03-14-2019
|
To Tune or Not to Tune? Adapting Pretrained
Representations to Diverse Tasks
by
Matthew Peters
et al
|
Text & Prediction
|
235
|
1
|
03-14-2019
|
Can Robot Attract Passersby without Causing Discomfort
by User-Centered Reinforcement Learning?
by
Yasunori Ozaki
et al
|
Robot & Human
|
84
|
0
|
03-15-2019
|
SceneCode: Monocular Dense Semantic Reconstruction
using Learned Encoded Scene Representation
by
Shuaifeng Zhi
et al
|
Parallel & Optimization Problems
|
39
|
0
|
03-12-2019
|
On the Pitfalls of Measuring Emergent Communication
by
Ryan Lowe
et al
|
Games & Multi-agent
|
28
|
0
|
03-13-2019
|
VRKitchen: an Interactive 3D Virtual Environment for
Task-oriented Learning
by
Xiaofeng Gao
et al
|
Virtual Reality & Haptic
|
27
|
0
|
03-13-2019
|
Aesthetics of Neural Network Art
by
Aaron Hertzmann
|
Image & Generative Adversarial
|
26
|
0
|
03-14-2019
|
MirrorGAN: Learning Text-to-image Generation by
Redescription
by
Tingting Qiao
et al
|
Image & Generative Adversarial
|
25
|
0
|
03-13-2019
|
Benchmarking Natural Language Understanding Services
for building Conversational Agents
by
Xingkun Liu
et al
|
Text & Prediction
|
22
|
0
|
03-12-2019
|
Universally Slimmable Networks and Improved Training
Techniques
by
Jiahui Yu
et al
|
Speech & Neural Networks
|
21
|
0
|
03-12-2019
|
BenchPress: Analyzing Android App Vulnerability
Benchmark Suites
by
Joydeep Mitra
et al
|
User & Recommendation
|
21
|
0
|
03-14-2019
|
Inferring Personalized Bayesian Embeddings for Learning
from Heterogeneous Demonstration
by
Rohan Paleja
et al
|
Robot & Human
|
19
|
0
|
03-14-2019
|
SimpleDet: A Simple and Versatile Distributed Framework
for Object Detection and Instance Recognition
by
Yuntao Chen
et al
|
Object Detection & Grasp
|
17
|
0
|
03-13-2019
|
Dual Residual Network for Accurate Human Activity
Recognition
by
Jun Long
et al
|
Speech & Neural Networks
|
16
|
0
|
03-14-2019
|
Generative adversarial network-based glottal waveform
model for statistical parametric speech synthesis
by
Bajibabu Bollepalli
et al
|
Image & Generative Adversarial
|
16
|
0
|
03-13-2019
|
Adversarial attacks against Fact Extraction and
VERification
by
James Thorne
et al
|
Image & Generative Adversarial
|
16
|
0
|
03-13-2019
|
Basic Performance Measurements of the Intel Optane DC
Persistent Memory Module
by
Joseph Izraelevitz
et al
|
Distributed & Chip Memory
|
16
|
0
|
03-14-2019
|
A Deep Patent Landscaping Model using Transformer and
Graph Convolutional Network
by
Seokkyu Choi
et al
|
User & Recommendation
|
16
|
0
|
03-13-2019
|
Hardness-Aware Deep Metric Learning
by
Wenzhao Zheng
et al
|
Energy & Mining
|
13
|
0
|
03-12-2019
|
Unsupervised Discovery of Parts, Structure, and
Dynamics
by
Zhenjia Xu
et al
|
Object Detection & Grasp
|
12
|
0
|
03-12-2019
|
Few-Shot and Zero-Shot Learning for Historical Text
Normalization
by
Marcel Bollmann
et al
|
Speech & Neural Networks
|
12
|
0
|
03-12-2019
|
Interaction Embeddings for Prediction and Explanation
in Knowledge Graphs
by
Wen Zhang
et al
|
Graph & Log
|
12
|
0
|
03-12-2019
|
Richness of Deep Echo State Network Dynamics
by
Claudio Gallicchio
et al
|
Text & Prediction
|
12
|
0
|
03-12-2019
|
SemEval-2019 Task 6: Offensive Language Analysis using
Deep Learning Architecture
by
Ryan Ong
|
Text & Prediction
|
12
|
0
|
03-14-2019
|
Interactive Concept Mining on Personal Data --
Bootstrapping Semantic Services
by
Markus Schröder
et al
|
Other
|
11
|
0
|
03-14-2019
|
High-Throughput CNN Inference on Embedded ARM
big.LITTLE Multi-Core Processors
by
Siqi Wang
et al
|
Speech & Neural Networks
|
11
|
0
|
03-13-2019
|
SciLens: Evaluating the Quality of Scientific News
Articles Using Social Media and Scientific Literature
Indicators
by
Panayiotis Smeros
et al
|
Social Media & Eye
|
11
|
0
|
03-13-2019
|
