Zum Hauptinhalt springen

Showing 1–19 of 19 results for author: Rezaei, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11232  [pdf

    cs.SE cs.AI

    SLEGO: A Collaborative Data Analytics System with LLM Recommender for Diverse Users

    Authors: Siu Lung Ng, Hirad Baradaran Rezaei, Fethi Rabhi

    Abstract: This paper presents the SLEGO (Software-Lego) system, a collaborative analytics platform that bridges the gap between experienced developers and novice users using a cloud-based platform with modular, reusable microservices. These microservices enable developers to share their analytical tools and workflows, while a simple graphical user interface (GUI) allows novice users to build comprehensive a… ▽ More

    Submitted 18 August, 2024; v1 submitted 17 June, 2024; originally announced June 2024.

    Comments: 11 pages, 10 figures, 5 tables

    ACM Class: D.2.11; I.2.1

  2. arXiv:2402.06831  [pdf

    cs.SI

    What We Know About Using Non-Engagement Signals in Content Ranking

    Authors: Tom Cunningham, Sana Pandey, Leif Sigerson, Jonathan Stray, Jeff Allen, Bonnie Barrilleaux, Ravi Iyer, Smitha Milli, Mohit Kothari, Behnam Rezaei

    Abstract: Many online platforms predominantly rank items by predicted user engagement. We believe that there is much unrealized potential in including non-engagement signals, which can improve outcomes both for platforms and for society as a whole. Based on a daylong workshop with experts from industry and academia, we formulate a series of propositions and document each as best we can from public evidence,… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

    ACM Class: H.3.3; H.4.3

  3. arXiv:2303.02203  [pdf, other

    cs.CV cs.RO

    X$^3$KD: Knowledge Distillation Across Modalities, Tasks and Stages for Multi-Camera 3D Object Detection

    Authors: Marvin Klingner, Shubhankar Borse, Varun Ravi Kumar, Behnaz Rezaei, Venkatraman Narayanan, Senthil Yogamani, Fatih Porikli

    Abstract: Recent advances in 3D object detection (3DOD) have obtained remarkably strong results for LiDAR-based models. In contrast, surround-view 3DOD models based on multiple camera images underperform due to the necessary view transformation of features from perspective view (PV) to a 3D world representation which is ambiguous due to missing depth information. This paper introduces X$^3$KD, a comprehensi… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

    Comments: Accepted to CVPR 2023

  4. arXiv:2003.09779  [pdf, other

    cs.LG stat.ML

    Deep Markov Spatio-Temporal Factorization

    Authors: Amirreza Farnoosh, Behnaz Rezaei, Eli Zachary Sennesh, Zulqarnain Khan, Jennifer Dy, Ajay Satpute, J Benjamin Hutchinson, Jan-Willem van de Meent, Sarah Ostadabbas

    Abstract: We introduce deep Markov spatio-temporal factorization (DMSTF), a generative model for dynamical analysis of spatio-temporal data. Like other factor analysis methods, DMSTF approximates high dimensional data by a product between time dependent weights and spatially dependent factors. These weights and factors are in turn represented in terms of lower dimensional latents inferred using stochastic v… ▽ More

    Submitted 18 August, 2020; v1 submitted 21 March, 2020; originally announced March 2020.

  5. arXiv:2003.07335  [pdf, other

    cs.CV eess.IV

    G-LBM:Generative Low-dimensional Background Model Estimation from Video Sequences

    Authors: Behnaz Rezaei, Amirreza Farnoosh, Sarah Ostadabbas

    Abstract: In this paper, we propose a computationally tractable and theoretically supported non-linear low-dimensional generative model to represent real-world data in the presence of noise and sparse outliers. The non-linear low-dimensional manifold discovery of data is done through describing a joint distribution over observations, and their low-dimensional representations (i.e. manifold coordinates). Our… ▽ More

    Submitted 17 July, 2020; v1 submitted 16 March, 2020; originally announced March 2020.

  6. arXiv:2001.01558  [pdf

    physics.flu-dyn cs.LG stat.ML

    Shear Stress Distribution Prediction in Symmetric Compound Channels Using Data Mining and Machine Learning Models

    Authors: Zohreh Sheikh Khozani, Khabat Khosravi, Mohammadamin Torabi, Amir Mosavi, Bahram Rezaei, Timon Rabczuk

    Abstract: Shear stress distribution prediction in open channels is of utmost importance in hydraulic structural engineering as it directly affects the design of stable channels. In this study, at first, a series of experimental tests were conducted to assess the shear stress distribution in prismatic compound channels. The shear stress values around the whole wetted perimeter were measured in the compound c… ▽ More

    Submitted 20 December, 2019; originally announced January 2020.

