11-13-2018
|
Garbage In, Reward Out: Bootstrapping Exploration in
Multi-Armed Bandits
by
Branislav Kveton
et al
|
11-13-2018
|
Recurrent Multi-Graph Neural Networks for Travel Cost
Prediction
by
Jilin Hu
et al
|
11-14-2018
|
Human-like machine learning: limitations and
suggestions
by
Georgios Mastorakis
|
11-14-2018
|
Machine Learning for Combinatorial Optimization: a
Methodological Tour dHorizon
by
Yoshua Bengio
et al
|
11-14-2018
|
Drop-Activation: Implicit Parameter Reduction and
Harmonic Regularization
by
Senwei Liang
et al
|
11-14-2018
|
Composing Modeling and Inference Operations with
Probabilistic Program Combinators
by
Eli Sennesh
et al
|
11-13-2018
|
Sorting out Lipschitz function approximation
by
Cem Anil
et al
|
11-13-2018
|
Co-Representation Learning For Classification and Novel
Class Detection via Deep Networks
by
Zhuoyi Wang
et al
|
11-15-2018
|
A Spectral View of Adversarially Robust Features
by
Shivam Garg
et al
|
11-15-2018
|
Unconstrained Submodular Maximization with Constant
Adaptive Complexity
by
Lin Chen
et al
|
11-13-2018
|
Neural Wavetable: a playable wavetable synthesizer
using neural networks
by
Lamtharn Hantrakul
et al
|
11-14-2018
|
Pure-Exploration for Infinite-Armed Bandits with
General Arm Reservoirs
by
Maryam Aziz
et al
|
11-14-2018
|
Real-time Power System State Estimation and Forecasting
via Deep Neural Networks
by
Liang Zhang
et al
|
11-14-2018
|
Concept Learning through Deep Reinforcement Learning
with Memory-Augmented Neural Networks
by
Jing Shi
et al
|
11-14-2018
|
Unsupervised learning with contrastive latent variable
models
by
Kristen Severson
et al
|
11-14-2018
|
Jointly Learning to Label Sentences and Tokens
by
Marek Rei
et al
|
11-14-2018
|
Revisiting Projection-Free Optimization for Strongly
Convex Constraint Sets
by
Jarrid Rector-Brooks
et al
|
11-13-2018
|
Extractive Summary as Discrete Latent Variables
by
Aran Komatsuzaki
|
11-15-2018
|
Adversarial Examples from Cryptographic Pseudo-Random
Generators
by
Sébastien Bubeck
et al
|
11-13-2018
|
SepNE: Bringing Separability to Network Embedding
by
Ziyao Li
et al
|
11-14-2018
|
Learning Optimal Personalized Treatment Rules Using
Robust Regression Informed K-NN
by
Ruidi Chen
et al
|
11-14-2018
|
Constraint-based Sequential Pattern Mining with
Decision Diagrams
by
Amin Hosseininasab
et al
|
11-16-2018
|
On the Complexity of Exploration in Goal-Driven
Navigation
by
Maruan Al-Shedivat
et al
|
11-16-2018
|
A generalized meta-loss function for distillation and
learning using privileged information for
classification and regression
by
Amina Asif
et al
|
11-15-2018
|
Context-Dependent Upper-Confidence Bounds for Directed
Exploration
by
Raksha Kumaraswamy
et al
|
11-14-2018
|
A Learning-Based Framework for Line-Spectra
Super-resolution
by
Gautier Izacard
et al
|
11-16-2018
|
An Algorithmic Perspective on Imitation Learning
by
Takayuki Osa
et al
|
11-13-2018
|
Co-regularized Alignment for Unsupervised Domain
Adaptation
by
Abhishek Kumar
et al
|
11-14-2018
|
Probabilistic Random Forest: A machine learning
algorithm for noisy datasets
by
Itamar Reis
et al
|
11-13-2018
|
Anomaly Detection using Autoencoders in High
