All-in-one VR headsets have limited rendering power which limits the complexity of the virtual environments (VEs) that can be used in VR applications. This paper describes a novel visibility algorithm for making compl...
详细信息
ISBN:
(数字)9798331536459
ISBN:
(纸本)9798331536466
All-in-one VR headsets have limited rendering power which limits the complexity of the virtual environments (VEs) that can be used in VR applications. This paper describes a novel visibility algorithm for making complex VEs tractable on all-in-one VR headsets. Given a view segment, the algorithm finds the set of triangles visible as a camera translates on the view segment. When run on the perimeter of a user view region, the algorithm provides a quality approximation of the visible set from inside the view region. The visibility algorithm supports static and dynamic VEs, and it solves visibility with either triangle, particle, or object granularity. The visible sets yield output frames that are virtually indistinguishable from ground truth frames rendered from the original VEs.
The task of finding the shortest vectors of a lattice that form a basis thereof is known as Minkowski reduction. In this work, Minkowski reduction is adapted to discrete subgroups of quaternionic spaces defined over t...
详细信息
ISBN:
(数字)9798331522896
ISBN:
(纸本)9798331522902
The task of finding the shortest vectors of a lattice that form a basis thereof is known as Minkowski reduction. In this work, Minkowski reduction is adapted to discrete subgroups of quaternionic spaces defined over the set of Hurwitz integers which constitutes a Euclidean subring of the (Hamilton) quaternions. Based on a quaternionic variant of Minkowski's greatest-common-divisor condition for suitable lattice vectors, a lattice-basis-reduction algorithm is derived. To that end, a basisupdate approach is presented which takes the non-commutativity of quaternionic multiplication into account. The reduction algorithm is finally applied in multi-user multiple-input/multipleoutput (MIMO) systems with dual-polarized antennas, where the quaternionic interference is handled by lattice-reduction-aided equalization. It is shown that quaternionic Minkowski reduction achieves significantly better results than state-of-the-art Lenstra-Lenstra-Lovász (LLL) reduction and that the successive minima of quaternionic lattices are approximated quite well.
Continual learning (CL) is a new online learning technique over sequentially generated streaming data from different tasks, aiming to maintain a small forgetting loss on previously-learned tasks. Existing work focuses...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
Continual learning (CL) is a new online learning technique over sequentially generated streaming data from different tasks, aiming to maintain a small forgetting loss on previously-learned tasks. Existing work focuses on reducing the forgetting loss under a given task sequence. However, if similar tasks continuously appear to the end time, the forgetting loss is still huge on prior distinct tasks. In practical IoT networks, an autonomous vehicle to sample data and learn different tasks can route and alter the order of task pattern at increased travelling cost. To our best knowledge, we are the first to study how to opportunistically route the testing object and alter the task sequence in CL. We formulate a new optimization problem and prove it NP-hard. We propose a polynomial-time algorithm to achieve approximation ratios of $\frac{3}{2}$ for underparameterized case and $\frac{3}{2} + {r^{1 - T}}$ for overparameterized case, respectively. Simulation results verify our algorithm’s close-to-optimum performance.
In this paper, we propose a class of approximation algorithms for max-weight matching (MWM) policy for input-queued switches, called expected 1-APRX. We establish the state space collapse (SSC) result for expected 1-A...
详细信息
This paper studies a consensus-based policy evaluation algorithm in a cooperative team of heterogeneous learners. To improve each agent’s approximation of their value function, they each update their weight parameter...
详细信息
ISBN:
(数字)9798331513269
ISBN:
(纸本)9798331513276
This paper studies a consensus-based policy evaluation algorithm in a cooperative team of heterogeneous learners. To improve each agent’s approximation of their value function, they each update their weight parameters, then perform consensus updates with neighboring agents over a dynamic communication network. We present the analysis of an efficient fully distributed algorithm for cooperatively evaluating and optimizing their value functions over a time-varying communication network in the average-reward setting. Our main result shows that, using this algorithm, the agents can approximate the true value function, with the approximation error dependent on the number of communication rounds and number of time steps it takes for the communication network to be connected. To validate the theoretical results, we present accompanying numerical experiments that show the theoretical error bounds are not only tight, but get tighter as the time steps required to guarantee network connectivity reduces.
Hierarchical Navigable Small World (HNSW) graphs are a state-of-the-art solution for approximate nearest neighbor search, widely applied in areas like recommendation systems, computer vision, and natural language proc...
