Zum Hauptinhalt springen

Showing 1–50 of 50 results for author: Lee, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.00913  [pdf, other

    cs.NI cs.ET

    Design and Implementation of ARA Wireless Living Lab for Rural Broadband and Applications

    Authors: Taimoor Ul Islam, Joshua Ofori Boateng, Md Nadim, Guoying Zu, Mukaram Shahid, Xun Li, Tianyi Zhang, Salil Reddy, Wei Xu, Ataberk Atalar, Vincent Lee, Yung-Fu Chen, Evan Gosling, Elisabeth Permatasari, Christ Somiah, Zhibo Meng, Sarath Babu, Mohammed Soliman, Ali Hussain, Daji Qiao, Mai Zheng, Ozdal Boyraz, Yong Guan, Anish Arora, Mohamed Selim , et al. (6 additional authors not shown)

    Abstract: To address the rural broadband challenge and to leverage the unique opportunities that rural regions provide for piloting advanced wireless applications, we design and implement the ARA wireless living lab for research and innovation in rural wireless systems and their applications in precision agriculture, community services, and so on. ARA focuses on the unique community, application, and econom… ▽ More

    Submitted 1 August, 2024; originally announced August 2024.

    Comments: 17 pages, 18 figures

  2. arXiv:2407.12282  [pdf, other

    cs.LG cs.AI cs.AR

    Chip Placement with Diffusion

    Authors: Vint Lee, Chun Deng, Leena Elzeiny, Pieter Abbeel, John Wawrzynek

    Abstract: Macro placement is a vital step in digital circuit design that defines the physical location of large collections of components, known as macros, on a 2-dimensional chip. The physical layout obtained during placement determines key performance metrics of the chip, such as power consumption, area, and performance. Existing learning-based methods typically fall short because of their reliance on rei… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

  3. arXiv:2403.13822  [pdf, other

    cs.CY

    An Effective Learning Management System for Revealing Student Performance Attributes

    Authors: Xinyu Zhang, Vincent CS Lee, Duo Xu, Jun Chen, Mohammad S. Obaidat

    Abstract: A learning management system streamlines the management of the teaching process in a centralized place, recording, tracking, and reporting the delivery of educational courses and student performance. Educational knowledge discovery from such an e-learning system plays a crucial role in rule regulation, policy establishment, and system development. However, existing LMSs do not have embedded mining… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

  4. arXiv:2401.03722  [pdf, other

    cs.LG

    From Data to Insights: A Comprehensive Survey on Advanced Applications in Thyroid Cancer Research

    Authors: Xinyu Zhang, Vincent CS Lee, Feng Liu

    Abstract: Thyroid cancer, the most prevalent endocrine cancer, has gained significant global attention due to its impact on public health. Extensive research efforts have been dedicated to leveraging artificial intelligence (AI) methods for the early detection of this disease, aiming to reduce its morbidity rates. However, a comprehensive understanding of the structured organization of research applications… ▽ More

    Submitted 8 January, 2024; originally announced January 2024.

    Comments: arXiv admin note: text overlap with arXiv:2308.13592 by other authors

  5. arXiv:2311.01450  [pdf, other

    cs.LG cs.AI cs.RO

    DreamSmooth: Improving Model-based Reinforcement Learning via Reward Smoothing

    Authors: Vint Lee, Pieter Abbeel, Youngwoon Lee

    Abstract: Model-based reinforcement learning (MBRL) has gained much attention for its ability to learn complex behaviors in a sample-efficient way: planning actions by generating imaginary trajectories with predicted rewards. Despite its success, we found that surprisingly, reward prediction is often a bottleneck of MBRL, especially for sparse rewards that are challenging (or even ambiguous) to predict. Mot… ▽ More

    Submitted 17 February, 2024; v1 submitted 2 November, 2023; originally announced November 2023.

    Comments: For code and website, see https://vint-1.github.io/dreamsmooth/

  6. arXiv:2310.14545  [pdf

    cs.CL

    Harnessing ChatGPT for thematic analysis: Are we ready?

    Authors: V Vien Lee, Stephanie C. C. van der Lubbe, Lay Hoon Goh, Jose M. Valderas

    Abstract: ChatGPT is an advanced natural language processing tool with growing applications across various disciplines in medical research. Thematic analysis, a qualitative research method to identify and interpret patterns in data, is one application that stands to benefit from this technology. This viewpoint explores the utilization of ChatGPT in three core phases of thematic analysis within a medical con… ▽ More

    Submitted 23 October, 2023; v1 submitted 22 October, 2023; originally announced October 2023.