Performance Computing Systems
by
Andrea Borghesi
et al
|
11-13-2018
|
A conjugate prior for the Dirichlet distribution
by
Jean-Marc Andreoli
|
11-15-2018
|
Neural Predictive Belief Representations
by
Zhaohan Daniel Guo
et al
|
11-14-2018
|
Predicting the time-evolution of multi-physics systems
with sequence-to-sequence models
by
K. D. Humbird
et al
|
11-13-2018
|
Semi-dual Regularized Optimal Transport
by
Marco Cuturi
et al
|
11-13-2018
|
Deep Q learning for fooling neural networks
by
Mandar Kulkarni
|
11-16-2018
|
Entropy-regularized Optimal Transport Generative Models
by
Dong Liu
et al
|
11-13-2018
|
SAFE: Self-Attentive Function Embeddings for Binary
Similarity
by
Luca Massarelli
et al
|
11-13-2018
|
An Orchestrated Empirical Study on Deep Learning
Frameworks and Platforms
by
Qianyu Guo
et al
|
11-13-2018
|
A New SVDD-Based Multivariate Non-parametric Process
Capability Index
by
Deovrat Kakde
et al
|
11-15-2018
|
Short-Term Wind-Speed Forecasting Using Kernel Spectral
Hidden Markov Models
by
Shunsuke Tsuzuki
et al
|
11-14-2018
|
Leveraging Financial News for Stock Trend Prediction
with Attention-Based Recurrent Neural Network
by
Huicheng Liu
|
11-15-2018
|
Theoretical Perspective of Deep Domain Adaptation
by
Trung Le
et al
|
11-14-2018
|
Pitfalls of Graph Neural Network Evaluation
by
Oleksandr Shchur
et al
|
11-14-2018
|
Large-scale Interactive Recommendation with
Tree-structured Policy Gradient
by
Haokun Chen
et al
|
11-13-2018
|
Evaluating GANs via Duality
by
Paulina Grnarova
et al
|
11-16-2018
|
A Novel Approach to Sparse Inverse Covariance
Estimation Using Transform Domain Updates and
Exponentially Adaptive Thresholding
by
Ashkan Esmaeili
et al
|
11-13-2018
|
Towards Neural Machine Translation for African
Languages
by
Jade Z. Abbott
et al
|
11-13-2018
|
Few-shot Learning for Named Entity Recognition in
Medical Text
by
Maximilian Hofer
et al
|
11-13-2018
|
Modular Networks: Learning to Decompose Neural
Computation
by
Louis Kirsch
et al
|
11-13-2018
|
An Online Attention-based Model for Speech Recognition
by
Ruchao Fan
et al
|
11-13-2018
|
A Multi-layer LSTM-based Approach for Robot Command
Interaction Modeling
by
Martino Mensio
et al
|
11-14-2018
|
Dropping Symmetry for Fast Symmetric Nonnegative Matrix
Factorization
by
Zhihui Zhu
et al
|
11-15-2018
|
Tight Bayesian Ambiguity Sets for Robust MDPs
by
Reazul Hasan Russel
et al
|
11-15-2018
|
Spatio-temporal Stacked LSTM for Temperature Prediction
in Weather Forecasting
by
Zahra Karevan
et al
|
11-15-2018
|
Physical Signal Classification Via Deep Neural Networks
by
Benjamin Epstein
et al
|
11-15-2018
|
The Trace Criterion for Kernel Bandwidth Selection for
Support Vector Data Description
by
Arin Chaudhuri
et al
|
11-16-2018
|
nn-dependability-kit: Engineering Neural Networks for
Safety-Critical Systems
by
Chih-Hong Cheng
et al
|
11-13-2018
|
ML-Net: multi-label classification of biomedical texts
with deep neural networks
by
Jingcheng Du
et al
|
11-16-2018
|
Subtask Gated Networks for Non-Intrusive Load
Monitoring
by
Changho Shin
et al
|
11-14-2018
|
Sample complexity of partition identification using
multi-armed bandits
by
Sandeep Juneja
et al
|