30,288 research outputs found

    Accessing files in an Internet: The Jade file system

    Get PDF
    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features

    Learning a face space for experiments on human identity

    Get PDF
    Generative models of human identity and appearance have broad applicability to behavioral science and technology, but the exquisite sensitivity of human face perception means that their utility hinges on the alignment of the model's representation to human psychological representations and the photorealism of the generated images. Meeting these requirements is an exacting task, and existing models of human identity and appearance are often unworkably abstract, artificial, uncanny, or biased. Here, we use a variational autoencoder with an autoregressive decoder to learn a face space from a uniquely diverse dataset of portraits that control much of the variation irrelevant to human identity and appearance. Our method generates photorealistic portraits of fictive identities with a smooth, navigable latent space. We validate our model's alignment with human sensitivities by introducing a psychophysical Turing test for images, which humans mostly fail. Lastly, we demonstrate an initial application of our model to the problem of fast search in mental space to obtain detailed "police sketches" in a small number of trials.Comment: 10 figures. Accepted as a paper to the 40th Annual Meeting of the Cognitive Science Society (CogSci 2018). *JWS and JCP contributed equally to this submissio

    Modeling Human Categorization of Natural Images Using Deep Feature Representations

    Get PDF
    Over the last few decades, psychologists have developed sophisticated formal models of human categorization using simple artificial stimuli. In this paper, we use modern machine learning methods to extend this work into the realm of naturalistic stimuli, enabling human categorization to be studied over the complex visual domain in which it evolved and developed. We show that representations derived from a convolutional neural network can be used to model behavior over a database of >300,000 human natural image classifications, and find that a group of models based on these representations perform well, near the reliability of human judgments. Interestingly, this group includes both exemplar and prototype models, contrasting with the dominance of exemplar models in previous work. We are able to improve the performance of the remaining models by preprocessing neural network representations to more closely capture human similarity judgments.Comment: 13 pages, 7 figures, 6 tables. Preliminary work presented at CogSci 201

    S-Net for multi-memory multicores

    Get PDF
    Copyright ACM, 2010. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of the 5th ACM SIGPLAN Workshop on Declarative Aspects of Multicore Programming: http://doi.acm.org/10.1145/1708046.1708054S-Net is a declarative coordination language and component technology aimed at modern multi-core/many-core architectures and systems-on-chip. It builds on the concept of stream processing to structure dynamically evolving networks of communicating asynchronous components. Components themselves are implemented using a conventional language suitable for the application domain. This two-level software architecture maintains a familiar sequential development environment for large parts of an application and offers a high-level declarative approach to component coordination. In this paper we present a conservative language extension for the placement of components and component networks in a multi-memory environment, i.e. architectures that associate individual compute cores or groups thereof with private memories. We describe a novel distributed runtime system layer that complements our existing multithreaded runtime system for shared memory multicores. Particular emphasis is put on efficient management of data communication. Last not least, we present preliminary experimental data

    Learning Hierarchical Visual Representations in Deep Neural Networks Using Hierarchical Linguistic Labels

    Full text link
    Modern convolutional neural networks (CNNs) are able to achieve human-level object classification accuracy on specific tasks, and currently outperform competing models in explaining complex human visual representations. However, the categorization problem is posed differently for these networks than for humans: the accuracy of these networks is evaluated by their ability to identify single labels assigned to each image. These labels often cut arbitrarily across natural psychological taxonomies (e.g., dogs are separated into breeds, but never jointly categorized as "dogs"), and bias the resulting representations. By contrast, it is common for children to hear both "dog" and "Dalmatian" to describe the same stimulus, helping to group perceptually disparate objects (e.g., breeds) into a common mental class. In this work, we train CNN classifiers with multiple labels for each image that correspond to different levels of abstraction, and use this framework to reproduce classic patterns that appear in human generalization behavior.Comment: 6 pages, 4 figures, 1 table. Accepted as a paper to the 40th Annual Meeting of the Cognitive Science Society (CogSci 2018

    A Variational Approach for Minimizing Lennard-Jones Energies

    Full text link
    A variational method for computing conformational properties of molecules with Lennard-Jones potentials for the monomer-monomer interactions is presented. The approach is tailored to deal with angular degrees of freedom, {\it rotors}, and consists in the iterative solution of a set of deterministic equations with annealing in temperature. The singular short-distance behaviour of the Lennard-Jones potential is adiabatically switched on in order to obtain stable convergence. As testbeds for the approach two distinct ensembles of molecules are used, characterized by a roughly dense-packed ore a more elongated ground state. For the latter, problems are generated from natural frequencies of occurrence of amino acids and phenomenologically determined potential parameters; they seem to represent less disorder than was previously assumed in synthetic protein studies. For the dense-packed problems in particular, the variational algorithm clearly outperforms a gradient descent method in terms of minimal energies. Although it cannot compete with a careful simulating annealing algorithm, the variational approach requires only a tiny fraction of the computer time. Issues and results when applying the method to polyelectrolytes at a finite temperature are also briefly discussed.Comment: 14 pages, uuencoded compressed postscript fil

    Effect of Phenolic Matrix Microcracking on the Structural Response of a 3-D Woven Thermal Protection System

    Get PDF
    The effect of microcracking in the phenolic matrix of a three-dimensional woven thermal protection system (TPS) and the resulting material stiffness reduction was studied via a comparison of finite element analysis results from a linear analysis and an iterative linear analysis. A TPS is necessary to protect space vehicles from the aerodynamic heating of planetary entry. The Heatshield for Extreme Entry Environment Technology (HEEET) project has developed a TPS for use in high heat-flux and pressure missions. The material is a dual-layer continuous dry weave, which is then infiltrated with a low-density phenolic resin matrix to form a rigid ablator. The phenolic resin matrix does not have structural load transfer requirements, and testing has shown that the phenolic resin can fully satisfy thermal requirements when the matrix contains microcracks. Due to high stresses in the through-the-thickness direction of the material, phenolic microcracks may form in the matrix material, which would result in a reduction of stiffness. An exploratory study was conducted to determine if reduction in material stiffness would change the load paths and/or decrease the structural margins. A comparison was performed between a linear finite element analysis that did not take into account phenolic microcracking and an iterative linear finite element analysis that accounted for propagation of phenolic microcracking. Four subcases using varying assumptions were analyzed and the results indicate that the assumed strength at which the phenolic microcracking propagates was the critical parameter for determining the extent of microcracking in the phenolic matrix. Phenolic microcracking does not have an adverse effect on the structural response of the test article and is not a critical failure

    Practical quantum key distribution over a 48-km optical fiber network

    Full text link
    The secure distribution of the secret random bit sequences known as "key" material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg's uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. Here we report the most recent results of our optical fiber experiment in which we have performed quantum key distribution over a 48-km optical fiber network at Los Alamos using photon interference states with the B92 and BB84 quantum key distribution protocols.Comment: 13 pages, 7 figures, .pdf format submitted to Journal of Modern Optic
    corecore