Skip to main content

Showing 1–17 of 17 results for author: C, A

Searching in archive cs. Search in all archives.
.
  1. Advancing Uto-Aztecan Language Technologies: A Case Study on the Endangered Comanche Language

    Authors: Jesus Alvarez C, Daua D. Karajeanes, Ashley Celeste Prado, John Ruttan, Ivory Yang, Sean O'Brien, Vasu Sharma, Kevin Zhu

    Abstract: The digital exclusion of endangered languages remains a critical challenge in NLP, limiting both linguistic research and revitalization efforts. This study introduces the first computational investigation of Comanche, an Uto-Aztecan language on the verge of extinction, demonstrating how minimal-cost, community-informed NLP interventions can support language preservation. We present a manually cura… ▽ More

    Submitted 10 May, 2025; originally announced May 2025.

    Comments: 11 pages, 13 figures; published in Proceedings of the Fifth Workshop on NLP for Indigenous Languages of the Americas (AmericasNLP 2025) at NAACL 2025, Albuquerque, NM

    ACM Class: I.2.7; H.3.1

    Journal ref: Proceedings of the Fifth Workshop on NLP for Indigenous Languages of the Americas (AmericasNLP), NAACL 2025, pp. 27-37, Albuquerque, NM

  2. arXiv:2505.17070  [pdf, other

    cs.CL cs.AI cs.SD eess.AS

    Improving endpoint detection in end-to-end streaming ASR for conversational speech

    Authors: Anandh C, Karthik Pandia Durai, Jeena Prakash, Manickavela Arumugam, Kadri Hacioglu, S. Pavankumar Dubagunta, Andreas Stolcke, Shankar Venkatesan, Aravind Ganapathiraju

    Abstract: ASR endpointing (EP) plays a major role in delivering a good user experience in products supporting human or artificial agents in human-human/machine conversations. Transducer-based ASR (T-ASR) is an end-to-end (E2E) ASR modelling technique preferred for streaming. A major limitation of T-ASR is delayed emission of ASR outputs, which could lead to errors or delays in EP. Inaccurate EP will cut the… ▽ More

    Submitted 19 May, 2025; originally announced May 2025.

    Comments: Submitted to Interspeech 2024

  3. arXiv:2505.04310  [pdf, ps, other

    cs.AI cs.LG math.OC

    Flow Models for Unbounded and Geometry-Aware Distributional Reinforcement Learning

    Authors: Simo Alami C., Rim Kaddah, Jesse Read, Marie-Paule Cani

    Abstract: We introduce a new architecture for Distributional Reinforcement Learning (DistRL) that models return distributions using normalizing flows. This approach enables flexible, unbounded support for return distributions, in contrast to categorical approaches like C51 that rely on fixed or bounded representations. It also offers richer modeling capacity to capture multi-modality, skewness, and tail beh… ▽ More

    Submitted 7 May, 2025; originally announced May 2025.

  4. arXiv:2402.05295  [pdf

    cs.LG cs.AI

    An information theoretic approach to quantify the stability of feature selection and ranking algorithms

    Authors: Alaiz-Rodriguez, R., Parnell, A. C

    Abstract: Feature selection is a key step when dealing with high dimensional data. In particular, these techniques simplify the process of knowledge discovery from the data by selecting the most relevant features out of the noisy, redundant and irrelevant features. A problem that arises in many of these practical applications is that the outcome of the feature selection algorithm is not stable. Thus, small… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

  5. arXiv:2311.06654  [pdf, other

    cs.CV

    Unsupervised and semi-supervised co-salient object detection via segmentation frequency statistics

    Authors: Souradeep Chakraborty, Shujon Naha, Muhammet Bastan, Amit Kumar K C, Dimitris Samaras

    Abstract: In this paper, we address the detection of co-occurring salient objects (CoSOD) in an image group using frequency statistics in an unsupervised manner, which further enable us to develop a semi-supervised method. While previous works have mostly focused on fully supervised CoSOD, less attention has been allocated to detecting co-salient objects when limited segmentation annotations are available f… ▽ More

    Submitted 11 November, 2023; originally announced November 2023.