    Comments: 23 pages, 7 figures, 3 tables, 1 textbox

  7. arXiv:2306.07608  [pdf, other

    cs.SI cs.AI

    Finding the Missing-half: Graph Complementary Learning for Homophily-prone and Heterophily-prone Graphs

    Authors: Yizhen Zheng, He Zhang, Vincent CS Lee, Yu Zheng, Xiao Wang, Shirui Pan

    Abstract: Real-world graphs generally have only one kind of tendency in their connections. These connections are either homophily-prone or heterophily-prone. While graphs with homophily-prone edges tend to connect nodes with the same class (i.e., intra-class nodes), heterophily-prone edges tend to build relationships between nodes with different classes (i.e., inter-class nodes). Existing GNNs only take the… ▽ More

    Submitted 13 June, 2023; originally announced June 2023.

    Comments: Accepted by ICML 2023

  8. Learning Strong Graph Neural Networks with Weak Information

    Authors: Yixin Liu, Kaize Ding, Jianling Wang, Vincent Lee, Huan Liu, Shirui Pan

    Abstract: Graph Neural Networks (GNNs) have exhibited impressive performance in many graph learning tasks. Nevertheless, the performance of GNNs can deteriorate when the input graph data suffer from weak information, i.e., incomplete structure, incomplete features, and insufficient labels. Most prior studies, which attempt to learn from the graph data with a specific type of weak information, are far from e… ▽ More

    Submitted 29 May, 2023; originally announced May 2023.

    Comments: Accepted by KDD 2023. 13 pages, 7 figures, 9 tables

  9. arXiv:2302.13251  [pdf, other

    eess.IV cs.CV cs.LG

    Unsupervised Domain Adaptation for Low-dose CT Reconstruction via Bayesian Uncertainty Alignment

    Authors: Kecheng Chen, Jie Liu, Renjie Wan, Victor Ho-Fun Lee, Varut Vardhanabhuti, Hong Yan, Haoliang Li

    Abstract: Low-dose computed tomography (LDCT) image reconstruction techniques can reduce patient radiation exposure while maintaining acceptable imaging quality. Deep learning is widely used in this problem, but the performance of testing data (a.k.a. target domain) is often degraded in clinical scenarios due to the variations that were not encountered in training data (a.k.a. source domain). Unsupervised d… ▽ More

    Submitted 2 June, 2024; v1 submitted 26 February, 2023; originally announced February 2023.

    Comments: Accepted by IEEE Transactions on Neural Networks and Learning Systems

  10. arXiv:2211.14065  [pdf, other

    cs.LG cs.SI

    Beyond Smoothing: Unsupervised Graph Representation Learning with Edge Heterophily Discriminating

    Authors: Yixin Liu, Yizhen Zheng, Daokun Zhang, Vincent CS Lee, Shirui Pan

    Abstract: Unsupervised graph representation learning (UGRL) has drawn increasing research attention and achieved promising results in several graph analytic tasks. Relying on the homophily assumption, existing UGRL methods tend to smooth the learned node representations along all edges, ignoring the existence of heterophilic edges that connect nodes with distinct attributes. As a result, current methods are… ▽ More

    Submitted 25 November, 2022; originally announced November 2022.

    Comments: 14 pages, 7 tables, 6 figures, accepted by AAAI 2023

  11. arXiv:2210.08792  [pdf, other

    cs.LG

    Unifying Graph Contrastive Learning with Flexible Contextual Scopes

    Authors: Yizhen Zheng, Yu Zheng, Xiaofei Zhou, Chen Gong, Vincent CS Lee, Shirui Pan

    Abstract: Graph contrastive learning (GCL) has recently emerged as an effective learning paradigm to alleviate the reliance on labelling information for graph representation learning. The core of GCL is to maximise the mutual information between the representation of a node and its contextual representation (i.e., the corresponding instance with similar semantic information) summarised from the contextual s… ▽ More

    Submitted 17 October, 2022; originally announced October 2022.

    Comments: Accepted in ICDM2022

  12. arXiv:2206.03638  [pdf, other

    cs.LG

    Alternately Optimized Graph Neural Networks

    Authors: Haoyu Han, Xiaorui Liu, Haitao Mao, MohamadAli Torkamani, Feng Shi, Victor Lee, Jiliang Tang

    Abstract: Graph Neural Networks (GNNs) have greatly advanced the semi-supervised node classification task on graphs. The majority of existing GNNs are trained in an end-to-end manner that can be viewed as tackling a bi-level optimization problem. This process is often inefficient in computation and memory usage. In this work, we propose a new optimization framework for semi-supervised learning on graphs. Th… ▽ More

    Submitted 19 July, 2023; v1 submitted 7 June, 2022; originally announced June 2022.

  13. arXiv:2206.01535  [pdf, other

    cs.LG cs.AI

    Rethinking and Scaling Up Graph Contrastive Learning: An Extremely Efficient Approach with Group Discrimination

    Authors: Yizhen Zheng, Shirui Pan, Vincent Cs Lee, Yu Zheng, Philip S. Yu

    Abstract: Graph contrastive learning (GCL) alleviates the heavy reliance on label information for graph representation learning (GRL) via self-supervised learning schemes. The core idea is to learn by maximising mutual information for similar instances, which requires similarity computation between two node instances. However, GCL is inefficient in both time and memory consumption. In addition, GCL normally… ▽ More

    Submitted 16 October, 2022; v1 submitted 3 June, 2022; originally announced June 2022.

