• ### A Scaling Limit for Limit Order Books Driven by Hawkes Processes(1709.01292)

Aug. 8, 2018 q-fin.MF
In this paper we derive a scaling limit for an infinite dimensional limit order book model driven by Hawkes random measures. The dynamics of the incoming order flow is allowed to depend on the current market price as well as on a volume indicator. With our choice of scaling the dynamics converges to a coupled SDE-ODE system where limiting best bid and ask price processes follows a diffusion dynamics, the limiting volume density functions follows an ODE in a Hilbert space and the limiting order arrival and cancellation intensities follow a Volterra-Fredholm integral equation.
• ### Scaling Nakamoto Consensus to Thousands of Transactions per Second(1805.03870)

May 10, 2018 cs.DC
This paper presents Conflux, a fast, scalable and decentralized blockchain system that optimistically process concurrent blocks without discarding any as forks. The Conflux consensus protocol represents relationships between blocks as a direct acyclic graph and achieves consensus on a total order of the blocks. Conflux then, from the block order, deterministically derives a transaction total order as the blockchain ledger. We evaluated Con- flux on Amazon EC2 clusters with up to 20k full nodes. Conflux achieves a transaction throughput of 5.76GB/h while confirming transactions in 4.5-7.4 minutes. The throughput is equivalent to 6400 transactions per second for typical Bitcoin transactions. Our results also indicate that when running Conflux, the consensus protocol is no longer the throughput bottleneck. The bottleneck is instead at the processing capability of individual nodes.
• ### Distributed and Multi-layer UAV Network for the Next-generation Wireless Communication(1805.01534)

May 3, 2018 eess.SP
Unmanned aerial vehicles (UAVs) for wireless communications has rapidly grown into a research hotspot as the mass production of high-performance, low-cost, intelligent UAVs become more practical and feasible. In the meantime, fifth generation (5G) wireless communications is being standardized and planned for deployment globally. During this process, UAVs are gradually being considered as an important part of 5G and expected to play a critical role in enabling more functional diversity for 5G communications. In this article, we conduct an in-depth investigation of mainstream UAV designs and state-of-the-art UAV enabled wireless communication systems.We propose a hierarchical architecture of UAVs with multi-layer and distributed features to facilitate a smooth integration of different mainstream UAVs into the next-generation wireless communication networks. Furthermore, we unveil the critical comprehensive design tradeoffs, in light of both communication and aerodynamic principles. Empirical models and satellite measurement data are used to conduct numerical analysis of the meteorological impacts of UAV enabled, 5G high bands communications.
• ### An Annotated Corpus for Machine Reading of Instructions in Wet Lab Protocols(1805.00195)

May 1, 2018 cs.AI, cs.CL
We describe an effort to annotate a corpus of natural language instructions consisting of 622 wet lab protocols to facilitate automatic or semi-automatic conversion of protocols into a machine-readable format and benefit biological research. Experimental results demonstrate the utility of our corpus for developing machine learning approaches to shallow semantic parsing of instructional texts. We make our annotated Wet Lab Protocol Corpus available to the research community.
• ### Interactive Language Acquisition with One-shot Visual Concept Learning through a Conversational Game(1805.00462)

April 26, 2018 cs.AI, cs.CL
Building intelligent agents that can communicate with and learn from humans in natural language is of great value. Supervised language learning is limited by the ability of capturing mainly the statistics of training data, and is hardly adaptive to new scenarios or flexible for acquiring new knowledge without inefficient retraining or catastrophic forgetting. We highlight the perspective that conversational interaction serves as a natural interface both for language learning and for novel knowledge acquisition and propose a joint imitation and reinforcement approach for grounded language learning through an interactive conversational game. The agent trained with this approach is able to actively acquire information by asking questions about novel objects and use the just-learned knowledge in subsequent conversations in a one-shot fashion. Results compared with other methods verified the effectiveness of the proposed approach.
• ### Interactive Grounded Language Acquisition and Generalization in a 2D World(1802.01433)

