blogger met spouse in tech lobby 2022

| Total: 1000

#1 Forecasting the 2022-23 tech layoffs using epidemiological models [PDF] [Copy] [Kimi] [REL]

Author: Richard Vale

Many large and small companies in the tech and startup sector have been laying off an unusually high number of workers in 2022 and 2023. We are interested in predicting when this period of layoffs might end, without resorting to economic forecasts. We observe that a sample of layoffs up to March 31, 2023 follow the pattern of noisy observations from an SIR (Susceptible-Infectious-Removed) model. A model is fitted to the data using an analytical solution to the SIR model obtained by Kröger and Schlickeiser. From the fitted model we estimate that the number of weekly layoffs will return to normal levels around the end of 2023.

Subjects: Applications , Physics and Society

Publish: 2023-05-09 07:01:29 UTC


#2 Lobby index in networks [PDF] [Copy] [Kimi] [REL]

Authors: A. Korn, A. Schubert, A. Telcs

We propose a new node centrality measure in networks, the lobby index, which is inspired by Hirsch's h-index. It is shown that in scale free networks the l-index has power tail with exponent square of the exponent of the degree distribution one. Properties of the l-index and extensions are discussed.

Subject: Physics and Society

Publish: 2008-09-02 20:17:26 UTC


#3 300 GHz Wideband Channel Measurement and Analysis in a Lobby [PDF1] [Copy] [Kimi] [REL]

Authors: Yiqin Wang, Yuanbo Li, Yi Chen, Ziming Yu, Chong Han

The Terahertz (0.1-10 THz) band has been envisioned as one of the promising spectrum bands to support ultra-broadband sixth-generation (6G) and beyond communications. In this paper, a wideband channel measurement campaign in a 500- square-meter indoor lobby at 306-321 GHz is presented. The measurement system consists of a vector network analyzer (VNA)-based channel sounder, and a directional antenna equipped at the receiver to resolve multi-path components (MPCs) in the angular domain. In particular, 21 positions and 3780 channel impulse responses (CIRs) are measured in the lobby, including the line-of-sight (LoS), non-line-of-sight (NLoS) and obstructed-line-of-sight (OLoS) cases. The multi-path characteristics are summarized as follows. First, the main scatterers in the lobby include the glass, the pillar, and the LED screen. Second, best direction and omni-directional path losses are analyzed. Compared with the close-in path loss model, the optimal path loss offset in the alpha-beta path loss model exceeds 86 dB in the LoS case, and accordingly, the exponent decreases to 1.57 and below. Third, more than 10 clusters are observed in OLoS and NLoS cases, compared to 2.17 clusters on average in the LoS case. Fourth, the average power dispersion of MPCs is smaller in both temporal and angular domains in the LoS case, compared with the NLoS and OLoS counterparts. Finally, in contrast to hallway scenarios measured in previous works at the same frequency band, the lobby which is larger in dimension and square in shape, features larger path losses and smaller delay and angular spreads.

Subjects: Information Theory , Signal Processing

Publish: 2022-11-21 04:51:06 UTC


#4 A generic model for spouse's pensions with a view towards the calculation of liabilities [PDF] [Copy] [Kimi] [REL]

Author: Alexander Sokol

We introduce a generic model for spouse's pensions. The generic model allows for the modeling of various types of spouse's pensions with payments commencing at the death of the insured. We derive abstract formulas for cashflows and liabilities corresponding to common types of spouse's pensions. We show how the standard formulas from the Danish G82 concession can be obtained as a special case of our generic model. We also derive expressions for liabilities for spouse's pensions in models more advanced than found in the G82 concession. The generic nature of our model and results furthermore enable the calculation of cashflows and liabilities using simple estimates of marital behaviour among a population.

