7,762 Hits in 2.0 sec

The structure of the UMVUEs from categorical data

Abram Kagan, Abram Kagan, Michael Konikov, Michael Konikov
2005 Teorija verojatnostej i ee primenenija  
doi:10.4213/tvp100 fatcat:dqhommhddrge5h7nak2qkyohj4

Differentiable Matrix Elements with MadJax [article]

Lukas Heinrich, Michael Kagan
2022 arXiv   pre-print
MadJax is a tool for generating and evaluating differentiable matrix elements of high energy scattering processes. As such, it is a step towards a differentiable programming paradigm in high energy physics that facilitates the incorporation of high energy physics domain knowledge, encoded in simulation software, into gradient based learning and optimization pipelines. MadJax comprises two components: (a) a plugin to the general purpose matrix element generator MadGraph that integrates matrix
more » ... ment and phase space sampling code with the JAX differentiable programming framework, and (b) a standalone wrapping API for accessing the matrix element code and its gradients, which are computed with automatic differentiation. The MadJax implementation and example applications of simulation based inference and normalizing flow based matrix element modeling, with capabilities enabled uniquely with differentiable matrix elements, are presented.
arXiv:2203.00057v1 fatcat:q6yvfxwbnfajlhvk264plonvs4

Image-Based Jet Analysis [article]

Michael Kagan
2020 arXiv   pre-print
Image-based jet analysis is built upon the jet image representation of jets that enables a direct connection between high energy physics and the fields of computer vision and deep learning. Through this connection, a wide array of new jet analysis techniques have emerged. In this text, we survey jet image based classification models, built primarily on the use of convolutional neural networks, examine the methods to understand what these models have learned and what is their sensitivity to
more » ... tainties, and review the recent successes in moving these models from phenomenological studies to real world application on experiments at the LHC. Beyond jet classification, several other applications of jet image based techniques, including energy estimation, pileup noise reduction, data generation, and anomaly detection, are discussed.
arXiv:2012.09719v2 fatcat:lkmk52e6gvfevakbvsp2bmavl4

Aristotelian Dialectic

H. Hamner Hill, Michael Kagan
1995 Informal Logic  
Hamner Hill & Michael Kagan apparent and not real wisdom), it is clear that for these people it is essential t? seem to perform the function of a wise man rather than act~ally t?  ...  HAMNER HILL DEPARTMENT OF PHILOSOPHY & RELIGION SOUTHEAST MISSOURI STATE UNIVERSITY CAPE GIRARDEAU, MO 63701 MICHAEL KAGAN DEPARTMENT OF PHILOSOPHY LE MOYNE COLLEGE SYRACUSE, NY 13214 o  ... 
doi:10.22329/il.v17i1.2394 fatcat:niw536jgorb5dmouksqaoess6y

Continual Learning via Neural Pruning [article]

Siavash Golkar, Michael Kagan, Kyunghyun Cho
2019 arXiv   pre-print
We introduce Continual Learning via Neural Pruning (CLNP), a new method aimed at lifelong learning in fixed capacity models based on neuronal model sparsification. In this method, subsequent tasks are trained using the inactive neurons and filters of the sparsified network and cause zero deterioration to the performance of previous tasks. In order to deal with the possible compromise between model sparsity and performance, we formalize and incorporate the concept of graceful forgetting: the
more » ... that it is preferable to suffer a small amount of forgetting in a controlled manner if it helps regain network capacity and prevents uncontrolled loss of performance during the training of future tasks. CLNP also provides simple continual learning diagnostic tools in terms of the number of free neurons left for the training of future tasks as well as the number of neurons that are being reused. In particular, we see in experiments that CLNP verifies and automatically takes advantage of the fact that the features of earlier layers are more transferable. We show empirically that CLNP leads to significantly improved results over current weight elasticity based methods.
arXiv:1903.04476v1 fatcat:tsaehmr2ujav5oxezasjltl5su

Co-Membership-based Generic Anomalous Communities Detection [article]

Shay Lapid, Dima Kagan, Michael Fire
2022 arXiv   pre-print
In 2018, Kagan et al.  ...  Motivated by Kagan et al.  ... 
arXiv:2203.16246v1 fatcat:yg44ccjtgfaodkxcxbfe5wjlta

Zooming Into Video Conferencing Privacy and Security Threats [article]

