-
Multi-Resolution Diffusion for Privacy-Sensitive Recommender Systems
Authors:
Derek Lilienthal,
Paul Mello,
Magdalini Eirinaki,
Stas Tiomkin
Abstract:
While recommender systems have become an integral component of the Web experience, their heavy reliance on user data raises privacy and security concerns. Substituting user data with synthetic data can address these concerns, but accurately replicating these real-world datasets has been a notoriously challenging problem. Recent advancements in generative AI have demonstrated the impressive capabil…
▽ More
While recommender systems have become an integral component of the Web experience, their heavy reliance on user data raises privacy and security concerns. Substituting user data with synthetic data can address these concerns, but accurately replicating these real-world datasets has been a notoriously challenging problem. Recent advancements in generative AI have demonstrated the impressive capabilities of diffusion models in generating realistic data across various domains. In this work we introduce a Score-based Diffusion Recommendation Module (SDRM), which captures the intricate patterns of real-world datasets required for training highly accurate recommender systems. SDRM allows for the generation of synthetic data that can replace existing datasets to preserve user privacy, or augment existing datasets to address excessive data sparsity. Our method outperforms competing baselines such as generative adversarial networks, variational autoencoders, and recently proposed diffusion models in synthesizing various datasets to replace or augment the original data by an average improvement of 4.30% in Recall@k and 4.65% in NDCG@k.
△ Less
Submitted 19 June, 2024; v1 submitted 6 November, 2023;
originally announced November 2023.
-
Process discovery on deviant traces and other stranger things
Authors:
Federico Chesani,
Chiara Di Francescomarino,
Chiara Ghidini,
Daniela Loreti,
Fabrizio Maria Maggi,
Paola Mello,
Marco Montali,
Sergio Tessaris
Abstract:
As the need to understand and formalise business processes into a model has grown over the last years, the process discovery research field has gained more and more importance, develo** two different classes of approaches to model representation: procedural and declarative. Orthogonally to this classification, the vast majority of works envisage the discovery task as a one-class supervised learn…
▽ More
As the need to understand and formalise business processes into a model has grown over the last years, the process discovery research field has gained more and more importance, develo** two different classes of approaches to model representation: procedural and declarative. Orthogonally to this classification, the vast majority of works envisage the discovery task as a one-class supervised learning process guided by the traces that are recorded into an input log. In this work instead, we focus on declarative processes and embrace the less-popular view of process discovery as a binary supervised learning task, where the input log reports both examples of the normal system execution, and traces representing "stranger" behaviours according to the domain semantics. We therefore deepen how the valuable information brought by both these two sets can be extracted and formalised into a model that is "optimal" according to user-defined goals. Our approach, namely NegDis, is evaluated w.r.t. other relevant works in this field, and shows promising results as regards both the performance and the quality of the obtained solution.
△ Less
Submitted 30 September, 2021;
originally announced September 2021.
-
Deep Learning-based Type Identification of Volumetric MRI Sequences
Authors:
Jean Pablo Vieira de Mello,
Thiago M. Paixão,
Rodrigo Berriel,
Mauricio Reyes,
Claudine Badue,
Alberto F. De Souza,
Thiago Oliveira-Santos
Abstract:
The analysis of Magnetic Resonance Imaging (MRI) sequences enables clinical professionals to monitor the progression of a brain tumor. As the interest for automatizing brain volume MRI analysis increases, it becomes convenient to have each sequence well identified. However, the unstandardized naming of MRI sequences makes their identification difficult for automated systems, as well as makes it di…
▽ More
The analysis of Magnetic Resonance Imaging (MRI) sequences enables clinical professionals to monitor the progression of a brain tumor. As the interest for automatizing brain volume MRI analysis increases, it becomes convenient to have each sequence well identified. However, the unstandardized naming of MRI sequences makes their identification difficult for automated systems, as well as makes it difficult for researches to generate or use datasets for machine learning research. In the face of that, we propose a system for identifying types of brain MRI sequences based on deep learning. By training a Convolutional Neural Network (CNN) based on 18-layer ResNet architecture, our system can classify a volumetric brain MRI as a FLAIR, T1, T1c or T2 sequence, or whether it does not belong to any of these classes. The network was evaluated on publicly available datasets comprising both, pre-processed (BraTS dataset) and non-pre-processed (TCGA-GBM dataset), image types with diverse acquisition protocols, requiring only a few slices of the volume for training. Our system can classify among sequence types with an accuracy of 96.81%.
△ Less
Submitted 6 June, 2021;
originally announced June 2021.
