-
3D Face Modeling From Diverse Raw Scan Data
Authors:
Feng Liu,
Luan Tran,
Xiaoming Liu
Abstract:
Traditional 3D face models learn a latent representation of faces using linear subspaces from limited scans of a single database. The main roadblock of building a large-scale face model from diverse 3D databases lies in the lack of dense correspondence among raw scans. To address these problems, this paper proposes an innovative framework to jointly learn a nonlinear face model from a diverse set…
▽ More
Traditional 3D face models learn a latent representation of faces using linear subspaces from limited scans of a single database. The main roadblock of building a large-scale face model from diverse 3D databases lies in the lack of dense correspondence among raw scans. To address these problems, this paper proposes an innovative framework to jointly learn a nonlinear face model from a diverse set of raw 3D scan databases and establish dense point-to-point correspondence among their scans. Specifically, by treating input scans as unorganized point clouds, we explore the use of PointNet architectures for converting point clouds to identity and expression feature representations, from which the decoder networks recover their 3D face shapes. Further, we propose a weakly supervised learning approach that does not require correspondence label for the scans. We demonstrate the superior dense correspondence and representation power of our proposed method, and its contribution to single-image 3D face reconstruction.
△ Less
Submitted 13 August, 2019; v1 submitted 13 February, 2019;
originally announced February 2019.
-
An Eisenbud-Goto-type Upper Bound for the Castelnuovo-Mumford Regularity of Fake Weighted Projective Spaces
Authors:
Bach Le Tran
Abstract:
We will give an upper bound for the $k$-normality of very ample lattice simplices, and then give an Eisenbud-Goto-type bound for some special classes of projective toric varieties.
We will give an upper bound for the $k$-normality of very ample lattice simplices, and then give an Eisenbud-Goto-type bound for some special classes of projective toric varieties.
△ Less
Submitted 10 February, 2019;
originally announced February 2019.
-
D&C: A Divide-and-Conquer Approach to IR-based Bug Localization
Authors:
Anil Koyuncu,
Tegawendé F. Bissyandé,
Dongsun Kim,
Kui Liu,
Jacques Klein,
Martin Monperrus,
Yves Le Traon
Abstract:
Many automated tasks in software maintenance rely on information retrieval techniques to identify specific information within unstructured data. Bug localization is such a typical task, where text in a bug report is analyzed to identify file locations in the source code that can be associated to the reported bug. Despite the promising results, the performance offered by IR-based bug localization t…
▽ More
Many automated tasks in software maintenance rely on information retrieval techniques to identify specific information within unstructured data. Bug localization is such a typical task, where text in a bug report is analyzed to identify file locations in the source code that can be associated to the reported bug. Despite the promising results, the performance offered by IR-based bug localization tools is still not significant for large adoption. We argue that one reason could be the attempt to build a one-size-fits-all approach. In this paper, we extensively study the performance of state-of-the-art bug localization tools, focusing on query formulation and its importance with respect to the localization performance. Building on insights from this study, we propose a new learning approach where multiple classifier models are trained on clear-cut sets of bug-location pairs. Concretely, we apply a gradient boosting supervised learning approach to various sets of bug reports whose localizations appear to be successful with specific types of features. The training scenario builds on our findings that the various state-of-the-art localization tools can be highly performant for specific sets of bug reports. We implement D&C, which computes appropriate weights that should be assigned to the similarity measurements between pairs of information token types. Experimental results on large and up-to-date datasets reveal that D&C outperforms state-of-the-art tools. On average, the experiments yield an MAP score of 0.52, and an MRR score of 0.63 with a curated dataset, which provides a substantial performance improvement over all tools: MAP is improved by between 4 and up to 10 percentage points, while MRR is improved by between 1 and up to 12. Finally, we note that D&C is stable in its localization performance: around 50% of bugs can be located at Top1, 77% at Top5 and 85% at Top10.
△ Less
Submitted 7 February, 2019;
originally announced February 2019.
-
Analysis of Testbeam Data of the Highly Granular RPC-Steel CALICE Digital Hadron Calorimeter and Validation of Geant4 Monte Carlo Models
Authors:
CALICE Collaboration,
M. Chefdeville,
J. Repond,
J. Schlereth,
J. R. Smith,
D. Trojand,
L. Xia,
Q. Zhang,
J. Apostolakis,
C. Grefe,
V. Ivantchenko,
G. Folger,
A. Ribon,
V. Uzhinskiy,
G. C. Blazey,
A. Dyshkant,
K. Francis,
V. Zutshi,
O. Bach,
V. Bocharnikov,
E. Brianne,
K. Gadow,
P. Göttlicher,
O. Hartbrich,
D. Heuchel
, et al. (71 additional authors not shown)
Abstract:
We present a study of the response of the highly granular Digital Hadronic Calorimeter with steel absorbers, the Fe-DHCAL, to positrons, muons, and pions with momenta ranging from 2 to 60 GeV/c. Developed in the context of the CALICE collaboration, this hadron calorimeter utilises Resistive Plate Chambers as active media, interspersed with steel absorber plates. With a transverse granularity of…
▽ More
We present a study of the response of the highly granular Digital Hadronic Calorimeter with steel absorbers, the Fe-DHCAL, to positrons, muons, and pions with momenta ranging from 2 to 60 GeV/c. Developed in the context of the CALICE collaboration, this hadron calorimeter utilises Resistive Plate Chambers as active media, interspersed with steel absorber plates. With a transverse granularity of $1\,\times\,1\,$cm$^{2}$ and a longitudinal segmentation of 38 layers, the calorimeter counted 350,208 readout channels, each read out with single-bit resolution (digital readout). The data were recorded in the Fermilab test beam in 2010-11. The analysis includes measurements of the calorimeter response and the energy resolution to positrons and muons, as well as detailed studies of various shower shape quantities. The results are compared to simulations based on Geant4, which utilise different electromagnetic and hadronic physics lists.
△ Less
Submitted 25 January, 2019;
originally announced January 2019.
-
A Reider-type Result for Smooth Projective Toric Surfaces
Authors:
Bach Le Tran
Abstract:
Let $L$ be an ample line bundle over a smooth projective toric surface $X$. Then $L$ corresponds to a very ample lattice polytope $P$ that encodes many geometric properties of $L$. In this article, by studying $P$, we will give some necessary and sufficient numerical criteria for the adjoint series $|K_X+L|$ to be either nef or (very) ample.
Let $L$ be an ample line bundle over a smooth projective toric surface $X$. Then $L$ corresponds to a very ample lattice polytope $P$ that encodes many geometric properties of $L$. In this article, by studying $P$, we will give some necessary and sufficient numerical criteria for the adjoint series $|K_X+L|$ to be either nef or (very) ample.
△ Less
Submitted 22 January, 2019;
originally announced January 2019.
-
Approximate cloaking for time-dependent Maxwell equations via transformation optics
Authors:
Hoai-Minh Nguyen,
Loc Tran
Abstract:
We study approximate cloaking using transformation optics for electromagnetic waves in the time domain. Our approach is based on estimates of the degree of visibility in the frequency domain for all frequencies in which the frequency dependence is explicit. The difficulty and the novelty analysis parts are in the low and high frequency regimes. To this end, we implement a variational technique in…
▽ More
We study approximate cloaking using transformation optics for electromagnetic waves in the time domain. Our approach is based on estimates of the degree of visibility in the frequency domain for all frequencies in which the frequency dependence is explicit. The difficulty and the novelty analysis parts are in the low and high frequency regimes. To this end, we implement a variational technique in the low frequency domain, and multiplier and duality techniques in the high frequency domain. Our approach is inspired by the work of Nguyen and Vogelius on the wave equation.
△ Less
Submitted 14 January, 2019;
originally announced January 2019.
-
Impact of Tool Support in Patch Construction
Authors:
Anil Koyuncu,
Tegawendé F. Bissyandé,
Dongsun Kim,
Jacques Klein,
Martin Monperrus,
Yves Le Traon
Abstract:
In this work, we investigate the practice of patch construction in the Linux kernel development, focusing on the differences between three patching processes: (1) patches crafted entirely manually to fix bugs, (2) those that are derived from warnings of bug detection tools, and (3) those that are automatically generated based on fix patterns. With this study, we provide to the research community c…
▽ More
In this work, we investigate the practice of patch construction in the Linux kernel development, focusing on the differences between three patching processes: (1) patches crafted entirely manually to fix bugs, (2) those that are derived from warnings of bug detection tools, and (3) those that are automatically generated based on fix patterns. With this study, we provide to the research community concrete insights on the practice of patching as well as how the development community is currently embracing research and commercial patching tools to improve productivity in repair. The result of our study shows that tool-supported patches are increasingly adopted by the developer community while manually-written patches are accepted more quickly. Patch application tools enable developers to remain committed to contributing patches to the code base. Our findings also include that, in actual development processes, patches generally implement several change operations spread over the code, even for patches fixing warnings by bug detection tools. Finally, this study has shown that there is an opportunity to directly leverage the output of bug detection tools to readily generate patches that are appropriate for fixing the problem, and that are consistent with manually-written patches.
△ Less
Submitted 18 December, 2018;
originally announced December 2018.