Subjects: Risk Management , Probability

Publish: 2015-03-06 18:58:42 UTC


#5 A structural study of Big Tech firm-switching of inventors in the post-recession era [PDF] [Copy] [Kimi] [REL]

Authors: Yidan Sun, Mayank Kejriwal

Complex systems research and network science have recently been used to provide novel insights into economic phenomena such as patenting behavior and innovation in firms. Several studies have found that increased mobility of inventors, manifested through firm switching or transitioning, is associated with increased overall productivity. This paper proposes a novel structural study of such transitioning inventors, and the role they play in patent co-authorship networks, in a cohort of highly innovative and economically influential companies such as the five Big Tech firms (Apple, Microsoft, Google, Amazon and Meta) in the post-recession period (2010-2022). We formulate and empirically investigate three research questions using Big Tech patent data. Our results show that transitioning inventors tend to have higher degree centrality than the average Big Tech inventor, and that their removal can lead to greater network fragmentation than would be expected by chance. The rate of transition over the 12-year period of study was found to be highest between 2015-2017, suggesting that the Big Tech innovation ecosystem underwent non-trivial shifts during this time. Finally, transition was associated with higher estimated impact of co-authored patents post-transition.

Subject: Social and Information Networks

Publish: 2023-07-16 01:57:19 UTC


#6 Lobby index as a network centrality measure [PDF] [Copy] [Kimi] [REL]

Authors: Monica G. Campiteli, Adriano J. Holanda, Leonardo D. H. Soares, Paulo R. C. Soles, Osame Kinouchi

We study the lobby index (l-index for short) as a local node centrality measure for complex networks. The l-inde is compared with degree (a local measure), betweenness and Eigenvector centralities (two global measures) in the case of biological network (Yeast interaction protein-protein network) and a linguistic network (Moby Thesaurus II). In both networks, the l-index has poor correlation with betweenness but correlates with degree and Eigenvector. Being a local measure, one can take advantage by using the l-index because it carries more information about its neighbors when compared with degree centrality, indeed it requires less time to compute when compared with Eigenvector centrality. Results suggests that l-index produces better results than degree and Eigenvector measures for ranking purposes, becoming suitable as a tool to perform this task.

Subjects: Social and Information Networks , Digital Libraries , Physics and Society

Publish: 2013-04-29 12:24:39 UTC


#7 Replacing discontinued Big Tech mobility reports: a penetration-based analysis [PDF] [Copy] [Kimi] [REL]

Author: Francesco Finazzi

People mobility data sets played a role during the COVID-19 pandemic in assessing the impact of lockdown measures and correlating mobility with pandemic trends. Two global data sets were Apple's Mobility Trends Reports and Google's Community Mobility Reports. The former is no longer available, while the latter will be discontinued in October 2022. Thus, new products will be required. To establish a lower bound on data set penetration guaranteeing high adherence between new products and the Big Tech products, an independent mobility data set based on 3.8 million smartphone trajectories is analysed to compare its information content with that of the Google data set. This lower bound is determined to be between 10^-4 and 10^-3 (1 trajectory every 10,000 and 1000 people, respectively) suggesting that relatively small data sets are suitable for replacing Big Tech reports.

Subject: Applications

Publish: 2022-10-18 09:47:27 UTC


#8 Towards Evidence-Based Tech Hiring Pipelines [PDF] [Copy] [Kimi] [REL]

Authors: Chris Brown, Swanand Vaishampayan

Software engineers are responsible for developing, maintaining, and innovating software. To hire software engineers, organizations employ a tech hiring pipeline. This process typically consists of a series of steps to evaluate the extent to which applicants meet job requirements and can effectively contribute to a development team -- such as resume screenings and technical interviews. However, research highlights substantial flaws with current tech hiring practices -- such as bias from stress-inducing assessments. As the landscape of software engineering (SE) is dramatically changing, assessing the technical proficiency and abilities of software engineers is an increasingly crucial task to meet technological needs and demands. In this paper, we outline challenges in current hiring practices and present future directions to promote fair and evidence-based evaluations in tech hiring pipelines. Our vision aims to enhance outcomes for candidates and assessments for employers to enhance the workforce in the tech industry.

Subject: Software Engineering

Publish: 2025-04-08 19:13:32 UTC


#9 The Contestation of Tech Ethics: A Sociotechnical Approach to Technology Ethics in Practice [PDF] [Copy] [Kimi] [REL]

