Regularized discrete optimal transport (OT) is a powerful tool to measure the distance between two discrete distributions that have been constructed from data samples on two different domains. While it has a wide rang...
详细信息
Most recent methods of deep image enhancement can be generally classified into two types: decompose-and-enhance and illumination estimation-centric. The former is usually less efficient, and the latter is constrained ...
详细信息
Most recent methods of deep image enhancement can be generally classified into two types: decompose-and-enhance and illumination estimation-centric. The former is usually less efficient, and the latter is constrained ...
详细信息
Most recent methods of deep image enhancement can be generally classified into two types: decompose-and-enhance and illumination estimation-centric. The former is usually less efficient, and the latter is constrained by a strong assumption regarding image reflectance as the desired enhancement result. To alleviate this constraint while retaining high efficiency, we propose a novel trainable module that diversifies the conversion from the low-light image and illumination map to the enhanced image. It formulates image enhancement as a comparametric equation parameterized by a camera response function and an exposure compensation ratio. By incorporating this module in an illumination estimation-centric DNN, our method improves the flexibility of deep image enhancement, limits the computational burden to illumination estimation, and allows for fully unsupervised learning adaptable to the diverse demands of different tasks.
We propose a meta-learning method for semi-supervised learning that learns from multiple tasks with heterogeneous attribute spaces. The existing semi-supervised meta-learning methods assume that all tasks share the sa...
详细信息
We propose a meta-learning method for positive and unlabeled (PU) classification, which improves the performance of binary classifiers obtained from only PU data in unseen target tasks. PU learning is an important pro...
详细信息
In this paper, we propose a novel training method for the transformer encoder-decoder based image captioning, which directly generates a captioning text from an input image. In general, many image- to- text paired dat...
In this paper, we propose a novel training method for the transformer encoder-decoder based image captioning, which directly generates a captioning text from an input image. In general, many image- to- text paired datasets need to be prepared for robust image captioning, but such datasets cannot be collected in practical cases. Our key idea for mitigating the data preparation cost is to utilize text-to-text paraphrasing modeling, i.e., a task to convert an input text into different expressions without changing the meaning. In fact, paraphrasing deals with a similar transformation task to image captioning even though paraphrasing tasks have to handle texts instead of images. In our proposed method, an encoder-decoder network trained via the paraphrasing task is directly leveraged for image captioning. Thus, an encoder-decoder network pre-trained by a text-to-text transformation task is transferred into an image-to-text transformation task even though a different modal must be handled in the encoder network. Our experiments using the MS COCO caption datasets demonstrate the effectiveness of the proposed method.
One of the success factors of Business process outsourcing (BPO) is a comprehensive and in-depth understanding of the business processes outsourced. However, such business processes are often undocumented, and discove...
详细信息
ISBN:
(数字)9798350376968
ISBN:
(纸本)9798350376975
One of the success factors of Business process outsourcing (BPO) is a comprehensive and in-depth understanding of the business processes outsourced. However, such business processes are often undocumented, and discovering them is difficult and time-consuming for BPO service providers. Previously, we introduced an approach for business process discovery that uses swim lanes to recognize that different parts of the process may be performed by different parts of an organization. It generates the business process from an event log and user information extracted from an existing system. Herein, this paper examines whether the approach aids engineers and consultants in the providers who need to investigate business processes of organizations (i.e., their customers on which they do not have sufficient knowledge) discovering the implicit operational knowledge of the target business processes (e.g., undocumented local rules). To do so, we survey an industrial workflow system from which we collected data about 2,000 events and 269 users for a two-year period of the system's operation. We conducted a study on the case by means of document evaluation and expert interviews. The study suggested that the output of the approach is a valuable process visualization for identifying knowledge that is not documented nor recognized by even experts in organizations.
Real-world image recognition systems often face corrupted input images, which cause distribution shifts and degrade the performance of models. These systems often use a single prediction model in a central server and ...
Real-world image recognition systems often face corrupted input images, which cause distribution shifts and degrade the performance of models. These systems often use a single prediction model in a central server and process images sent from various environments, such as cameras distributed in cities or cars. Such single models face images corrupted in heterogeneous ways in test time. Thus, they require to instantly adapt to the multiple corruptions during testing rather than being re-trained at a high cost. Test-time adaptation (TTA), which aims to adapt models without accessing the training dataset, is one of the settings that can address this problem. Existing TTA methods indeed work well on a single corruption. However, the adaptation ability is limited when multiple types of corruption occur, which is more realistic. We hypothesize this is because the distribution shift is more complicated, and the adaptation becomes more difficult in case of multiple corruptions. In fact, we experimentally found that a larger distribution gap remains after TTA. To address the distribution gap during testing, we propose a novel TTA method named Covariance-Aware Feature alignment (CAFe). We empirically show that CAFe outperforms prior TTA methods on image corruptions, including multiple types of corruptions.
While quantum computers have attracted much attention, dealing with computational errors due to noise effects caused by the interaction between quantum hardware and the external environment is a significant challenge....
详细信息
ISBN:
(数字)9798350367041
ISBN:
(纸本)9798350367058
While quantum computers have attracted much attention, dealing with computational errors due to noise effects caused by the interaction between quantum hardware and the external environment is a significant challenge. In this paper, we propose an approach to apply N-version programming (NVP) to quantum software to improve the reliability of the entire quantum software system. First, we define architecture patterns for N-version quantum software systems (NVQS) based on a combination of quantum libraries and devices. Next, given that the output of the quantum software system is a probability distribution, we came up with an evaluation strategy inspired by the concept of NVP for clustering and selecting multiple probability distributions output from NVQS. Finally, we outline our future experimental plan.
It is a higher priority for organizations to keep their source code secured. When a certain specific code includes a secret such as intellectual property, they need to pay special attention to prevent the secret code ...
详细信息
ISBN:
(纸本)9798350329964
It is a higher priority for organizations to keep their source code secured. When a certain specific code includes a secret such as intellectual property, they need to pay special attention to prevent the secret code from leaking outside. On the other hand, sometimes code leaks comes from acts by inside programmers. This industrial paper proposes a MORDEn (Micro Organized Remote Development Environment) toward preventing code leaks. MORDEn enables programmers capable of coding and debugging by physically separating secret code from their client. We also introduce a showcase that demonstrates the feasibility of MORDEn from a case study project using it.
暂无评论