    Comments: Accepted in NeurIPS 2022

  14. Optimal service resource management strategy for IoT-based health information system considering value co-creation of users

    Authors: Ji Fang, Vincent CS Lee, Haiyan Wang

    Abstract: This paper explores optimal service resource management strategy, a continuous challenge for health information service to enhance service performance, optimise service resource utilisation and deliver interactive health information service. An adaptive optimal service resource management strategy was developed considering a value co-creation model in health information service with a focus on col… ▽ More

    Submitted 30 January, 2024; v1 submitted 5 April, 2022; originally announced April 2022.

    Comments: Fang, J., Lee, V.C.S. and Wang, H. (2024), "Optimal service resource management strategy for IoT-based health information system considering value co-creation of users", Industrial Management & Data Systems, Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/IMDS-03-2023-0173

  15. Enhancing Digital Health Services: A Machine Learning Approach to Personalized Exercise Goal Setting

    Authors: Ji Fang, Vincent CS Lee, Hao Ji, Haiyan Wang

    Abstract: The utilization of digital health has increased recently, and these services provide extensive guidance to encourage users to exercise frequently by setting daily exercise goals to promote a healthy lifestyle. These comprehensive guides evolved from the consideration of various personalized behavioral factors. Nevertheless, existing approaches frequently neglect the users dynamic behavior and the… ▽ More

    Submitted 4 March, 2024; v1 submitted 2 April, 2022; originally announced April 2022.

  16. arXiv:2203.13308  [pdf, other

    cs.CR

    Verifiable Access Control for Augmented Reality Localization and Mapping

    Authors: Shaowei Zhu, Hyo Jin Kim, Maurizio Monge, G. Edward Suh, Armin Alaghi, Brandon Reagen, Vincent Lee

    Abstract: Localization and mapping is a key technology for bridging the virtual and physical worlds in augmented reality (AR). Localization and mapping works by creating and querying maps made of anchor points that enable the overlay of these two worlds. As a result, information about the physical world is captured in the map and naturally gives rise to concerns around who can map physical spaces as well as… ▽ More

    Submitted 24 March, 2022; originally announced March 2022.

  17. arXiv:2203.03627  [pdf

    eess.IV cs.CV

    Multi-channel deep convolutional neural networks for multi-classifying thyroid disease

    Authors: Xinyu Zhang, Vincent CS. Lee, Jia Rong, James C. Lee, Jiangning Song, Feng Liu

    Abstract: Thyroid disease instances have been continuously increasing since the 1990s, and thyroid cancer has become the most rapidly rising disease among all the malignancies in recent years. Most existing studies focused on applying deep convolutional neural networks for detecting thyroid cancer. Despite their satisfactory performance on binary classification tasks, limited studies have explored multi-cla… ▽ More

    Submitted 5 March, 2022; originally announced March 2022.

  18. arXiv:2203.02547  [pdf, other

    cs.CR

    Homomorphically Encrypted Computation using Stochastic Encodings

    Authors: Hsuan Hsiao, Vincent Lee, Brandon Reagen, Armin Alaghi

    Abstract: Homomorphic encryption (HE) is a privacy-preserving technique that enables computation directly over ciphertext. Unfortunately, a key challenge for HE is that implementations can be impractically slow and have limits on computation that can be efficiently implemented. For instance, in Boolean constructions of HE like TFHE, arithmetic operations need to be decomposed into constituent elementary log… ▽ More

    Submitted 4 March, 2022; originally announced March 2022.

  19. arXiv:2202.13433  [pdf, other

    cs.RO

    Feasibility and Acceptability of Remote Neuromotor Rehabilitation Interactions Using Social Robot Augmented Telepresence: A Case Study

    Authors: Michael J. Sobrepera, Vera G. Lee, Suveer Garg, Michelle J. Johnson, Ph. D

    Abstract: There is a growing need to deliver rehabilitation care to patients remotely. Long term demographic changes, geographic shortages of care providers, and now a global pandemic contribute to this need. Telepresence provides an option for delivering this care. However, telepresence using video and audio alone does not provide an interaction of the same quality as in-person. To bridge this gap, we prop… ▽ More

    Submitted 27 February, 2022; originally announced February 2022.