Uncertainty Aware Learning from Demonstrations in
Multiple Contexts using Bayesian Neural Networks
by
Sanjay Thakur
et al
|
Speech & Neural Networks
|
10
|
0
|
03-12-2019
|
A Visually Plausible Grasping System for Object
Manipulation and Interaction in Virtual Reality
Environments
by
Sergiu Oprea
et al
|
Virtual Reality & Haptic
|
10
|
0
|
03-13-2019
|
Inferring 3D Shapes of Unknown Rigid Objects in Clutter
through Inverse Physics Reasoning
by
Changkyu Song
et al
|
Object Detection & Grasp
|
10
|
0
|
03-12-2019
|
Deep Multi-Agent Reinforcement Learning with
Discrete-Continuous Hybrid Action Spaces
by
Haotian Fu
et al
|
Games & Multi-agent
|
10
|
0
|
03-14-2019
|
Detection and Tracking of Small Objects in Sparse 3D
Laser Range Data
by
Jan Razlaw
et al
|
Object Detection & Grasp
|
9
|
0
|
03-13-2019
|
Simulating Emergent Properties of Human Driving
Behavior Using Multi-Agent Reward Augmented Imitation
Learning
by
Raunak P. Bhattacharyya
et al
|
Games & Multi-agent
|
9
|
0
|
03-14-2019
|
The Physics of Diagrams: Revealing the scientific basis
of graphical representation design
by
Sarah Pissierssens
et al
|
Energy & Mining
|
9
|
0
|
03-15-2019
|
MFAS: Multimodal Fusion Architecture Search
by
Juan-Manuel Pérez-Rúa
et al
|
Architecture Search & Tree
|
8
|
0
|
03-13-2019
|
Personal Dynamic Cost-Aware Sensing for Latent Context
Detection
by
Saar Tal
et al
|
Other
|
8
|
0
|
03-13-2019
|
MMKG: Multi-Modal Knowledge Graphs
by
Ye Liu
et al
|
Graph & Log
|
8
|
0
|
03-13-2019
|
Efficient Search-Based Weighted Model Integration
by
Zhe Zeng
et al
|
Architecture Search & Tree
|
7
|
0
|
03-14-2019
|
What Makes Research Software Sustainable? An Interview
Study With Research Software Engineers
by
Mario Rosado de Souza
et al
|
Software & Students
|
7
|
0
|
03-12-2019
|
Cascaded Projection: End-to-End Network Compression and
Acceleration
by
Breton Minnehan
et al
|
Image & Generative Adversarial
|
7
|
0
|
03-14-2019
|
gym-gazebo2, a toolkit for reinforcement learning using
ROS 2 and Gazebo
by
Nestor Gonzalez Lopez
et al
|
Deep Reinforcement Learning & Policy
|
7
|
0
|
03-12-2019
|
Progressive Generative Adversarial Binary Networks for
Music Generation
by
Manan Oza
et al
|
Image & Generative Adversarial
|
7
|
0
|
03-15-2019
|
scaleBF: A High Scalable Membership Filter using 3D
Bloom Filter
by
Ripon Patgiri
et al
|
Machine Learning & Big Data
|
7
|
0
|
03-13-2019
|
Computing Approximate Equilibria in Sequential
Adversarial Games by Exploitability Descent
by
Edward Lockhart
et al
|
Games & Multi-agent
|
7
|
0
|
03-15-2019
|
Role of Bloom Filter in Big Data Research: A Survey
by
Ripon Patgiri
et al
|
Machine Learning & Big Data
|
6
|
0
|
03-12-2019
|
Activity-Based Analysis of Open Source Software
Contributors: Roles and Dynamics
by
Jinghui Cheng
et al
|
Software & Students
|
6
|
0
|
03-13-2019
|
A Framework for On-line Learning of Underwater Vehicles
Dynamic Models
by
Bilal Wehbe
et al
|
Robot & Human
|
6
|
0
|
03-12-2019
|
What sets Verified Users apart? Insights, Analysis and
Prediction of Verified Users on Twitter
by
Indraneil Paul
et al
|
Program Verification & Source Code
|
6
|
0
|
03-13-2019
|
Resource Abstraction for Reinforcement Learning in
Multiagent Congestion Problems
by
Kleanthis Malialis
et al
|
Deep Reinforcement Learning & Policy
|
6
|
0
|
03-15-2019
|
A Context-Aware Citation Recommendation Model with BERT
and Graph Convolutional Networks
by
Chanwoo Jeong
et al
|
User & Recommendation
|
6
|
0
|
03-15-2019
|
Matching Entities Across Different Knowledge Graphs
with Graph Embeddings
by
Michael Azmy
et al
|
Graph & Log
|
6
|
0
|
03-14-2019
|
Theories of Parenting and their Application to
Artificial Intelligence
by
Sky Croeser
et al
|
Artificial Intelligence & Neural Machine
Translation
|
6
|
0
|
03-14-2019
|
ROS2Learn: a reinforcement learning framework for ROS 2
