Skip to main content

Showing 1–30 of 30 results for author: Pan, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.13216  [pdf, other

    cs.LG cs.AI

    Combining Optimal Transport and Embedding-Based Approaches for More Expressiveness in Unsupervised Graph Alignment

    Authors: Songyang Chen, Yu Liu, Lei Zou, Zexuan Wang, Youfang Lin, Yuxing Chen, Anqun Pan

    Abstract: Unsupervised graph alignment finds the one-to-one node correspondence between a pair of attributed graphs by only exploiting graph structure and node features. One category of existing works first computes the node representation and then matches nodes with close embeddings, which is intuitive but lacks a clear objective tailored for graph alignment in the unsupervised setting. The other category… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: 12 pages,9 figures

  2. arXiv:2404.09932  [pdf, other

    cs.LG cs.AI cs.CL cs.CY

    Foundational Challenges in Assuring Alignment and Safety of Large Language Models

    Authors: Usman Anwar, Abulhair Saparov, Javier Rando, Daniel Paleka, Miles Turpin, Peter Hase, Ekdeep Singh Lubana, Erik Jenner, Stephen Casper, Oliver Sourbut, Benjamin L. Edelman, Zhaowei Zhang, Mario Günther, Anton Korinek, Jose Hernandez-Orallo, Lewis Hammond, Eric Bigelow, Alexander Pan, Lauro Langosco, Tomasz Korbak, Heidi Zhang, Ruiqi Zhong, Seán Ó hÉigeartaigh, Gabriel Recchia, Giulio Corsi , et al. (13 additional authors not shown)

    Abstract: This work identifies 18 foundational challenges in assuring the alignment and safety of large language models (LLMs). These challenges are organized into three different categories: scientific understanding of LLMs, development and deployment methods, and sociotechnical challenges. Based on the identified challenges, we pose $200+$ concrete research questions.

    Submitted 15 April, 2024; originally announced April 2024.

  3. arXiv:2403.11221  [pdf, other

    cs.DC cs.DB

    Lion: Minimizing Distributed Transactions through Adaptive Replica Provision (Extended Version)

    Authors: Qiushi Zheng, Zhanhao Zhao, Wei Lu, Chang Yao, Yuxing Chen, Anqun Pan, Xiaoyong Du

    Abstract: Distributed transaction processing often involves multiple rounds of cross-node communications, and therefore tends to be slow. To improve performance, existing approaches convert distributed transactions into single-node transactions by either migrating co-accessed partitions onto the same nodes or establishing a super node housing replicas of the entire database. However, migration-based methods… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

  4. arXiv:2403.03218  [pdf, other

    cs.LG cs.AI cs.CL cs.CY

    The WMDP Benchmark: Measuring and Reducing Malicious Use With Unlearning

    Authors: Nathaniel Li, Alexander Pan, Anjali Gopal, Summer Yue, Daniel Berrios, Alice Gatti, Justin D. Li, Ann-Kathrin Dombrowski, Shashwat Goel, Long Phan, Gabriel Mukobi, Nathan Helm-Burger, Rassin Lababidi, Lennart Justen, Andrew B. Liu, Michael Chen, Isabelle Barrass, Oliver Zhang, Xiaoyuan Zhu, Rishub Tamirisa, Bhrugu Bharathi, Adam Khoja, Zhenqi Zhao, Ariel Herbert-Voss, Cort B. Breuer , et al. (32 additional authors not shown)

    Abstract: The White House Executive Order on Artificial Intelligence highlights the risks of large language models (LLMs) empowering malicious actors in develo** biological, cyber, and chemical weapons. To measure these risks of malicious use, government institutions and major AI labs are develo** evaluations for hazardous capabilities in LLMs. However, current evaluations are private, preventing furthe… ▽ More

    Submitted 15 May, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

    Comments: See the project page at https://wmdp.ai

  5. arXiv:2402.17985  [pdf, other

    cs.LG cs.AI cs.CL

    FlattenQuant: Breaking Through the Inference Compute-bound for Large Language Models with Per-tensor Quantization