April 24, 2018 cs.AI, cs.CL, cs.LG
We build a virtual agent for learning language in a 2D maze-like world. The agent sees images of the surrounding environment, listens to a virtual teacher, and takes actions to receive rewards. It interactively learns the teacher's language from scratch based on two language use cases: sentence-directed navigation and question answering. It learns simultaneously the visual representations of the world, the language, and the action control. By disentangling language grounding from other computational routines and sharing a concept detection function between language grounding and prediction, the agent reliably interpolates and extrapolates to interpret sentences that contain new word combinations or new words missing from training sentences. The new words are transferred from the answers of language prediction. Such a language ability is trained and evaluated on a population of over 1.6 million distinct sentences consisting of 119 object words, 8 color words, 9 spatial-relation words, and 50 grammatical words. The proposed model significantly outperforms five comparison methods for interpreting zero-shot sentences. In addition, we demonstrate human-interpretable intermediate outputs of the model in the appendix.
• ### Robust Beamforming with Pilot Reuse Scheduling in a Heterogeneous Cloud Radio Access Network(1804.08464)

April 23, 2018 cs.IT, math.IT
This paper considers a downlink ultra-dense heterogeneous cloud radio access network (H-CRAN) which guarantees seamless coverage and can provide high date rates. In order to reduce channel state information (CSI) feedback overhead, incomplete inter-cluster CSI is considered, i.e., each remote radio head (RRH) or macro base station (MBS) only measures the CSI from user equipments (UEs) in its serving cluster. To reduce pilot consumption, pilot reuse among UEs is assumed, resulting in imperfect intra-cluster CSI. A two-stage optimization problem is then formulated. In the first stage, a pilot scheduling algorithm is proposed to minimize the sum mean square error (MSE) of all channel estimates. Specifically, the minimum number of required pilots along with a feasible pilot allocation solution are first determined by applying the Dsatur algorithm, and adjustments based on the defined level of pilot contamination are then carried out for further improvement. Based on the pilot allocation result obtained in the first stage, the second stage aims to maximize the sum spectral efficiency (SE) of the network by optimizing the beam-vectors. Due to incomplete inter-cluster CSI and imperfect intra-cluster CSI, an explicit expression of each UE's achievable rate is unavailable. Hence, a lower bound on the achievable rate is derived based on Jensen's inequality, and an alternative robust transmission design (RTD) algorithm along with its distributed realization are then proposed to maximize the derived tight lower bound. Simulation results show that compared with existing algorithms, the system performance can be greatly improved by the proposed algorithms in terms of both sum MSE and sum SE.
• ### Robust Transmission Design for Multi-Cell D2D Underlaid Cellular Networks(1804.05243)

April 14, 2018 cs.IT, math.IT
This paper investigates the robust transmission design (RTD) of a multi-cell device-to-device (D2D) underlaid cellular network with imperfect channel state information (CSI). The bounded model is adopted to characterize the CSI impairment and the aim is to maximize the worst-case sum rate of the system. To protect cellular communications, it is assumed that the interference from all D2D transmitters to each base station (BS) is power-limited. It is first shown that the worst-case signal-to-interference-plus-noise ratio (SINR) of each D2D link can be obtained directly, while that of cellular links cannot be similarly found since the channel estimation error vectors of cellular links are coupled in the SINR expressions. To solve the nonconvex problem, the objective function of the original problem is replaced with its lower bound, and the resulted problem is decomposed into multiple semidefinite programming (SDP) subproblems which are convex and have computationally efficient solutions. An iterative RTD algorithm is then proposed to obtain a suboptimal solution. Simulation results show that D2D communication can significantly increase the performance of the conventional cellular systems while causing tolerable interference to cellular users. In addition, the proposed RTD algorithm outperforms the conventional non-robust transmission design greatly in terms of network spectral efficiency.
• ### $\lambda$ phase transition in Horava gravity(1804.03815)