    Comments: 29 pages, 6 figures

    MSC Class: 68T05

  7. arXiv:1909.09566  [pdf, other

    cs.CV

    Target-Specific Action Classification for Automated Assessment of Human Motor Behavior from Video

    Authors: Behnaz Rezaei, Yiorgos Christakis, Bryan Ho, Kevin Thomas, Kelley Erb, Sarah Ostadabbas, Shyamal Patel

    Abstract: Objective monitoring and assessment of human motor behavior can improve the diagnosis and management of several medical conditions. Over the past decade, significant advances have been made in the use of wearable technology for continuously monitoring human motor behavior in free-living conditions. However, wearable technology remains ill-suited for applications which require monitoring and interp… ▽ More

    Submitted 20 September, 2019; originally announced September 2019.

    Comments: This manuscript is under submission to the Sensors journal

  8. arXiv:1902.00820  [pdf, other

    cs.CV eess.IV

    DeepPBM: Deep Probabilistic Background Model Estimation from Video Sequences

    Authors: Amirreza Farnoosh, Behnaz Rezaei, Sarah Ostadabbas

    Abstract: This paper presents a novel unsupervised probabilistic model estimation of visual background in video sequences using a variational autoencoder framework. Due to the redundant nature of the backgrounds in surveillance videos, visual information of the background can be compressed into a low-dimensional subspace in the encoder part of the variational autoencoder, while the highly variant informatio… ▽ More

    Submitted 2 February, 2019; originally announced February 2019.

  9. arXiv:1711.01218  [pdf, other

    cs.CV eess.IV

    Background Subtraction via Fast Robust Matrix Completion

    Authors: Behnaz Rezaei, Sarah Ostadabbas

    Abstract: Background subtraction is the primary task of the majority of video inspection systems. The most important part of the background subtraction which is common among different algorithms is background modeling. In this regard, our paper addresses the problem of background modeling in a computationally efficient way, which is important for current eruption of "big data" processing coming from high re… ▽ More

    Submitted 3 November, 2017; originally announced November 2017.

  10. arXiv:1606.04165  [pdf, other

    cs.HC cs.AI

    Using Virtual Humans to Understand Real Ones

    Authors: Katie Hoemann, Behnaz Rezaei, Stacy C. Marsella, Sarah Ostadabbas

    Abstract: Human interactions are characterized by explicit as well as implicit channels of communication. While the explicit channel transmits overt messages, the implicit ones transmit hidden messages about the communicator (e.g., his/her intentions and attitudes). There is a growing consensus that providing a computer with the ability to manipulate implicit affective cues should allow for a more meaningfu… ▽ More

    Submitted 13 June, 2016; originally announced June 2016.

  11. arXiv:1606.00370  [pdf, other

    cs.HC cs.LG

    Decoding Emotional Experience through Physiological Signal Processing

    Authors: Maria S. Perez-Rosero, Behnaz Rezaei, Murat Akcakaya, Sarah Ostadabbas

    Abstract: There is an increasing consensus among re- searchers that making a computer emotionally intelligent with the ability to decode human affective states would allow a more meaningful and natural way of human-computer interactions (HCIs). One unobtrusive and non-invasive way of recognizing human affective states entails the exploration of how physiological signals vary under different emotional experi… ▽ More

    Submitted 1 June, 2016; originally announced June 2016.

  12. arXiv:0711.0259  [pdf, ps, other

    cs.GT

    Diversification in the Internet Economy:The Role of For-Profit Mediators

    Authors: Sudhir Kumar Singh, Vwani P. Roychowdhury, Himawan Gunadhi, Behnam A. Rezaei

    Abstract: We investigate market forces that would lead to the emergence of new classes of players in the sponsored search market. We report a 3-fold diversification triggered by two inherent features of the sponsored search market, namely, capacity constraints and collusion-vulnerability of current mechanisms. In the first scenario, we present a comparative study of two models motivated by capacity constr… ▽ More

    Submitted 2 November, 2007; originally announced November 2007.

    Comments: 20 pages, subsumes arXiv:0707.1057

  13. arXiv:0709.4048  [pdf, ps, other

    cs.DC cs.NI

    A Symphony Conducted by Brunet

    Authors: P. Oscar Boykin, Jesse S. A. Bridgewater, Joseph S. Kong, Kamen M. Lozev, Behnam A. Rezaei, Vwani P. Roychowdhury

    Abstract: We introduce BruNet, a general P2P software framework which we use to produce the first implementation of Symphony, a 1-D Kleinberg small-world architecture. Our framework is designed to easily implement and measure different P2P protocols over different transport layers such as TCP or UDP. This paper discusses our implementation of the Symphony network, which allows each node to keep… ▽ More

    Submitted 25 September, 2007; originally announced September 2007.