    Comments: Accepted at IEEE WACV 2024

  6. arXiv:2302.06523  [pdf, other

    cs.LG cs.AI cs.CV

    Transferable Deep Metric Learning for Clustering

    Authors: Simo Alami. C, Rim Kaddah, Jesse Read

    Abstract: Clustering in high dimension spaces is a difficult task; the usual distance metrics may no longer be appropriate under the curse of dimensionality. Indeed, the choice of the metric is crucial, and it is highly dependent on the dataset characteristics. However a single metric could be used to correctly perform clustering on multiple datasets of different domains. We propose to do so, providing a fr… ▽ More

    Submitted 13 February, 2023; originally announced February 2023.

    Comments: Published in Symposium of Intelligent Data Analysis (IDA), 2023

  7. arXiv:2212.00770  [pdf, other

    cs.CV cs.AI

    On Utilizing Relationships for Transferable Few-Shot Fine-Grained Object Detection

    Authors: Ambar Pal, Arnau Ramisa, Amit Kumar K C, René Vidal

    Abstract: State-of-the-art object detectors are fast and accurate, but they require a large amount of well annotated training data to obtain good performance. However, obtaining a large amount of training annotations specific to a particular task, i.e., fine-grained annotations, is costly in practice. In contrast, obtaining common-sense relationships from text, e.g., "a table-lamp is a lamp that sits on top… ▽ More

    Submitted 1 December, 2022; originally announced December 2022.

    Comments: 8 pages, 3 figures

  8. Conv-NILM-Net, a causal and multi-appliance model for energy source separation

    Authors: Simo Alami C., Jérémie Decock, Rim Kaddah, Jesse Read

    Abstract: Non-Intrusive Load Monitoring (NILM) seeks to save energy by estimating individual appliance power usage from a single aggregate measurement. Deep neural networks have become increasingly popular in attempting to solve NILM problems. However most used models are used for Load Identification rather than online Source Separation. Among source separation models, most use a single-task learning approa… ▽ More

    Submitted 13 February, 2023; v1 submitted 3 August, 2022; originally announced August 2022.

    Comments: Published in ECML PKDD 2022: Machine Learning and Principles and Practice of Knowledge Discovery in Databases

    Journal ref: Machine Learning and Principles and Practice of Knowledge Discovery in Databases. ECML PKDD 2022. Communications in Computer and Information Science, vol 1753, pp 207-222. Springer, Cham

  9. arXiv:2208.00773  [pdf

    cs.CV eess.IV

    Real Time Object Detection System with YOLO and CNN Models: A Review

    Authors: Viswanatha V, Chandana R K, Ramachandra A. C.

    Abstract: The field of artificial intelligence is built on object detection techniques. YOU ONLY LOOK ONCE (YOLO) algorithm and it's more evolved versions are briefly described in this research survey. This survey is all about YOLO and convolution neural networks (CNN)in the direction of real time object detection.YOLO does generalized object representation more effectively without precision losses than oth… ▽ More

    Submitted 23 July, 2022; originally announced August 2022.

  10. arXiv:2207.12866  [pdf

    eess.AS cs.CV cs.LG cs.SD

    Implementation Of Tiny Machine Learning Models On Arduino 33 BLE For Gesture And Speech Recognition

    Authors: Viswanatha V, Ramachandra A. C, Raghavendra Prasanna, Prem Chowdary Kakarla, Viveka Simha PJ, Nishant Mohan

    Abstract: In this article gesture recognition and speech recognition applications are implemented on embedded systems with Tiny Machine Learning (TinyML). It features 3-axis accelerometer, 3-axis gyroscope and 3-axis magnetometer. The gesture recognition,provides an innovative approach nonverbal communication. It has wide applications in human-computer interaction and sign language. Here in the implementati… ▽ More

    Submitted 23 July, 2022; originally announced July 2022.

  11. CAMEO: Curiosity Augmented Metropolis for Exploratory Optimal Policies

    Authors: Simo Alami. C, Fernando Llorente, Rim Kaddah, Luca Martino, Jesse Read

    Abstract: Reinforcement Learning has drawn huge interest as a tool for solving optimal control problems. Solving a given problem (task or environment) involves converging towards an optimal policy. However, there might exist multiple optimal policies that can dramatically differ in their behaviour; for example, some may be faster than the others but at the expense of greater risk. We consider and study a di… ▽ More

    Submitted 15 February, 2023; v1 submitted 19 May, 2022; originally announced May 2022.