April 11, 2018 hep-th, gr-qc
Recently superfluid black holes are reported in Lovelock gravity with conformally coupled scalar field [Robie A. Hennigar, Robert B. Mann, Erickson Tjoa, Phys.Rev.Lett. 118 (2017) no.2, 021301]. In this paper, we present another example of black holes containing $\lambda$ phase transition in Horava gravity. After studying the extended thermodynamics of general dimensional Horava-Lifshitz AdS black holes, it is found that only the one with spherical horizon in four and five dimensions have a $\lambda$ phase transition, which is a line of (continuous) second order phase transitions and was famous in the discussion of superfluidity of liquid ${}^4$He. The "superfluid" black hole phase and "normal" black hole phase are also distinguished. Especially, six dimensional Horava-Lifshitz AdS black holes exhibit infinitely many critical points in $P-\nu$ plane and the divergent points for specific heat, for which they only contain the "normal" black hole phase and the "superfluid" black hole phase disappears due to the physical temperature constraint; therefore there is no similar phase transition. In more than six dimensions, there is no $P-\nu$ critical behavior. After choosing the appropriate ordering field, we study the critical phenomena in different planes of thermodynamical phase space. We also calculate the critical exponents, which are the same with the van der Waals fluid.
• ### Occlusion Aware Unsupervised Learning of Optical Flow(1711.05890)

April 4, 2018 cs.CV
It has been recently shown that a convolutional neural network can learn optical flow estimation with unsupervised learning. However, the performance of the unsupervised methods still has a relatively large gap compared to its supervised counterpart. Occlusion and large motion are some of the major factors that limit the current unsupervised learning of optical flow methods. In this work we introduce a new method which models occlusion explicitly and a new warping way that facilitates the learning of large motion. Our method shows promising results on Flying Chairs, MPI-Sintel and KITTI benchmark datasets. Especially on KITTI dataset where abundant unlabeled samples exist, our unsupervised method outperforms its counterpart trained with supervised learning.
• ### LEGO: Learning Edge with Geometry all at Once by Watching Videos(1803.05648)

March 24, 2018 cs.CV
Learning to estimate 3D geometry in a single image by watching unlabeled videos via deep convolutional network is attracting significant attention. In this paper, we introduce a "3D as-smooth-as-possible (3D-ASAP)" prior inside the pipeline, which enables joint estimation of edges and 3D scene, yielding results with significant improvement in accuracy for fine detailed structures. Specifically, we define the 3D-ASAP prior by requiring that any two points recovered in 3D from an image should lie on an existing planar surface if no other cues provided. We design an unsupervised framework that Learns Edges and Geometry (depth, normal) all at Once (LEGO). The predicted edges are embedded into depth and surface normal smoothness terms, where pixels without edges in-between are constrained to satisfy the prior. In our framework, the predicted depths, normals and edges are forced to be consistent all the time. We conduct experiments on KITTI to evaluate our estimated geometry and CityScapes to perform edge evaluation. We show that in all of the tasks, i.e.depth, normal and edge, our algorithm vastly outperforms other state-of-the-art (SOTA) algorithms, demonstrating the benefits of our approach.
• ### Cellular and WiFi Co-design for 5G User Equipment(1803.06943)

March 19, 2018 eess.SP
Motivated by providing solutions to design challenges of coexisting cellular and WiFi for future 5G application scenarios, this paper, first, conducts an in-depth investigation of current technological trends of 5G from user equipment (UE) design perspective, and then presents a cost-effective cellular-WiFi design methodology based on the new distributed phased array MIMO (DPA-MIMO) architecture for practical 5G UE devices as an example. Furthermore, additional 5G cellular-WiFi application scenarios and co-operation details within 5G heterogeneous networks are unveiled on top of the said cellular-WiFi co-enabled 5G UE design.
• ### Compressive Sensing Based User Clustering for Downlink NOMA Systems with Decoding Power(1803.04651)

