Filters








8,552 Hits in 2.6 sec

On optimal tempered Lévy flight foraging [article]

Yuquan Chen, Derek Hollenbeck, Yong Wang, YangQuan Chen
2018 arXiv   pre-print
Derek Hollenbeck mainly contributed to the numerical simulation.  ...  Yong Wang and YangQuan Chen contributed for providing the idea of using tempered Lévy distribution in foraging and helped revising the paper.  ... 
arXiv:1806.00909v1 fatcat:a7u7llcdbfgn3nbymyfjiwdfra

ARPA Whitepaper [article]

Derek Zhang, Alex Su, Felix Xu, Jiang Chen
2018 arXiv   pre-print
We propose a secure computation solution for blockchain networks. The correctness of computation is verifiable even under malicious majority condition using information-theoretic Message Authentication Code (MAC), and the privacy is preserved using Secret-Sharing. With state-of-the-art multiparty computation protocol and a layer2 solution, our privacy-preserving computation guarantees data security on blockchain, cryptographically, while reducing the heavy-lifting computation job to a few
more » ... This breakthrough has several implications on the future of decentralized networks. First, secure computation can be used to support Private Smart Contracts, where consensus is reached without exposing the information in the public contract. Second, it enables data to be shared and used in trustless network, without disclosing the raw data during data-at-use, where data ownership and data usage is safely separated. Last but not least, computation and verification processes are separated, which can be perceived as computational sharding, this effectively makes the transaction processing speed linear to the number of participating nodes. Our objective is to deploy our secure computation network as an layer2 solution to any blockchain system. Smart Contractssmartcontract will be used as bridge to link the blockchain and computation networks. Additionally, they will be used as verifier to ensure that outsourced computation is completed correctly. In order to achieve this, we first develop a general MPC network with advanced features, such as: 1) Secure Computation, 2) Off-chain Computation, 3) Verifiable Computation, and 4)Support dApps' needs like privacy-preserving data exchange.
arXiv:1812.05820v1 fatcat:wpu3uxpo6vcftomeeeufovd3ai

Data Augmentation for Intent Classification [article]

Derek Chen, Claire Yin
2022 arXiv   pre-print
Auxiliary datasets take advantage of external unlabeled data from a relevant domain to form new pseudo-labeled examples (Chen and Yu, 2021) .  ... 
arXiv:2206.05790v1 fatcat:k5zuj2ikszfgxmd2ypyco4x2ca

Hydrodynamic attractor of noisy plasmas [article]

Zenan Chen, Derek Teaney, Li Yan
2022 arXiv   pre-print
We provide a generalized formulation of fluctuating hydrodynamics for the far-from-equilibrium noisy medium. As an example, we consider a noisy plasma experiencing Bjorken expansion, for which the leading order evolution is captured by hydrodynamic attractor of classical hydrodynamics, while the quadratic couplings of fluctuations are solved effectively via a generalized version of the hydrodynamic kinetic equation. In the far-from-equilibrium plasma, backreaction of hydrodynamic fluctuations
more » ... sults in renormalization of transport properties, as well as long time tails, of high orders. In particular, corresponding to a renormalized hydrodynamic attractor, evolution in a noisy plasma towards equilibrium becomes non-monotonic.
arXiv:2206.12778v1 fatcat:n2jlhjmagvesdbrhakjepnbbia

More on the Magnus–Derek game

Li-Jui Chen, Jinn-Jy Lin, Min-Zheng Shieh, Shi-Chun Tsai
2011 Theoretical Computer Science  
We consider the so called Magnus-Derek game, which is a two-person game played on a round table with n positions. The two players are called Magnus and Derek.  ...  Then we consider a modified version of the Magnus-Derek game, where one of the players reveals his moves in advance and the other player plays optimally.  ...  Definition 3 ( 3 Derek Problem).  ... 
doi:10.1016/j.tcs.2010.09.031 fatcat:5qqouszucneablyljfhofql72e