-
Reducing cybersickness in 360-degree virtual reality
Authors:
Iqra Arshad,
Paulo De Mello,
Martin Ender,
Jason D. McEwen,
Elisa R. Ferré
Abstract:
Despite the technological advancements in Virtual Reality (VR), users are constantly combating feelings of nausea and disorientation, the so called cybersickness. Cybersickness symptoms cause severe discomfort and hinder the immersive VR experience. Here we investigated cybersickness in 360-degree head-mounted display VR. In traditional 360-degree VR experiences, translational movement in the real…
▽ More
Despite the technological advancements in Virtual Reality (VR), users are constantly combating feelings of nausea and disorientation, the so called cybersickness. Cybersickness symptoms cause severe discomfort and hinder the immersive VR experience. Here we investigated cybersickness in 360-degree head-mounted display VR. In traditional 360-degree VR experiences, translational movement in the real world is not reflected in the virtual world, and therefore self-motion information is not corroborated by matching visual and vestibular cues, which may trigger symptoms of cybersickness. We have evaluated whether a new Artificial Intelligence (AI) software designed to supplement the 360-degree VR experience with artificial 6-degrees-of-freedom motion may reduce cybersickness. Explicit (simulator sickness questionnaire and fast motion sickness rating) and implicit (heart rate) measurements were used to evaluate cybersickness symptoms during and after 360-degree VR exposure. Simulator sickness scores showed a significant reduction in feelings of nausea during the AI supplemented 6-degrees-of-freedom motion VR compared to traditional 360-degree VR. However, 6-degrees-of-freedom motion VR did not reduce oculomotor or disorientation measures of sickness. No changes have been observed in fast motion sickness and heart rate measures. Improving the congruency between visual and vestibular cues in 360-degree VR, as provided by the AI supplemented 6-degrees-of-freedom motion system considered, is essential to provide a more engaging, immersive and safe VR, which is critical for educational, cultural and entertainment applications.
△ Less
Submitted 17 November, 2021; v1 submitted 5 March, 2021;
originally announced March 2021.
-
Deep traffic light detection by overlaying synthetic context on arbitrary natural images
Authors:
Jean Pablo Vieira de Mello,
Lucas Tabelini,
Rodrigo F. Berriel,
Thiago M. Paixão,
Alberto F. de Souza,
Claudine Badue,
Nicu Sebe,
Thiago Oliveira-Santos
Abstract:
Deep neural networks come as an effective solution to many problems associated with autonomous driving. By providing real image samples with traffic context to the network, the model learns to detect and classify elements of interest, such as pedestrians, traffic signs, and traffic lights. However, acquiring and annotating real data can be extremely costly in terms of time and effort. In this cont…
▽ More
Deep neural networks come as an effective solution to many problems associated with autonomous driving. By providing real image samples with traffic context to the network, the model learns to detect and classify elements of interest, such as pedestrians, traffic signs, and traffic lights. However, acquiring and annotating real data can be extremely costly in terms of time and effort. In this context, we propose a method to generate artificial traffic-related training data for deep traffic light detectors. This data is generated using basic non-realistic computer graphics to blend fake traffic scenes on top of arbitrary image backgrounds that are not related to the traffic domain. Thus, a large amount of training data can be generated without annotation efforts. Furthermore, it also tackles the intrinsic data imbalance problem in traffic light datasets, caused mainly by the low amount of samples of the yellow state. Experiments show that it is possible to achieve results comparable to those obtained with real training data from the problem domain, yielding an average mAP and an average F1-score which are each nearly 4 p.p. higher than the respective metrics obtained with a real-world reference model.
△ Less
Submitted 10 December, 2020; v1 submitted 7 November, 2020;
originally announced November 2020.
-
A new framework for the computation of Hessians
Authors:
Robert M. Gower,
Margarida P. Mello
Abstract:
We investigate the computation of Hessian matrices via Automatic Differentiation, using a graph model and an algebraic model. The graph model reveals the inherent symmetries involved in calculating the Hessian. The algebraic model, based on Griewank and Walther's state transformations, synthesizes the calculation of the Hessian as a formula. These dual points of view, graphical and algebraic, lead…
▽ More
We investigate the computation of Hessian matrices via Automatic Differentiation, using a graph model and an algebraic model. The graph model reveals the inherent symmetries involved in calculating the Hessian. The algebraic model, based on Griewank and Walther's state transformations, synthesizes the calculation of the Hessian as a formula. These dual points of view, graphical and algebraic, lead to a new framework for Hessian computation. This is illustrated by develo** edge_pushing, a new truly reverse Hessian computation algorithm that fully exploits the Hessian's symmetry. Computational experiments compare the performance of edge_pushing on sixteen functions from the CUTE collection against two algorithms available as drivers of the software ADOL-C, and the results are very promising.
