Existing works in event extraction typically extract event arguments within the sentence scope. However, besides the sentence level, events may also be naturally presented at the document level. A document-level event...
Existing works in event extraction typically extract event arguments within the sentence scope. However, besides the sentence level, events may also be naturally presented at the document level. A document-level event usually reflects, to some extent, the theme (i.e., the main content) of the document (e.g., electronic medical records and news articles), which is thus referred to as the thematic event. Thematic Event Extraction (TEE) aims to extract the arguments of thematic events. TEE faces a major challenge, i.e., the sparsity and dispersion of arguments, which means that the arguments of a thematic event are dispersed in different sentences of the document. To overcome this challenge, we propose an Event-related Sentence Detection based TEE model, called ESDTEE, which first detects the sentences related to the thematic event and then extracts the arguments only within these detected sentences using existing models. Extensive experiments with comprehensive analyses demonstrate the effectiveness of ESDTEE.
In terms of the generative process, the Gamma-Gamma-Poisson Process (G2PP) is equivalent to the nonparametric topic model of Hierarchical Dirichlet Process (HDP). Considering the high computational cost of estimating ...
详细信息
The paper deals with complementary changes in scientific research and real economy (exemplified by the farming industry) taking place when using the holistic approach to the industry”s digital transformation resultin...
详细信息
ISBN:
(数字)9798350375718
ISBN:
(纸本)9798350375725
The paper deals with complementary changes in scientific research and real economy (exemplified by the farming industry) taking place when using the holistic approach to the industry”s digital transformation resulting in the appearance of precise agrarian technologies that require a comprehensive., system-based combination of research and production resources that are able to ensure increased productivity in the industry. We demonstrate that among these new technologies, the artificial intelligence methods have a special significance. They have to, however, go through integration transformations to become standards for the proposed common digital farming management platform.
Data-free knowledge distillation (DFKD) enables knowledge transfer from a pre-trained teacher to a student network without accessing the real dataset. However, generator-based DFKD methods struggle to ensure that the ...
详细信息
This study investigates the robustness of graph embedding methods for community detection in the face of network perturbations, specifically edge deletions. Graph embedding techniques, which represent nodes as low-dim...
详细信息
To take unit commitment (UC) decisions under uncertain net load, most studies utilize a stochastic UC (SUC) model that adopts a one-size-fits-all representation of uncertainty. Disregarding contextual information such...
详细信息
To take unit commitment (UC) decisions under uncertain net load, most studies utilize a stochastic UC (SUC) model that adopts a one-size-fits-all representation of uncertainty. Disregarding contextual information such as weather forecasts and temporal information, these models are typically plagued by a poor out-of-sample performance. To effectively exploit contextual information, in this paper, we formulate a conditional SUC problem that is solved given a covariate observation. The presented problem relies on the true conditional distribution of net load and so cannot be solved in practice. To approximate its solution, we put forward a predictive prescription framework, which leverages a machine learning model to derive weights that are used in solving a reweighted sample average approximation problem. In contrast with existing predictive prescription frameworks, we manipulate the weights that the learning model delivers based on the specific dataset, present a method to select pertinent covariates, and tune the hyperparameters of the framework based on the out-of-sample cost of its policies. We conduct extensive numerical studies, which lay out the relative merits of the framework vis-à-vis various benchmarks.
We show how (well-established) type systems based on non-idempotent intersection types can be extended to characterize termination properties of functional programming languages with pattern matching features. To mode...
详细信息
We address the problem of safely coordinating a network of Connected and Automated Vehicles (CAVs) in conflict areas of a traffic network. Such problems can be solved through a combination of tractable optimal control...
We address the problem of safely coordinating a network of Connected and Automated Vehicles (CAVs) in conflict areas of a traffic network. Such problems can be solved through a combination of tractable optimal control problems and Control Barrier Functions (CBFs) that guarantee the satisfaction of all constraints. These solutions can be reduced to a sequence of Quadratic Programs (QPs) which are efficiently solved online over discrete time steps. However, guaranteeing the feasibility of the CBF-based QP method within each discretized time interval requires the careful selection of time steps which need to be sufficiently small. This creates computational requirements and communication rates between agents which may limit the controller’s application to real CAVs. We tackle this limitation by adopting an event-triggered control approach for CAVs such that the next QP is triggered by properly defined events with a safety guarantee. We present a laboratory-scale test bed developed to emulate merging roadways using mobile robots as CAVs. We present results to demonstrate how the event-triggered scheme is computationally efficient and can handle measurement uncertainties and noise compared to time-driven control while guaranteeing safety.
作者:
Leon, Vasileios K.National Technical University of Athens
School of Electrical and Computer Engineering Division of Computer Science Microprocessors and Digital Systems Laboratory 9 Heroon Polytechniou Zografou Campus Athens15780 Greece
The recent end of Dennard’s Scaling and the declining Moore’s Law have signified a new era for computingsystems. Power efficiency has now become a critical factor for both cloud and edge computing. Concurrently, th...
详细信息
The recent end of Dennard’s Scaling and the declining Moore’s Law have signified a new era for computingsystems. Power efficiency has now become a critical factor for both cloud and edge computing. Concurrently, the rapid growth of compute-intensive applications from the Digital Signal Processing (DSP) and Artificial Intelligence (AI) domains challenges the resources of computingsystems. As a result, the computing industry is forced to find alternative design approaches and computing platforms to sustain increased power efficiency, while providing sufficient performance. Among the examined solutions, Approximate computing, Hardware Acceleration, and Heterogeneous computing have gained great momentum. Approximate computing is a novel design paradigm that exploits the inherent error resilience of DSP/AI applications to deliver gains in power, area, and/or performance by reducing the quality of the results. Hardware Acceleration refers to the execution of demanding computational tasks on specialized hardware, such as the Application-Specific Integrated Circuits (ASICs) and the Field-Programmable Gate Arrays (FPGAs), rather than general-purpose processors. Finally, Heterogeneous computing refers to versatile processing architectures, such as the Vision Processing Units (VPUs), which integrate more than one type of processor and various memory technologies. In this Dissertation, we introduce design solutions and methodologies, built on top of the preceding computing paradigms, for the development of energy-efficient DSP and AI accelerators. In particular, we adopt the promising paradigm of Approximate computing and apply new approximation techniques in the design of arithmetic circuits. Based on our methodology, these arithmetic approximation techniques are then combined with hardware design techniques to implement approximate ASIC- and FPGA-based DSP and AI accelerators. Moreover, we propose methodologies for the efficient mapping of DSP/AI kernels on distinctive embe
We address the security of a network of Connected and Automated Vehicles (CAVs) cooperating to navigate through a conflict area. Adversarial attacks such as Sybil attacks can cause safety violations resulting in colli...
We address the security of a network of Connected and Automated Vehicles (CAVs) cooperating to navigate through a conflict area. Adversarial attacks such as Sybil attacks can cause safety violations resulting in collisions and traffic jams. In addition, uncooperative (but not necessarily adversarial) CAVs can also induce similar adversarial effects on the traffic network. We propose a decentralized resilient control and coordination scheme that mitigates the effects of adversarial attacks and uncooperative CAVs by utilizing a trust framework. Our trust-aware scheme can guarantee safe collision free coordination and mitigate traffic jams. Simulation results validate the theoretical guarantee of our proposed scheme, and demonstrate that it can effectively mitigate adversarial effects across different traffic scenarios.
暂无评论