On Optimal Tempered Lévy Flight Foraging

Yuquan Chen, Derek Hollenbeck, Yong Wang, YangQuan Chen
2018 Frontiers in Physics  
Particularly, Zeng and Chen [15] considered the waiting time between two successive flights and formulated the master equation for such foraging behavior.  ...  We have to mention that the master equation proposed by Zeng and Chen [15] should also be standard diffusion equation rather than fractional diffusion differential equation since the Lévy distribution  ...  Copyright © 2018 Chen, Hollenbeck, Wang and Chen. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY).  ... 
doi:10.3389/fphy.2018.00111 fatcat:77wynbebcbcvjjpzpycx4kvluq

C. Comninellis and G. Chen (eds): Electrochemistry for the environment

Derek Pletcher
2010 Journal of Applied Electrochemistry  
doi:10.1007/s10800-010-0229-0 fatcat:rwmyhce2xnh6dmp4f5omw5rtqq

UniTE: Unified Translation Evaluation [article]

Yu Wan, Dayiheng Liu, Baosong Yang, Haibo Zhang, Boxing Chen, Derek F. Wong, Lidia S. Chao
2022 arXiv   pre-print
Wang and Chen (2020) found that the positional embeddings in PLM are engaged with strong adjacent information.  ...  reference may be affected because their positions are not indexed from the start, related studies on positional embeddings reveal that, PLM can well capture relative positional information (Wang and Chen  ... 
arXiv:2204.13346v1 fatcat:3iz4jy4c3rc47kvxrlc66licoa

HyperExpan: Taxonomy Expansion with Hyperbolic Representation Learning [article]

Mingyu Derek Ma, Muhao Chen, Te-Lin Wu, Nanyun Peng
2021 arXiv   pre-print
., 2020) , organizational chart induction (Chen and Quirk, 2019) , hierarchical classification (López and Strube, 2020; , knowledge association , knowledge graph completion (Wang et al., 2021a; Balazevic  ... 
arXiv:2109.10500v1 fatcat:7uupuxk3ozd4bkjrqndnai7zoq

Human-centred home network security [article]

Derek McAuley, Jiahong Chen, Tom Lodge, Richard Mortier, Stanislaw Piasecki, Diana Andreea Popescu, Lachlan Urquhart
2022 arXiv   pre-print
This chapter draws from across the foregoing chapters discussing many core HDI approaches and disciplinary perspectives to consider the specific application of HDI in home network security. While much work has considered the challenges of securing in home IoT devices and their communications, especially for those with limited power or computational capacity, scant attention has been paid by the research community to home network security, and its acceptability and usability, from the viewpoint
more » ... f ordinary citizens. It will be clear that we need a radical transformation in our approach to designing domestic networking infrastructure to guard against widespread cyber-attacks that threaten to counter the benefits of the IoT. Our aim has to be to defend against enemies inside the walls, to protect critical functionality in the home against rogue devices and prevent the proliferation of disruptive wide-scale IoT DDOS attacks that are already occurring [1].
arXiv:2203.14109v1 fatcat:nu7qfott75duhg2xnpkhyz6m4i

Decoupling Strategy and Generation in Negotiation Dialogues [article]

He He and Derek Chen and Anusha Balakrishnan and Percy Liang
2018 arXiv   pre-print
We consider negotiation settings in which two agents use natural language to bargain on goods. Agents need to decide on both high-level strategy (e.g., proposing 50) and the execution of that strategy (e.g., generating "The bike is brand new. Selling for just 50."). Recent work on negotiation trains neural models, but their end-to-end nature makes it hard to control their strategy, and reinforcement learning tends to lead to degenerate solutions. In this paper, we propose a modular approach
more » ... d on coarse di- alogue acts (e.g., propose(price=50)) that decouples strategy and generation. We show that we can flexibly set the strategy using supervised learning, reinforcement learning, or domain-specific knowledge without degeneracy, while our retrieval-based generation can maintain context-awareness and produce diverse utterances. We test our approach on the recently proposed DEALORNODEAL game, and we also collect a richer dataset based on real items on Craigslist. Human evaluation shows that our systems achieve higher task success rate and more human-like negotiation behavior than previous approaches.
arXiv:1808.09637v1 fatcat:ljgihe4k5zfdxjpn6yletevuhq

