Publications

A Two-Stage Optimization Framework for Electric Vehicle Fleet Day-ahead Charging Management
Arian Shah Kamrani
Nowadays electric vehicles (EVs) have become one of the important means of transportation all over the world. The importance of EV owners’… (see more) privacy as well as smart EV fleet charging has always been one of the challenges in smart charging planning and management. Furthermore, in smart charging, the distribution system operator must also coordinate with EV aggregators to insure that the power system is operated within security limits while reducing charging costs and satisfying EV users’ energy needs. In this paper, a semi-private framework for EV owners has been introduced which solves a two-stage optimization problem for the smart control of EV charging. This framework considers charging cost reduction and peak load shaving as well as satisfying power grid constraints. At the higher stage, based on optimal power flow calculations, the proposed control signals are transferred to the lower stage in order to facilitate optimal scheduling in accordance with the mentioned goals. The obtained results based on the proposed optimal method implemented on the IEEE 33-bus network show that compared to uncontrolled charging, the cost of charging and the peak of the network are reduced by 5.31% and 4.90%, respectively. Moreover, all the constraints of the power grid are satisfied.
A Systematic Literature Review of Fashion, Sustainability, and Consumption Using a Mixed Methods Approach
Osmud Rahman
Dingtao Hu
With the growing global awareness of the environmental impact of clothing consumption, there has been a notable surge in the publication of … (see more)journal articles dedicated to “fashion sustainability” in the past decade, specifically from 2010 to 2020. However, despite this wealth of research, many studies remain disconnected and fragmented due to varying research objectives, focuses, and approaches. Conducting a systematic literature review with a mixed methods research approach can help identify key research themes, trends, and developmental patterns, while also shedding light on the complexity of fashion, sustainability, and consumption. To enhance the literature review and analytical process, the current systematic literature review employed text mining techniques and bibliometric visualization tools, including RAKE, VOSviewer, and CitNetExplorer. The findings revealed an increase in the number of publications focusing on “fashion and sustainability” between 2010 and 2021. Most studies were predominantly conducted in the United States, with a specific focus on female consumers. Moreover, a greater emphasis was placed on non-sustainable cues rather than the sustainable cues. Additionally, a higher number of case studies was undertaken to investigate three fast-fashion companies. To enhance our knowledge and understanding of this subject, this article highlights several valuable contributions and provides recommendations for future research.
AI4GCC - Track 3: Consumption and the Challenges of Multi-Agent RL
Marco Jiralerspong
Teacher-Student Architecture for Knowledge Distillation: A Survey
Chengming Hu
Xuan Li
Danyang Liu
Haolun Wu
Xi Chen
Ju Wang
Although Deep neural networks (DNNs) have shown a strong capacity to solve large-scale problems in many areas, such DNNs are hard to be depl… (see more)oyed in real-world systems due to their voluminous parameters. To tackle this issue, Teacher-Student architectures were proposed, where simple student networks with a few parameters can achieve comparable performance to deep teacher networks with many parameters. Recently, Teacher-Student architectures have been effectively and widely embraced on various knowledge distillation (KD) objectives, including knowledge compression, knowledge expansion, knowledge adaptation, and knowledge enhancement. With the help of Teacher-Student architectures, current studies are able to achieve multiple distillation objectives through lightweight and generalized student networks. Different from existing KD surveys that primarily focus on knowledge compression, this survey first explores Teacher-Student architectures across multiple distillation objectives. This survey presents an introduction to various knowledge representations and their corresponding optimization objectives. Additionally, we provide a systematic overview of Teacher-Student architectures with representative learning algorithms and effective distillation schemes. This survey also summarizes recent applications of Teacher-Student architectures across multiple purposes, including classification, recognition, generation, ranking, and regression. Lastly, potential research directions in KD are investigated, focusing on architecture design, knowledge quality, and theoretical studies of regression-based learning, respectively. Through this comprehensive survey, industry practitioners and the academic community can gain valuable insights and guidelines for effectively designing, learning, and applying Teacher-Student architectures on various distillation objectives.
Bayesian modeling disentangles language versus executive control disruption in stroke
Gesa Hartwigsen
Jae‐Sung Lim
Hee-Joon Bae
Kyung‐Ho Yu
Hugo J. Kuijf
Nick A. Weaver
J. Matthijs Biesbroek
Jakub Kopal
Exploring Security Practices in Infrastructure as Code: An Empirical Study
Alexandre Verdet
Mohammad Hamdaqa
Léuson M. P. Da Silva
Cloud computing has become popular thanks to the widespread use of Infrastructure as Code (IaC) tools, allowing the community to convenientl… (see more)y manage and configure cloud infrastructure using scripts. However, the scripting process itself does not automatically prevent practitioners from introducing misconfigurations, vulnerabilities, or privacy risks. As a result, ensuring security relies on practitioners understanding and the adoption of explicit policies, guidelines, or best practices. In order to understand how practitioners deal with this problem, in this work, we perform an empirical study analyzing the adoption of IaC scripted security best practices. First, we select and categorize widely recognized Terraform security practices promulgated in the industry for popular cloud providers such as AWS, Azure, and Google Cloud. Next, we assess the adoption of these practices by each cloud provider, analyzing a sample of 812 open-source projects hosted on GitHub. For that, we scan each project configuration files, looking for policy implementation through static analysis (checkov). Additionally, we investigate GitHub measures that might be correlated with adopting these best practices. The category Access policy emerges as the most widely adopted in all providers, while Encryption in rest are the most neglected policies. Regarding GitHub measures correlated with best practice adoption, we observe a positive, strong correlation between a repository number of stars and adopting practices in its cloud infrastructure. Based on our findings, we provide guidelines for cloud practitioners to limit infrastructure vulnerability and discuss further aspects associated with policies that have yet to be extensively embraced within the industry.
Toward computing attributions for dimensionality reduction techniques
Matthew Scicluna
Jean-Christophe Grenier
Raphael Poujol
Multi-variable Hard Physical Constraints for Climate Model Downscaling
Jose Gonz'alez-Abad
'Alex Hern'andez-Garc'ia
Paula Harder
Jos'e Manuel Guti'errez
Are vividness judgments in mental imagery correlated with perceptual thresholds?
Clémence Bertrand Pilon
Hugo Delhaye
Vincent Taschereau-Dumouchel
Frédéric Gosselin
Class imbalance should not throw you off balance: Choosing the right classifiers and performance metrics for brain decoding with imbalanced data
Philipp Thölke
Yorguin-Jose Mantilla-Ramos
Hamza Abdelhedi
Charlotte Maschke
Arthur Dehgan
Yann Harel
Anirudha Kemtur
Loubna Mekki Berrada
Myriam Sahraoui
Tammy Young
Antoine Bellemare Pépin
Clara El Khantour
Mathieu Landry
Annalisa Pascarella
Vanessa Hadid
Etienne Combrisson
Jordan O’Byrne
Consultative engagement of stakeholders toward a roadmap for African language technologies
Kathleen Siminyu
Jade Abbott
Kọ́lá Túbọ̀sún
Aremu Anuoluwapo
Blessing Kudzaishe Sibanda
Kofi Yeboah
Masabata Mokgesi-Selinga
Frederick R. Apina
Angela Thandizwe Mthembu
Arshath Ramkilowan
Babatunde Oladimeji
A cop-winning strategy on strongly cop-win graphs
Jos'ee Desharnais
François Laviolette
Héli Marcoux
Norbert Polat