610 research outputs found
Network Interface Design for Network-on-Chip
In the culture of globalized integrated circuit (IC, a.k.a chip) production, the use of Intellectual Property (IP) cores, computer aided design tools (CAD) and testing services from un-trusted vendors are prevalent to reduce the time to market. Unfortunately, the globalized business model potentially creates opportunities for hardware tampering and modification from adversary, and this tampering is known as hardware Trojan (HT). Network-on-chip (NoC) has emerged as an efficient on-chip communication infrastructure. In this work, the security aspects of NoC network interface (NI), one of the most critical components in NoC will be investigated and presented. Particularly, the NI design, hardware attack models and countermeasures for NI in a NoC system are explored.
An OCP compatible NI is implemented in an IBM0.18ìm CMOS technology. The synthesis results are presented and compared with existing literature. Second, comprehensive hardware attack models targeted for NI are presented from system level to circuit level. The impact of hardware Trojans on NoC functionality and performance are evaluated. Finally, a countermeasure method is proposed to address the hardware attacks in NIs
Real option and vertical mixed-use development
Vertical mixed-use development is a favourite choice in urban development in high-density Asian cities to increase the land use efficiency. The flexibility of construction timing and the restrictions by lease contracts in vertical mixeduse projects are usually different from horizontal ones and single-use properties. To improve the valuation for vertical mixed-use projects, this study re-examines the real option pricing model. Simultaneous development for different uses and a finite maximum waiting period are the major characteristics of these projects. An approach is introduced to determine whether to develop a mixed-use project vertically or horizontally on the basis of a statistics called the critical height premium. The vertical mixed-use project pricing model can be further verified by containing a height premium if market price information is derived from non-vertical mixed-use properties. This study suggests a more comprehensive real option approach to quantify the advantages and disadvantages of operating vertical mixed-use developments
Open-Vocabulary Argument Role Prediction for Event Extraction
The argument role in event extraction refers to the relation between an event
and an argument participating in it. Despite the great progress in event
extraction, existing studies still depend on roles pre-defined by domain
experts. These studies expose obvious weakness when extending to emerging event
types or new domains without available roles. Therefore, more attention and
effort needs to be devoted to automatically customizing argument roles. In this
paper, we define this essential but under-explored task: open-vocabulary
argument role prediction. The goal of this task is to infer a set of argument
roles for a given event type. We propose a novel unsupervised framework,
RolePred for this task. Specifically, we formulate the role prediction problem
as an in-filling task and construct prompts for a pre-trained language model to
generate candidate roles. By extracting and analyzing the candidate arguments,
the event-specific roles are further merged and selected. To standardize the
research of this task, we collect a new event extraction dataset from
WikiPpedia including 142 customized argument roles with rich semantics. On this
dataset, RolePred outperforms the existing methods by a large margin. Source
code and dataset are available on our GitHub repository:
https://github.com/yzjiao/RolePredComment: EMNLP 2022 Finding
Amodal Segmentation Based on Visible Region Segmentation and Shape Prior
Almost all existing amodal segmentation methods make the inferences of
occluded regions by using features corresponding to the whole image. This is
against the human's amodal perception, where human uses the visible part and
the shape prior knowledge of the target to infer the occluded region. To mimic
the behavior of human and solve the ambiguity in the learning, we propose a
framework, it firstly estimates a coarse visible mask and a coarse amodal mask.
Then based on the coarse prediction, our model infers the amodal mask by
concentrating on the visible region and utilizing the shape prior in the
memory. In this way, features corresponding to background and occlusion can be
suppressed for amodal mask estimation. Consequently, the amodal mask would not
be affected by what the occlusion is given the same visible regions. The
leverage of shape prior makes the amodal mask estimation more robust and
reasonable. Our proposed model is evaluated on three datasets. Experiments show
that our proposed model outperforms existing state-of-the-art methods. The
visualization of shape prior indicates that the category-specific feature in
the codebook has certain interpretability.Comment: Accepted by AAAI 202
TagSmart: analysis and visualization for yeast mutant fitness data measured by tag microarrays
<p>Abstract</p> <p>Background</p> <p>A nearly complete collection of gene-deletion mutants (96% of annotated open reading frames) of the yeast <it>Saccharomyces cerevisiae </it>has been systematically constructed. Tag microarrays are widely used to measure the fitness of each mutant in a mutant mixture. The tag array experiments can have a complex experimental design, such as time course measurements and drug treatment with multiple dosages.</p> <p>Results</p> <p>TagSmart is a web application for analysis and visualization of <it>Saccharomyces cerevisiae </it>mutant fitness data measured by tag microarrays. It implements a robust statistical approach to assess the concentration differences among S. cerevisiae mutant strains. It also provides an interactive environment for data analysis and visualization. TagSmart has the following advantages over previously described analysis procedures: 1) it is user-friendly software rather than merely a description of analytical procedure; 2) It can handle complicated experimental designs, such as multiple time points and treatment with multiple dosages; 3) it has higher sensitivity and specificity; 4) It allows users to mask out "bad" tags in the analysis.