    Comments: 13 pages, 11 figures

  14. arXiv:0709.0204  [pdf, ps, other

    cs.GT

    Capacity constraints and the inevitability of mediators in adword auctions

    Authors: Sudhir Kumar Singh, Vwani P. Roychowdhury, Himawan Gunadhi, Behnam A. Rezaei

    Abstract: One natural constraint in the sponsored search advertising framework arises from the fact that there is a limit on the number of available slots, especially for the popular keywords, and as a result, a significant pool of advertisers are left out. We study the emergence of diversification in the adword market triggered by such capacity constraints in the sense that new market mechanisms, as well… ▽ More

    Submitted 3 September, 2007; originally announced September 2007.

    Comments: 6 pages

  15. arXiv:0707.1057  [pdf, ps, other

    cs.GT

    For-profit mediators in sponsored search advertising

    Authors: Sudhir Kumar Singh, Vwani P. Roychowdhury, Himawan Gunadhi, Behnam A. Rezaei

    Abstract: A mediator is a well-known construct in game theory, and is an entity that plays on behalf of some of the agents who choose to use its services, while the rest of the agents participate in the game directly. We initiate a game theoretic study of sponsored search auctions, such as those used by Google and Yahoo!, involving {\em incentive driven} mediators. We refer to such mediators as {\em for-p… ▽ More

    Submitted 3 September, 2007; v1 submitted 6 July, 2007; originally announced July 2007.

    Comments: 6 pages

  16. arXiv:0707.1053  [pdf, ps, other

    cs.GT

    Exploration via design and the cost of uncertainty in keyword auctions

    Authors: Sudhir Kumar Singh, Vwani P. Roychowdhury, Milan Bradonjić, Behnam A. Rezaei

    Abstract: We present a deterministic exploration mechanism for sponsored search auctions, which enables the auctioneer to learn the relevance scores of advertisers, and allows advertisers to estimate the true value of clicks generated at the auction site. This exploratory mechanism deviates only minimally from the mechanism being currently used by Google and Yahoo! in the sense that it retains the same pr… ▽ More

    Submitted 2 November, 2007; v1 submitted 6 July, 2007; originally announced July 2007.

    Comments: 19 pages, presentation improved, references added, title changed

  17. arXiv:cs/0604021  [pdf, ps, other

    cs.IT

    Low Latency Wireless Ad-Hoc Networking: Power and Bandwidth Challenges and a Hierarchical Solution

    Authors: Nima Sarshar, Behnam A. Rezaei, Vwani P. Roychowdhury

    Abstract: This paper is concerned with the scaling of the number of hops in a large scale wireless ad-hoc network (WANET), a quantity we call network latency. A large network latency affects all aspects of data communication in a WANET, including an increase in delay, packet loss, required processing power and memory. We consider network management and data routing challenges in WANETs with scalable netwo… ▽ More

    Submitted 6 April, 2006; originally announced April 2006.

  18. arXiv:physics/0504026  [pdf, ps, other

    physics.soc-ph cond-mat.dis-nn cs.CY cs.NI

    Let Your CyberAlter Ego Share Information and Manage Spam

    Authors: Joseph S. Kong, P. Oscar Boykin, Behnam A. Rezaei, Nima Sarshar, Vwani P. Roychowdhury

    Abstract: Almost all of us have multiple cyberspace identities, and these {\em cyber}alter egos are networked together to form a vast cyberspace social network. This network is distinct from the world-wide-web (WWW), which is being queried and mined to the tune of billions of dollars everyday, and until recently, has gone largely unexplored. Empirically, the cyberspace social networks have been found to p… ▽ More

    Submitted 7 May, 2005; v1 submitted 4 April, 2005; originally announced April 2005.

    Comments: 13 pages, 10 figures

    Journal ref: Collaborative Spam Filtering Using E-Mail Networks, IEEE Computer, Vol. 39, No. 8, pages 67-73, 2006

  19. arXiv:cond-mat/0504185  [pdf, ps, other

    cond-mat.stat-mech cs.DS cs.NI physics.data-an physics.soc-ph

    Disaster Management in Scale-Free Networks: Recovery from and Protection Against Intentional Attacks

    Authors: Behnam A. Rezaei, Nima Sarshar, P. Oscar Boykin, Vwani P. Roychowdhury

    Abstract: Susceptibility of scale free Power Law (PL) networks to attacks has been traditionally studied in the context of what may be termed as {\em instantaneous attacks}, where a randomly selected set of nodes and edges are deleted while the network is kept {\em static}. In this paper, we shift the focus to the study of {\em progressive} and instantaneous attacks on {\em reactive} grown and random PL n… ▽ More

    Submitted 11 May, 2005; v1 submitted 7 April, 2005; originally announced April 2005.

    Comments: 12 pages, to be submitted to PRE