-
You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems
Authors:
Kui Liu,
Anil Koyuncu,
Tegawendé F. Bissyandé,
Dongsun Kim,
Jacques Klein,
Yves Le Traon
Abstract:
Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure that it reaches significant milestones by reliably comparing state-of-the-art tools for a better understanding of their strengths and weaknesses. In this work, we identify and investigate a practical…
▽ More
Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure that it reaches significant milestones by reliably comparing state-of-the-art tools for a better understanding of their strengths and weaknesses. In this work, we identify and investigate a practical bias caused by the fault localization (FL) step in a repair pipeline. We propose to highlight the different fault localization configurations used in the literature, and their impact on APR systems when applied to the Defects4J benchmark. Then, we explore the performance variations that can be achieved by `tweaking' the FL step. Eventually, we expect to create a new momentum for (1) full disclosure of APR experimental procedures with respect to FL, (2) realistic expectations of repairing bugs in Defects4J, as well as (3) reliable performance comparison among the state-of-the-art APR systems, and against the baseline performance results of our thoroughly assessed kPAR repair tool. Our main findings include: (a) only a subset of Defects4J bugs can be currently localized by commonly-used FL techniques; (b) current practice of comparing state-of-the-art APR systems (i.e., counting the number of fixed bugs) is potentially misleading due to the bias of FL configurations; and (c) APR authors do not properly qualify their performance achievement with respect to the different tuning parameters implemented in APR systems.
△ Less
Submitted 15 February, 2019; v1 submitted 18 December, 2018;
originally announced December 2018.
-
Semantic Fuzzing with Zest
Authors:
Rohan Padhye,
Caroline Lemieux,
Koushik Sen,
Mike Papadakis,
Yves Le Traon
Abstract:
Programs expecting structured inputs often consist of both a syntactic analysis stage, which parses raw input, and a semantic analysis stage, which conducts checks on the parsed input and executes the core logic of the program. Generator-based testing tools in the lineage of QuickCheck are a promising way to generate random syntactically valid test inputs for these programs. We present Zest, a tec…
▽ More
Programs expecting structured inputs often consist of both a syntactic analysis stage, which parses raw input, and a semantic analysis stage, which conducts checks on the parsed input and executes the core logic of the program. Generator-based testing tools in the lineage of QuickCheck are a promising way to generate random syntactically valid test inputs for these programs. We present Zest, a technique which automatically guides QuickCheck-like randominput generators to better explore the semantic analysis stage of test programs. Zest converts random-input generators into deterministic parametric generators. We present the key insight that mutations in the untyped parameter domain map to structural mutations in the input domain. Zest leverages program feedback in the form of code coverage and input validity to perform feedback-directed parameter search. We evaluate Zest against AFL and QuickCheck on five Java programs: Maven, Ant, BCEL, Closure, and Rhino. Zest covers 1.03x-2.81x as many branches within the benchmarks semantic analysis stages as baseline techniques. Further, we find 10 new bugs in the semantic analysis stages of these benchmarks. Zest is the most effective technique in finding these bugs reliably and quickly, requiring at most 10 minutes on average to find each bug.
△ Less
Submitted 7 June, 2019; v1 submitted 30 November, 2018;
originally announced December 2018.
-
Un-normalized hypergraph p-Laplacian based semi-supervised learning methods
Authors:
Loc Hoang Tran,
Linh Hoang Tran
Abstract:
Most network-based machine learning methods assume that the labels of two adjacent samples in the network are likely to be the same. However, assuming the pairwise relationship between samples is not complete. The information a group of samples that shows very similar pattern and tends to have similar labels is missed. The natural way overcoming the information loss of the above assumption is to r…
▽ More
Most network-based machine learning methods assume that the labels of two adjacent samples in the network are likely to be the same. However, assuming the pairwise relationship between samples is not complete. The information a group of samples that shows very similar pattern and tends to have similar labels is missed. The natural way overcoming the information loss of the above assumption is to represent the feature dataset of samples as the hypergraph. Thus, in this paper, we will present the un-normalized hypergraph p-Laplacian semi-supervised learning methods. These methods will be applied to the zoo dataset and the tiny version of 20 newsgroups dataset. Experiment results show that the accuracy performance measures of these un-normalized hypergraph p-Laplacian based semi-supervised learning methods are significantly greater than the accuracy performance measure of the un-normalized hypergraph Laplacian based semi-supervised learning method (the current state of the art method hypergraph Laplacian based semi-supervised learning method for classification problem with p=2).
△ Less
Submitted 28 April, 2019; v1 submitted 5 November, 2018;
originally announced November 2018.
-
Approximate cloaking for electromagnetic waves via transformation optics: cloaking vs infinite energy
Authors:
Hoai-Minh Nguyen,
Loc Tran
Abstract:
We study the approximate cloaking via transformation optics for electromagnetic waves in the time harmonic regime in which the cloaking device {\it only} consists of a layer constructed by the mapping technique. Due to the fact that no-lossy layer is required, resonance might appear and the analysis is delicate. We analyse both non-resonant and resonant cases. In particular, we show that the energ…
▽ More
We study the approximate cloaking via transformation optics for electromagnetic waves in the time harmonic regime in which the cloaking device {\it only} consists of a layer constructed by the mapping technique. Due to the fact that no-lossy layer is required, resonance might appear and the analysis is delicate. We analyse both non-resonant and resonant cases. In particular, we show that the energy can blow up inside the cloaked region in the resonant case and/whereas cloaking is {\it achieved} in {\it both} cases. Moreover, the degree of visibility {\it depends} on the compatibility of the source inside the cloaked region and the system. These facts are new and distinct from known mathematical results in the literature.
△ Less
Submitted 1 November, 2018;
originally announced November 2018.
-
Hypergraph based semi-supervised learning algorithms applied to speech recognition problem: a novel approach
Authors:
Loc Hoang Tran,
Trang Hoang,
Bui Hoang Nam Huynh
Abstract:
Most network-based speech recognition methods are based on the assumption that the labels of two adjacent speech samples in the network are likely to be the same. However, assuming the pairwise relationship between speech samples is not complete. The information a group of speech samples that show very similar patterns and tend to have similar labels is missed. The natural way overcoming the infor…
▽ More
Most network-based speech recognition methods are based on the assumption that the labels of two adjacent speech samples in the network are likely to be the same. However, assuming the pairwise relationship between speech samples is not complete. The information a group of speech samples that show very similar patterns and tend to have similar labels is missed. The natural way overcoming the information loss of the above assumption is to represent the feature data of speech samples as the hypergraph. Thus, in this paper, the three un-normalized, random walk, and symmetric normalized hypergraph Laplacian based semi-supervised learning methods applied to hypergraph constructed from the feature data of speech samples in order to predict the labels of speech samples are introduced. Experiment results show that the sensitivity performance measures of these three hypergraph Laplacian based semi-supervised learning methods are greater than the sensitivity performance measures of the Hidden Markov Model method (the current state of the art method applied to speech recognition problem) and graph based semi-supervised learning methods (i.e. the current state of the art network-based method for classification problems) applied to network created from the feature data of speech samples.
△ Less
Submitted 28 October, 2018;
originally announced October 2018.
-
Energy Efficiency Fairness for Multi-Pair Wireless-Powered Relaying Systems
Authors:
Kien-Giang Nguyen,
Quang-Doanh Vu,
Le-Nam Tran,
Markku Juntti
Abstract:
We consider a multi-pair amplify-and-forward relay network where the energy-constrained relays adopting time-switching protocol harvest energy from the radio frequency signals transmitted by the users for assisting user data transmission. Both one-way and two-way relaying techniques are investigated. Aiming at energy efficiency (EE) fairness among the user pairs, we construct an energy consumption…
▽ More
We consider a multi-pair amplify-and-forward relay network where the energy-constrained relays adopting time-switching protocol harvest energy from the radio frequency signals transmitted by the users for assisting user data transmission. Both one-way and two-way relaying techniques are investigated. Aiming at energy efficiency (EE) fairness among the user pairs, we construct an energy consumption model incorporating rate-dependent signal processing power, the dependence on output power level of power amplifiers' efficiency, and nonlinear energy harvesting (EH) circuits. Then we formulate the max-min EE fairness problems in which the data rates, users' transmit power, relays' processing coefficient, and EH time are jointly optimized under the constraints on the quality of service and users' maximum transmit power. To achieve efficient suboptimal solutions to these nonconvex problems, we devise monotonic descent algorithms based on the inner approximation (IA) framework, which solve a second-order-cone program in each iteration. To further simplify the designs, we propose an approach combining IA and zero-forcing beamforming, which eliminates inter-pair interference and reduces the numbers of variables and required iterations. Finally, extensive numerical results are presented to validate the proposed approaches. More specifically, the results demonstrate that ignoring the realistic aspects of power consumption might degrade the performance remarkably, and jointly designing parameters involved could significantly enhance the energy efficiency.
△ Less
Submitted 15 October, 2018;
originally announced October 2018.
-
Robust variance estimation and inference for causal effect estimation
Authors:
Linh Tran,
Maya Petersen,
Joshua Schwab,
Mark J van der Laan
Abstract:
We consider a longitudinal data structure consisting of baseline covariates, time-varying treatment variables, intermediate time-dependent covariates, and a possibly time dependent outcome. Previous studies have shown that estimating the variance of asymptotically linear estimators using empirical influence functions in this setting result in anti-conservative estimates with increasing magnitudes…
▽ More
We consider a longitudinal data structure consisting of baseline covariates, time-varying treatment variables, intermediate time-dependent covariates, and a possibly time dependent outcome. Previous studies have shown that estimating the variance of asymptotically linear estimators using empirical influence functions in this setting result in anti-conservative estimates with increasing magnitudes of positivity violations, leading to poor coverage and uncontrolled Type I errors. In this paper, we present two alternative approaches of estimating the variance of these estimators: (i) a robust approach which directly targets the variance of the influence function as a counterfactual mean outcome, and (ii) a non-parametric bootstrap based approach that is theoretically valid and lowers the computational cost, thereby increasing the feasibility in non-parametric settings using complex machine learning algorithms. The performance of these approaches are compared to that of the empirical influence function in simulations across different levels of positivity violations and treatment effect sizes.
