Cookie paywalls allow visitors of a website to access its content only after they make a choice between paying a fee or accept tracking. European Data Protection Authorities (DPAs) recently issued guidelines and decis...
详细信息
MSC Codes K. Computing Milieux K.4 computerS AND SOCIETY K.4.1 Public Policy Issues. EthicsAs AI systems increasingly operate with autonomy and adaptability, the traditional boundaries of moral responsibility in techn...
详细信息
This paper aims to tackle Multiple Object Tracking (MOT), an important problem in computer vision but remains challenging due to many practical issues, especially occlusions. Indeed, we propose a new real-time Depth P...
详细信息
Smart contracts are programs that are stored on a blockchain ledger with code immutable after deployment. Thus, verifying the correct behavior of smart contracts before deployment is vital. This paper demonstrates how...
详细信息
Smart contracts are programs that are stored on a blockchain ledger with code immutable after deployment. Thus, verifying the correct behavior of smart contracts before deployment is vital. This paper demonstrates how a security vulnerability verification in a casino smart contract can be transformed to non-blocking verification. To this end, the contract is first modeled as interacting extended finite state machines (EFSM), with one EFSM for each function. Modeling the security vulnerability as a condition in the EFSM system, non-blocking verification reveals the system to be blocking. Investigating the counterexample produced by the verification shows that a transfer that is refused by its receiver may block the casino so that all remaining funds are forever locked into the contract, thus revealing a severe vulnerability. It is then demonstrated how the same technique can show the absence of this vulnerability, by verifying that the EFSM model of an improved casino contract is indeed non-blocking.
This work explores the temperature dependency of the performance of an ultra-thin silicon nanowire (SiNW) gate-all-around field-effect transistor (GAA-FET). The nanowire is assumed coaxially aligned with an ideal cyli...
详细信息
ISBN:
(数字)9798350386240
ISBN:
(纸本)9798350386257
This work explores the temperature dependency of the performance of an ultra-thin silicon nanowire (SiNW) gate-all-around field-effect transistor (GAA-FET). The nanowire is assumed coaxially aligned with an ideal cylindrical gate-all-around device. The nanowire is [110] axially aligned with a diameter of 1.3 nm. Electron transport is modeled using Ensemble Monte Carlo (EMC) simulations coupled self-consistently with an electrostatic solver that solves Gauss Law in integral form. Electron scattering mechanisms include bulk silicon longitudinal acoustic and optical phonons. A wide range of temperatures is considered - from 4 K to 150 K to understand the effects of temperature on device performance under both steady-state and device switching conditions. The device is seen to work appropriately for the temperature range considered. The differences in device currents for different temperatures is attributed to the differences in the electron scattering rates for the various temperatures.
Traffic in backbone networks is characterized by strong seasonality, with clear patterns visible in various services and applications based on their usage throughout the day. Data-driven networks can learn these patte...
详细信息
ISBN:
(数字)9783903176669
ISBN:
(纸本)9798331505158
Traffic in backbone networks is characterized by strong seasonality, with clear patterns visible in various services and applications based on their usage throughout the day. Data-driven networks can learn these patterns to manage resources more efficiently as they become increasingly saturated. In this paper, we explore the benefits of traffic prediction and grooming across different traffic patterns. To achieve this, we simulate network operations using uniform sets of time-varying connection requests, where all demands in a simulation share the same traffic pattern related to a specific network-based service or application. Our goal is to thoroughly evaluate the robustness of the proposed techniques across diverse scenarios. The results will facilitate the design of future application-aware algorithms for the most efficient handling of each traffic pattern.
This paper presents a novel Learning from Demonstration (LfD) method that uses neural fields to learn new skills efficiently and accurately. It achieves this by utilizing a shared embedding to learn both scene and mot...
This paper presents a novel Learning from Demonstration (LfD) method that uses neural fields to learn new skills efficiently and accurately. It achieves this by utilizing a shared embedding to learn both scene and motion representations in a generative way. Our method smoothly maps each expert demonstration to a scene-motion embedding and learns to model them without requiring hand-crafted task parameters or large datasets. It achieves data efficiency by enforcing scene and motion generation to be smooth with respect to changes in the embedding space. At inference time, our method can retrieve scene-motion embeddings using test time optimization, and generate precise motion trajectories for novel scenes. The proposed method is versatile and can employ images, 3D shapes, and any other scene representations that can be modeled using neural fields. Additionally, it can generate both end-effector positions and joint angle-based trajectories. Our method is evaluated on tasks that require accurate motion trajectory generation, where the underlying task parametrization is based on object positions and geometric scene changes. Experimental results demonstrate that the proposed method outperforms the baseline approaches and generalizes to novel scenes. Furthermore, in real-world experiments, we show that our method can successfully model multi-valued trajectories, it is robust to the distractor objects introduced at inference time, and it can generate 6D motions.
We provide exact asymptotic expressions for the performance of regression by an L−layer deep random feature (RF) model, where the input is mapped through multiple random embedding and non-linear activation functions. ...
详细信息
A large amount of testing is needed to determine when autonomous vehicles are sufficiently safe. To achieve this goal, test cases should be representative of real-world driving but also designed to provide sufficient ...
详细信息
暂无评论