2,002 Hits in 7.9 sec

High-Quality Diversification for Task-Oriented Dialogue Systems [article]

Zhiwen Tang, Hrishikesh Kulkarni, Grace Hui Yang
2021 arXiv   pre-print
Training DRL agents with diverse dialogue trajectories prepare them well for rare user requests and unseen situations.  ...  However, trajectories created by these artificial user models may contain generation errors, which can quickly propagate into the agent's policy.  ...  Analysis of DUME DUME is our collection of trainable diversified user models.  ... 
arXiv:2106.00891v2 fatcat:ng4t6tzx7baopi3jc35qqgwbha

Feature Selection Using Enhanced Particle Swarm Optimisation for Classification Models

Hailun Xie, Li Zhang, Chee Peng Lim, Yonghong Yu, Han Liu
2021 Sensors  
The aim is to overcome two major shortcomings of the original PSO model, i.e., premature convergence and weak exploitation around the near optimal solutions.  ...  In comparison with a set of 15 classical and advanced search methods, the proposed models illustrate statistical superiority for discriminative feature selection for a total of 13 data sets.  ...  On top of it, a new search action is proposed by embedding diverse search coefficients yielded using sine, cosine, and hyperbolic tangent formulae.  ... 
doi:10.3390/s21051816 pmid:33807806 pmcid:PMC7961412 fatcat:b3vhnu7qqnbnvayknlyg4t3uyy

Measuring and Recommending Time-Sensitive Routes from Location-Based Data

Hsun-Ping Hsieh, Cheng-Te Li, Shou-De Lin
2014 ACM Transactions on Intelligent Systems and Technology  
To handle these queries, we propose a search method, Guidance Search, which consists of a novel heuristic satisfaction function which guides the search towards the destination location, and a backward  ...  The second is about composing the route between the specified source location and the destination location given a starting time.  ...  [Wei et al. 2012] search for popular and attractive trajectories for recommendation. Z. Chen et al. [Chen et al. 2010 ] find the top-k trajectories connecting some user-given locations. H.  ... 
doi:10.1145/2542668 fatcat:ukq72oxhfng2bajwr2jvvnxasy

A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points

Yannian Zhao, Yonglong Luo, Qingying Yu, Zhaoyan Hu
2020 Mobile Information Systems  
Compared with existing methods such as trajectory rotation and unidirectional generation, theoretical analysis and experimental results on the datasets of real trajectories show that the anonymous trajectories  ...  Second, k−1 anonymous trajectories are generated bidirectionally according to that secure candidate set. Finally, accessibility corrections are made for each anonymous trajectory.  ...  [8] proposed an l-diversity model that defines a diversified standard, which satisfies any anonymous set (minimum bounding rectangle).  ... 
doi:10.1155/2020/3429256 doaj:0cdcb77058ca4384b4d722ea01e5b913 fatcat:ssbcljobnzabzlkhznzihgutqu

Unsupervised Path Representation Learning with Curriculum Negative Sampling [article]

Sean Bin Yang, Chenjuan Guo, Jilin Hu, Jian Tang, Bin Yang
2021 arXiv   pre-print
Top-k only: it employs the top-k diversified shortest path algorithms to generate negative paths sharing the same origin and destination with the input path with different overlapping nodes.  ...  Next, we use the source and the destination of P 1 as the input to call the top-k diversified shortest path algorithm Liu et al. [2018] to generate paths that share the same source and destination of  ... 
arXiv:2106.09373v1 fatcat:j5kxg7kybzgo5npx2pinrpjofe

A survey of results on mobile phone datasets analysis [article]

Vincent D. Blondel, Adeline Decuyper, Gautier Krings
2015 arXiv   pre-print
In many cases, modeling the mobility of users starts by creating an Origin-Destination matrix that represents how many people will travel between a specific pair of (origin, destination) locations within  ...  p ij log d D spatial (i) = − a p ia log p ia log A , (10) which is 1 if the node has diversified contacts.  ... 
arXiv:1502.03406v1 fatcat:akca6vnmtfbihp5nqotnz3rvpq

Discovering Diverse Mechanisms of Migration: The Mexico-US Stream 1970-2000

Filiz Garip
2012 Population and Development Review  
the Number of Clusters A final step in cluster analysis requires the researcher to supply the number of clusters, K, to the K-means algorithm.  ...  New economics predicts risk-diversifying migrants who seek to complement earnings at risk in origin. Cumulative causation describes network migrants who follow family or friends in destination.  ... 
doi:10.1111/j.1728-4457.2012.00510.x fatcat:vdxo2xygrffqteysj356ikht3i

ARAMIS heritage, 10 years after the end of the project [chapter]