△ Less
Submitted 6 October, 2018;
originally announced October 2018.
-
FixMiner: Mining Relevant Fix Patterns for Automated Program Repair
Authors:
Anil Koyuncu,
Kui Liu,
Tegawendé F. Bissyandé,
Dongsun Kim,
Jacques Klein,
Martin Monperrus,
Yves Le Traon
Abstract:
Patching is a common activity in software development. It is generally performed on a source code base to address bugs or add new functionalities. In this context, given the recurrence of bugs across projects, the associated similar patches can be leveraged to extract generic fix actions. While the literature includes various approaches leveraging similarity among patches to guide program repair,…
▽ More
Patching is a common activity in software development. It is generally performed on a source code base to address bugs or add new functionalities. In this context, given the recurrence of bugs across projects, the associated similar patches can be leveraged to extract generic fix actions. While the literature includes various approaches leveraging similarity among patches to guide program repair, these approaches often do not yield fix patterns that are tractable and reusable as actionable input to APR systems. In this paper, we propose a systematic and automated approach to mining relevant and actionable fix patterns based on an iterative clustering strategy applied to atomic changes within patches. The goal of FixMiner is thus to infer separate and reusable fix patterns that can be leveraged in other patch generation systems. Our technique, FixMiner, leverages Rich Edit Script which is a specialized tree structure of the edit scripts that captures the AST-level context of the code changes. FixMiner uses different tree representations of Rich Edit Scripts for each round of clustering to identify similar changes. These are abstract syntax trees, edit actions trees, and code context trees. We have evaluated FixMiner on thousands of software patches collected from open source projects. Preliminary results show that we are able to mine accurate patterns, efficiently exploiting change information in Rich Edit Scripts. We further integrated the mined patterns to an automated program repair prototype, PARFixMiner, with which we are able to correctly fix 26 bugs of the Defects4J benchmark. Beyond this quantitative performance, we show that the mined fix patterns are sufficiently relevant to produce patches with a high probability of correctness: 81% of PARFixMiner's generated plausible patches are correct.
△ Less
Submitted 30 September, 2019; v1 submitted 3 October, 2018;
originally announced October 2018.
-
PriPeARL: A Framework for Privacy-Preserving Analytics and Reporting at LinkedIn
Authors:
Krishnaram Kenthapadi,
Thanh T. L. Tran
Abstract:
Preserving privacy of users is a key requirement of web-scale analytics and reporting applications, and has witnessed a renewed focus in light of recent data breaches and new regulations such as GDPR. We focus on the problem of computing robust, reliable analytics in a privacy-preserving manner, while satisfying product requirements. We present PriPeARL, a framework for privacy-preserving analytic…
▽ More
Preserving privacy of users is a key requirement of web-scale analytics and reporting applications, and has witnessed a renewed focus in light of recent data breaches and new regulations such as GDPR. We focus on the problem of computing robust, reliable analytics in a privacy-preserving manner, while satisfying product requirements. We present PriPeARL, a framework for privacy-preserving analytics and reporting, inspired by differential privacy. We describe the overall design and architecture, and the key modeling components, focusing on the unique challenges associated with privacy, coverage, utility, and consistency. We perform an experimental study in the context of ads analytics and reporting at LinkedIn, thereby demonstrating the tradeoffs between privacy and utility needs, and the applicability of privacy-preserving mechanisms to real-world data. We also highlight the lessons learned from the production deployment of our system at LinkedIn.
△ Less
Submitted 20 September, 2018;
originally announced September 2018.
-
Self-energy embedding theory (SEET) for periodic systems
Authors:
Alexander A. Rusakov,
Sergei Iskakov,
Lan Nguyen Tran,
Dominika Zgid
Abstract:
We present an implementation of the self-energy embedding theory (SEET) for periodic systems and provide a fully self-consistent embedding solution for a simple realistic periodic problem - 1D crystalline hydrogen - that displays many of the features present in complex real materials. For this system, we observe a remarkable agreement between our finite temperature periodic implementation results…
▽ More
We present an implementation of the self-energy embedding theory (SEET) for periodic systems and provide a fully self-consistent embedding solution for a simple realistic periodic problem - 1D crystalline hydrogen - that displays many of the features present in complex real materials. For this system, we observe a remarkable agreement between our finite temperature periodic implementation results and well established and accurate zero temperature auxiliary quantum Monte Carlo data extrapolated to thermodynamic limit. We discuss differences and similarities with other Green's function embedding methods and provide the detailed algorithmic steps crucial for highly accurate and reproducible results.
△ Less
Submitted 12 September, 2018;
originally announced September 2018.
-
Hadronic Energy Resolution of a Combined High Granularity Scintillator Calorimeter System
Authors:
CALICE Collaboration,
J. Repond,
L. Xia,
J. Apostolakis,
G. Folger,
V. Ivantchenko,
A. Ribon,
V. Uzhinskiy,
D. Boumediene,
V. Francais,
G. C. Blazey,
A. Dyshkant,
K. Francis,
V. Zutshi,
O. Bach,
E. Brianne,
A. Ebrahimi,
K. Gadow,
P. Gttlicher,
O. Hartbrich F. Krivan,
K. Krüger,
J. Kvasnicka,
S. Lu,
C. Neubüser,
A. Provenza
, et al. (84 additional authors not shown)
Abstract:
This paper presents results obtained with the combined CALICE Scintillator Electromagnetic Calorimeter, Analogue Hadronic Calorimeter and Tail Catcher & Muon Tracker, three high granularity scintillator-SiPM calorimeter prototypes. The response of the system to pions with momenta between 4 GeV/c and 32 GeV/c is analysed, including the energy response, resolution, and longitudinal shower profiles.…
▽ More
This paper presents results obtained with the combined CALICE Scintillator Electromagnetic Calorimeter, Analogue Hadronic Calorimeter and Tail Catcher & Muon Tracker, three high granularity scintillator-SiPM calorimeter prototypes. The response of the system to pions with momenta between 4 GeV/c and 32 GeV/c is analysed, including the energy response, resolution, and longitudinal shower profiles. The results of a software compensation technique based on weighting according to hit energy are compared to those of a standard linear energy reconstruction. The results are compared to predictions of the GEANT4 physics lists QGSP_BERT_HP and FTFP_BERT_HP.
△ Less
Submitted 12 September, 2018; v1 submitted 11 September, 2018;
originally announced September 2018.
-
HyperML: A Boosting Metric Learning Approach in Hyperbolic Space for Recommender Systems
Authors:
Lucas Vinh Tran,
Yi Tay,
Shuai Zhang,
Gao Cong,
Xiaoli Li
Abstract:
This paper investigates the notion of learning user and item representations in non-Euclidean space. Specifically, we study the connection between metric learning in hyperbolic space and collaborative filtering by exploring Mobius gyrovector spaces where the formalism of the spaces could be utilized to generalize the most common Euclidean vector operations. Overall, this work aims to bridge the ga…
▽ More
This paper investigates the notion of learning user and item representations in non-Euclidean space. Specifically, we study the connection between metric learning in hyperbolic space and collaborative filtering by exploring Mobius gyrovector spaces where the formalism of the spaces could be utilized to generalize the most common Euclidean vector operations. Overall, this work aims to bridge the gap between Euclidean and hyperbolic geometry in recommender systems through metric learning approach. We propose HyperML (Hyperbolic Metric Learning), a conceptually simple but highly effective model for boosting the performance. Via a series of extensive experiments, we show that our proposed HyperML not only outperforms their Euclidean counterparts, but also achieves state-of-the-art performance on multiple benchmark datasets, demonstrating the effectiveness of personalized recommendation in hyperbolic geometry.
△ Less
Submitted 28 November, 2019; v1 submitted 5 September, 2018;
originally announced September 2018.
-
On Learning 3D Face Morphable Model from In-the-wild Images
Authors:
Luan Tran,
Xiaoming Liu
Abstract:
As a classic statistical model of 3D facial shape and albedo, 3D Morphable Model (3DMM) is widely used in facial analysis, e.g., model fitting, image synthesis. Conventional 3DMM is learned from a set of 3D face scans with associated well-controlled 2D face images, and represented by two sets of PCA basis functions. Due to the type and amount of training data, as well as, the linear bases, the rep…
▽ More
As a classic statistical model of 3D facial shape and albedo, 3D Morphable Model (3DMM) is widely used in facial analysis, e.g., model fitting, image synthesis. Conventional 3DMM is learned from a set of 3D face scans with associated well-controlled 2D face images, and represented by two sets of PCA basis functions. Due to the type and amount of training data, as well as, the linear bases, the representation power of 3DMM can be limited. To address these problems, this paper proposes an innovative framework to learn a nonlinear 3DMM model from a large set of in-the-wild face images, without collecting 3D face scans. Specifically, given a face image as input, a network encoder estimates the projection, lighting, shape and albedo parameters. Two decoders serve as the nonlinear 3DMM to map from the shape and albedo parameters to the 3D shape and albedo, respectively. With the projection parameter, lighting, 3D shape, and albedo, a novel analytically-differentiable rendering layer is designed to reconstruct the original input face. The entire network is end-to-end trainable with only weak supervision. We demonstrate the superior representation power of our nonlinear 3DMM over its linear counterpart, and its contribution to face alignment, 3D reconstruction, and face editing.