March 13, 2018 cs.IT, math.IT
This letter investigates joint power control and user clustering for downlink non-orthogonal multiple access systems. Our aim is to minimize the total power consumption by taking into account not only the conventional transmission power but also the decoding power of the users. To solve this optimization problem, it is firstly transformed into an equivalent problem with tractable constraints. Then, an efficient algorithm is proposed to tackle the equivalent problem by using the techniques of reweighted 1-norm minimization and majorization-minimization. Numerical results validate the superiority of the proposed algorithm over the conventional algorithms including the popular matching-based algorithm.
• ### Optimal Fairness-Aware Time and Power Allocation in Wireless Powered Communication Networks(1802.04951)

Feb. 14, 2018 cs.IT, math.IT
In this paper, we consider the sum $\alpha$-fair utility maximization problem for joint downlink (DL) and uplink (UL) transmissions of a wireless powered communication network (WPCN) via time and power allocation. In the DL, the users with energy harvesting receiver architecture decode information and harvest energy based on simultaneous wireless information and power transfer. While in the UL, the users utilize the harvested energy for information transmission, and harvest energy when other users transmit UL information. We show that the general sum $\alpha$-fair utility maximization problem can be transformed into an equivalent convex one. Tradeoffs between sum rate and user fairness can be balanced via adjusting the value of $\alpha$. In particular, for zero fairness, i.e., $\alpha=0$, the optimal allocated time for both DL and UL is proportional to the overall available transmission power. Tradeoffs between sum rate and user fairness are presented through simulations.
• ### Gosig: Scalable Byzantine Consensus on Adversarial Wide Area Network for Blockchains(1802.01315)

Feb. 5, 2018 cs.DC
Existing Byzantine fault tolerance (BFT) protocols face significant challenges in the consortium blockchain scenario. On the one hand, we can make little assumptions about the reliability and security of the underlying Internet. On the other hand, the applications on consortium blockchains demand a system as scalable as the Bit-coin but providing much higher performance, as well as provable safety. We present a new BFT protocol, Gosig, that combines crypto-based secret leader selection and multi-round voting in the protocol layer with implementation layer optimizations such as gossip-based message propagation. In particular, Gosig guarantees safety even in a network fully controlled by adversaries, while providing provable liveness with easy-to-achieve network connectivity assumption. On a wide area testbed consisting of 140 Amazon EC2 servers spanning 14 cities on five continents, we show that Gosig can achieve over 4,000 transactions per second with less than 1 minute transaction confirmation time.
• ### PrivPy: Enabling Scalable and General Privacy-Preserving Computation(1801.10117)

Jan. 30, 2018 cs.CR
We introduce PrivPy, a practical privacy-preserving collaborative computation framework. PrivPy provides an easy-to-use and highly compatible Python programming front-end which supports high-level array operations and different secure computation engines to allow for security assumptions and performance trade-offs. We also design and implement a new secret-sharing-based computation engine with highly efficient protocols for private arithmetics over real numbers: a fast secure multiplication protocol, a garbled-circuit-based secure comparison protocol, and optimized array/matrix operations that are essential for big data applications. PrivPy provides provable privacy and supports general computation. We demonstrate the scalability of PrivPy using machine learning models (e.g. logistic regression and convolutional neural networks) and real-world datasets (including a 5000-by-1-million private matrix).
• ### Distributed order Hausdorff derivative diffusion model to characterize non-Fickian diffusion in porous media(1801.09352)

Jan. 29, 2018 physics.flu-dyn
Many theoretical and experimental results show that solute transport in heterogeneous porous media exhibits multi-scaling behaviors. To describe such non-Fickian diffusions, this work provides a distributed order Hausdorff diffusion model to describe the tracer transport in porous media. This model is proved to be equivalent with the diffusion equation model with a nonlinear time dependent diffusion coefficient. In conjunction with the structural derivative, its mean squared displacement (MSD) of the tracer particles is explicitly derived as a dilogarithm function when the weight function of the order distribution is a linear function of the time derivative order. This model can capture both accelerating and decelerating anomalous and ultraslow diffusions by varying the weight parameter c. In this study, the tracer transport in water-filled pore spaces of two-dimensional Euclidean is demonstrated as a decelerating sub-diffusion, and can well be described by the distributed order Hausdorff diffusion model with c = 1.73. While the Hausdorff diffusion model can accurately fit the sub-diffusion experimental data of the tracer transport in the pore-solid prefractal porous media.
• ### Edge-Preserving Piecewise Linear Image Smoothing Using Piecewise Constant Filters(1801.06928)