  20. arXiv:2201.05232  [pdf, other

    cs.AR

    FARSI: Facebook AR System Investigator for Agile Domain-Specific System-on-Chip Exploration

    Authors: Behzad Boroujerdian, Ying Jing, Amit Kumar, Lavanya Subramanian, Luke Yen, Vincent Lee, Vivek Venkatesan, Amit Jindal, Robert Shearer, Vijay Janapa Reddi

    Abstract: Domain-specific SoCs (DSSoCs) are attractive solutions for domains with stringent power/performance/area constraints; however, they suffer from two fundamental complexities. On the one hand, their many specialized hardware blocks result in complex systems and thus high development effort. On the other, their many system knobs expand the complexity of design space, making the search for the optimal… ▽ More

    Submitted 17 January, 2022; v1 submitted 13 January, 2022; originally announced January 2022.

  21. arXiv:2112.12785  [pdf, other

    cs.CV

    NinjaDesc: Content-Concealing Visual Descriptors via Adversarial Learning

    Authors: Tony Ng, Hyo Jin Kim, Vincent Lee, Daniel DeTone, Tsun-Yi Yang, Tianwei Shen, Eddy Ilg, Vassileios Balntas, Krystian Mikolajczyk, Chris Sweeney

    Abstract: In the light of recent analyses on privacy-concerning scene revelation from visual descriptors, we develop descriptors that conceal the input image content. In particular, we propose an adversarial learning framework for training visual descriptors that prevent image reconstruction, while maintaining the matching accuracy. We let a feature encoding network and image reconstruction network compete… ▽ More

    Submitted 29 March, 2022; v1 submitted 23 December, 2021; originally announced December 2021.

    Comments: Accepted at CVPR 2022. Supplementary material included after references. 15 pages, 14 figures, 6 tables

  22. arXiv:2108.09606  [pdf, other

    cs.DS

    Online Ride-Hitching in UAV Travelling

    Authors: Songhua Li, Minming Li, Lingjie Duan, Victor C. S. Lee

    Abstract: The unmanned aerial vehicle (UAV) has emerged as a promising solution to provide delivery and other mobile services to customers rapidly, yet it drains its stored energy quickly when travelling on the way and (even if solar-powered) it takes time for charging power on the way before reaching the destination. To address this issue, existing works focus more on UAV's path planning with designated sy… ▽ More

    Submitted 21 August, 2021; originally announced August 2021.

    Comments: A preliminary version of this paper is to appear at COCOON 2021

  23. arXiv:2108.04097  [pdf, other

    cs.RO cs.CV

    Deep Learning for Embodied Vision Navigation: A Survey

    Authors: Fengda Zhu, Yi Zhu, Vincent CS Lee, Xiaodan Liang, Xiaojun Chang

    Abstract: "Embodied visual navigation" problem requires an agent to navigate in a 3D environment mainly rely on its first-person observation. This problem has attracted rising attention in recent years due to its wide application in autonomous driving, vacuum cleaner, and rescue robot. A navigation agent is supposed to have various intelligent skills, such as visual perceiving, mapping, planning, exploring… ▽ More

    Submitted 11 October, 2021; v1 submitted 7 July, 2021; originally announced August 2021.

    Comments: 20 pages

  24. Anomaly Detection in Dynamic Graphs via Transformer

    Authors: Yixin Liu, Shirui Pan, Yu Guang Wang, Fei Xiong, Liang Wang, Qingfeng Chen, Vincent CS Lee

    Abstract: Detecting anomalies for dynamic graphs has drawn increasing attention due to their wide applications in social networks, e-commerce, and cybersecurity. Recent deep learning-based approaches have shown promising results over shallow methods. However, they fail to address two core challenges of anomaly detection in dynamic graphs: the lack of informative encoding for unattributed nodes and the diffi… ▽ More

    Submitted 27 October, 2021; v1 submitted 17 June, 2021; originally announced June 2021.

    Comments: 13 pages, 5 figures

  25. arXiv:2105.03812  [pdf, other

    cs.CV

    Analysis and Mitigations of Reverse Engineering Attacks on Local Feature Descriptors

    Authors: Deeksha Dangwal, Vincent T. Lee, Hyo Jin Kim, Tianwei Shen, Meghan Cowan, Rajvi Shah, Caroline Trippel, Brandon Reagen, Timothy Sherwood, Vasileios Balntas, Armin Alaghi, Eddy Ilg

    Abstract: As autonomous driving and augmented reality evolve, a practical concern is data privacy. In particular, these applications rely on localization based on user images. The widely adopted technology uses local feature descriptors, which are derived from the images and it was long thought that they could not be reverted back. However, recent work has demonstrated that under certain conditions reverse… ▽ More

    Submitted 8 May, 2021; originally announced May 2021.

    Comments: 13 pages

  26. SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing

    Authors: Deeksha Dangwal, Meghan Cowan, Armin Alaghi, Vincent T. Lee, Brandon Reagen, Caroline Trippel

    Abstract: Users are demanding increased data security. As a result, security is rapidly becoming a first-order design constraint in next generation computing systems. Researchers and practitioners are exploring various security technologies to meet user demand such as trusted execution environments (e.g., Intel SGX, ARM TrustZone), homomorphic encryption, and differential privacy. Each technique provides so… ▽ More

    Submitted 1 May, 2021; originally announced May 2021.