Author: Ben Green

This article introduces the special issue "Technology Ethics in Action: Critical and Interdisciplinary Perspectives". In response to recent controversies about the harms of digital technology, discourses and practices of "tech ethics" have proliferated across the tech industry, academia, civil society, and government. Yet despite the seeming promise of ethics, tech ethics in practice suffers from several significant limitations: tech ethics is vague and toothless, has a myopic focus on individual engineers and technology design, and is subsumed into corporate logics and incentives. These limitations suggest that tech ethics enables corporate "ethics-washing": embracing the language of ethics to defuse criticism and resist government regulation, without committing to ethical behavior. Given these dynamics, I describe tech ethics as a terrain of contestation where the central debate is not whether ethics is desirable, but what "ethics" entails and who gets to define it. Current approaches to tech ethics are poised to enable technologists and technology companies to label themselves as "ethical" without substantively altering their practices. Thus, those striving for structural improvements in digital technologies must be mindful of the gap between ethics as a mode of normative inquiry and ethics as a practical endeavor. In order to better evaluate the opportunities and limits of tech ethics, I propose a sociotechnical approach that analyzes tech ethics in light of who defines it and what impacts it generates in practice.

Subjects: Computers and Society , Artificial Intelligence

Publish: 2021-06-03 12:16:08 UTC


#10 Text2Gender: A Deep Learning Architecture for Analysis of Blogger's Age and Gender [PDF] [Copy] [Kimi] [REL]

Authors: Vishesh Thakur, Aneesh Tickoo

Deep learning techniques have gained a lot of traction in the field of NLP research. The aim of this paper is to predict the age and gender of an individual by inspecting their written text. We propose a supervised BERT-based classification technique in order to predict the age and gender of bloggers. The dataset used contains 681284 rows of data, with the information of the blogger's age, gender, and text of the blog written by them. We compare our algorithm to previous works in the same domain and achieve a better accuracy and F1 score. The accuracy reported for the prediction of age group was 84.2%, while the accuracy for the prediction of gender was 86.32%. This study relies on the raw capabilities of BERT to predict the classes of textual data efficiently. This paper shows promising capability in predicting the demographics of the author with high accuracy and can have wide applicability across multiple domains.

Subjects: Computation and Language , Artificial Intelligence

Publish: 2023-05-15 13:26:50 UTC


#11 Beyond Transactional Democracy: A Study of Civic Tech in Canada [PDF] [Copy] [Kimi] [REL]

Authors: Curtis W McCord, Christoph Becker

Technologies are increasingly enrolled in projects to involve civilians in the work of policy-making, often under the label of 'civic technology'. But conventional forms of participation through transactions such as voting provide limited opportunities for engagement. In response, some civic tech groups organize around issues of shared concern to explore new forms of democratic technologies. How does their work affect the relationship between publics and public servants? This paper explores how a Civic Tech Toronto creates a platform for civic engagement through the maintenance of an autonomous community for civic engagement and participation that is casual, social, nonpartisan, experimental, and flexible. Based on two years of action research, including community organizing, interviews, and observations, this paper shows how this grassroots civic tech group creates a civic platform that places a diverse range of participants in contact with the work of public servants, helping to build capacities and relationships that prepare both publics and public servants for the work of participatory democracy. The case shows that understanding civic tech requires a lens beyond the mere analysis or production of technical artifacts. As a practice for making technologies that is social and participatory, civic tech creates alternative modes of technology development and opportunities for experimentation and learning, and it can reconfigure the roles of democratic participants.

Subjects: Computers and Society , Human-Computer Interaction

Publish: 2023-02-13 19:31:13 UTC


#12 Exploring Multi-Dimensional Events Characterizing Tech Start-Up Emergence in the Nigerian Entrepreneurial Ecosystem [PDF] [Copy] [Kimi] [REL]

Authors: Emanuel Okoro Ajah, Chidi Ononiwu

Most countries across the globe identify technology-based start-ups as a driving force for job creation, economic growth and national development, and a critical tool for economic sustenance during pandemic crises like covid-19. However, its emergence are been argued to be problematic. Especially in a developing economy like Nigeria, where tech start-up founders are faced with diverse form of constraints and environmental uncertainties. Extant literature indicated that studies are been conducted to explain tech start-up emergence. However, such studies are fragmented with findings that are determinants to tech start-up emergence, with several determinants studied in isolation, and the emergence as linear and unidimensional events. Consequently, neglecting multi-dimensional perspective, which aggregate the dimensions of events characterizing tech start-up emergence. Given the iterative, event-based process, and interactive-dependent nature of tech start-up ventures to create activity-based products/services in an open, uncertain, nonlinear and dynamic environment, we argue that little are been known about tech start-up emergence. Thus, by drawing from synthesize literature review, activity theory, and exploratory case study design we identify opportunity discovery and selection; team formation and domain consensus; bootstrapping; minimum viable product development and market experimentation feedback as interdependent multi-dimensional events constituting tech start-up emergence in Nigerian tech start-up ecosystem.