Agent-Based Decentralized Control Method for Islanded Microgrids

Qiang Li, Feixiong Chen, Minyou Chen, Josep M. Guerrero, Derek Abbott
2015 IEEE Transactions on Smart Grid  
In this paper, an agent-based decentralized control model for islanded microgrids is proposed, which consists of a two-layer control structure. The bottom layer is the electrical distribution microgrid, while the top layer is the communication network composed of agents. An agent is regarded as a local control processor together with communication devices, so agents can collect present states of distributed generators and loads, when communication lines are added between two layers. Moreover,
more » ... ch agent can also exchange information with its neighboring agents of the network. After information is processed according to control laws, agents adjust the production of distributed generators to which they connect. The main contributions of this paper are (i) an agent-based model for decentralized secondary control is introduced and the rules to establish the communication network are given; (ii) a systematic method is presented, which can be used to derive a set of control laws for agents from any given communication network, where only local information is needed. Furthermore, it has been seen that the output power supplied by distributed generators satisfies the load demand in the microgrid, when agents use the proposed control laws. Finally, the simulation results show that frequency and voltage fluctuations are small and meet the requirements.
doi:10.1109/tsg.2015.2422732 fatcat:yuljb25afjhtla2aoauj6wm24u

Summarization as Indirect Supervision for Relation Extraction [article]

Keming Lu, I-Hung Hsu, Wenxuan Zhou, Mingyu Derek Ma, Muhao Chen
2022 arXiv   pre-print
Various entity marking techniques are widely adopted in previous multiclass classification RE systems (Zhang et al., , 2019;; Wang et al., 2021; Zhong and Chen, 2021; Zhou and Chen, 2021) .  ...  Type constrained inference emerges in many recent works (Lyu and Chen, 2021; Sainz et al., 2021; Cohen et al., 2020) .  ...  ., 2021) 6 , we re-implement RE-CENT (Lyu and Chen, 2021 ) and test it under both low-resource and full-training scenarios 7 .  ... 
arXiv:2205.09837v1 fatcat:oaix3dkdyraend4itjs5xzlm5a

Regularized Inverse Reinforcement Learning [article]

Wonseok Jeon, Chen-Yang Su, Paul Barde, Thang Doan, Derek Nowrouzezahrai, Joelle Pineau
2020 arXiv   pre-print
Inverse Reinforcement Learning (IRL) aims to facilitate a learner's ability to imitate expert behavior by acquiring reward functions that explain the expert's decisions. Regularized IRL applies strongly convex regularizers to the learner's policy in order to avoid the expert's behavior being rationalized by arbitrary constant rewards, also known as degenerate solutions. We propose tractable solutions, and practical methods to obtain them, for regularized IRL. Current methods are restricted to
more » ... e maximum-entropy IRL framework, limiting them to Shannon-entropy regularizers, as well as proposing the solutions that are intractable in practice. We present theoretical backing for our proposed IRL method's applicability for both discrete and continuous controls, empirically validating our performance on a variety of tasks.
arXiv:2010.03691v2 fatcat:gv2pftbbavdvdbqygkfzmo5qay

Molecular Dynamics Simulation of Transmembrane Helix Dissociation

Derek Mendez, Liao Chen, Robert Renthal
2009 Biophysical Journal  
(2006 1736-Pos Board B580 Molecular Dynamics Simulation of Transmembrane Helix Dissociation Derek Mendez, Liao Chen, Robert Renthal. University of Texas at San Antonio, San Antonio, TX, USA.  ... 
doi:10.1016/j.bpj.2008.12.3825 fatcat:ihtqvq7qobc2ro6x5jtubjapv4
« Previous Showing results 1 — 15 out of 8,552 results