△ Less
Submitted 29 July, 2020;
originally announced July 2020.
-
Verification of Magnitude and Phase Responses in Fixed-Point Digital Filters
Authors:
Daniel P. M. de Mello,
Mauro L. de Freitas,
Lucas C. Cordeiro,
Waldir S. S. Junior,
Iury V. de Bessa,
Eddie B. L. Filho,
Laurent Clavier
Abstract:
In the digital signal processing (DSP) area, one of the most important tasks is digital filter design. Currently, this procedure is performed with the aid of computational tools, which generally assume filter coefficients represented with floating-point arithmetic. Nonetheless, during the implementation phase, which is often done in digital signal processors or field programmable gate arrays, the…
▽ More
In the digital signal processing (DSP) area, one of the most important tasks is digital filter design. Currently, this procedure is performed with the aid of computational tools, which generally assume filter coefficients represented with floating-point arithmetic. Nonetheless, during the implementation phase, which is often done in digital signal processors or field programmable gate arrays, the representation of the obtained coefficients can be carried out through integer or fixed-point arithmetic, which often results in unexpected behavior or even unstable filters. The present work addresses this issue and proposes a verification methodology based on the digital-system verifier (DSVerifier), with the goal of checking fixed-point digital filters w.r.t. implementation aspects. In particular, DSVerifier checks whether the number of bits used in coefficient representation will result in a filter with the same features specified during the design phase. Experimental results show that errors regarding frequency response and overflow are likely to be identified with the proposed methodology, which thus improves overall system's reliability.
△ Less
Submitted 16 June, 2017;
originally announced June 2017.
-
Abducing Compliance of Incomplete Event Logs
Authors:
Federico Chesani,
Riccardo De Masellis,
Chiara Di Francescomarino,
Chiara Ghidini,
Paola Mello,
Marco Montali,
Sergio Tessaris
Abstract:
The capability to store data about business processes execution in so-called Event Logs has brought to the diffusion of tools for the analysis of process executions and for the assessment of the goodness of a process model. Nonetheless, these tools are often very rigid in dealing with with Event Logs that include incomplete information about the process execution. Thus, while the ability of handli…
▽ More
The capability to store data about business processes execution in so-called Event Logs has brought to the diffusion of tools for the analysis of process executions and for the assessment of the goodness of a process model. Nonetheless, these tools are often very rigid in dealing with with Event Logs that include incomplete information about the process execution. Thus, while the ability of handling incomplete event data is one of the challenges mentioned in the process mining manifesto, the evaluation of compliance of an execution trace still requires an end-to-end complete trace to be performed.
This paper exploits the power of abduction to provide a flexible, yet computationally effective, framework to deal with different forms of incompleteness in an Event Log. Moreover it proposes a refinement of the classical notion of compliance into strong and conditional compliance to take into account incomplete logs. Finally, performances evaluation in an experimental setting shows the feasibility of the presented approach.
△ Less
Submitted 17 June, 2016;
originally announced June 2016.
-
A CHR-based Implementation of Known Arc-Consistency
Authors:
Marco Alberti,
Marco Gavanelli,
Evelina Lamma,
Paola Mello,
Michela Milano
Abstract:
In classical CLP(FD) systems, domains of variables are completely known at the beginning of the constraint propagation process. However, in systems interacting with an external environment, acquiring the whole domains of variables before the beginning of constraint propagation may cause waste of computation time, or even obsolescence of the acquired data at the time of use.
For such cases, the…
▽ More
In classical CLP(FD) systems, domains of variables are completely known at the beginning of the constraint propagation process. However, in systems interacting with an external environment, acquiring the whole domains of variables before the beginning of constraint propagation may cause waste of computation time, or even obsolescence of the acquired data at the time of use.
For such cases, the Interactive Constraint Satisfaction Problem (ICSP) model has been proposed as an extension of the CSP model, to make it possible to start constraint propagation even when domains are not fully known, performing acquisition of domain elements only when necessary, and without the need for restarting the propagation after every acquisition.
In this paper, we show how a solver for the two sorted CLP language, defined in previous work, to express ICSPs, has been implemented in the Constraint Handling Rules (CHR) language, a declarative language particularly suitable for high level implementation of constraint solvers.
△ Less
Submitted 24 August, 2004;
originally announced August 2004.