    Authors: Yi Zhang, Fei Yang, Shuang Peng, Fangyu Wang, Aimin Pan

    Abstract: Large language models (LLMs) have demonstrated state-of-the-art performance across various tasks. However, the latency of inference and the large GPU memory consumption of LLMs restrict their deployment performance. Recently, there have been some efficient attempts to quantize LLMs, yet inference with large batch size or long sequence still has the issue of being compute-bound. Fine-grained quanti… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

  6. arXiv:2402.06627  [pdf, other

    cs.LG cs.AI cs.CL

    Feedback Loops With Language Models Drive In-Context Reward Hacking

    Authors: Alexander Pan, Erik Jones, Meena Jagadeesan, Jacob Steinhardt

    Abstract: Language models influence the external world: they query APIs that read and write to web pages, generate content that shapes human behavior, and run system commands as autonomous agents. These interactions form feedback loops: LLM outputs affect the world, which in turn affect subsequent LLM outputs. In this work, we show that feedback loops can cause in-context reward hacking (ICRH), where the LL… ▽ More

    Submitted 6 June, 2024; v1 submitted 9 February, 2024; originally announced February 2024.

    Comments: ICML 2024 camera-ready

  7. arXiv:2401.13850  [pdf, other

    cs.CY

    PADTHAI-MM: A Principled Approach for Designing Trustable, Human-centered AI systems using the MAST Methodology

    Authors: Nayoung Kim, Myke C. Cohen, Yang Ba, Anna Pan, Shawaiz Bhatti, Pouria Salehi, James Sung, Erik Blasch, Michelle V. Mancenido, Erin K. Chiou

    Abstract: Designing for AI trustworthiness is challenging, with a lack of practical guidance despite extensive literature on trust. The Multisource AI Scorecard Table (MAST), a checklist rating system, addresses this gap in designing and evaluating AI-enabled decision support systems. We propose the Principled Approach for Designing Trustable Human-centered AI systems using MAST Methodology (PADTHAI-MM), a… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

  8. arXiv:2312.03549  [pdf, other

    cs.CL cs.DC

    Holmes: Towards Distributed Training Across Clusters with Heterogeneous NIC Environment

    Authors: Fei Yang, Shuang Peng, Ning Sun, Fangyu Wang, Yuanyuan Wang, Fu Wu, Jiezhong Qiu, Aimin Pan

    Abstract: Large language models (LLMs) such as GPT-3, OPT, and LLaMA have demonstrated remarkable accuracy in a wide range of tasks. However, training these models can incur significant expenses, often requiring tens of thousands of GPUs for months of continuous operation. Typically, this training is carried out in specialized GPU clusters equipped with homogeneous high-speed Remote Direct Memory Access (RD… ▽ More

    Submitted 29 April, 2024; v1 submitted 6 December, 2023; originally announced December 2023.

    Comments: 12 pages

  9. arXiv:2311.18040  [pdf, other

    cs.CY

    Evaluating Trustworthiness of AI-Enabled Decision Support Systems: Validation of the Multisource AI Scorecard Table (MAST)

    Authors: Pouria Salehi, Yang Ba, Nayoung Kim, Ahmadreza Mosallanezhad, Anna Pan, Myke C. Cohen, Yixuan Wang, Jieqiong Zhao, Shawaiz Bhatti, James Sung, Erik Blasch, Michelle V. Mancenido, Erin K. Chiou

    Abstract: The Multisource AI Scorecard Table (MAST) is a checklist tool based on analytic tradecraft standards to inform the design and evaluation of trustworthy AI systems. In this study, we evaluate whether MAST is associated with people's trust perceptions in AI-enabled decision support systems (AI-DSSs). Evaluating trust in AI-DSSs poses challenges to researchers and practitioners. These challenges incl… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

  10. arXiv:2310.19624  [pdf, other

    cs.LG cs.AI q-bio.QM

    Exploring Post-Training Quantization of Protein Language Models

    Authors: Shuang Peng, Fei Yang, Ning Sun, Sheng Chen, Yanfeng Jiang, Aimin Pan

    Abstract: Recent advancements in unsupervised protein language models (ProteinLMs), like ESM-1b and ESM-2, have shown promise in different protein prediction tasks. However, these models face challenges due to their high computational demands, significant memory needs, and latency, restricting their usage on devices with limited resources. To tackle this, we explore post-training quantization (PTQ) for Prot… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

