Language Aided Speaker Diarization Using Speaker Role Information. (arXiv:1911.07994v1 [eess.AS])

Speaker diarization relies on the assumption that acoustic embeddings from speech segments corresponding to a particular speaker share common characteristics. Thus, they are concentrated in a specific region of the speaker space; a region which represents that speaker’s identity. Those identities however are not known a priori, so a clustering algorithm is employed, which is…

CD2 : Combined Distances of Contrast Distributions for the Assessment of Perceptual Quality of Image Processing. (arXiv:1911.07995v1 [eess.IV])

The quality of visual input is very important for both human and machine perception. Consequently many processing techniques exist that deal with different distortions. Usually image processing is applied freely and lacks redundancy regarding safety. We propose a novel image comparison method called the Combined Distances of Contrast Distributions (CD2) to protect against errors that…

Analysis on image recovery for digital Fresnel hologram with aliased fringe generated from self-similarity of point spread function. (arXiv:1911.07997v1 [physics.optics])

We investigate the aliasing phenomenon for digital Fresnel hologram with an enhanced numerical aperture (NA). The enhanced-NA digital Fresnel hologram acquired computationally or optically at a closer distance from the object has an aliased fringe generated by undersampling process of the Fresnel prefactor called as a point spread function. The point spread function shows a…

Self-Powered Solar Aerial Vehicles: Towards Infinite Endurance UAVs. (arXiv:1911.07904v1 [eess.SY])

A self-powered scheme is explored for achieving long-endurance operation, with the use of solar power and buoyancy lift. The end goal is the capability of infinite endurance while complying with the Unmanned Aerial Vehicle (UAV) dynamics and the required control performance, maneuvering, and duty cycles. Nondimensional power terms related to the UAV power demand and…

Configuration-dependent Fault Localization. (arXiv:1911.07906v1 [cs.SE])

In a buggy configurable system, configuration-dependent bugs cause the failures in only certain configurations due to unexpected interactions among features. Manually localizing configuration-dependent faults in configurable systems could be highly time-consuming due to their complexity. However, the cause of configuration-dependent bugs is not considered by existing automated fault localization techniques, which are designed to localize…

Comments on the Du-Kakade-Wang-Yang Lower Bounds. (arXiv:1911.07910v1 [cs.LG])

Du, Kakade, Wang, and Yang recently established intriguing lower bounds on sample complexity, which suggest that reinforcement learning with a misspecified representation is intractable. Another line of work, which centers around a statistic called the eluder dimension, establishes tractability of problems similar to those considered in the Du-Kakade-Wang-Yang paper. We compare these results and reconcile…

Hierarchical Optimization Time Integration for CFL-rate MPM Stepping. (arXiv:1911.07913v1 [cs.GR])

We propose Hierarchical Optimization Time Integration (HOT) for efficient implicit time stepping of the Material Point method (MPM) irrespective of simulated materials and conditions. HOT is a MPM-specialized hierarchical optimization algorithm that solves nonlinear time step problems for large-scale MPM systems near the CFL-limit, e.g., with step sizes around 0.01s. HOT provides “out-of-the-box” convergent simulations…

On the Price of Satisficing in Network User Equilibria. (arXiv:1911.07914v1 [cs.GT])

When network users are satisficing decision-makers, the resulting traffic pattern attains a satisficing user equilibrium, which may deviate from the (perfectly rational) user equilibrium. In a satisficing user equilibrium traffic pattern, the total system travel time can be worse than in the case of the PRUE. We show how bad the worst-case satisficing user equilibrium…

Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic. (arXiv:1911.07970v1 [cs.LG])

Recently, a special type of data poisoning (DP) attack, known as a backdoor, was proposed. These attacks aimto have a classifier learn to classify to a target class whenever the backdoor pattern is present in a test sample. In thispaper, we address post-training detection of perceptible backdoor patterns in DNN image classifiers, wherein thedefender does…