    Comments: 9 pages

  27. arXiv:2101.07841  [pdf, other

    cs.CR

    Porcupine: A Synthesizing Compiler for Vectorized Homomorphic Encryption

    Authors: Meghan Cowan, Deeksha Dangwal, Armin Alaghi, Caroline Trippel, Vincent T. Lee, Brandon Reagen

    Abstract: Homomorphic encryption (HE) is a privacy-preserving technique that enables computation directly on encrypted data. Despite its promise, HE has seen limited use due to performance overheads and compilation challenges. Recent work has made significant advances to address the performance overheads but automatic compilation of efficient HE kernels remains relatively unexplored. This paper presents P… ▽ More

    Submitted 19 January, 2021; originally announced January 2021.

  28. arXiv:2011.10938  [pdf, other

    cs.DS cs.DM

    Online Maximum $k$-Interval Coverage Problem

    Authors: Songhua Li, Minming Li, Lingjie Duan, Victor C. S. Lee

    Abstract: We study the online maximum coverage problem on a line, in which, given an online sequence of sub-intervals (which may intersect among each other) of a target large interval and an integer $k$, we aim to select at most $k$ of the sub-intervals such that the total covered length of the target interval is maximized. The decision to accept or reject each sub-interval is made immediately and irrevocab… ▽ More

    Submitted 22 November, 2020; originally announced November 2020.

    Comments: An extended abstract of this full version is to appear in COCOA 2020

  29. arXiv:2006.00505  [pdf, other

    cs.CR

    Cheetah: Optimizing and Accelerating Homomorphic Encryption for Private Inference

    Authors: Brandon Reagen, Wooseok Choi, Yeongil Ko, Vincent Lee, Gu-Yeon Wei, Hsien-Hsin S. Lee, David Brooks

    Abstract: As the application of deep learning continues to grow, so does the amount of data used to make predictions. While traditionally, big-data deep learning was constrained by computing performance and off-chip memory bandwidth, a new constraint has emerged: privacy. One solution is homomorphic encryption (HE). Applying HE to the client-cloud model allows cloud services to perform inference directly on… ▽ More

    Submitted 8 October, 2020; v1 submitted 31 May, 2020; originally announced June 2020.

  30. Robotic Hierarchical Graph Neurons. A novel implementation of HGN for swarm robotic behaviour control

    Authors: Phillip Smith, Aldeida Aleti, Vincent C. S. Lee, Robert Hunjet, Asad Khan

    Abstract: This paper explores the use of a novel form of Hierarchical Graph Neurons (HGN) for in-operation behaviour selection in a swarm of robotic agents. This new HGN is called Robotic-HGN (R-HGN), as it matches robot environment observations to environment labels via fusion of match probabilities from both temporal and intra-swarm collections. This approach is novel for HGN as it addresses robotic obser… ▽ More

    Submitted 27 October, 2019; originally announced October 2019.

    Journal ref: Expert Systems with Applications 2021

  31. arXiv:1909.11822  [pdf, other

    physics.comp-ph cs.LG cs.PF

    DisCo: Physics-Based Unsupervised Discovery of Coherent Structures in Spatiotemporal Systems

    Authors: Adam Rupe, Nalini Kumar, Vladislav Epifanov, Karthik Kashinath, Oleksandr Pavlyk, Frank Schlimbach, Mostofa Patwary, Sergey Maidanov, Victor Lee, Prabhat, James P. Crutchfield

    Abstract: Extracting actionable insight from complex unlabeled scientific data is an open challenge and key to unlocking data-driven discovery in science. Complementary and alternative to supervised machine learning approaches, unsupervised physics-based methods based on behavior-driven theories hold great promise. Due to computational limitations, practical application on real-world domain science problems… ▽ More

    Submitted 25 September, 2019; originally announced September 2019.

  32. arXiv:1909.11251  [pdf

    cs.LG stat.ML

    Online Semi-Supervised Concept Drift Detection with Density Estimation

    Authors: Chang How Tan, Vincent CS Lee, Mahsa Salehi

    Abstract: Concept drift is formally defined as the change in joint distribution of a set of input variables X and a target variable y. The two types of drift that are extensively studied are real drift and virtual drift where the former is the change in posterior probabilities p(y|X) while the latter is the change in distribution of X without affecting the posterior probabilities. Many approaches on concept… ▽ More

    Submitted 10 November, 2019; v1 submitted 24 September, 2019; originally announced September 2019.