    Comments: 2022 30th European Signal Processing Conference (EUSIPCO), Belgrade, Serbia, 2022, pp. 1482-1486

  12. arXiv:2108.10034  [pdf, other

    cs.SI

    Collation of Feasible Solutions for Domain Based Problems: An Analysis of Sentiments Based on Codeathon Activity

    Authors: Rajeshwari K, Preetha S, Anitha C, Lakshmi Shree K, Pronoy Roy

    Abstract: Codeathon activity is a practical approach for enduring the principles of Software Engineering and Object Oriented Modelling. Real world domain problem's solution was accomplished through team work. Analysing the problem and designing a feasible solution through a one day activity was achieved through virtual connection. There are three different sections in a semester, 13 teams were framed and as… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

    Comments: 10 pages, 15 figures, 1 table

  13. arXiv:2107.10556  [pdf

    cs.CY

    Codeathon Activity: A Design Prototype for Real World Problems

    Authors: Preetha S, Rajeshwari K, Anitha C, Kausthub Narayan

    Abstract: Activity-based learning helps students to learn through participation. A virtual codeathon activity, as part of this learning scheme, was conducted for 180 undergraduate students to focus on analysis and design of solutions to crucial real-world problems in the existing Covid-19 pandemic situation. In this paper, an analysis is made to know the problem solving skills of students given a single pro… ▽ More

    Submitted 22 July, 2021; originally announced July 2021.

    Comments: 6 pages, 3 tables

  14. arXiv:2105.00777  [pdf, ps, other

    cs.CV cs.AI

    Recognition of Oracle Bone Inscriptions by using Two Deep Learning Models

    Authors: Yoshiyuki Fujikawa, Hengyi Li, Xuebin Yue, Aravinda C V, Amar Prabhu G, Lin Meng

    Abstract: Oracle bone inscriptions (OBIs) contain some of the oldest characters in the world and were used in China about 3000 years ago. As an ancient form of literature, OBIs store a lot of information that can help us understand the world history, character evaluations, and more. However, as OBIs were found only discovered about 120 years ago, few studies have described them, and the aging process has ma… ▽ More

    Submitted 4 May, 2021; v1 submitted 3 May, 2021; originally announced May 2021.

  15. arXiv:1509.00313  [pdf, other

    cs.CV

    Iterative hypothesis testing for multi-object tracking in presence of features with variable reliability

    Authors: Amit Kumar K. C., Damien Delannay, Christophe De Vleeschouwer

    Abstract: This paper assumes prior detections of multiple targets at each time instant, and uses a graph-based approach to connect those detections across time, based on their position and appearance estimates. In contrast to most earlier works in the field, our framework has been designed to exploit the appearance features, even when they are only sporadically available, or affected by a non-stationary noi… ▽ More

    Submitted 1 September, 2015; originally announced September 2015.

    Comments: 21 pages, 8 figures, submitted to CVIU: Special Issue on Visual Tracking

  16. arXiv:1504.01124  [pdf, other

    cs.CV

    Discriminative and Efficient Label Propagation on Complementary Graphs for Multi-Object Tracking

    Authors: Amit Kumar K. C., Laurent Jacques, Christophe De Vleeschouwer

    Abstract: Given a set of detections, detected at each time instant independently, we investigate how to associate them across time. This is done by propagating labels on a set of graphs, each graph capturing how either the spatio-temporal or the appearance cues promote the assignment of identical or distinct labels to a pair of detections. The graph construction is motivated by a locally linear embedding of… ▽ More

    Submitted 1 December, 2015; v1 submitted 5 April, 2015; originally announced April 2015.

    Comments: 15 pages, 6 figures, submitted to PAMI

  17. arXiv:1104.3208  [pdf, ps, other

    cs.DM

    Constructions of hamiltonian graphs with bounded degree and diameter O (log n)

    Authors: Aleksandar Ili\' c, Dragan Stevanovi\' c

    Abstract: Token ring topology has been frequently used in the design of distributed loop computer networks and one measure of its performance is the diameter. We propose an algorithm for constructing hamiltonian graphs with $n$ vertices and maximum degree $Δ$ and diameter $O (\log n)$, where $n$ is an arbitrary number. The number of edges is asymptotically bounded by… ▽ More

    Submitted 16 April, 2011; originally announced April 2011.

    Comments: 6 pages, 3 figures

    Report number: A. Ili\' , D. Stevanovi\' c, Constructions of Hamiltonian graphs with bounded degree and diameter O(log n), Appl. Math. Letters 22 (2009) 1715-1720