    Comments: 8 pages, 4 figures

  11. arXiv:2310.01405  [pdf, other

    cs.LG cs.AI cs.CL cs.CV cs.CY

    Representation Engineering: A Top-Down Approach to AI Transparency

    Authors: Andy Zou, Long Phan, Sarah Chen, James Campbell, Phillip Guo, Richard Ren, Alexander Pan, Xuwang Yin, Mantas Mazeika, Ann-Kathrin Dombrowski, Shashwat Goel, Nathaniel Li, Michael J. Byun, Zifan Wang, Alex Mallen, Steven Basart, Sanmi Koyejo, Dawn Song, Matt Fredrikson, J. Zico Kolter, Dan Hendrycks

    Abstract: In this paper, we identify and characterize the emerging area of representation engineering (RepE), an approach to enhancing the transparency of AI systems that draws on insights from cognitive neuroscience. RepE places population-level representations, rather than neurons or circuits, at the center of analysis, equip** us with novel methods for monitoring and manipulating high-level cognitive p… ▽ More

    Submitted 10 October, 2023; v1 submitted 2 October, 2023; originally announced October 2023.

    Comments: Code is available at https://github.com/andyzoujm/representation-engineering

  12. arXiv:2309.15840  [pdf, other

    cs.CL cs.AI cs.LG

    How to Catch an AI Liar: Lie Detection in Black-Box LLMs by Asking Unrelated Questions

    Authors: Lorenzo Pacchiardi, Alex J. Chan, Sören Mindermann, Ilan Moscovitz, Alexa Y. Pan, Yarin Gal, Owain Evans, Jan Brauner

    Abstract: Large language models (LLMs) can "lie", which we define as outputting false statements despite "knowing" the truth in a demonstrable sense. LLMs might "lie", for example, when instructed to output misinformation. Here, we develop a simple lie detector that requires neither access to the LLM's activations (black-box) nor ground-truth knowledge of the fact in question. The detector works by asking a… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

  13. arXiv:2308.15012  [pdf, other

    cs.DB

    SALI: A Scalable Adaptive Learned Index Framework based on Probability Models

    Authors: Jiake Ge, Huanchen Zhang, Boyu Shi, Yuanhui Luo, Yunda Guo, Yunpeng Chai, Yuxing Chen, Anqun Pan

    Abstract: The growth in data storage capacity and the increasing demands for high performance have created several challenges for concurrent indexing structures. One promising solution is learned indexes, which use a learning-based approach to fit the distribution of stored data and predictively locate target keys, significantly improving lookup performance. Despite their advantages, prevailing learned inde… ▽ More

    Submitted 4 September, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

    Comments: Accepted by Conference SIGMOD 24, June 09-15, 2024, Santiago, Chile

  14. arXiv:2304.14619  [pdf, ps, other

    cs.CV

    A positive feedback method based on F-measure value for Salient Object Detection

    Authors: Ailing Pan, Chao Dai, Chen Pan, Dong** Zhang, Yunchao Xu

    Abstract: The majority of current salient object detection (SOD) models are focused on designing a series of decoders based on fully convolutional networks (FCNs) or Transformer architectures and integrating them in a skillful manner. These models have achieved remarkable high performance and made significant contributions to the development of SOD. Their primary research objective is to develop novel algor… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

    Comments: 13 pages, 4 figures, 3 table

    MSC Class: ACM-class: I.4 COMPUTING METHODOLOGIES; I.4.9 Image Processing and Computer Vision; I.5.4 Pattern Recognition

  15. arXiv:2304.03279  [pdf, other

    cs.LG cs.AI cs.CL cs.CY

    Do the Rewards Justify the Means? Measuring Trade-Offs Between Rewards and Ethical Behavior in the MACHIAVELLI Benchmark

    Authors: Alexander Pan, Jun Shern Chan, Andy Zou, Nathaniel Li, Steven Basart, Thomas Woodside, Jonathan Ng, Hanlin Zhang, Scott Emmons, Dan Hendrycks

    Abstract: Artificial agents have traditionally been trained to maximize reward, which may incentivize power-seeking and deception, analogous to how next-token prediction in language models (LMs) may incentivize toxicity. So do agents naturally learn to be Machiavellian? And how do we measure these behaviors in general-purpose models such as GPT-4? Towards answering these questions, we introduce MACHIAVELLI,… ▽ More

    Submitted 12 June, 2023; v1 submitted 6 April, 2023; originally announced April 2023.