  33. arXiv:1909.07520  [pdf, other

    physics.comp-ph cs.LG physics.ao-ph physics.flu-dyn

    Towards Unsupervised Segmentation of Extreme Weather Events

    Authors: Adam Rupe, Karthik Kashinath, Nalini Kumar, Victor Lee, Prabhat, James P. Crutchfield

    Abstract: Extreme weather is one of the main mechanisms through which climate change will directly impact human society. Coping with such change as a global community requires markedly improved understanding of how global warming drives extreme weather events. While alternative climate scenarios can be simulated using sophisticated models, identifying extreme weather events in these simulations requires aut… ▽ More

    Submitted 16 September, 2019; originally announced September 2019.

  34. arXiv:1908.07951   

    eess.SP cs.NI

    Secure practical indoor optical wireless communications using quantum key distribution

    Authors: Vincent Lee, Dominic OBrien

    Abstract: Quantum Key Distribution (QKD) can guarantee security for practical indoor optical wireless environments. The key challenges are to mitigate artificial lighting and ambient light at the receiver. A new spectral region for QKD is proposed and an ideal QKD link model is simulated with experimental ambient light power measurements. Simulation, modelling, and analysis indicates that the carbon dioxide… ▽ More

    Submitted 28 April, 2020; v1 submitted 18 August, 2019; originally announced August 2019.

    Comments: Page 10, experimental results. Authors decision to revisit and resolve orders of magnitude discrepancy

  35. arXiv:1907.03382  [pdf, other

    cs.LG cs.PF stat.ML

    Etalumis: Bringing Probabilistic Programming to Scientific Simulators at Scale

    Authors: Atılım Güneş Baydin, Lei Shao, Wahid Bhimji, Lukas Heinrich, Lawrence Meadows, Jialin Liu, Andreas Munk, Saeid Naderiparizi, Bradley Gram-Hansen, Gilles Louppe, Mingfei Ma, Xiaohui Zhao, Philip Torr, Victor Lee, Kyle Cranmer, Prabhat, Frank Wood

    Abstract: Probabilistic programming languages (PPLs) are receiving widespread attention for performing Bayesian inference in complex generative models. However, applications to science remain limited because of the impracticability of rewriting complex scientific simulators in a PPL, the computational cost of inference, and the lack of scalable implementations. To address these, we present a novel PPL frame… ▽ More

    Submitted 27 August, 2019; v1 submitted 7 July, 2019; originally announced July 2019.

    Comments: 14 pages, 8 figures

    MSC Class: 68T37; 68T05; 62P35 ACM Class: G.3; I.2.6; J.2

    Journal ref: Proceedings of the International Conference for High Performance Computing, Networking, Storage, and Analysis (SC19), November 17--22, 2019

  36. Nearest-Neighbour-Induced Isolation Similarity and its Impact on Density-Based Clustering

    Authors: Xiaoyu Qin, Kai Ming Ting, Ye Zhu, Vincent CS Lee

    Abstract: A recent proposal of data dependent similarity called Isolation Kernel/Similarity has enabled SVM to produce better classification accuracy. We identify shortcomings of using a tree method to implement Isolation Similarity; and propose a nearest neighbour method instead. We formally prove the characteristic of Isolation Similarity with the use of the proposed method. The impact of Isolation Simila… ▽ More

    Submitted 30 June, 2019; originally announced July 2019.

    Journal ref: Qin, Xiaoyu, et al. "Nearest-neighbour-induced isolation similarity and its impact on density-based clustering." Proceedings of the AAAI Conference on Artificial Intelligence. Vol. 33. No. 01. 2019

  37. arXiv:1902.05971  [pdf, other

    cs.ET

    Synthesizing Number Generators for Stochastic Computing using Mixed Integer Programming

    Authors: Vincent T. Lee, Samuel Archibald Elliot, Armin Alaghi, Luis Ceze

    Abstract: Stochastic computing (SC) is a high density, low-power computation technique which encodes values as unary bitstreams instead of binary-encoded (BE) values. Practical SC implementations require deterministic or pseudo-random number sequences which are optimally correlated to generate bitstreams and achieve accurate results. Unfortunately, the size of the search space makes manually designing optim… ▽ More

    Submitted 26 February, 2019; v1 submitted 15 February, 2019; originally announced February 2019.

    Comments: 6 pages, 5 figures, 3 tables

  38. arXiv:1901.08248  [pdf, other

    cs.DB

    TigerGraph: A Native MPP Graph Database

    Authors: Alin Deutsch, Yu Xu, Mingxi Wu, Victor Lee

    Abstract: We present TigerGraph, a graph database system built from the ground up to support massively parallel computation of queries and analytics. TigerGraph's high-level query language, GSQL, is designed for compatibility with SQL, while simultaneously allowing NoSQL programmers to continue thinking in Bulk-Synchronous Processing (BSP) terms and reap the benefits of high-level specification. GSQL is… ▽ More

    Submitted 24 January, 2019; originally announced January 2019.

