8,168 research outputs found
The Quantum Car
I explore the use of quantum information as a security enabler for the future
driverless vehicle. Specifically, I investigate the role combined classical and
quantum information can have on the most important characteristic of the
driverless vehicle paradigm - the vehicle location. By using
information-theoretic verification frameworks, coupled with emerging
quantum-based location-verification procedures, I show how vehicle positions
can be authenticated with a probability of error simply not attainable in
classical-only networks. I also discuss how other quantum applications can be
seamlessly encapsulated within the same vehicular communication infrastructure
required for location verification. The two technology enablers required for
the driverless quantum vehicle are an increase in current quantum memory
timescales (likely) and wide-scale deployment of classical vehicular
communication infrastructure (underway). I argue the enhanced safety features
delivered by the `Quantum Car' mean its eventual deployment is inevitable.Comment: 4 pages, 1 figur
On content-based recommendation and user privacy in social-tagging systems
Recommendation systems and content filtering approaches based on annotations and ratings, essentially rely on users expressing their preferences and interests through their actions, in order to provide personalised content. This activity, in which users engage collectively has been named social tagging, and it is one of the most popular in which users engage online, and although it has opened new possibilities for application interoperability on the semantic web, it is also posing new privacy threats. It, in fact, consists of describing online or offline resources by using free-text labels (i.e. tags), therefore exposing the user profile and activity to privacy attacks. Users, as a result, may wish to adopt a privacy-enhancing strategy in order not to reveal their interests completely. Tag forgery is a privacy enhancing technology consisting of generating tags for categories or resources that do not reflect the user's actual preferences. By modifying their profile, tag forgery may have a negative impact on the quality of the recommendation system, thus protecting user privacy to a certain extent but at the expenses of utility loss. The impact of tag forgery on content-based recommendation is, therefore, investigated in a real-world application scenario where different forgery strategies are evaluated, and the consequent loss in utility is measured and compared.Peer ReviewedPostprint (author’s final draft
Energy flow polynomials: A complete linear basis for jet substructure
We introduce the energy flow polynomials: a complete set of jet substructure
observables which form a discrete linear basis for all infrared- and
collinear-safe observables. Energy flow polynomials are multiparticle energy
correlators with specific angular structures that are a direct consequence of
infrared and collinear safety. We establish a powerful graph-theoretic
representation of the energy flow polynomials which allows us to design
efficient algorithms for their computation. Many common jet observables are
exact linear combinations of energy flow polynomials, and we demonstrate the
linear spanning nature of the energy flow basis by performing regression for
several common jet observables. Using linear classification with energy flow
polynomials, we achieve excellent performance on three representative jet
tagging problems: quark/gluon discrimination, boosted W tagging, and boosted
top tagging. The energy flow basis provides a systematic framework for complete
investigations of jet substructure using linear methods.Comment: 41+15 pages, 13 figures, 5 tables; v2: updated to match JHEP versio
Memory-Based Lexical Acquisition and Processing
Current approaches to computational lexicology in language technology are
knowledge-based (competence-oriented) and try to abstract away from specific
formalisms, domains, and applications. This results in severe complexity,
acquisition and reusability bottlenecks. As an alternative, we propose a
particular performance-oriented approach to Natural Language Processing based
on automatic memory-based learning of linguistic (lexical) tasks. The
consequences of the approach for computational lexicology are discussed, and
the application of the approach on a number of lexical acquisition and
disambiguation tasks in phonology, morphology and syntax is described.Comment: 18 page
Attentive Tensor Product Learning
This paper proposes a new architecture - Attentive Tensor Product Learning
(ATPL) - to represent grammatical structures in deep learning models. ATPL is a
new architecture to bridge this gap by exploiting Tensor Product
Representations (TPR), a structured neural-symbolic model developed in
cognitive science, aiming to integrate deep learning with explicit language
structures and rules. The key ideas of ATPL are: 1) unsupervised learning of
role-unbinding vectors of words via TPR-based deep neural network; 2) employing
attention modules to compute TPR; and 3) integration of TPR with typical deep
learning architectures including Long Short-Term Memory (LSTM) and Feedforward
Neural Network (FFNN). The novelty of our approach lies in its ability to
extract the grammatical structure of a sentence by using role-unbinding
vectors, which are obtained in an unsupervised manner. This ATPL approach is
applied to 1) image captioning, 2) part of speech (POS) tagging, and 3)
constituency parsing of a sentence. Experimental results demonstrate the
effectiveness of the proposed approach
- …