详细信息
ISBN:
(数字)9783982674100
ISBN:
(纸本)9798331534646
Hierarchical Navigable Small World (HNSW) graphs are a state-of-the-art solution for approximate nearest neighbor search, widely applied in areas like recommendation systems, computer vision, and natural language processing. However, the effectiveness of the HNSW algorithm is constrained by its reliance on static parameter settings, which do not account for variations in data density and dimensionality across different datasets. This paper introduces Dynamic HNSW, an adaptive method that dynamically adjusts key parameters - such as the $M$ (number of connections per node) and ef (search depth) - based on both local data density and dimensionality of the dataset. The proposed approach improves flexibility and efficiency, allowing the graph to adapt to diverse data characteristics. Experimental results across multiple datasets demonstrate that Dynamic HNSW significantly reduces graph build time by up to 33.11% and memory usage by up to 32.44%, while maintaining comparable recall, thereby outperforming the conventional HNSW in both scalability and efficiency.
We study the complexity of approximating the permanent of a positive semidefinite matrix A∈ ℂn× *** first result is a new approximation algorithm for per(A) with approximation ratio e−(0.9999 + γ)n, exponential...
详细信息
ISBN:
(纸本)9798400715105
We study the complexity of approximating the permanent of a positive semidefinite matrix A∈ ℂn× *** first result is a new approximation algorithm for per(A) with approximation ratio e−(0.9999 + γ)n, exponentially improving upon the current best bound of e−(1+γ−o(1))n (Anari-Gurvits-Oveis Gharan-Saberi 2017, Yuan-Parrilo 2022). Here, γ ≈ 0.577 is Euler’s *** second result is a hardness result. We prove that it is NP-hard to approximate per(A) within a factor e−(γ−)n for any >0. This is the first exponential hardness of approximation for this problem. Along the way, we prove optimal hardness of approximation results for the ||·||2→ q “norm” problem of a matrix for all −1 < q < 2.
Provable privacy typically requires involved analysis and is often associated with unacceptable accuracy loss. While many empirical verification or approximation methods, such as Membership Inference Attacks (MIA) and...
详细信息
ISBN:
(数字)9798331522360
ISBN:
(纸本)9798331522377
Provable privacy typically requires involved analysis and is often associated with unacceptable accuracy loss. While many empirical verification or approximation methods, such as Membership Inference Attacks (MIA) and Differential Privacy Auditing (DPA), have been proposed, these do not offer rigorous privacy guarantees. In this paper, we apply recently-proposed Probably Approximately Correct (PAC) Privacy to give formal, mechanized, simulation-based proofs for a range of practical, black-box algorithms: K-Means, Support Vector Machines (SVM), Principal Component Analysis (PCA) and Random Forests. To provide these proofs, we present a new simulation algorithm that efficiently determines anisotropic noise perturbation required for any given level of privacy. We provide a proof of correctness for this algorithm and demonstrate that anisotropic noise has substantive benefits over isotropic noise. Stable algorithms are easier to privatize, and we demonstrate privacy amplification resulting from introducing regularization in these algorithms; meaningful privacy guarantees are obtained with small losses in accuracy. We propose new techniques in order to reduce instability in algorithmic output and convert intractable geometric stability verification into efficient deterministic stability verification. Thorough experiments are included, and we validate our provable adversarial inference hardness against state-of-the-art empirical attacks.
This paper describes the development of an algorithm for converting segmentation masks derived from neural networks into ordered sets of point coordinates representing road markings for highly automated vehicles (HAVs...
详细信息
ISBN:
(数字)9798331511241
ISBN:
(纸本)9798331511258
This paper describes the development of an algorithm for converting segmentation masks derived from neural networks into ordered sets of point coordinates representing road markings for highly automated vehicles (HAVs). Several methods are considered, including the nearest neighbor method, polynomial approximation, Hough transform, and parallel contouring. Performance tests and complexity analyses are performed for each method. The parallel contour method with dynamic search for opposite points was the most effective, demonstrating linear complexity and high accuracy in approximating road marking contours. This solution ensures efficient processing of large real-time datasets, critical for HAV navigation. The study integrates the algorithm into a unified system, combining segmentation with mask-to-line conversion, enhancing autonomous driving precision.
We propose sublinear algorithms for probabilistic testing of the discrete and continuous Fréchet distance—a standard similarity measure for curves. We assume the algorithm is given access to the input curves via...
详细信息
暂无评论