Subject: Computers and Society

Publish: 2021-08-22 14:40:31 UTC


#13 Deep Technology Tracing for High-tech Companies [PDF] [Copy] [Kimi] [REL]

Authors: Han Wu, Kun Zhang, Guangyi Lv, Qi Liu, Runlong Yu, Weihao Zhao, Enhong Chen, Jianhui Ma

Technological change and innovation are vitally important, especially for high-tech companies. However, factors influencing their future research and development (R&D) trends are both complicated and various, leading it a quite difficult task to make technology tracing for high-tech companies. To this end, in this paper, we develop a novel data-driven solution, i.e., Deep Technology Forecasting (DTF) framework, to automatically find the most possible technology directions customized to each high-tech company. Specially, DTF consists of three components: Potential Competitor Recognition (PCR), Collaborative Technology Recognition (CTR), and Deep Technology Tracing (DTT) neural network. For one thing, PCR and CTR aim to capture competitive relations among enterprises and collaborative relations among technologies, respectively. For another, DTT is designed for modeling dynamic interactions between companies and technologies with the above relations involved. Finally, we evaluate our DTF framework on real-world patent data, and the experimental results clearly prove that DTF can precisely help to prospect future technology emphasis of companies by exploiting hybrid factors.

Subjects: Machine Learning , Machine Learning

Publish: 2020-01-02 07:44:12 UTC


#14 Management of high-tech companies in conditions of import substitution [PDF] [Copy] [Kimi] [REL]

Authors: S. E. Pyatovsky, N. S. Efimova, E. V. Surkova

The article analyzes the development of high-tech sectors of the Russian economy in the context of import substitution. Features of managing priority project portfolios are considered. Issues of creating a unified information space for aviation industry enterprises are studied in the context of introduction of a modified OLAP technology of management decision support. Investment attractiveness of high-tech sectors of the Russian economy is estimated based on the coefficient of gross value added of project products. Investment-overheated industries are identified, and recommendations on market correction and returning project assets to a balanced state are given.

Subject: Computers and Society

Publish: 2024-10-04 17:11:22 UTC


#15 Tech-ASan: Two-stage check for Address Sanitizer [PDF] [Copy] [Kimi] [REL]

Authors: Yixuan Cao, Yuhong Feng, Huafeng Li, Chongyi Huang, Fangcao Jian, Haoran Li, Xu Wang

Address Sanitizer (ASan) is a sharp weapon for detecting memory safety violations, including temporal and spatial errors hidden in C/C++ programs during execution. However, ASan incurs significant runtime overhead, which limits its efficiency in testing large software. The overhead mainly comes from sanitizer checks due to the frequent and expensive shadow memory access. Over the past decade, many methods have been developed to speed up ASan by eliminating and accelerating sanitizer checks, however, they either fail to adequately eliminate redundant checks or compromise detection capabilities. To address this issue, this paper presents Tech-ASan, a two-stage check based technique to accelerate ASan with safety assurance. First, we propose a novel two-stage check algorithm for ASan, which leverages magic value comparison to reduce most of the costly shadow memory accesses. Second, we design an efficient optimizer to eliminate redundant checks, which integrates a novel algorithm for removing checks in loops. Third, we implement Tech-ASan as a memory safety tool based on the LLVM compiler infrastructure. Our evaluation using the SPEC CPU2006 benchmark shows that Tech-ASan outperforms the state-of-the-art methods with 33.70% and 17.89% less runtime overhead than ASan and ASan--, respectively. Moreover, Tech-ASan detects 56 fewer false negative cases than ASan and ASan-- when testing on the Juliet Test Suite under the same redzone setting.