Dima Kagan, Galit Fuhrmann Alpert, Michael Fire
2020 arXiv   pre-print
The COVID-19 pandemic outbreak, with its related social distancing and shelter-in-place measures, has dramatically affected ways in which people communicate with each other, forcing people to find new ways to collaborate, study, celebrate special occasions, and meet with family and friends. One of the most popular solutions that have emerged is the use of video conferencing applications to replace face-to-face meetings with virtual meetings. This resulted in unprecedented growth in the number
more » ... video conferencing users. In this study, we explored privacy issues that may be at risk by attending virtual meetings. We extracted private information from collage images of meeting participants that are publicly posted on the Web. We used image processing, text recognition tools, as well as social network analysis to explore our web crawling curated dataset of over 15,700 collage images, and over 142,000 face images of meeting participants. We demonstrate that video conference users are facing prevalent security and privacy threats. Our results indicate that it is relatively easy to collect thousands of publicly available images of video conference meetings and extract personal information about the participants, including their face images, age, gender, usernames, and sometimes even full names. This type of extracted data can vastly and easily jeopardize people's security and privacy both in the online and real-world, affecting not only adults but also more vulnerable segments of society, such as young children and older adults. Finally, we show that cross-referencing facial image data with social network data may put participants at additional privacy risks they may not be aware of and that it is possible to identify users that appear in several video conference meetings, thus providing a potential to maliciously aggregate different sources of information about a target individual.
arXiv:2007.01059v1 fatcat:xv7vc2sqmvd23pojr3bdkjsgom

Facebook Applications' Installation and Removal: A Temporal Analysis [article]

Dima Kagan, Michael Fire, Aviad Elyashar, Yuval Elovici
2013 arXiv   pre-print
Facebook applications are one of the reasons for Facebook attractiveness. Unfortunately, numerous users are not aware of the fact that many malicious Facebook applications exist. To educate users, to raise users' awareness and to improve Facebook users' security and privacy, we developed a Firefox add-on that alerts users to the number of installed applications on their Facebook profiles. In this study, we present the temporal analysis of the Facebook applications' installation and removal
more » ... et collected by our add-on. This dataset consists of information from 2,945 users, collected during a period of over a year. We used linear regression to analyze our dataset and discovered the linear connection between the average percentage change of newly installed Facebook applications and the number of days passed since the user initially installed our add-on. Additionally, we found out that users who used our Firefox add-on become more aware of their security and privacy installing on average fewer new applications. Finally, we discovered that on average 86.4% of Facebook users install an additional application every 4.2 days.
arXiv:1309.4067v1 fatcat:w4rk3m56ffdidmrtyyrpi5wwhq

Social Network Based Search for Experts [article]

Yehonatan Bitton, Michael Fire, Dima Kagan, Bracha Shapira, Lior Rokach, Judit Bar-Ilan
2012 arXiv   pre-print
Our system illustrates how information retrieved from social networks can be used for suggesting experts for specific tasks. The system is designed to facilitate the task of finding the appropriate person(s) for a job, as a conference committee member, an advisor, etc. This short description will demonstrate how the system works in the context of the HCIR2012 published tasks.
arXiv:1212.3540v1 fatcat:2d7ocnyu7jdhbguhuanb7uddpi

Scientometric Trends for Coronaviruses and Other Emerging Viral Infections [article]

Dima Kagan, Jacob Moran-Gilad, Michael Fire
2020 bioRxiv   pre-print
COVID-19 is the most rapidly expanding coronavirus outbreak in the past two decades. To provide a swift response to a novel outbreak, prior knowledge from similar outbreaks is essential. Here, we study the volume of research conducted on previous coronavirus outbreaks, specifically SARS and MERS, relative to other infectious diseases by analyzing over 45 million papers from the last 20 years. Our results demonstrate that previous coronavirus outbreaks have been understudied compared to other
more » ... uses. We also show that the research volume of emerging infectious diseases is very high after an outbreak and drops drastically upon the containment of the disease. This can yield inadequate research and limited investment in gaining a full understanding of novel coronavirus management and prevention. Independent of the outcome of the current COVID-19 outbreak, we believe that measures should be taken to encourage sustained research in the field.
doi:10.1101/2020.03.17.995795 fatcat:xz6wruk6d5bcfp7pbmshtqkkem

