Efficient decorrelation of features using Gramian in Reinforcement Learning. (arXiv:1911.08610v1 [cs.LG])

Learning good representations is a long standing problem in reinforcement learning (RL). One of the conventional ways to achieve this goal in the supervised setting is through regularization of the parameters. Extending some of these ideas to the RL setting has not yielded similar improvements in learning. In this paper, we develop an online regularization…

Deep Anomaly Detection with Deviation Networks. (arXiv:1911.08623v1 [cs.LG])

Although deep learning has been applied to successfully address many data mining problems, relatively limited work has been done on deep learning for anomaly detection. Existing deep anomaly detection methods, which focus on learning new feature representations to enable downstream anomaly detection methods, perform indirect optimization of anomaly scores, leading to data-inefficient learning and suboptimal…

Symbolic Formulae for Linear Mixed Models. (arXiv:1911.08628v1 [stat.ME])

A statistical model is a mathematical representation of an often simplified or idealised data-generating process. In this paper, we focus on a particular type of statistical model, called linear mixed models (LMMs), that is widely used in many disciplines e.g.~agriculture, ecology, econometrics, psychology. Mixed models, also commonly known as multi-level, nested, hierarchical or panel data…

Logic-inspired Deep Neural Networks. (arXiv:1911.08635v1 [cs.LG])

Deep neural networks have achieved impressive performance and become de-facto standard in many tasks. However, phenomena such as adversarial examples and fooling examples hint that the generalization they make is flawed. We argue that the problem roots in their distributed and connected nature and propose remedies inspired by propositional logic. Our experiments show that the…

Nets of lines with the combinatorics of the square grid and with touching inscribed conics. (arXiv:1911.08477v1 [math.AG])

In the projective plane, we consider congruences of straight lines with the combinatorics of the square grid and with all elementary quadrilaterals possessing touching inscribed conics. The inscribed conics of two combinatorially neighbouring quadrilaterals have the same touching point on their common edge-line. We suggest that these nets are a natural projective generalisation of incircular…

Solitons in fluctuating hydrodynamics of diffusive processes. (arXiv:1911.08489v1 [cond-mat.stat-mech])

We demonstrate that fluid mechanical systems arising from large fluctuations of one-dimensional statistical processes generically exhibit solitons and nonlinear waves. We derive the explicit form of these solutions and examine their properties for the specific cases of the Kipnis-Marchioro-Presutti model (KMP) and the Symmetric Exclusion Process (SEP). We show that the two fluid systems are…

Subliminal aspects concerning the Lounesto’s classification. (arXiv:1911.08506v1 [math-ph])

In the present communication we employ a split programme applied to spinors belonging to the regular and singular sectors of the Lounesto’s classification, looking towards to unveil how it can be built or defined upon two spinors arrangement. We separate the spinors into two distinct parts and investigate to which class within the Lounesto’s classification…

Optimal Complexity and Certification of Bregman First-Order Methods. (arXiv:1911.08510v1 [math.OC])

We provide a lower bound showing that the $O(1/k)$ convergence rate of the NoLips method (a.k.a. Bregman Gradient) is optimal for the class of functions satisfying the $h$-smoothness assumption. This assumption, also known as relative smoothness, appeared in the recent developments around the Bregman Gradient method, where acceleration remained an open issue. On the way,…

Topological properties of secure wireless sensor networks under the q-composite key predistribution scheme with unreliable links. (arXiv:1911.08513v1 [cs.NI])

Security is an important issue in wireless sensor networks (WSNs), which are often deployed in hostile environments. The q-composite key predistribution scheme has been recognized as a suitable approach to secure WSNs. Although the q-composite scheme has received much attention in the literature, there is still a lack of rigorous analysis for secure WSNs operating…