Subjects: Software Engineering , Cryptography and Security

Publish: 2025-06-05 13:32:48 UTC


#16 $100,000 or the Robot Gets it! Tech Workers' Resistance Guide: Tech Worker Actions, History, Risks, Impacts, and the Case for a Radical Flank [PDF] [Copy] [Kimi] [REL]

Author: Mohamed Abdalla

Over the past decade, Big Tech has faced increasing levels of worker activism. While worker actions have resulted in positive outcomes (e.g., cancellation of Google's Project Dragonfly), such successes have become increasingly infrequent. This is, in part, because corporations have adjusted their strategies to dealing with increased worker activism (e.g., increased retaliation against workers, and contracts clauses that prevent cancellation due to worker pressure). This change in company strategy prompts urgent questions about updating worker strategies for influencing corporate behavior in an industry with vast societal impact. Current discourse on tech worker activism often lacks empirical grounding regarding its scope, history, and strategic calculus. Our work seeks to bridge this gap by firstly conducting a systematic analysis of worker actions at Google and Microsoft reported in U.S. newspapers to delineate their characteristics. We then situate these actions within the long history of labour movements and demonstrate that, despite perceptions of radicalism, contemporary tech activism is comparatively moderate. Finally, we engage directly with current and former tech activists to provide a novel catalogue of potential worker actions, evaluating their perceived risks, impacts, and effectiveness (concurrently publishing "Tech Workers' Guide to Resistance"). Our findings highlight considerable variation in strategic thinking among activists themselves. We conclude by arguing that the establishment of a radical flank could increase the effectiveness of current movements. "Tech Workers' Guide to Resistance" can be found at https://www.cs.toronto.edu/~msa/TechWorkersResistanceGuide.pdf or https://doi.org/10.5281/zenodo.16779082

Subject: Computers and Society

Publish: 2025-08-11 15:29:34 UTC


#17 TeCH: Text-guided Reconstruction of Lifelike Clothed Humans [PDF] [Copy] [Kimi] [REL]

Authors: Yangyi Huang, Hongwei Yi, Yuliang Xiu, Tingting Liao, Jiaxiang Tang, Deng Cai, Justus Thies

Despite recent research advancements in reconstructing clothed humans from a single image, accurately restoring the "unseen regions" with high-level details remains an unsolved challenge that lacks attention. Existing methods often generate overly smooth back-side surfaces with a blurry texture. But how to effectively capture all visual attributes of an individual from a single image, which are sufficient to reconstruct unseen areas (e.g., the back view)? Motivated by the power of foundation models, TeCH reconstructs the 3D human by leveraging 1) descriptive text prompts (e.g., garments, colors, hairstyles) which are automatically generated via a garment parsing model and Visual Question Answering (VQA), 2) a personalized fine-tuned Text-to-Image diffusion model (T2I) which learns the "indescribable" appearance. To represent high-resolution 3D clothed humans at an affordable cost, we propose a hybrid 3D representation based on DMTet, which consists of an explicit body shape grid and an implicit distance field. Guided by the descriptive prompts + personalized T2I diffusion model, the geometry and texture of the 3D humans are optimized through multi-view Score Distillation Sampling (SDS) and reconstruction losses based on the original observation. TeCH produces high-fidelity 3D clothed humans with consistent & delicate texture, and detailed full-body geometry. Quantitative and qualitative experiments demonstrate that TeCH outperforms the state-of-the-art methods in terms of reconstruction accuracy and rendering quality. The code will be publicly available for research purposes at https://huangyangyi.github.io/TeCH

Subjects: Computer Vision and Pattern Recognition , Artificial Intelligence , Graphics

Publish: 2023-08-16 17:59:13 UTC


#18 NeckCare: Preventing Tech Neck using Hearable-based Multimodal Sensing [PDF1] [Copy] [Kimi] [REL]

Authors: Bhawana Chhaglani, Alan Seefeldt

Tech neck is a modern epidemic caused by prolonged device usage and it can lead to significant neck strain and discomfort. This paper addresses the challenge of detecting and preventing tech neck syndrome using non-invasive ubiquitous sensing techniques. We present NeckCare, a novel system leveraging hearable sensors, including IMUs and microphones, to monitor tech neck postures and estimate distance form screen in real-time. By analyzing pitch, displacement, and acoustic ranging data from 15 participants, we achieve posture classification accuracy of 96% using IMU data alone and 99% when combined with audio data. Our distance estimation technique is millimeter-level accurate even in noisy conditions. NeckCare provides immediate feedback to users, promoting healthier posture and reducing neck strain. Future work will explore personalizing alerts, predicting muscle strain, integrating neck exercise detection and enhancing digital eye strain prediction.