    Comments: ICML 2023 Oral (camera-ready); 31 pages, 5 figures

  16. arXiv:2303.06710  [pdf, other

    cs.RO cs.AI cs.LG

    Decision Making for Human-in-the-loop Robotic Agents via Uncertainty-Aware Reinforcement Learning

    Authors: Siddharth Singi, Zhanpeng He, Alvin Pan, Sandip Patel, Gunnar A. Sigurdsson, Robinson Piramuthu, Shuran Song, Matei Ciocarlie

    Abstract: In a Human-in-the-Loop paradigm, a robotic agent is able to act mostly autonomously in solving a task, but can request help from an external expert when needed. However, knowing when to request such assistance is critical: too few requests can lead to the robot making mistakes, but too many requests can overload the expert. In this paper, we present a Reinforcement Learning based approach to this… ▽ More

    Submitted 14 March, 2023; v1 submitted 12 March, 2023; originally announced March 2023.

  17. arXiv:2302.00942  [pdf, other

    cs.LG

    Efficient Graph Field Integrators Meet Point Clouds

    Authors: Krzysztof Choromanski, Arijit Sehanobish, Han Lin, Yunfan Zhao, Eli Berger, Tetiana Parshakova, Alvin Pan, David Watkins, Tianyi Zhang, Valerii Likhosherstov, Somnath Basu Roy Chowdhury, Avinava Dubey, Deepali Jain, Tamas Sarlos, Snigdha Chaturvedi, Adrian Weller

    Abstract: We present two new classes of algorithms for efficient field integration on graphs encoding point clouds. The first class, SeparatorFactorization(SF), leverages the bounded genus of point cloud mesh graphs, while the second class, RFDiffusion(RFD), uses popular epsilon-nearest-neighbor graph representations for point clouds. Both can be viewed as providing the functionality of Fast Multipole Metho… ▽ More

    Submitted 4 October, 2023; v1 submitted 2 February, 2023; originally announced February 2023.

    Journal ref: ICML 2023

  18. arXiv:2301.07313  [pdf, other

    cs.DB cs.DC

    Efficient Black-box Checking of Snapshot Isolation in Databases

    Authors: Kaile Huang, Si Liu, Zhenge Chen, Hengfeng Wei, David Basin, Haixiang Li, Anqun Pan

    Abstract: Snapshot isolation (SI) is a prevalent weak isolation level that avoids the performance penalty imposed by serializability and simultaneously prevents various undesired data anomalies. Nevertheless, SI anomalies have recently been found in production cloud databases that claim to provide the SI guarantee. Given the complex and often unavailable internals of such databases, a black-box SI checker i… ▽ More

    Submitted 24 October, 2023; v1 submitted 18 January, 2023; originally announced January 2023.

    Comments: 20 pages, 15 figures, accepted by PVLDB

  19. arXiv:2210.02018  [pdf, other

    cs.CV

    InterFace:Adjustable Angular Margin Inter-class Loss for Deep Face Recognition

    Authors: Meng Sang, Jiaxuan Chen, Mengzhen Li, Pan Tan, Anning Pan, Shan Zhao, Yang Yang

    Abstract: In the field of face recognition, it is always a hot research topic to improve the loss solution to make the face features extracted by the network have greater discriminative power. Research works in recent years has improved the discriminative power of the face model by normalizing softmax to the cosine space step by step and then adding a fixed penalty margin to reduce the intra-class distance… ▽ More

    Submitted 9 October, 2022; v1 submitted 5 October, 2022; originally announced October 2022.

    Comments: arXiv admin note: text overlap with arXiv:2109.09416 by other authors

  20. Sampling Through the Lens of Sequential Decision Making

    Authors: Jason Xiaotian Dou, Alvin Qingkai Pan, Runxue Bao, Haiyi Harry Mao, Lei Luo, Zhi-Hong Mao

    Abstract: Sampling is ubiquitous in machine learning methodologies. Due to the growth of large datasets and model complexity, we want to learn and adapt the sampling process while training a representation. Towards achieving this grand goal, a variety of sampling techniques have been proposed. However, most of them either use a fixed sampling scheme or adjust the sampling scheme based on simple heuristics.… ▽ More

    Submitted 13 December, 2022; v1 submitted 17 August, 2022; originally announced August 2022.