  39. arXiv:1811.09538  [pdf, ps, other

    cs.GT

    A Game Model of Search and Pursuit

    Authors: Steve Alpern, Viciano Lee

    Abstract: Shmuel Gal and Jerome Casas have recently introduced a game theoretic model that combines search and pursuit by a predator for a prey animal. The prey (hider) can hide in a finite number of locations. The predator (searcher) can inspect any k of these locations. If the prey is not in any of these, the prey wins. If the prey is found at an inspected location, a pursuit begins which is successful fo… ▽ More

    Submitted 9 December, 2019; v1 submitted 23 November, 2018; originally announced November 2018.

    Comments: 17 pages, 0 figures, presented at the 18th International Symposium on Dynamic Games and Application July 9-12, 2018

  40. arXiv:1810.04756  [pdf, other

    cs.ET

    Stochastic Synthesis for Stochastic Computing

    Authors: Vincent T. Lee, Armin Alaghi, Luis Ceze, Mark Oskin

    Abstract: Stochastic computing (SC) is an emerging computing technique which offers higher computational density, and lower power over binary-encoded (BE) computation. Unlike BE computation, SC encodes values as probabilistic bitstreams which makes designing new circuits unintuitive. Existing techniques for synthesizing SC circuits are limited to specific classes of functions such as polynomial evaluation o… ▽ More

    Submitted 10 October, 2018; originally announced October 2018.

    Comments: 7 pages, 4 figures, 3 tables

  41. arXiv:1808.04728  [pdf, other

    astro-ph.CO astro-ph.IM cs.LG physics.comp-ph

    CosmoFlow: Using Deep Learning to Learn the Universe at Scale

    Authors: Amrita Mathuriya, Deborah Bard, Peter Mendygral, Lawrence Meadows, James Arnemann, Lei Shao, Siyu He, Tuomas Karna, Daina Moise, Simon J. Pennycook, Kristyn Maschoff, Jason Sewall, Nalini Kumar, Shirley Ho, Mike Ringenburg, Prabhat, Victor Lee

    Abstract: Deep learning is a promising tool to determine the physical model that describes our universe. To handle the considerable computational cost of this problem, we present CosmoFlow: a highly scalable deep learning application built on top of the TensorFlow framework. CosmoFlow uses efficient implementations of 3D convolution and pooling primitives, together with improvements in threading for many el… ▽ More

    Submitted 9 November, 2018; v1 submitted 14 August, 2018; originally announced August 2018.

    Comments: 11 pages, 6 pages, presented at SuperComputing 2018

  42. arXiv:1807.07706  [pdf, other

    cs.LG hep-ph physics.data-an stat.ML

    Efficient Probabilistic Inference in the Quest for Physics Beyond the Standard Model

    Authors: Atılım Güneş Baydin, Lukas Heinrich, Wahid Bhimji, Lei Shao, Saeid Naderiparizi, Andreas Munk, Jialin Liu, Bradley Gram-Hansen, Gilles Louppe, Lawrence Meadows, Philip Torr, Victor Lee, Prabhat, Kyle Cranmer, Frank Wood

    Abstract: We present a novel probabilistic programming framework that couples directly to existing large-scale simulators through a cross-platform probabilistic execution protocol, which allows general-purpose inference engines to record and control random number draws within simulators in a language-agnostic way. The execution of existing simulators as probabilistic programs enables highly interpretable po… ▽ More

    Submitted 17 February, 2020; v1 submitted 20 July, 2018; originally announced July 2018.

    Comments: 20 pages, 9 figures

    MSC Class: 68T37; 68T05; 62P35 ACM Class: G.3; I.2.6; J.2

    Journal ref: In Advances in Neural Information Processing Systems 33 (NeurIPS), Vancouver, Canada, 2019

  43. arXiv:1803.04862  [pdf, other

    eess.SP cs.AR

    Correlation Manipulating Circuits for Stochastic Computing

    Authors: Vincent T. Lee, Armin Alaghi, Luis Ceze

    Abstract: Stochastic computing (SC) is an emerging computing technique that promises high density, low power, and error tolerant solutions. In SC, values are encoded as unary bitstreams and SC arithmetic circuits operate on one or more bitstreams. In many cases, the input bitstreams must be correlated or uncorrelated for SC arithmetic to produce accurate results. As a result, a key challenge for designing S… ▽ More

    Submitted 1 March, 2018; originally announced March 2018.

    Comments: 6 pages, 5 figures, 4 tables, Design, Automation and Test in Europe Conference and Exhibition (2018)

  44. arXiv:1712.09388  [pdf, other

    cs.DC

    Scaling GRPC Tensorflow on 512 nodes of Cori Supercomputer

    Authors: Amrita Mathuriya, Thorsten Kurth, Vivek Rane, Mustafa Mustafa, Lei Shao, Debbie Bard, Prabhat, Victor W Lee

    Abstract: We explore scaling of the standard distributed Tensorflow with GRPC primitives on up to 512 Intel Xeon Phi (KNL) nodes of Cori supercomputer with synchronous stochastic gradient descent (SGD), and identify causes of scaling inefficiency at higher node counts. To our knowledge, this is the first exploration of distributed GRPC Tensorflow scalability on a HPC supercomputer at such large scale with s… ▽ More

    Submitted 26 December, 2017; originally announced December 2017.