Subjects: Human-Computer Interaction , Sound , Audio and Speech Processing

Publish: 2024-12-18 08:00:43 UTC


#19 The Future of Tech Labor: How Workers are Organizing and Transforming the Computing Industry [PDF] [Copy] [Kimi] [REL]

Authors: Cella M. Sum, Anna Konvicka, Mona Wang, Sarah E. Fox

The tech industry's shifting landscape and the growing precarity of its labor force have spurred unionization efforts among tech workers. These workers turn to collective action to improve their working conditions and to protest unethical practices within their workplaces. To better understand this movement, we interviewed 44 U.S.-based tech worker-organizers to examine their motivations, strategies, challenges, and future visions for labor organizing. These workers included engineers, product managers, customer support specialists, QA analysts, logistics workers, gig workers, and union staff organizers. Our findings reveal that, contrary to popular narratives of prestige and privilege within the tech industry, tech workers face fragmented and unstable work environments which contribute to their disempowerment and hinder their organizing efforts. Despite these difficulties, organizers are laying the groundwork for a more resilient tech worker movement through community building and expanding political consciousness. By situating these dynamics within broader structural and ideological forces, we identify ways for the CSCW community to build solidarity with tech workers who are materially transforming our field through their organizing efforts.

Subject: Human-Computer Interaction

Publish: 2025-08-18 02:30:26 UTC


#20 Women Want to Learn Tech: Lessons from the Czechitas Education Project [PDF] [Copy] [Kimi] [REL]

Authors: Barbora Buhnova, Dita Prikrylova

While it is understood by women that tech fluency might act as a powerful career accelerator or even a new career direction towards software engineering, this awakening often comes after graduation from a different field, when it is difficult for the women to make the shift towards tech and computing. In this paper, we report on our experience with running a successful education non-profit called Czechitas, which shows that women in their 20s and 30s are (maybe surprisingly) highly interested in learning tech, they just need a helping hand and tailored assistance, encouragement and guidance.

Subject: Computers and Society

Publish: 2019-05-14 11:02:55 UTC


#21 Predicting Behavior in Cancer-Afflicted Patient and Spouse Interactions using Speech and Language [PDF] [Copy] [Kimi] [REL]

Authors: Sandeep Nallan Chakravarthula, Haoqi Li, Shao-Yen Tseng, Maija Reblin, Panayiotis Georgiou

Cancer impacts the quality of life of those diagnosed as well as their spouse caregivers, in addition to potentially influencing their day-to-day behaviors. There is evidence that effective communication between spouses can improve well-being related to cancer but it is difficult to efficiently evaluate the quality of daily life interactions using manual annotation frameworks. Automated recognition of behaviors based on the interaction cues of speakers can help analyze interactions in such couples and identify behaviors which are beneficial for effective communication. In this paper, we present and detail a dataset of dyadic interactions in 85 real-life cancer-afflicted couples and a set of observational behavior codes pertaining to interpersonal communication attributes. We describe and employ neural network-based systems for classifying these behaviors based on turn-level acoustic and lexical speech patterns. Furthermore, we investigate the effect of controlling for factors such as gender, patient/caregiver role and conversation content on behavior classification. Analysis of our preliminary results indicates the challenges in this task due to the nature of the targeted behaviors and suggests that techniques incorporating contextual processing might be better suited to tackle this problem.

Subject: Computation and Language

Publish: 2019-08-02 15:30:06 UTC


#22 Contingent Penalty and Contingent Renewal Supply Contracts in High-Tech Industry [PDF] [Copy] [Kimi] [REL]

Authors: Mirjam S Meijer, Willem van Jaarsveld, Ton de Kok, Christopher S Tang

Unlike consumer goods industry, a high-tech manufacturer (OEM) often amortizes new product development costs over multiple generations, where demand for each generation is based on advance orders and additional uncertain demand. Also, due to economic reasons and regulations, high-tech OEMs usually source from a single supplier. Relative to the high retail price, the wholesale price for a supplier to produce high-tech components is low. Consequently, incentives are misaligned: the OEM faces relatively high under-stock costs and the supplier faces high over-stock costs. In this paper, we examine supply contracts that are intended to align the incentives between a high-tech OEM and a supplier so that the supplier will invest adequate and yet non-verifiable capacity to meet the OEM's uncertain demand. When focusing on a single generation, the manufacturer can coordinate a decentralized supply chain and extract all surplus by augmenting a traditional wholesale price contract with a "contingent penalty" should the supplier fail to fulfill the OEM's demand. When the resulting penalty is too high to be enforceable, we consider a new class of "contingent renewal" wholesale price contracts with a stipulation: the OEM will renew the contract with the incumbent supplier for the next generation only when the supplier can fulfill the demand for the current generation. By using non-renewal as an implicit penalty, we show that the contingent renewal contract can coordinate the supply chain. While the OEM can capture the bulk of the supply chain profit, this innovative contract cannot enable the OEM to extract the entire surplus.