  21. arXiv:2204.05627  [pdf, other

    cs.AI

    Proximal Policy Optimization Learning based Control of Congested Freeway Traffic

    Authors: Shurong Mo, Nailong Wu, Jie Qi, Anqi Pan, Zhiguang Feng, Huaicheng Yan, Yueying Wang

    Abstract: This study proposes a delay-compensated feedback controller based on proximal policy optimization (PPO) reinforcement learning to stabilize traffic flow in the congested regime by manipulating the time-gap of adaptive cruise control-equipped (ACC-equipped) vehicles.The traffic dynamics on a freeway segment are governed by an Aw-Rascle-Zhang (ARZ) model, consisting of $2\times 2$ nonlinear first-or… ▽ More

    Submitted 14 January, 2023; v1 submitted 12 April, 2022; originally announced April 2022.

  22. arXiv:2204.01341  [pdf, other

    cs.CV cs.AI

    An application of Pixel Interval Down-sampling (PID) for dense tiny microorganism counting on environmental microorganism images

    Authors: Jiawei Zhang, Xin Zhao, Tao Jiang, Md Mamunur Rahaman, Yudong Yao, Yu-Hao Lin, **ghua Zhang, Ao Pan, Marcin Grzegorzek, Chen Li

    Abstract: This paper proposes a novel pixel interval down-sampling network (PID-Net) for dense tiny object (yeast cells) counting tasks with higher accuracy. The PID-Net is an end-to-end convolutional neural network (CNN) model with an encoder--decoder architecture. The pixel interval down-sampling operations are concatenated with max-pooling operations to combine the sparse and dense features. This address… ▽ More

    Submitted 22 July, 2022; v1 submitted 4 April, 2022; originally announced April 2022.

  23. Comparing the Perceived Legitimacy of Content Moderation Processes: Contractors, Algorithms, Expert Panels, and Digital Juries

    Authors: Christina A. Pan, Sahil Yakhmi, Tara P. Iyer, Evan Strasnick, Amy X. Zhang, Michael S. Bernstein

    Abstract: While research continues to investigate and improve the accuracy, fairness, and normative appropriateness of content moderation processes on large social media platforms, even the best process cannot be effective if users reject its authority as illegitimate. We present a survey experiment comparing the perceived institutional legitimacy of four popular content moderation processes. We conducted a… ▽ More

    Submitted 6 October, 2022; v1 submitted 13 February, 2022; originally announced February 2022.

    Comments: This paper will appear at CSCW 2022

  24. arXiv:2201.03544  [pdf, ps, other

    cs.LG cs.AI stat.ML

    The Effects of Reward Misspecification: Map** and Mitigating Misaligned Models

    Authors: Alexander Pan, Kush Bhatia, Jacob Steinhardt

    Abstract: Reward hacking -- where RL agents exploit gaps in misspecified reward functions -- has been widely observed, but not yet systematically studied. To understand how reward hacking arises, we construct four RL environments with misspecified rewards. We investigate reward hacking as a function of agent capabilities: model capacity, action space resolution, observation space noise, and training time. M… ▽ More

    Submitted 14 February, 2022; v1 submitted 10 January, 2022; originally announced January 2022.

    Comments: ICLR 2022; 19 pages

  25. arXiv:2111.14946  [pdf, other

    cs.DC

    Verifying Transactional Consistency of MongoDB

    Authors: Hongrong Ouyang, Hengfeng Wei, Yu Huang, Haixiang Li, Anqun Pan

    Abstract: MongoDB is a popular general-purpose, document-oriented, distributed NoSQL database. It supports transactions in three different deployments: single-document transactions utilizing the WiredTiger storage engine in a standalone node, multi-document transactions in a replica set which consists of a primary node and several secondary nodes, and distributed transactions in a sharded cluster which is a… ▽ More

    Submitted 15 June, 2022; v1 submitted 29 November, 2021; originally announced November 2021.