Jan. 22, 2018 cs.GR
Most image smoothing filters in the literature assume a piecewise constant model of smoothed output images. However, the piecewise constant model assumption can cause artifacts such as gradient reversals in applications such as image detail enhancement, HDR tone mapping, etc. In these applications, a piecewise linear model assumption is more preferred. In this paper, we propose a simple yet very effective framework to smooth images of piecewise linear model assumption using classical filters with the piecewise constant model assumption. Our method is capable of handling with gradient reversal artifacts caused by the piecewise constant model assumption. In addition, our method can further help accelerated methods, which need to quantize image intensity values into different bins, to achieve similar results that need a large number of bins using a much smaller number of bins. This can greatly reduce the computational cost. We apply our method to various classical filters with the piecewise constant model assumption. Experimental results of several applications show the effectiveness of the proposed method.
• ### Expansion of one-dimensional lattice hard-core bosons at finite temperature(1612.08988)

Jan. 20, 2018 cond-mat.quant-gas
We develop an exact approach to study the quench dynamics of hard-core bosons initially in thermal equilibrium in one-dimensional lattices. This approach is used to study the sudden expansion of thermal states after confining potentials are switched off. We find that a dynamical fermionization of the momentum distribution occurs at all temperatures. This phenomenon is studied for low initial site occupations, for which the expansion of the cloud is self-similar. In this regime, the occupation of the natural orbitals allows one to distinguish hard-core bosons from noninteracting fermions. We also study the free expansion of initial Mott insulating domains at finite temperature, and show that the emergence of off-diagonal one-body correlations is suppressed gradually with increasing temperature. Surprisingly, the melting of the Mott domain is accompanied by an effective cooling of the system. We explain this phenomenon analytically using an equilibrium description based on an emergent local Hamiltonian.
• ### ICFVR 2017: 3rd International Competition on Finger Vein Recognition(1801.01262)

Jan. 4, 2018 cs.CV
In recent years, finger vein recognition has become an important sub-field in biometrics and been applied to real-world applications. The development of finger vein recognition algorithms heavily depends on large-scale real-world data sets. In order to motivate research on finger vein recognition, we released the largest finger vein data set up to now and hold finger vein recognition competitions based on our data set every year. In 2017, International Competition on Finger Vein Recognition(ICFVR) is held jointly with IJCB 2017. 11 teams registered and 10 of them joined the final evaluation. The winner of this year dramatically improved the EER from 2.64% to 0.483% compared to the winner of last year. In this paper, we introduce the process and results of ICFVR 2017 and give insights on development of state-of-art finger vein recognition algorithms.
• ### Local noncentrosymmetric structure of Bi2Sr2CaCu2O8+y by X-ray magnetic circular dichroism at Cu K-edge XANES(1711.00397)

Dec. 31, 2017 cond-mat.supr-con
The two-dimensional Bi2Sr2CaCu2O8+y (Bi2212), the most studied prototype cuprate superconductor, is a lamellar system made of a stack of two-dimensional corrugated CuO2 bilayers separated by Bi2O2+ySr2O2 layers. While the large majority of theories, proposed to interpret unconventional high Tc superconductivity in Bi2Sr2CaCu2O8+y, assume a centrosymmetric tetragonal CuO2 lattice for the [CuO2]Ca[CuO2] bilayer here we report new compelling results providing evidence for local noncentrosymmetric structure at the Cu site. We have measured polarized Cu K-edge XANES (x-ray absorption near edge structure) and the K-edge X-ray magnetic circular dichroism (XMCD) of a Bi2212 single crystal near optimum doping. The Cu K edge XMCD signal was measured at ID12 beamline of ESRF with the k-vector of x-ray beam parallel to c-axis i.e. with the electric field of x-ray beam E//ab, using a 17 T magnetic field parallel to the c-axis of a Bi2212 single crystal. Numerical simulations of the XMCD signal of Bi2212 by multiple scattering theory have shown agreement with the experimental XMCD signal only for the local structure with noncentrosymmetric Bb2b space group of Bi2Sr2CaCu2O8+y.
• ### Framework of Channel Estimation for Hybrid Analog-and-Digital Processing Enabled Massive MIMO Communications(1712.08846)