Subject: Optimization and Control

Publish: 2021-05-19 08:22:04 UTC


#23 MET: Masked Encoding for Tabular Data [PDF] [Copy] [Kimi1] [REL]

Authors: Kushal Majmundar, Sachin Goyal, Praneeth Netrapalli, Prateek Jain

We consider the task of self-supervised representation learning (SSL) for tabular data: tabular-SSL. Typical contrastive learning based SSL methods require instance-wise data augmentations which are difficult to design for unstructured tabular data. Existing tabular-SSL methods design such augmentations in a relatively ad-hoc fashion and can fail to capture the underlying data manifold. Instead of augmentations based approaches for tabular-SSL, we propose a new reconstruction based method, called Masked Encoding for Tabular Data (MET), that does not require augmentations. MET is based on the popular MAE approach for vision-SSL [He et al., 2021] and uses two key ideas: (i) since each coordinate in a tabular dataset has a distinct meaning, we need to use separate representations for all coordinates, and (ii) using an adversarial reconstruction loss in addition to the standard one. Empirical results on five diverse tabular datasets show that MET achieves a new state of the art (SOTA) on all of these datasets and improves up to 9% over current SOTA methods. We shed more light on the working of MET via experiments on carefully designed simple datasets.

Subjects: Machine Learning , Machine Learning

Publish: 2022-06-17 05:51:10 UTC


#24 Analysis of peeling decoder for MET ensembles [PDF] [Copy] [Kimi] [REL]

Authors: University of Virginia and L-3 Communications CSW Ryan Hinton, University of Virginia Stephen G. Wilson

The peeling decoder introduced by Luby, et al. allows analysis of LDPC decoding for the binary erasure channel (BEC). For irregular ensembles, they analyze the decoder state as a Markov process and present a solution to the differential equations describing the process mean. Multi-edge type (MET) ensembles allow greater precision through specifying graph connectivity. We generalize the the peeling decoder for MET ensembles and derive analogous differential equations. We offer a new change of variables and solution to the node fraction evolutions in the general (MET) case. This result is preparatory to investigating finite-length ensemble behavior.

Subject: Information Theory

Publish: 2009-11-09 18:38:53 UTC


#25 TRUST-TECH based Methods for Optimization and Learning [PDF] [Copy] [Kimi] [REL]

Author: Chandan K. Reddy

Many problems that arise in machine learning domain deal with nonlinearity and quite often demand users to obtain global optimal solutions rather than local optimal ones. Optimization problems are inherent in machine learning algorithms and hence many methods in machine learning were inherited from the optimization literature. Popularly known as the initialization problem, the ideal set of parameters required will significantly depend on the given initialization values. The recently developed TRUST-TECH (TRansformation Under STability-reTaining Equilibria CHaracterization) methodology systematically explores the subspace of the parameters to obtain a complete set of local optimal solutions. In this thesis work, we propose TRUST-TECH based methods for solving several optimization and machine learning problems. Two stages namely, the local stage and the neighborhood-search stage, are repeated alternatively in the solution space to achieve improvements in the quality of the solutions. Our methods were tested on both synthetic and real datasets and the advantages of using this novel framework are clearly manifested. This framework not only reduces the sensitivity to initialization, but also allows the flexibility for the practitioners to use various global and local methods that work well for a particular problem of interest. Other hierarchical stochastic algorithms like evolutionary algorithms and smoothing algorithms are also studied and frameworks for combining these methods with TRUST-TECH have been proposed and evaluated on several test systems.

Subjects: Artificial Intelligence , Computational Engineering, Finance, and Science , Mathematical Software , Numerical Analysis , Neural and Evolutionary Computing

Publish: 2007-12-25 03:14:32 UTC