△ Less
Submitted 14 July, 2019; v1 submitted 28 August, 2018;
originally announced August 2018.
-
Energy Efficiency Maximization for C-RANs: Discrete Monotonic Optimization, Penalty, and l0-Approximation Methods
Authors:
Kien-Giang Nguyen,
Quang-Doanh Vu,
Markku Juntti,
Le-Nam Tran
Abstract:
We study downlink of multiantenna cloud radio access networks (C-RANs) with finite-capacity fronthaul links. The aim is to propose joint designs of beamforming and remote radio head (RRH)-user association, subject to constraints on users' quality-of-service, limited capacity of fronthaul links and transmit power, to maximize the system energy efficiency. To cope with the limited-capacity fronthaul…
▽ More
We study downlink of multiantenna cloud radio access networks (C-RANs) with finite-capacity fronthaul links. The aim is to propose joint designs of beamforming and remote radio head (RRH)-user association, subject to constraints on users' quality-of-service, limited capacity of fronthaul links and transmit power, to maximize the system energy efficiency. To cope with the limited-capacity fronthaul we consider the problem of RRH-user association to select a subset of users that can be served by each RRH. Moreover, different to the conventional power consumption models, we take into account the dependence of baseband signal processing power on the data rate, as well as the dynamics of the efficiency of power amplifiers. The considered problem leads to a mixed binary integer program (MBIP) which is difficult to solve. Our first contribution is to derive a globally optimal solution for the considered problem by customizing a discrete branch-reduce-and-bound (DBRB) approach. Since the global optimization method requires a high computational effort, we further propose two suboptimal solutions able to achieve the near optimal performance but with much reduced complexity. To this end, we transform the design problem into continuous (but inherently nonconvex) programs by two approaches: penalty and \ell_{0}-approximation methods. These resulting continuous nonconvex problems are then solved by the successive convex approximation framework. Numerical results are provided to evaluate the effectiveness of the proposed approaches.
△ Less
Submitted 9 August, 2018;
originally announced August 2018.
-
Energy-Efficient Multi-Cell Multigroup Multicasting with Joint Beamforming and Antenna Selection
Authors:
Oskari Tervo,
Le-Nam Tran,
Harri Pennanen,
Symeon Chatzinotas,
Björn Ottersten,
Markku Juntti
Abstract:
This paper studies the energy efficiency and sum rate trade-off for coordinated beamforming in multi-cell multi-user multigroup multicast multiple-input single-output systems. We first consider a conventional network energy efficiency maximization (EEmax) problem by jointly optimizing the transmit beamformers and antennas selected to be used in transmission. We also account for per-antenna maximum…
▽ More
This paper studies the energy efficiency and sum rate trade-off for coordinated beamforming in multi-cell multi-user multigroup multicast multiple-input single-output systems. We first consider a conventional network energy efficiency maximization (EEmax) problem by jointly optimizing the transmit beamformers and antennas selected to be used in transmission. We also account for per-antenna maximum power constraints to avoid non-linear distortion in power amplifiers and user-specific minimum rate constraints to guarantee certain service levels and fairness. To be energy-efficient, transmit antenna selection is employed. It eventually leads to a mixed-Boolean fractional program. We then propose two different approaches to solve this difficult problem. The first solution is based on a novel modeling technique that produces a tight continuous relaxation. The second approach is based on sparsity-inducing method, which does not require the introduction of any Boolean variable. We also investigate the trade-off between the energy efficiency and sum rate by proposing two different formulations. In the first formulation, we propose a new metric that is the ratio of the sum rate and the so-called weighted power. Specifically, this metric reduces to EEmax when the weight is 1, and to sum rate maximization when the weight is 0. In the other method, we treat the trade-off problem as a multi-objective optimization for which a scalarization approach is adopted. Numerical results illustrate significant achievable energy efficiency gains over the method where the antenna selection is not employed. The effect of antenna selection on the energy efficiency and sum rate trade-off is also demonstrated.
△ Less
Submitted 2 August, 2018;
originally announced August 2018.
-
Real-time Lane Marker Detection Using Template Matching with RGB-D Camera
Authors:
Cong Hoang Quach,
Van Lien Tran,
Duy Hung Nguyen,
Viet Thang Nguyen,
Minh Trien Pham,
Manh Duong Phung
Abstract:
This paper addresses the problem of lane detection which is fundamental for self-driving vehicles. Our approach exploits both colour and depth information recorded by a single RGB-D camera to better deal with negative factors such as lighting conditions and lane-like objects. In the approach, colour and depth images are first converted to a half-binary format and a 2D matrix of 3D points. They are…
▽ More
This paper addresses the problem of lane detection which is fundamental for self-driving vehicles. Our approach exploits both colour and depth information recorded by a single RGB-D camera to better deal with negative factors such as lighting conditions and lane-like objects. In the approach, colour and depth images are first converted to a half-binary format and a 2D matrix of 3D points. They are then used as the inputs of template matching and geometric feature extraction processes to form a response map so that its values represent the probability of pixels being lane markers. To further improve the results, the template and lane surfaces are finally refined by principal component analysis and lane model fitting techniques. A number of experiments have been conducted on both synthetic and real datasets. The result shows that the proposed approach can effectively eliminate unwanted noise to accurately detect lane markers in various scenarios. Moreover, the processing speed of 20 frames per second under hardware configuration of a popular laptop computer allows the proposed algorithm to be implemented for real-time autonomous driving applications.
△ Less
Submitted 5 June, 2018;
originally announced June 2018.
-
Magnetic phase diagram of Ca-substituted EuFe$_2$As$_2$
Authors:
L. M. Tran,
M. Babij,
L. Korosec,
T. Shang,
Z. Bukowski,
T. Shiroka
Abstract:
The simultaneous presence of a Fe-related spin-density wave and antiferromagnetic order of Eu$^{2+}$ moments ranks EuFe$_2$As$_2$ among the most interesting parent compounds of iron-based pnictide superconductors. Here we explore the consequences of the dilution of Eu$^{2+}$ magnetic lattice through on-site Ca substitution. By employing macro- and microscopic techniques, including electrical trans…
▽ More
The simultaneous presence of a Fe-related spin-density wave and antiferromagnetic order of Eu$^{2+}$ moments ranks EuFe$_2$As$_2$ among the most interesting parent compounds of iron-based pnictide superconductors. Here we explore the consequences of the dilution of Eu$^{2+}$ magnetic lattice through on-site Ca substitution. By employing macro- and microscopic techniques, including electrical transport and magnetometry, as well as muon-spin spectroscopy, we study the evolution of Eu magnetic order in both the weak and strong dilution regimes, achieved for Ca concentration $x(\mathrm{Ca}) = 0.12$ and 0.43, respectively. We demonstrate the localized character of the Eu antiferromagnetism mediated via RKKY interactions, in contrast with the largely itinerant nature of Fe magnetic interactions. Our results suggest a weak coupling between the Fe and Eu magnetic sublattices and a rapid decrease of the Eu magnetic interaction strength upon Ca substitution. The latter is confirmed both by the depression of the ordering temperature of the Eu$^{2+}$ moments, $T_\mathrm{N}$, and the decrease of magnetic volume fraction with increasing $x(\mathrm{Ca})$. We establish that, similarly to the EuFe$_2$As$_2$ parent compound, the investigated Ca-doped compounds have a twinned structure and undergo a permanent detwinning upon applying an external magnetic field.
△ Less
Submitted 13 July, 2018; v1 submitted 10 May, 2018;
originally announced May 2018.
-
Towards Interpretable Face Recognition
Authors:
Bangjie Yin,
Luan Tran,
Haoxiang Li,
Xiaohui Shen,
Xiaoming Liu
Abstract:
Deep CNNs have been pushing the frontier of visual recognition over past years. Besides recognition accuracy, strong demands in understanding deep CNNs in the research community motivate developments of tools to dissect pre-trained models to visualize how they make predictions. Recent works further push the interpretability in the network learning stage to learn more meaningful representations. In…
▽ More
Deep CNNs have been pushing the frontier of visual recognition over past years. Besides recognition accuracy, strong demands in understanding deep CNNs in the research community motivate developments of tools to dissect pre-trained models to visualize how they make predictions. Recent works further push the interpretability in the network learning stage to learn more meaningful representations. In this work, focusing on a specific area of visual recognition, we report our efforts towards interpretable face recognition. We propose a spatial activation diversity loss to learn more structured face representations. By leveraging the structure, we further design a feature activation diversity loss to push the interpretable representations to be discriminative and robust to occlusions. We demonstrate on three face recognition benchmarks that our proposed method is able to improve face recognition accuracy with easily interpretable face representations.
△ Less
Submitted 17 August, 2019; v1 submitted 1 May, 2018;
originally announced May 2018.