2017 Risk Analysis and Management - Trends, Challenges and Emerging Issues  
Separating natural and epistemic uncertainty in flood frequency analysis, Journal of Hydrology, 309, 114-132. Petry, B. (2002) .  ...  Characterising Uncertainty: A Taxonomy and an Analysis of Extreme Events, MSc Thesis, School of Engineering and Applied Science, University of Virginia, VA.  ...  Traditional DPO methods pay close attention to the searching efficiency of on-line recalculation.  ... 
doi:10.1201/9781315265339-9 fatcat:rs6apsg5rndttgq7fi5huiukry

A survey of results on mobile phone datasets analysis

Vincent D Blondel, Adeline Decuyper, Gautier Krings
2015 EPJ Data Science  
In many cases, modeling the mobility of users starts by creating an Origin-Destination matrix that represents how many people will travel between a specific pair of (origin, destination) locations within  ...  p ij log d , D spatial (i) = -a p ia log p ia log A , (   ) which is  if the node has diversified contacts.  ... 
doi:10.1140/epjds/s13688-015-0046-0 fatcat:oxo3bjnfb5h4tckgdzwydu2mau

User-centered Design and Evaluation of a Geovisualization Application Leveraging Aggregated QS Data

Jonathan K. Nelson, Alan M. MacEachren
2020 Cartographic Perspectives  
of data generated by these individuals, when aggregated and anonymized, can be used by city planners, Departments of Transportation, advocacy groups, and researchers to help make cities safer and more efficient  ...  This results in trajectory-oriented views of movement from both origin-destination and route-based perspectives (Andrienko and Andrienko 2010) .  ...  Intersections, origin-destination polygons, and destination-origin polygons can be toggled on or off.  ... 
doi:10.14714/cp96.1631 fatcat:777g6hygfnfhlpzcgx5zg7qvv4

A deep learning based approach for trajectory estimation using geographically clustered data

Aditya Shrivastava, Jai Prakash V Verma, Swati Jain, Sanjay Garg
2021 SN Applied Sciences  
This study presents a novel approach to predict a complete source to destination trajectory of a vehicle using a partial trajectory query.  ...  To handle a large amount of data, clustering of similar trajectory data is used that helps in reducing the search space.  ...  Efficiently predicting destinations using a stochastic-ally sampling simulation based on the RNN encoder-decoder framework.  ... 
doi:10.1007/s42452-021-04556-x doaj:47c26f94076b42beb83202cc298e2cfe fatcat:7pbs2vmxyfejlcdfd4nrergfo4

Privacy in RFID and mobile objects [article]

Rolando Trujillo-Rasua
2013 arXiv   pre-print
Finally, we present two trajectory anonymisation methods aimed at preserving the individuals' privacy when their trajectories are released.  ...  However, obvious privacy threats arise if an individual can be linked with some of those published trajectories.  ...  Another useful privacy notion is -diversity [154] , which improves k-anonymity by diversifying the sensitive attributes values of each group of records that can be isolated by an attacker.  ... 
arXiv:1310.5476v1 fatcat:7lz5b242z5ht5hwzso4qffdojm

An ensemble inverse optimal control approach for robotic task learning and adaptation

Hang Yin, Francisco S. Melo, Ana Paiva, Aude Billard
2018 Autonomous Robots  
This paper contributes a novel framework to efficiently learn cost-to-go function representations for robotic tasks with latent modes.  ...  The proposed approach relies on the principle behind ensemble methods, where improved performance is obtained by aggregating a group of simple models, each of which can be efficiently learnedq.  ...  This function is often constrained with a simple form, allowing the decision boundary to be efficiently searched.  ... 
doi:10.1007/s10514-018-9757-y fatcat:yxy6ih4uwbhelpznxs66gr3osq

Cluster Analysis of Young Online Consumers in Indian Context

Dipanjay Bhalerao
2015 ANVESHAK-International Journal of Management  
Originality: Authors must ensure that they have written entirely original work.  ...  ANOVA Table Analysis ANOVA table shows that mean of the variable place is the highest whereas the s.d. of process and people tops the list.  ... 
doi:10.15410/aijm/2015/v4i2/67730 fatcat:77idyos2snhodduz4a7tqkpume

Promotion policies for services offshoring : Global analysis and lessons for Latin America [chapter]

Andrés López, Andrés Niembro, Daniela Ramos
2014 ECLAC Books  
Chile's export basket is characterized by strong product concentration, but the country has diversified the destinations of its exports.  ...  Concepts With intense global competition driving the search for greater cost savings and productive efficiency, many firms decide to outsource intermediate goods or services to other suppliers rather than  ... 
doi:10.18356/a6cffe7f-en fatcat:3rrdlpxatrh23l3glzyrolnlmq
« Previous Showing results 1 — 15 out of 2,002 results