    Comments: v0.2, update with proof of correctness. 17 pages(16 pages excluding reference), 8 algorithms, 5 tables and 2 figures

  26. arXiv:2110.08956  [pdf, other

    eess.SY cs.AI cs.LG

    Improving Robustness of Reinforcement Learning for Power System Control with Adversarial Training

    Authors: Alexander Pan, Yongkyun Lee, Huan Zhang, Yize Chen, Yuanyuan Shi

    Abstract: Due to the proliferation of renewable energy and its intrinsic intermittency and stochasticity, current power systems face severe operational challenges. Data-driven decision-making algorithms from reinforcement learning (RL) offer a solution towards efficiently operating a clean energy system. Although RL algorithms achieve promising performance compared to model-based control models, there has b… ▽ More

    Submitted 18 October, 2021; v1 submitted 17 October, 2021; originally announced October 2021.

    Comments: Published at 2021 ICML RL4RL Workshop; Submitted to 2022 PSCC

  27. arXiv:2109.14189  [pdf, other

    cs.DC

    Byz-GentleRain: An Efficient Byzantine-tolerant Causal Consistency Protocol

    Authors: Kaile Huang, Hengfeng Wei, Yu Huang, Haixiang Li, Anqun Pan

    Abstract: Causal consistency is a widely used weak consistency model that allows high availability despite network partitions. There are plenty of research prototypes and industrial deployments of causally consistent distributed systems. However, as far as we know, none of them consider Byzantine faults, except Byz-RCM proposed by Tseng et al. Byz-RCM achieves causal consistency in the client-server model w… ▽ More

    Submitted 29 September, 2021; originally announced September 2021.

    Comments: 20 pages, 3 figures, 4 Algorithms; Published as a brief announcement on SSS'2021 (The 23rd International Symposium on Stabilization, Safety, and Security of Distributed Systems)

  28. arXiv:2109.06485  [pdf, other

    cs.DB

    Coo: Rethink Data Anomalies In Databases

    Authors: Haixiang Li, Xiaoyan Li, Yuxing Chen, Yuean Zhu, Xiaoyong Du, Wei Lu, Chang Liu, Anqun Pan

    Abstract: Transaction processing technology has three important contents: data anomalies, isolation levels, and concurrent control algorithms. Concurrent control algorithms are used to eliminate some or all data anomalies at different isolation levels to ensure data consistency. Isolation levels in the current ANSI standard are defined by disallowing certain kinds of data anomalies. Yet, the definitions of… ▽ More

    Submitted 1 November, 2021; v1 submitted 14 September, 2021; originally announced September 2021.

  29. arXiv:1901.02819  [pdf, ps, other

    cs.SE cs.PL

    Automated Customized Bug-Benchmark Generation

    Authors: Vineeth Kashyap, Jason Ruchti, Lucja Kot, Emma Turetsky, Rebecca Swords, Shih An Pan, Julien Henry, David Melski, Eric Schulte

    Abstract: We introduce Bug-Injector, a system that automatically creates benchmarks for customized evaluation of static analysis tools. We share a benchmark generated using Bug-Injector and illustrate its efficacy by using it to evaluate the recall of two leading open-source static analysis tools: Clang Static Analyzer and Infer. Bug-Injector works by inserting bugs based on bug templates into real-world… ▽ More

    Submitted 6 September, 2019; v1 submitted 9 January, 2019; originally announced January 2019.

    Journal ref: IEEE SCAM 2019

  30. arXiv:1707.03716  [pdf

    cs.CV physics.optics

    Data preprocessing methods for robust Fourier ptychographic microscopy

    Authors: Yan Zhang, An Pan, Ming Lei, Baoli Yao

    Abstract: Fourier ptychographic microscopy (FPM) is a recently proposed computational imaging technique with both high resolution and wide field-of-view. In current FP experimental setup, the dark-field images with high-angle illuminations are easily submerged by stray light and background noise due to the low signal-to-noise ratio, thus significantly degrading the reconstruction quality and also imposing a… ▽ More

    Submitted 4 June, 2017; originally announced July 2017.

    Comments: 7 pages, 8 figures

    Journal ref: Optical Engineering 56(12), 123107 (2017)