Safety assessment of the microalgae Nannochloropsis oculata

Michael L. Kagan, Ray A. Matulka
2015 Toxicology Reports  
Conflict of interest Michael L. Kagan is an employee of Qualitas Health Ltd. Ray A.  ... 
doi:10.1016/j.toxrep.2015.03.008 pmid:28962397 pmcid:PMC5598295 fatcat:624jrggxxvbenkla35lifpmmqm

Friend or Foe? Fake Profile Identification in Online Social Networks [article]

Michael Fire, Dima Kagan, Aviad Elyashar, Yuval Elovici
2013 arXiv   pre-print
The amount of personal information unwillingly exposed by users on online social networks is staggering, as shown in recent research. Moreover, recent reports indicate that these networks are infested with tens of millions of fake users profiles, which may jeopardize the users' security and privacy. To identify fake users in such networks and to improve users' security and privacy, we developed the Social Privacy Protector software for Facebook. This software contains three protection layers,
more » ... ich improve user privacy by implementing different methods. The software first identifies a user's friends who might pose a threat and then restricts this "friend's" exposure to the user's personal information. The second layer is an expansion of Facebook's basic privacy settings based on different types of social network usage profiles. The third layer alerts users about the number of installed applications on their Facebook profile, which have access to their private information. An initial version of the Social Privacy Protection software received high media coverage, and more than 3,000 users from more than twenty countries have installed the software, out of which 527 used the software to restrict more than nine thousand friends. In addition, we estimate that more than a hundred users accepted the software's recommendations and removed at least 1,792 Facebook applications from their profiles. By analyzing the unique dataset obtained by the software in combination with machine learning techniques, we developed classifiers, which are able to predict which Facebook profiles have high probabilities of being fake and therefore, threaten the user's well-being. Moreover, in this study, we present statistics on users' privacy settings and statistics of the number of applications installed on Facebook profiles...
arXiv:1303.3751v1 fatcat:64ckoy2qyjdrpgrvwaenkevtbe

W ± Z production in pp collisions at 7 TeV with ATLAS

2012 Pramana (Bangalore)  
with single-27 muon or single-electron triggers requiring p T ≥ 18 (20) GeV for muons (electrons).28 Collision candidates were required to have a primary vertex (PV) with at least three tracks. 29 * kagan  ... 
doi:10.1007/s12043-012-0427-x fatcat:l67lq7tw4zdxxj4oe6ptfwdmrq

Static and dynamic analysis of call chains in java

Atanas Rountev, Scott Kagan, Michael Gibas
2004 Software engineering notes  
This work presents a parameterized framework for static and dynamic analysis of call chains in Java components. Such analyses have a wide range of uses in tools for software understanding and testing. We also describe a test coverage tool built with these analyses and the use of the tool on a real-world test suite. Our experiments evaluate the exact precision of several instances of the framework and provide a novel approach for estimating the limits of class analysis technology for computing precise call chains.
doi:10.1145/1013886.1007514 fatcat:5ol4djlusrfp5i2dxyvronxpqq

Legal Refugee Recognition in the Urban South: Formal v. de Facto Refugee Status

Michael Kagan
2007 Refuge  
The legal relevance of the "urban refugee" concept in the Middle East and Africa stems from the practice of practicing different forms of refugee status determination (RSD) in rural as opposed to urban areas. Urban refugees are usually subject to rigorous individual adjudication, while rural refugees are typically recognized on a prima facie basis. This difference in procedure has no basis in the substance of refugee law, and it marginalizes urban refugees in two key ways. First, in Africa and
more » ... he Middle East, refugee status recognition is used by host governments to prevent refugee integration, to force refugees to live far from population centres, and to transfer responsibility for their welfare to international agencies. Second, individualized RSD procedures in wide use by the United Nations generally lack key fairness safeguards, increasing the risk that genuine refugees will be wrongfully rejected. This phenomenon means that urban refugee populations will often be systematically undercounted, and will include a significant number of de facto refugees who are in fact refugees in danger of refoulement, but whose applications were rejected and who thus have no access to the protection and resources otherwise targeted at refugees.
doi:10.25071/1920-7336.21364 fatcat:beh2yw4tgfbadm6nznyv5o47jy
« Previous Showing results 1 — 15 out of 7,762 results