-
LED Selection and MAP Detection for Generalized LED Index Modulation
Authors:
Manh Le Tran,
Sunghwan Kim,
Thomas Ketseoglou,
Ender Ayanoglu
Abstract:
In this paper, we propose light-emitting diode (LED) selection that can be applied not only to the conventional Multiple-Input Multiple-Output (MIMO) case, but also to a larger MIMO configuration of generalized LED index modulation (GLIM) system with optical orthogonal frequency division multiplexing (OFDM) in visible light communication (VLC). Moreover, we derive a simplified implementation of th…
▽ More
In this paper, we propose light-emitting diode (LED) selection that can be applied not only to the conventional Multiple-Input Multiple-Output (MIMO) case, but also to a larger MIMO configuration of generalized LED index modulation (GLIM) system with optical orthogonal frequency division multiplexing (OFDM) in visible light communication (VLC). Moreover, we derive a simplified implementation of the maximum a posteriori (MAP) detector when the number of LEDs is an even number larger than four. Simulation results show that the performance of MAP and LED selection is better than other detection algorithms for larger even numbers of LEDs and conventional GLIM for $4\times4$ transmission, respectively.
△ Less
Submitted 30 April, 2018;
originally announced May 2018.
-
Interact and Decide: Medley of Sub-Attention Networks for Effective Group Recommendation
Authors:
Lucas Vinh Tran,
Tuan-Anh Nguyen Pham,
Yi Tay,
Yiding Liu,
Gao Cong,
Xiaoli Li
Abstract:
This paper proposes Medley of Sub-Attention Networks (MoSAN), a new novel neural architecture for the group recommendation task. Group-level recommendation is known to be a challenging task, in which intricate group dynamics have to be considered. As such, this is to be contrasted with the standard recommendation problem where recommendations are personalized with respect to a single user. Our pro…
▽ More
This paper proposes Medley of Sub-Attention Networks (MoSAN), a new novel neural architecture for the group recommendation task. Group-level recommendation is known to be a challenging task, in which intricate group dynamics have to be considered. As such, this is to be contrasted with the standard recommendation problem where recommendations are personalized with respect to a single user. Our proposed approach hinges upon the key intuition that the decision making process (in groups) is generally dynamic, i.e., a user's decision is highly dependent on the other group members. All in all, our key motivation manifests in a form of an attentive neural model that captures fine-grained interactions between group members. In our MoSAN model, each sub-attention module is representative of a single member, which models a user's preference with respect to all other group members. Subsequently, a Medley of Sub-Attention modules is then used to collectively make the group's final decision. Overall, our proposed model is both expressive and effective. Via a series of extensive experiments, we show that MoSAN not only achieves state-of-the-art performance but also improves standard baselines by a considerable margin.
△ Less
Submitted 28 November, 2019; v1 submitted 12 April, 2018;
originally announced April 2018.
-
Shaping nanoparticle fingerprints at the interface of cholesteric droplets
Authors:
Lisa Tran,
Hye-Na Kim,
Ningwei Li,
Shu Yang,
Kathleen J. Stebe,
Randall D. Kamien,
Martin F. Haase
Abstract:
The ordering of nanoparticles into predetermined configurations is of importance to the design of advanced technologies. In this work, we moderate the surface anchoring against the bulk elasticity of liquid crystals to dynamically shape nanoparticle assemblies at a fluid interface. By tuning the degree of nanoparticle hydrophobicity with surfactants that alter the molecular anchoring of liquid cry…
▽ More
The ordering of nanoparticles into predetermined configurations is of importance to the design of advanced technologies. In this work, we moderate the surface anchoring against the bulk elasticity of liquid crystals to dynamically shape nanoparticle assemblies at a fluid interface. By tuning the degree of nanoparticle hydrophobicity with surfactants that alter the molecular anchoring of liquid crystals, we pattern nanoparticles at the interface of cholesteric liquid crystal emulsions. Adjusting the particle hydrophobicity more finely further modifies the rigidity of assemblies. We establish that patterns are tunable by varying both surfactant and chiral dopant concentrations. Since particle assembly occurs at the interface with the desired structures exposed to the surrounding phase, we demonstrate that particles can be readily crosslinked and manipulated, forming structures that retain their shape under external perturbations. This study establishes the templating of nanomaterials into reconfigurable arrangements. Interfacial assembly is tempered by elastic patterns that arise from the geometric frustration of confined cholesterics. This work serves as a basis for creating materials with chemical heterogeneity and with linear, periodic structures, essential for optical and energy applications.
△ Less
Submitted 11 April, 2018;
originally announced April 2018.
-
Nonlinear 3D Face Morphable Model
Authors:
Luan Tran,
Xiaoming Liu
Abstract:
As a classic statistical model of 3D facial shape and texture, 3D Morphable Model (3DMM) is widely used in facial analysis, e.g., model fitting, image synthesis. Conventional 3DMM is learned from a set of well-controlled 2D face images with associated 3D face scans, and represented by two sets of PCA basis functions. Due to the type and amount of training data, as well as the linear bases, the rep…
▽ More
As a classic statistical model of 3D facial shape and texture, 3D Morphable Model (3DMM) is widely used in facial analysis, e.g., model fitting, image synthesis. Conventional 3DMM is learned from a set of well-controlled 2D face images with associated 3D face scans, and represented by two sets of PCA basis functions. Due to the type and amount of training data, as well as the linear bases, the representation power of 3DMM can be limited. To address these problems, this paper proposes an innovative framework to learn a nonlinear 3DMM model from a large set of unconstrained face images, without collecting 3D face scans. Specifically, given a face image as input, a network encoder estimates the projection, shape and texture parameters. Two decoders serve as the nonlinear 3DMM to map from the shape and texture parameters to the 3D shape and texture, respectively. With the projection parameter, 3D shape, and texture, a novel analytically-differentiable rendering layer is designed to reconstruct the original input face. The entire network is end-to-end trainable with only weak supervision. We demonstrate the superior representation power of our nonlinear 3DMM over its linear counterpart, and its contribution to face alignment and 3D reconstruction.
△ Less
Submitted 26 August, 2018; v1 submitted 10 April, 2018;
originally announced April 2018.
-
GreyCat: Efficient What-If Analytics for Data in Motion at Scale
Authors:
Thomas Hartmann,
Francois Fouquet,
Assaad Moawad,
Romain Rouvoy,
Yves Le Traon
Abstract:
Over the last few years, data analytics shifted from a descriptive era, confined to the explanation of past events, to the emergence of predictive techniques. Nonetheless, existing predictive techniques still fail to effectively explore alternative futures, which continuously diverge from current situations when exploring the effects of what-if decisions. Enabling prescriptive analytics therefore…
▽ More
Over the last few years, data analytics shifted from a descriptive era, confined to the explanation of past events, to the emergence of predictive techniques. Nonetheless, existing predictive techniques still fail to effectively explore alternative futures, which continuously diverge from current situations when exploring the effects of what-if decisions. Enabling prescriptive analytics therefore calls for the design of scalable systems that can cope with the complexity and the diversity of underlying data models. In this article, we address this challenge by combining graphs and time series within a scalable storage system that can organize a massive amount of unstructured and continuously changing data into multi-dimensional data models, called Many-Worlds Graphs. We demonstrate that our open source implementation, GreyCat, can efficiently fork and update thousands of parallel worlds composed of millions of timestamped nodes, such as what-if exploration.
△ Less
Submitted 23 March, 2018;
originally announced March 2018.
-
Selecting Fault Revealing Mutants
Authors:
Thierry Titcheu Chekam,
Mike Papadakis,
Tegawendé Bissyandé,
Yves Le Traon,
Koushik Sen
Abstract:
Mutant selection refers to the problem of choosing, among a large number of mutants, the (few) ones that should be used by the testers. In view of this, we investigate the problem of selecting the fault revealing mutants, i.e., the mutants that are most likely to be killable and lead to test cases that uncover unknown program faults. We formulate two variants of this problem: the fault revealing m…
▽ More
Mutant selection refers to the problem of choosing, among a large number of mutants, the (few) ones that should be used by the testers. In view of this, we investigate the problem of selecting the fault revealing mutants, i.e., the mutants that are most likely to be killable and lead to test cases that uncover unknown program faults. We formulate two variants of this problem: the fault revealing mutant selection and the fault revealing mutant prioritization. We argue and show that these problems can be tackled through a set of 'static' program features and propose a machine learning approach, named FaRM, that learns to select and rank killable and fault revealing mutants. Experimental results involving 1,692 real faults show the practical benefits of our approach in both examined problems. Our results show that FaRM achieves a good trade-off between application cost and effectiveness (measured in terms of faults revealed). We also show that FaRM outperforms all the existing mutant selection methods, i.e., the random mutant sampling, the selective mutation and defect prediction (mutating the code areas pointed by defect prediction). In particular, our results show that with respect to mutant selection, our approach reveals 23% to 34% more faults than any of the baseline methods, while, with respect to mutant prioritization, it achieves higher average percentage of revealed faults with a median difference between 4% and 9% (from the random mutant orderings).
△ Less
Submitted 4 November, 2018; v1 submitted 21 March, 2018;
originally announced March 2018.