</p> <p>Two biological tests were performed to illustrate the performance of TagSmart. First, we generated titration mixtures of mutant strains, in which the relative concentration of each strain was controlled. We used tag microarrays to measure the numbers of tag copies in each titration mixture. The data was analyzed with TagSmart and the result showed high precision and recall. Second, TagSmart was applied to a dataset in which heterozygous deletion strain mixture pools were treated with a new drug, Cincreasin. TagSmart identified 53 mutant strains as sensitive to Cincreasin treatment. We individually tested each identified mutant, and found 52 out of the 53 predicted mutants were indeed sensitive to Cincreasin.</p> <p>Conclusion</p> <p>TagSmart is provided "as is" to analyze tag array data produced by Affymetrix and Agilent arrays. TagSmart web application is assessable by Windows, Mac, and Linux users. It also has a downloadable version for execution on PCs running Windows. TagSmart is available for academic use at: <url>http://biocomp.bioen.uiuc.edu/tagsmart</url></p
Broad bandwidth of perceptual learning in second-order contrast modulation detection
Comparing characteristics of learning in first- and second-order systems might inform us about different neural plasticity in the two systems. In the current study, we aim to determine the properties of perceptual learning in second-order contrast modulation detection in normal adults. We trained nine observers to detect second-order gratings at an envelope modulation spatial frequency of 8 cycles/8 with their nondominant eyes. We found that, although training generated the largest improvements around the trained frequency, contrast sensitivity over a broad range of spatial frequencies also improved, with a 4.09-octave bandwidth of perceptual learning, exhibiting specificity to the trained spatial frequency as well as a relatively large degree of generalization. The improvements in the modulation sensitivity function (MSF) were not significantly different between the trained and untrained eyes. Furthermore, training did not significantly change subjects' ability in detecting firstorder gratings. Our results suggest that perceptual learning in second-order detection might occur at the postchannel level in binocular neurons, possibly through reducing the internal noise of the visual system
ReactIE: Enhancing Chemical Reaction Extraction with Weak Supervision
Structured chemical reaction information plays a vital role for chemists
engaged in laboratory work and advanced endeavors such as computer-aided drug
design. Despite the importance of extracting structured reactions from
scientific literature, data annotation for this purpose is cost-prohibitive due
to the significant labor required from domain experts. Consequently, the
scarcity of sufficient training data poses an obstacle to the progress of
related models in this domain. In this paper, we propose ReactIE, which
combines two weakly supervised approaches for pre-training. Our method utilizes
frequent patterns within the text as linguistic cues to identify specific
characteristics of chemical reactions. Additionally, we adopt synthetic data
from patent records as distant supervision to incorporate domain knowledge into
the model. Experiments demonstrate that ReactIE achieves substantial
improvements and outperforms all existing baselines.Comment: Findings of ACL 2023, Short Pape
Instruct and Extract: Instruction Tuning for On-Demand Information Extraction
Large language models with instruction-following capabilities open the door
to a wider group of users. However, when it comes to information extraction - a
classic task in natural language processing - most task-specific systems cannot
align well with long-tail ad hoc extraction use cases for non-expert users. To
address this, we propose a novel paradigm, termed On-Demand Information
Extraction, to fulfill the personalized demands of real-world users. Our task
aims to follow the instructions to extract the desired content from the
associated text and present it in a structured tabular format. The table
headers can either be user-specified or inferred contextually by the model. To
facilitate research in this emerging area, we present a benchmark named
InstructIE, inclusive of both automatically generated training data, as well as
the human-annotated test set. Building on InstructIE, we further develop an
On-Demand Information Extractor, ODIE. Comprehensive evaluations on our
benchmark reveal that ODIE substantially outperforms the existing open-source
models of similar size. Our code and dataset are released on
https://github.com/yzjiao/On-Demand-IE.Comment: EMNLP 202
Towards Robust Offline Reinforcement Learning under Diverse Data Corruption
Offline reinforcement learning (RL) presents a promising approach for
learning reinforced policies from offline datasets without the need for costly
or unsafe interactions with the environment. However, datasets collected by
humans in real-world environments are often noisy and may even be maliciously
corrupted, which can significantly degrade the performance of offline RL. In
this work, we first investigate the performance of current offline RL
algorithms under comprehensive data corruption, including states, actions,
rewards, and dynamics. Our extensive experiments reveal that implicit
Q-learning (IQL) demonstrates remarkable resilience to data corruption among
various offline RL algorithms. Furthermore, we conduct both empirical and
theoretical analyses to understand IQL's robust performance, identifying its
supervised policy learning scheme as the key factor. Despite its relative
robustness, IQL still suffers from heavy-tail targets of Q functions under
dynamics corruption. To tackle this challenge, we draw inspiration from robust
statistics to employ the Huber loss to handle the heavy-tailedness and utilize
quantile estimators to balance penalization for corrupted data and learning
stability. By incorporating these simple yet effective modifications into IQL,
we propose a more robust offline RL approach named Robust IQL (RIQL). Extensive
experiments demonstrate that RIQL exhibits highly robust performance when
subjected to diverse data corruption scenarios.Comment: 31 pages, 17 figure
- …