Due to the impressive zero-shot capabilities, pre-trained vision-language models (e.g. CLIP), have attracted widespread attention and adoption across various domains. Nonetheless, CLIP has been observed to be suscepti...
The importance of text classification algorithms has increased due to the growing availability of large-scale data. This has led to a greater demand for efficient classification techniques and encoding algorithms. Wor...
详细信息
As a special case of the multiobjective optimization problem, the multiobjective knapsack problem (MOKP) widely exists in real-world applications. Currently, most algorithms used to solve MOKPs assume that these probl...
详细信息
The retail sector is a vital driver of economic growth. The retail industry must adopt technology to enhance productivity, streamline operations, and minimize human errors in order to continue its crucial economic rol...
详细信息
Safe offline reinforcement learning is a promising way to bypass risky online interactions towards safe policy learning. Most existing methods only enforce soft constraints, i.e., constraining safety violations in exp...
详细信息
Safe offline reinforcement learning is a promising way to bypass risky online interactions towards safe policy learning. Most existing methods only enforce soft constraints, i.e., constraining safety violations in expectation below thresholds predetermined. This can lead to potentially unsafe outcomes, thus unacceptable in safety-critical scenarios. An alternative is to enforce the hard constraint of zero violation. However, this can be challenging in offline setting, as it needs to strike the right balance among three highly intricate and correlated aspects: safety constraint satisfaction, reward maximization, and behavior regularization imposed by offline datasets. Interestingly, we discover that via reachability analysis of safe-control theory, the hard safety constraint can be equivalently translated to identifying the largest feasible region given the offline dataset. This seamlessly converts the original trilogy problem to a feasibility-dependent objective, i.e., maximizing reward value within the feasible region while minimizing safety risks in the infeasible region. Inspired by these, we propose FISOR (FeasIbility-guided Safe Offline RL), which allows safety constraint adherence, reward maximization, and offline policy learning to be realized via three decoupled processes, while offering strong safety performance and stability. In FISOR, the optimal policy for the translated optimization problem can be derived in a special form of weighted behavior cloning, which can be effectively extracted with a guided diffusion model thanks to its expressiveness. Moreover, we propose a novel energy-guided sampling method that does not require training a complicated time-dependent classifier to simplify the training. We compare FISOR against baselines on DSRL benchmark for safe offline RL. Evaluation results show that FISOR is the only method that can guarantee safety satisfaction in all tasks, while achieving top returns in most tasks. Project website: https://zhengyinan
In the process of developing the C919 large aircraft customer service intelligence system,we find that heterogeneous and incomplete data cause the inefficient and inaccurate decision ***,to solve this problem,we propo...
详细信息
In the process of developing the C919 large aircraft customer service intelligence system,we find that heterogeneous and incomplete data cause the inefficient and inaccurate decision ***,to solve this problem,we propose to introduce the idea of ontology modeling and reasoning into competitive intelligence system building in this *** first present the building principles and methods of the civil aviation customer service *** then define the classes and properties to contribute a real-world civil aviation customer service ontology,which is published on the Web(http:/***/dataset/cacso).We finally design SWRL rules corresponding to different intelligence analysis targets to support reasoning in our designed competitive intelligence system.
Accurately distinguishing different types of jaw-bone radiation lesions (RJLs) based on cone beam computed tomography (CBCT) images is crucial for oral surgeons to choose appropriate treatment plans. Currently, only e...
详细信息
Domain generalization methods aim to learn transferable knowledge from source domains that can generalize well to unseen target domains. Recent studies show that neural networks frequently suffer from a simplicity-bia...
We introduce and study a family of online metric problems with long-term constraints. In these problems, an online player makes decisions xt in a metric space (X, d) to simultaneously minimize their hitting cost ft(xt...
详细信息
We introduce and study a family of online metric problems with long-term constraints. In these problems, an online player makes decisions xt in a metric space (X, d) to simultaneously minimize their hitting cost ft(xt) and switching cost as determined by the metric. Over the time horizon T, the player must satisfy a long-term demand constraint -t c(xt) ≥ 1, where c(xt) denotes the fraction of demand satisfied at time t. Such problems can find a wide array of applications to online resource allocation in sustainable energy/computing systems. We devise optimal competitive and learning-augmented algorithms for the case of bounded hitting cost gradients and weighted 1 metrics, and further show that our proposed algorithms perform well in numerical experiments. Copyright 2024 by the author(s)
With the development of information technology, people can share their health records (PHRs) through the Internet and obtain rapid medical services, which makes mobile health become a promising field. PHRs are collect...
详细信息
暂无评论