-
Resonant intersubband polariton-LO phonon scattering in an optically pumped polaritonic device
Authors:
J-M. Manceau,
L. Tran,
G. Biasiol,
T. Laurent,
I Sagnes,
G. Beaudoin,
S. De Liberato,
I. Carusotto,
R. Colombelli
Abstract:
We report experimental evidence of longitudinal optical (LO) phonon-intersubband polariton scattering processes under resonant injection of light. The scattering process is resonant with both the initial (upper polariton) and final (lower polariton) states and is induced by the interaction of confined electrons with longitudinal optical phonons. The system is optically pumped with a mid-IR laser t…
▽ More
We report experimental evidence of longitudinal optical (LO) phonon-intersubband polariton scattering processes under resonant injection of light. The scattering process is resonant with both the initial (upper polariton) and final (lower polariton) states and is induced by the interaction of confined electrons with longitudinal optical phonons. The system is optically pumped with a mid-IR laser tuned between 1094 cm-1 and 1134 cm-1 (lambda=9.14 um and lambda=8.82 um). The demonstration is provided for both GaAs/AlGaAs and InGaAs/AlInAs doped quantum well systems whose intersubband plasmon lies at lambda=10 um wavelength. In addition to elucidating the microscopic mechanism of the polariton-phonon scattering, that is found to differ substantially from the standard single particle electron-LO phonon scattering mechanism, this work constitutes the first step towards the hopefully forthcoming demonstration of an intersubband polariton laser.
△ Less
Submitted 21 March, 2018; v1 submitted 20 March, 2018;
originally announced March 2018.
-
Gotta Adapt 'Em All: Joint Pixel and Feature-Level Domain Adaptation for Recognition in the Wild
Authors:
Luan Tran,
Kihyuk Sohn,
Xiang Yu,
Xiaoming Liu,
Manmohan Chandraker
Abstract:
Recent developments in deep domain adaptation have allowed knowledge transfer from a labeled source domain to an unlabeled target domain at the level of intermediate features or input pixels. We propose that advantages may be derived by combining them, in the form of different insights that lead to a novel design and complementary properties that result in better performance. At the feature level,…
▽ More
Recent developments in deep domain adaptation have allowed knowledge transfer from a labeled source domain to an unlabeled target domain at the level of intermediate features or input pixels. We propose that advantages may be derived by combining them, in the form of different insights that lead to a novel design and complementary properties that result in better performance. At the feature level, inspired by insights from semi-supervised learning, we propose a classification-aware domain adversarial neural network that brings target examples into more classifiable regions of source domain. Next, we posit that computer vision insights are more amenable to injection at the pixel level. In particular, we use 3D geometry and image synthesis based on a generalized appearance flow to preserve identity across pose transformations, while using an attribute-conditioned CycleGAN to translate a single source into multiple target images that differ in lower-level properties such as lighting. Besides standard UDA benchmark, we validate on a novel and apt problem of car recognition in unlabeled surveillance images using labeled images from the web, handling explicitly specified, nameable factors of variation through pixel-level and implicit, unspecified factors through feature-level adaptation.
△ Less
Submitted 28 May, 2019; v1 submitted 28 February, 2018;
originally announced March 2018.
-
Mining Fix Patterns for FindBugs Violations
Authors:
Kui Liu,
Dongsun Kim,
Tegawendé F. Bissyandé,
Shin Yoo,
Yves Le Traon
Abstract:
In this paper, we first collect and track a large number of fixed and unfixed violations across revisions of software.
The empirical analyses reveal that there are discrepancies in the distributions of violations that are detected and those that are fixed, in terms of occurrences, spread and categories, which can provide insights into prioritizing violations.
To automatically identify patterns…
▽ More
In this paper, we first collect and track a large number of fixed and unfixed violations across revisions of software.
The empirical analyses reveal that there are discrepancies in the distributions of violations that are detected and those that are fixed, in terms of occurrences, spread and categories, which can provide insights into prioritizing violations.
To automatically identify patterns in violations and their fixes, we propose an approach that utilizes convolutional neural networks to learn features and clustering to regroup similar instances. We then evaluate the usefulness of the identified fix patterns by applying them to unfixed violations.
The results show that developers will accept and merge a majority (69/116) of fixes generated from the inferred fix patterns. It is also noteworthy that the yielded patterns are applicable to four real bugs in the Defects4J major benchmark for software testing and automated repair.
△ Less
Submitted 9 October, 2018; v1 submitted 8 December, 2017;
originally announced December 2017.
-
GAGAN: Geometry-Aware Generative Adversarial Networks
Authors:
Jean Kossaifi,
Linh Tran,
Yannis Panagakis,
Maja Pantic
Abstract:
Deep generative models learned through adversarial training have become increasingly popular for their ability to generate naturalistic image textures. However, aside from their texture, the visual appearance of objects is significantly influenced by their shape geometry; information which is not taken into account by existing generative models. This paper introduces the Geometry-Aware Generative…
▽ More
Deep generative models learned through adversarial training have become increasingly popular for their ability to generate naturalistic image textures. However, aside from their texture, the visual appearance of objects is significantly influenced by their shape geometry; information which is not taken into account by existing generative models. This paper introduces the Geometry-Aware Generative Adversarial Networks (GAGAN) for incorporating geometric information into the image generation process. Specifically, in GAGAN the generator samples latent variables from the probability space of a statistical shape model. By mapping the output of the generator to a canonical coordinate frame through a differentiable geometric transformation, we enforce the geometry of the objects and add an implicit connection from the prior to the generated object. Experimental results on face generation indicate that the GAGAN can generate realistic images of faces with arbitrary facial attributes such as facial expression, pose, and morphology, that are of better quality than current GAN-based methods. Our method can be used to augment any existing GAN architecture and improve the quality of the images generated.
△ Less
Submitted 27 March, 2018; v1 submitted 2 December, 2017;
originally announced December 2017.
-
Immunity of intersubband polaritons to inhomogeneous broadening
Authors:
J-M. Manceau,
G. Biasiol,
N. L. Tran,
I. Carusotto,
R. Colombelli
Abstract:
We demonstrate that intersubband (ISB) polaritons are robust to inhomogeneous effects originating from the presence of multiple quantum wells (MQWs). In a series of samples that exhibit mid-infrared ISB absorption transitions with broadenings varying by a factor of 5 (from 4 meV to 20meV), we have observed polariton linewidths always lying in the 4 - 7 meV range only. We have experimentally verifi…
▽ More
We demonstrate that intersubband (ISB) polaritons are robust to inhomogeneous effects originating from the presence of multiple quantum wells (MQWs). In a series of samples that exhibit mid-infrared ISB absorption transitions with broadenings varying by a factor of 5 (from 4 meV to 20meV), we have observed polariton linewidths always lying in the 4 - 7 meV range only. We have experimentally verified the dominantly inhomogeneous origin of the broadening of the ISB transition, and that the linewidth reduction effect of the polariton modes persists up to room-temperature. This immunity to inhomogeneous broadening is a direct consequence of the coupling of the large number of ISB oscillators to a single photonic mode. It is a precious tool to gauge the natural linewidth of the ISB plasmon , that is otherwise masked in such MQWs system , and is also beneficial in view of perspective applications such as intersubband polariton lasers.
△ Less
Submitted 27 November, 2017;
originally announced November 2017.
-
Energy-Efficient Transmission Strategies for CoMP Downlink - Overview, Extension, and Numerical Comparison
Authors:
Kien-Giang Nguyen,
Oskari Tervo,
Quang-Doanh Vu,
Le-Nam Tran,
Markku Juntti
Abstract:
This paper focuses on energy-efficient coordinated multi-point (CoMP) downlink in multi-antenna multi-cell wireless communications systems. We provide an overview of transmit beamforming designs for various energy efficiency (EE) metrics including maximizing the overall network EE, sum weighted EE and fairness EE. Generally, an EE optimization problem is a nonconvex program for which finding the g…
▽ More
This paper focuses on energy-efficient coordinated multi-point (CoMP) downlink in multi-antenna multi-cell wireless communications systems. We provide an overview of transmit beamforming designs for various energy efficiency (EE) metrics including maximizing the overall network EE, sum weighted EE and fairness EE. Generally, an EE optimization problem is a nonconvex program for which finding the globally optimal solutions requires high computational effort. Consequently, several low-complexity suboptimal approaches have been proposed. Here we sum up the main concepts of the recently proposed algorithms based on the state-of-the-art successive convex approximation (SCA) framework. Moreover, we discuss the application to the newly posted EE problems including new EE metrics and power consumption models. Furthermore, distributed implementation developed based on alternating direction method of multipliers (ADMM) for the provided solutions is also discussed. For the sake of completeness, we provide numerical comparison of the SCA based approaches and the conventional solutions developed based on parametric transformations (PTs). We also demonstrate the differences and roles of different EE objectives and power consumption models.
△ Less
Submitted 9 August, 2018; v1 submitted 21 November, 2017;
originally announced November 2017.