    Comments: Published as a poster in NIPS 2017 Workshop: Deep Learning At Supercomputer Scale

  45. arXiv:1706.02344  [pdf

    cs.AR

    Energy-Efficient Hybrid Stochastic-Binary Neural Networks for Near-Sensor Computing

    Authors: Vincent T. Lee, Armin Alaghi, John P. Hayes, Visvesh Sathe, Luis Ceze

    Abstract: Recent advances in neural networks (NNs) exhibit unprecedented success at transforming large, unstructured data streams into compact higher-level semantic information for tasks such as handwriting recognition, image classification, and speech recognition. Ideally, systems would employ near-sensor computation to execute these tasks at sensor endpoints to maximize data reduction and minimize data mo… ▽ More

    Submitted 7 June, 2017; originally announced June 2017.

    Comments: 6 pages, 3 figures, Design, Automata and Test in Europe (DATE) 2017

  46. arXiv:1611.07409  [pdf, ps, other

    cs.PF

    A Metric for Performance Portability

    Authors: S. J. Pennycook, J. D. Sewall, V. W. Lee

    Abstract: The term "performance portability" has been informally used in computing to refer to a variety of notions which generally include: 1) the ability to run one application across multiple hardware platforms; and 2) achieving some notional level of performance on these platforms. However, there has been a noticeable lack of consensus on the precise meaning of the term, and authors' conclusions regardi… ▽ More

    Submitted 22 November, 2016; originally announced November 2016.

    Comments: 7 pages, in Proceedings of the 7th International Workshop in Performance Modeling, Benchmarking and Simulation of High Performance Computer Systems

  47. arXiv:1608.03175  [pdf, other

    cs.DC

    Similarity Search on Automata Processors

    Authors: Vincent T. Lee, Justin Kotalik, Carlo C. Del Mundo, Armin Alaghi, Luis Ceze, Mark Oskin

    Abstract: Similarity search is a critical primitive for a wide variety of applications including natural language processing, content-based search, machine learning, computer vision, databases, robotics, and recommendation systems. At its core, similarity search is implemented using the k-nearest neighbors (kNN) algorithm, where computation consists of highly parallel distance calculations and a global top-… ▽ More

    Submitted 7 June, 2017; v1 submitted 9 August, 2016; originally announced August 2016.

    Comments: 12 pages, 11 figures, accepted to International Parallel and Distribution Processing Symposium (IPDPS) 2017

  48. arXiv:1606.03742  [pdf, other

    cs.DC cs.AR

    Application-Driven Near-Data Processing for Similarity Search

    Authors: Vincent T. Lee, Amrita Mazumdar, Carlo C. del Mundo, Armin Alaghi, Luis Ceze, Mark Oskin

    Abstract: Similarity search is a key to a variety of applications including content-based search for images and video, recommendation systems, data deduplication, natural language processing, computer vision, databases, computational biology, and computer graphics. At its core, similarity search manifests as k-nearest neighbors (kNN), a computationally simple primitive consisting of highly parallel distance… ▽ More

    Submitted 10 July, 2017; v1 submitted 12 June, 2016; originally announced June 2016.

    Comments: 15 pages, 8 figures, 7 tables

  49. arXiv:1102.3937  [pdf, ps, other

    cs.SI physics.soc-ph

    Axiomatic Ranking of Network Role Similarity

    Authors: Ruoming Jin, Victor E. Lee, Hui Hong

    Abstract: A key task in social network and other complex network analysis is role analysis: describing and categorizing nodes according to how they interact with other nodes. Two nodes have the same role if they interact with equivalent sets of neighbors. The most fundamental role equivalence is automorphic equivalence. Unfortunately, the fastest algorithms known for graph automorphism are nonpolynomial. Mo… ▽ More

    Submitted 9 June, 2011; v1 submitted 18 February, 2011; originally announced February 2011.

    Comments: 17 pages, twocolumn Version 2 of this technical report fixes minor errors in the Triangle Inequality proof, grammatical errors, and other typos. Edited and more polished version to be published in KDD'11, August 2011

    ACM Class: H.2.8

  50. A Comprehensive Survey of Data Mining-based Fraud Detection Research

    Authors: Clifton Phua, Vincent Lee, Kate Smith, Ross Gayler

    Abstract: This survey paper categorises, compares, and summarises from almost all published technical and review articles in automated fraud detection within the last 10 years. It defines the professional fraudster, formalises the main types and subtypes of known fraud, and presents the nature of data evidence collected within affected industries. Within the business context of mining the data to achieve hi… ▽ More

    Submitted 30 September, 2010; originally announced September 2010.

    Comments: 14 pages