-
Boundary Aware U-Net for Glacier Segmentation
Authors:
Bibek Aryal,
Katie E. Miles,
Sergio A. Vargas Zesati,
Olac Fuentes
Abstract:
Large-scale study of glaciers improves our understanding of global glacier change and is imperative for monitoring the ecological environment, preventing disasters, and studying the effects of global climate change. Glaciers in the Hindu Kush Himalaya (HKH) are particularly interesting as the HKH is one of the world's most sensitive regions for climate change. In this work, we: (1) propose a modif…
▽ More
Large-scale study of glaciers improves our understanding of global glacier change and is imperative for monitoring the ecological environment, preventing disasters, and studying the effects of global climate change. Glaciers in the Hindu Kush Himalaya (HKH) are particularly interesting as the HKH is one of the world's most sensitive regions for climate change. In this work, we: (1) propose a modified version of the U-Net for large-scale, spatially non-overlapping, clean glacial ice, and debris-covered glacial ice segmentation; (2) introduce a novel self-learning boundary-aware loss to improve debris-covered glacial ice segmentation performance; and (3) propose a feature-wise saliency score to understand the contribution of each feature in the multispectral Landsat 7 imagery for glacier mapping. Our results show that the debris-covered glacial ice segmentation model trained using self-learning boundary-aware loss outperformed the model trained using dice loss. Furthermore, we conclude that red, shortwave infrared, and near-infrared bands have the highest contribution toward debris-covered glacial ice segmentation from Landsat 7 images.
△ Less
Submitted 26 January, 2023;
originally announced January 2023.
-
Iterated group products and leakage resilience against NC^1
Authors:
Eric Miles
Abstract:
We show that if NC$^1 \neq$ L, then for every element $α$ of the alternating group $A_t$, circuits of depth $O(\log t)$ cannot distinguish between a uniform vector over $(A_t)^t$ with product $= α$ and one with product $=$ identity. Combined with a recent construction by the author and Viola in the setting of leakage-resilient cryptography [STOC '13], this gives a compiler that produces circuits w…
▽ More
We show that if NC$^1 \neq$ L, then for every element $α$ of the alternating group $A_t$, circuits of depth $O(\log t)$ cannot distinguish between a uniform vector over $(A_t)^t$ with product $= α$ and one with product $=$ identity. Combined with a recent construction by the author and Viola in the setting of leakage-resilient cryptography [STOC '13], this gives a compiler that produces circuits withstanding leakage from NC$^1$ (assuming NC$^1 \neq$ L). For context, leakage from NC$^1$ breaks nearly all previous constructions, and security against leakage from P is impossible. %In the multi-query setting, circuits produced by this compiler use a simple secure hardware component.
We build on work by Cook and McKenzie [J.\ Algorithms '87] establishing the relationship between L $=$ logarithmic space and the symmetric group $S_t$. Our techniques include a novel algorithmic use of commutators to manipulate the cycle structure of permutations in $A_t$.
△ Less
Submitted 11 December, 2013;
originally announced December 2013.
-
Local reductions
Authors:
Hamid Jahanjou,
Eric Miles,
Emanuele Viola
Abstract:
We reduce non-deterministic time $T \ge 2^n$ to a 3SAT instance $φ$ of quasilinear size $|φ| = T \cdot \log^{O(1)} T$ such that there is an explicit circuit $C$ that on input an index $i$ of $\log |φ|$ bits outputs the $i$th clause, and each output bit of $C$ depends on $O(1)$ input bits. The previous best result was $C$ in NC$^1$. Even in the simpler setting of polynomial size $|φ| = \poly(T)$ th…
▽ More
We reduce non-deterministic time $T \ge 2^n$ to a 3SAT instance $φ$ of quasilinear size $|φ| = T \cdot \log^{O(1)} T$ such that there is an explicit circuit $C$ that on input an index $i$ of $\log |φ|$ bits outputs the $i$th clause, and each output bit of $C$ depends on $O(1)$ input bits. The previous best result was $C$ in NC$^1$. Even in the simpler setting of polynomial size $|φ| = \poly(T)$ the previous best result was $C$ in AC$^0$.
More generally, for any time $T \ge n$ and parameter $r \leq n$ we obtain $\log_2 |φ| = \max(\log T, n/r) + O(\log n) + O(\log\log T)$ and each output bit of $C$ is a decision tree of depth $O(\log r)$.
As an application, we tighten Williams' connection between satisfiability algorithms and circuit lower bounds (STOC 2010; SIAM J. Comput. 2013).
△ Less
Submitted 7 April, 2014; v1 submitted 13 November, 2013;
originally announced November 2013.
-
Alternating Hierarchies for Time-Space Tradeoffs
Authors:
Chris Pollett,
Eric Miles
Abstract:
Nepomnjascii's Theorem states that for all 0 <= ε< 1 and k > 0 the class of languages recognized in nondeterministic time n^k and space n^ε, NTISP[n^k, n^ε], is contained in the linear time hierarchy. By considering restrictions on the size of the universal quantifiers in the linear time hierarchy, this paper refines Nepomnjascii's result to give a sub- hierarchy, Eu-LinH, of the linear time hie…
▽ More
Nepomnjascii's Theorem states that for all 0 <= ε< 1 and k > 0 the class of languages recognized in nondeterministic time n^k and space n^ε, NTISP[n^k, n^ε], is contained in the linear time hierarchy. By considering restrictions on the size of the universal quantifiers in the linear time hierarchy, this paper refines Nepomnjascii's result to give a sub- hierarchy, Eu-LinH, of the linear time hierarchy that is contained in NP and which contains NTISP[n^k, n^ε]. Hence, Eu-LinH contains NL and SC. This paper investigates basic structural properties of Eu-LinH. Then the relationships between Eu-LinH and the classes NL, SC, and NP are considered to see if they can shed light on the NL = NP or SC = NP questions. Finally, a new hierarchy, zeta -LinH, is defined to reduce the space requirements needed for the upper bound on Eu-LinH.
△ Less
Submitted 8 January, 2008;
originally announced January 2008.