-
Mössbauer study of Eu0.57Ca0.43Fe2As2 and Eu0.73Ca0.27(Fe0.87Co0.13)2As2: A comparison to 122 iron-based superconductors parent compounds EuFe2As2 and CaFe2As2
Authors:
K. Komedera,
A. Blachowski,
K. Ruebenbauer,
J. Zukrowski,
S. M. Dubiel,
L. M. Tran,
M. Babij,
Z. Bukowski
Abstract:
57Fe and 151Eu Moessbauer spectra were obtained versus temperature for Eu0.57Ca0.43Fe2As2 compound with 3d and 4f magnetic order and Eu0.73Ca0.27(Fe0.87Co0.13)2As2 re-entrant superconductor, where the finite resistivity reappears while approaching the ground state. They were compared with previously obtained spectra for parent compounds EuFe2As2 and CaFe2As2. It was found that substitution beyond…
▽ More
57Fe and 151Eu Moessbauer spectra were obtained versus temperature for Eu0.57Ca0.43Fe2As2 compound with 3d and 4f magnetic order and Eu0.73Ca0.27(Fe0.87Co0.13)2As2 re-entrant superconductor, where the finite resistivity reappears while approaching the ground state. They were compared with previously obtained spectra for parent compounds EuFe2As2 and CaFe2As2. It was found that substitution beyond the Fe-As layers does not lead to the rotation (canting) of the Eu2+ magnetic moments and does not generate Eu3+ states. On the other hand, re-entrant superconductor exhibits rotation (canting) of the Eu2+ moments on the c-axis of the unit cell leading to the transferred hyperfine magnetic field on iron nuclei. Divalent europium orders magnetically within the bulk of the re-entrant superconducting phase. The re-entrant superconductor remains in the inhomogeneous state close to the ground state with about 27 % of the volume being free of 3d magnetism, while the remainder exhibits weak spin density wave. Those two regions slightly differ by the electric field gradient and electron density on iron nuclei.
△ Less
Submitted 27 February, 2018; v1 submitted 24 October, 2017;
originally announced October 2017.
-
AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community
Authors:
Li Li,
Jun Gao,
Médéric Hurier,
Pingfan Kong,
Tegawendé F. Bissyandé,
Alexandre Bartel,
Jacques Klein,
Yves Le Traon
Abstract:
We present a growing collection of Android apps collected from several sources, including the official Google Play app market and a growing collection of various metadata of those collected apps aiming at facilitating the Android-relevant research works. Our dataset by far has collected over five million apps and over 20 types of metadata such as VirusTotal reports. Our objective of collecting thi…
▽ More
We present a growing collection of Android apps collected from several sources, including the official Google Play app market and a growing collection of various metadata of those collected apps aiming at facilitating the Android-relevant research works. Our dataset by far has collected over five million apps and over 20 types of metadata such as VirusTotal reports. Our objective of collecting this dataset is to contribute to ongoing research efforts, as well as to enable new potential research topics on Android Apps. By releasing our app and metadata set to the research community, we also aim at encouraging our fellow researchers to engage in reproducible experiments.
This article will be continuously updated based on the growing apps and metadata collected in the AndroZoo project. If you have specific metadata that you want to collect from AndroZoo and which are not yet provided by far, please let us know. We will thereby prioritise it in our collecting process so as to provide it to our fellow researchers in a short manner.
△ Less
Submitted 15 September, 2017;
originally announced September 2017.
-
On $k$-normality and Regularity of Normal Toric Varieties
Authors:
Bach Le Tran
Abstract:
We give a bound of $k$ for a very ample lattice polytope to be $k$-normal. Equivalently, we give a new combinatorial bound for the Castelnuovo-Mumford regularity of normal projective toric varieties.
We give a bound of $k$ for a very ample lattice polytope to be $k$-normal. Equivalently, we give a new combinatorial bound for the Castelnuovo-Mumford regularity of normal projective toric varieties.
△ Less
Submitted 4 February, 2018; v1 submitted 14 August, 2017;
originally announced August 2017.
-
Construction and Response of a Highly Granular Scintillator-based Electromagnetic Calorimeter
Authors:
CALICE collaboration,
J. Repond,
L. Xia,
G. Eigen,
T. Price,
N. K. Watson,
A. Winter,
M. A. Thomson,
G. C. Blazey,
A. Dyshkant,
K. Francis,
V. Zutshi,
K. Gadow,
P. Göttlicher,
O. Hartbrich,
F. Krivan,
K. Krüger,
S. Lu,
B. Lutz,
M. Reinecke,
F. Sefkow,
Y. Sudo,
H. L. Tran,
A. Kaplan,
H. -Ch. Schultz-Coulon
, et al. (57 additional authors not shown)
Abstract:
A highly granular electromagnetic calorimeter with scintillator strip readout is being developed for future lepton collider experiments. A prototype of 21.5 $X_0$ depth and $180 \times 180 $mm$^2$ transverse dimensions was constructed, consisting of 2160 individually read out $10 \times 45 \times 3$ mm$^3$ scintillator strips. This prototype was tested using electrons of 2--32 GeV at the Fermilab…
▽ More
A highly granular electromagnetic calorimeter with scintillator strip readout is being developed for future lepton collider experiments. A prototype of 21.5 $X_0$ depth and $180 \times 180 $mm$^2$ transverse dimensions was constructed, consisting of 2160 individually read out $10 \times 45 \times 3$ mm$^3$ scintillator strips. This prototype was tested using electrons of 2--32 GeV at the Fermilab Test Beam Facility in 2009. Deviations from linear energy response were less than 1.1\%, and the intrinsic energy resolution was determined to be $(12.5 \pm 0.1 (\mathrm{stat.}) \pm0.4 (\mathrm{syst.}))\%/\sqrt{E[\mathrm{GeV}]}\oplus (1.2 \pm 0.1(\mathrm{stat.})^{+0.6}_{-0.7}(\mathrm{syst.}))\%$, where the uncertainties correspond to statistical and systematic sources, respectively.
△ Less
Submitted 28 February, 2018; v1 submitted 22 July, 2017;
originally announced July 2017.
-
A change in stripes for cholesteric shells via anchoring in moderation
Authors:
Lisa Tran,
Maxim O. Lavrentovich,
Guillaume Durey,
Alexandre Darmon,
Martin F. Haase,
Ningwei Li,
Daeyeon Lee,
Kathleen J. Stebe,
Randall D. Kamien,
Teresa Lopez-Leon
Abstract:
Chirality, ubiquitous in complex biological systems, can be controlled and quantified in synthetic materials such as cholesteric liquid crystal (CLC) systems. In this work, we study spherical shells of CLC under weak anchoring conditions. We induce anchoring transitions at the inner and outer boundaries using two independent methods: by changing the surfactant concentration or by raising the tempe…
▽ More
Chirality, ubiquitous in complex biological systems, can be controlled and quantified in synthetic materials such as cholesteric liquid crystal (CLC) systems. In this work, we study spherical shells of CLC under weak anchoring conditions. We induce anchoring transitions at the inner and outer boundaries using two independent methods: by changing the surfactant concentration or by raising the temperature close to the clearing point. The shell confinement leads to new states and associated surface structures: a state where large stripes on the shell can be filled with smaller, perpendicular sub-stripes, and a focal conic domain (FCD) state, where thin stripes wrap into at least two, topologically required, double spirals. Focusing on the latter state, we use a Landau-de Gennes model of the CLC to simulate its detailed configurations as a function of anchoring strength. By abruptly changing the topological constraints on the shell, we are able to study the interconversion between director defects and pitch defects, a phenomenon usually restricted by the complexity of the cholesteric phase. This work extends the knowledge of cholesteric patterns, structures that not only have potential for use as intricate, self-assembly blueprints but are pervasive in biological systems.
△ Less
Submitted 14 June, 2017;
originally announced June 2017.
-
Representation Learning by Rotating Your Faces
Authors:
Luan Tran,
Xi Yin,
Xiaoming Liu
Abstract:
The large pose discrepancy between two face images is one of the fundamental challenges in automatic face recognition. Conventional approaches to pose-invariant face recognition either perform face frontalization on, or learn a pose-invariant representation from, a non-frontal face image. We argue that it is more desirable to perform both tasks jointly to allow them to leverage each other. To this…
▽ More
The large pose discrepancy between two face images is one of the fundamental challenges in automatic face recognition. Conventional approaches to pose-invariant face recognition either perform face frontalization on, or learn a pose-invariant representation from, a non-frontal face image. We argue that it is more desirable to perform both tasks jointly to allow them to leverage each other. To this end, this paper proposes a Disentangled Representation learning-Generative Adversarial Network (DR-GAN) with three distinct novelties. First, the encoder-decoder structure of the generator enables DR-GAN to learn a representation that is both generative and discriminative, which can be used for face image synthesis and pose-invariant face recognition. Second, this representation is explicitly disentangled from other face variations such as pose, through the pose code provided to the decoder and pose estimation in the discriminator. Third, DR-GAN can take one or multiple images as the input, and generate one unified identity representation along with an arbitrary number of synthetic face images. Extensive quantitative and qualitative evaluation on a number of controlled and in-the-wild databases demonstrate the superiority of DR-GAN over the state of the art in both learning representations and rotating large-pose face images.
△ Less
Submitted 11 September, 2018; v1 submitted 31 May, 2017;
originally announced May 2017.
-
Software compensation in Particle Flow reconstruction
Authors:
Huong Lan Tran,
Katja Krüger,
Felix Sefkow,
Steven Green,
John Marshall,
Mark Thomson,
Frank Simon
Abstract:
The particle flow approach to calorimetry benefits from highly granular calorimeters and sophisticated software algorithms in order to reconstruct and identify individual particles in complex event topologies. The high spatial granularity, together with analogue energy information, can be further exploited in software compensation. In this approach, the local energy density is used to discriminate…
▽ More
The particle flow approach to calorimetry benefits from highly granular calorimeters and sophisticated software algorithms in order to reconstruct and identify individual particles in complex event topologies. The high spatial granularity, together with analogue energy information, can be further exploited in software compensation. In this approach, the local energy density is used to discriminate electromagnetic and purely hadronic sub-showers within hadron showers in the detector to improve the energy resolution for single particles by correcting for the intrinsic non-compensation of the calorimeter system. This improvement in the single particle energy resolution also results in a better overall jet energy resolution by improving the energy measurement of identified neutral hadrons and improvements in the pattern recognition stage by a more accurate matching of calorimeter energies to tracker measurements. This paper describes the software compensation technique and its implementation in particle flow reconstruction with the Pandora Particle Flow Algorithm (PandoraPFA). The impact of software compensation on the choice of optimal transverse granularity for the analogue hadronic calorimeter option of the International Large Detector (ILD) concept is also discussed.