Dec. 23, 2017 cs.IT, math.IT
We investigate a general channel estimation problem in the massive multiple-input multiple-output (MIMO) system which employs the hybrid analog/digital precoding structure with limited radio-frequency (RF) chains. By properly designing RF combiners and performing multiple trainings, the proposed channel estimation can approach the performance of fully-digital estimations depending on the degree of channel spatial correlation and the number of RF chains. Dealing with the hybrid channel estimation, the optimal combiner is theoretically derived by relaxing the constant-magnitude constraint in a specific single-training scenario, which is then extended to the design of combiners for multiple trainings by Sequential and Alternating methods. Further, we develop a technique to generate the phase-only RF combiners based on the corresponding unconstrained ones to satisfy the constant-magnitude constraints. The performance of the proposed hybrid channel estimation scheme is examined by simulations under both nonparametric and spatial channel models. The simulation results demonstrate that the estimated CSI can approach the performance of fully-digital estimations in terms of both mean square error and spectral efficiency. Moreover, a practical spatial channel covariance estimation method is proposed and its effectiveness in hybrid channel estimation is verified by simulations.
• ### Association and Load Optimization with User Priorities in Load-Coupled Heterogeneous Networks(1710.06587)

Oct. 18, 2017 cs.IT, math.IT
In this paper, we consider the network utility maximization problem with various user priorities via jointly optimizing user association, load distribution and power control in a load-coupled heterogeneous network. In order to tackle the nonconvexity of the problem, we first analyze the problem by obtaining the optimal resource allocation strategy in closed form and characterizing the optimal base station load distribution pattern. Both observations are shown essential in simplifying the original problem and making it possible to transform the nonconvex load distribution and power control problem into convex reformulation via exponential variable transformation. An iterative algorithm with low complexity is accordingly presented to obtain a suboptimal solution to the joint optimization problem. Simulation results show that the proposed algorithm achieves better performance than conventional approaches.
• ### DeepTransport: Learning Spatial-Temporal Dependency for Traffic Condition Forecasting(1709.09585)

Oct. 28, 2019 cs.AI
Predicting traffic conditions has been recently explored as a way to relieve traffic congestion. Several pioneering approaches have been proposed based on traffic observations of the target location as well as its adjacent regions, but they obtain somewhat limited accuracy due to lack of mining road topology. To address the effect attenuation problem, we propose to take account of the traffic of surrounding locations(wider than adjacent range). We propose an end-to-end framework called DeepTransport, in which Convolutional Neural Networks (CNN) and Recurrent Neural Networks (RNN) are utilized to obtain spatial-temporal traffic information within a transport network topology. In addition, attention mechanism is introduced to align spatial and temporal information. Moreover, we constructed and released a real-world large traffic condition dataset with 5-minute resolution. Our experiments on this dataset demonstrate our method captures the complex relationship in temporal and spatial domain. It significantly outperforms traditional statistical methods and a state-of-the-art deep learning method.
• ### Dynamic Computational Time for Visual Attention(1703.10332)

Sept. 7, 2017 cs.CV
We propose a dynamic computational time model to accelerate the average processing time for recurrent visual attention (RAM). Rather than attention with a fixed number of steps for each input image, the model learns to decide when to stop on the fly. To achieve this, we add an additional continue/stop action per time step to RAM and use reinforcement learning to learn both the optimal attention policy and stopping policy. The modification is simple but could dramatically save the average computational time while keeping the same recognition performance as RAM. Experimental results on CUB-200-2011 and Stanford Cars dataset demonstrate the dynamic computational model can work effectively for fine-grained image recognition.The source code of this paper can be obtained from https://github.com/baidu-research/DT-RAM