△ Less
Submitted 25 October, 2017; v1 submitted 29 May, 2017;
originally announced May 2017.
-
Energy-Efficient Joint Unicast and Multicast Beamforming with Multi-Antenna User Terminals
Authors:
Oskari Tervo,
Le-Nam Tran,
Symeon Chatzinotas,
Markku Juntti,
Björn Ottersten
Abstract:
This paper studies energy-efficient joint transmit and receive beamforming in multi-cell multi-user multiple-input multiple-output systems. We consider conventional network energy efficiency metric where the users can receive unicasting streams in addition to the group-specific common multicasting streams which have certain rate constraints. The goal is to use the transmission resources more effic…
▽ More
This paper studies energy-efficient joint transmit and receive beamforming in multi-cell multi-user multiple-input multiple-output systems. We consider conventional network energy efficiency metric where the users can receive unicasting streams in addition to the group-specific common multicasting streams which have certain rate constraints. The goal is to use the transmission resources more efficiently to improve the energy efficiency, when the users are equipped with multiple antennas. Numerical results show the achieved energy efficiency gains by using the additional degrees of freedom of the multicasting transmission to private message unicasting.
△ Less
Submitted 10 May, 2017;
originally announced May 2017.
-
A Real-Time Framework for Task Assignment in Hyperlocal Spatial Crowdsourcing
Authors:
Luan Tran,
Hien To,
Liyue Fan,
Cyrus Shahabi
Abstract:
Spatial Crowdsourcing (SC) is a novel platform that engages individuals in the act of collecting various types of spatial data. This method of data collection can significantly reduce cost and turnover time, and is particularly useful in urban environmental sensing, where traditional means fail to provide fine-grained field data. In this study, we introduce hyperlocal spatial crowdsourcing, where…
▽ More
Spatial Crowdsourcing (SC) is a novel platform that engages individuals in the act of collecting various types of spatial data. This method of data collection can significantly reduce cost and turnover time, and is particularly useful in urban environmental sensing, where traditional means fail to provide fine-grained field data. In this study, we introduce hyperlocal spatial crowdsourcing, where all workers who are located within the spatiotemporal vicinity of a task are eligible to perform the task, e.g., reporting the precipitation level at their area and time. In this setting, there is often a budget constraint, either for every time period or for the entire campaign, on the number of workers to activate to perform tasks. The challenge is thus to maximize the number of assigned tasks under the budget constraint, despite the dynamic arrivals of workers and tasks. We introduce a taxonomy of several problem variants, such as budget-per-time-period vs. budget-per-campaign and binary-utility vs. distance-based-utility. We study the hardness of the task assignment problem in the offline setting and propose online heuristics which exploits the spatial and temporal knowledge acquired over time. Our experiments are conducted with spatial crowdsourcing workloads generated by the SCAWG tool and extensive results show the effectiveness and efficiency of our proposed solutions.
△ Less
Submitted 25 April, 2017; v1 submitted 22 April, 2017;
originally announced April 2017.
-
Weaving Rules into Models@run.time for Embedded Smart Systems
Authors:
Ludovic Mouline,
Thomas Hartmann,
François Fouquet,
Yves Le Traon,
Johann Bourcier,
Olivier Barais
Abstract:
Smart systems are characterised by their ability to analyse measured data in live and to react to changes according to expert rules. Therefore, such systems exploit appropriate data models together with actions, triggered by domain-related conditions. The challenge at hand is that smart systems usually need to process thousands of updates to detect which rules need to be triggered, often even on r…
▽ More
Smart systems are characterised by their ability to analyse measured data in live and to react to changes according to expert rules. Therefore, such systems exploit appropriate data models together with actions, triggered by domain-related conditions. The challenge at hand is that smart systems usually need to process thousands of updates to detect which rules need to be triggered, often even on restricted hardware like a Raspberry Pi. Despite various approaches have been investigated to efficiently check conditions on data models, they either assume to fit into main memory or rely on high latency persistence storage systems that severely damage the reactivity of smart systems. To tackle this challenge, we propose a novel composition process, which weaves executable rules into a data model with lazy loading abilities. We quantitatively show, on a smart building case study, that our approach can handle, at low latency, big sets of rules on top of large-scale data models on restricted hardware.
△ Less
Submitted 14 April, 2017;
originally announced April 2017.
-
DeepCoder: Semi-parametric Variational Autoencoders for Automatic Facial Action Coding
Authors:
Dieu Linh Tran,
Robert Walecki,
Ognjen Rudovic,
Stefanos Eleftheriadis,
Bjørn Schuller,
Maja Pantic
Abstract:
Human face exhibits an inherent hierarchy in its representations (i.e., holistic facial expressions can be encoded via a set of facial action units (AUs) and their intensity). Variational (deep) auto-encoders (VAE) have shown great results in unsupervised extraction of hierarchical latent representations from large amounts of image data, while being robust to noise and other undesired artifacts. P…
▽ More
Human face exhibits an inherent hierarchy in its representations (i.e., holistic facial expressions can be encoded via a set of facial action units (AUs) and their intensity). Variational (deep) auto-encoders (VAE) have shown great results in unsupervised extraction of hierarchical latent representations from large amounts of image data, while being robust to noise and other undesired artifacts. Potentially, this makes VAEs a suitable approach for learning facial features for AU intensity estimation. Yet, most existing VAE-based methods apply classifiers learned separately from the encoded features. By contrast, the non-parametric (probabilistic) approaches, such as Gaussian Processes (GPs), typically outperform their parametric counterparts, but cannot deal easily with large amounts of data. To this end, we propose a novel VAE semi-parametric modeling framework, named DeepCoder, which combines the modeling power of parametric (convolutional) and nonparametric (ordinal GPs) VAEs, for joint learning of (1) latent representations at multiple levels in a task hierarchy1, and (2) classification of multiple ordinal outputs. We show on benchmark datasets for AU intensity estimation that the proposed DeepCoder outperforms the state-of-the-art approaches, and related VAEs and deep learning models.
△ Less
Submitted 5 August, 2017; v1 submitted 7 April, 2017;
originally announced April 2017.
-
Alternating Optimization for Capacity Region of Gaussian MIMO Broadcast Channels with Per-antenna Power Constraint
Authors:
Thuy M. Pham,
Ronan Farrell,
Le-Nam Tran
Abstract:
This paper characterizes the capacity region of Gaussian MIMO broadcast channels (BCs) with per-antenna power constraint (PAPC). While the capacity region of MIMO BCs with a sum power constraint (SPC) was extensively studied, that under PAPC has received less attention. A reason is that efficient solutions for this problem are hard to find. The goal of this paper is to devise an efficient algorith…
▽ More
This paper characterizes the capacity region of Gaussian MIMO broadcast channels (BCs) with per-antenna power constraint (PAPC). While the capacity region of MIMO BCs with a sum power constraint (SPC) was extensively studied, that under PAPC has received less attention. A reason is that efficient solutions for this problem are hard to find. The goal of this paper is to devise an efficient algorithm for determining the capacity region of Gaussian MIMO BCs subject to PAPC, which is scalable to the problem size. To this end, we first transform the weighted sum capacity maximization problem, which is inherently nonconvex with the input covariance matrices, into a convex formulation in the dual multiple access channel by minimax duality. Then we derive a computationally efficient algorithm combining the concept of alternating optimization and successive convex approximation. The proposed algorithm achieves much lower complexity compared to an existing interiorpoint method. Moreover, numerical results demonstrate that the proposed algorithm converges very fast under various scenarios.
△ Less
Submitted 17 May, 2017; v1 submitted 5 April, 2017;
originally announced April 2017.
-
Low-complexity Approaches for MIMO Capacity with Per-antenna Power Constraint
Authors:
Thuy M. Pham,
Ronan Farrell,
Le-Nam Tran
Abstract:
This paper proposes two low-complexity iterative algorithms to compute the capacity of a single-user multiple-input multiple-output channel with per-antenna power constraint. The first method results from manipulating the optimality conditions of the considered problem and applying fixed-point iteration. In the second approach, we transform the considered problem into a minimax optimization progra…
▽ More
This paper proposes two low-complexity iterative algorithms to compute the capacity of a single-user multiple-input multiple-output channel with per-antenna power constraint. The first method results from manipulating the optimality conditions of the considered problem and applying fixed-point iteration. In the second approach, we transform the considered problem into a minimax optimization program using the well-known MAC- BC duality, and then solve it by a novel alternating optimization method. In both proposed iterative methods, each iteration involves an optimization problem which can be efficiently solved by the water-filling algorithm. The proposed iterative methods are provably convergent. Complexity analysis and extensive numerical experiments are carried out to demonstrate the superior performance of the proposed algorithms over an existing approach known as the mode-dropping algorithm.
△ Less
Submitted 17 May, 2017; v1 submitted 5 April, 2017;
originally announced April 2017.