by
Yue Leire Erro Nuin
et al
|
Deep Reinforcement Learning & Policy
|
6
|
0
|
03-13-2019
|
Market Trend Prediction using Sentiment Analysis:
Lessons Learned and Paths Forward
by
Andrius Mudinas
et al
|
Text & Prediction
|
6
|
0
|
03-13-2019
|
Maybe Deep Neural Networks are the Best Choice for
Modeling Source Code
by
Rafael-Michael Karampatsis
et al
|
Program Verification & Source Code
|
6
|
0
|
03-15-2019
|
Proportionally dense subgraph of maximum size:
complexity and approximation
by
Janka Chlebíková
et al
|
Graph & Log
|
5
|
0
|
03-12-2019
|
Situational Awareness, Drivers Trust in Automated
Driving Systems and Secondary Task Performance
by
Luke Petersen
et al
|
Safety & Autonomous Driving
|
5
|
0
|
03-14-2019
|
Exploiting Information Centric Networking to federate
NoSQL Spatial Databases
by
Andrea Detti
et al
|
Distributed & Chip Memory
|
5
|
0
|
03-14-2019
|
Stripe: Tensor Compilation via the Nested Polyhedral
Model
by
Tim Zerrell
et al
|
Program Verification & Source Code
|
5
|
0
|
03-12-2019
|
Generating Compact Geometric Track-Maps for Train
Positioning Applications
by
Hanno Winter
et al
|
Robot & Human
|
5
|
0
|
03-12-2019
|
Probabilistic Temporal Logic over Finite Traces
(Technical Report)
by
Fabrizio M. Maggi
et al
|
Program Verification & Source Code
|
5
|
0
|
03-14-2019
|
An Exact Algorithm for Minimum Weight Vertex Cover
Problem in Large Graphs
by
Luzhi Wang
et al
|
Graph & Log
|
5
|
0
|
03-14-2019
|
FAVE: A fast and efficient network Flow AVailability
Estimation method with bounded relative error
by
Tingwei Liu
et al
|
Visual Localization & Flow
|
5
|
0
|
03-13-2019
|
Effective reinforcement learning based local search for
the maximum k-plex problem
by
Yan Jin
et al
|
Deep Reinforcement Learning & Policy
|
5
|
0
|
03-13-2019
|
Cardinality Estimation in a Virtualized Network Device
Using Online Machine Learning
by
Reuven Cohen
et al
|
Other
|
5
|
0
|
03-12-2019
|
Learning Symmetric and Asymmetric Steganography via
Adversarial Training
by
Zheng Li
et al
|
Image & Generative Adversarial
|
5
|
0
|
03-15-2019
|
COCO: The Large Scale Black-Box Optimization
Benchmarking (bbob-largescale) Test Suite
by
Ouassim Elhara
et al
|
Testing & Test Suite
|
4
|
0
|
03-15-2019
|
Enabling Spike-based Backpropagation in
State-of-the-art Deep Neural Network Architectures
by
Chankyu Lee
et al
|
Speech & Neural Networks
|
4
|
0
|
03-12-2019
|
Near-Optimal Algorithms for Shortest Paths in Weighted
Unit-Disk Graphs
by
Haitao Wang
et al
|
Graph & Log
|
4
|
0
|
03-15-2019
|
Improving Strong-Scaling of CNN Training by Exploiting
Finer-Grained Parallelism
by
Nikoli Dryden
et al
|
Distributed & Chip Memory
|
4
|
0
|
03-14-2019
|
Adaptive Variance for Changing Sparse-Reward
Environments
by
Xingyu Lin
et al
|
Deep Reinforcement Learning & Policy
|
4
|
0
|
03-13-2019
|
Bounded maximum degree conjecture holds precisely for
cc-crossing-critical graphs with c≤12c≤12
by
Drago Bokal
et al
|
Graph & Log
|
4
|
0
|
03-14-2019
|
Maximum Cut Parameterized by Crossing Number
by
Markus Chimani
et al
|
Graph & Log
|
4
|
0
|
03-12-2019
|
Termite: A System for Tunneling Through Heterogeneous
Data
by
Raul Castro Fernandez
et al
|
Web & Query
|
4
|
0
|
03-14-2019
|
Fast Approximate Shortest Paths in the Congested Clique
by
Keren Censor-Hillel
et al
|
Graph & Log
|
4
|
0
|
03-13-2019
|
Animating an Autonomous 3D Talking Avatar
by
Dominik Borer
et al
|
Safety & Autonomous Driving
|
4
|
0
|
03-13-2019
|
Cleaning tasks knowledge transfer between heterogeneous
robots: a deep learning approach
by
Jaeseok Kim
et al
|
Robot & Human
|
4
|
0
|
03-13-2019
|
Hypothesis-based Belief Planning for Dexterous Grasping
by
Claudio Zito
et al
|
Object Detection & Grasp
|
4
|
0
|
03-15-2019
|
Deterministic Approximation of Random Walks in Small
Space
by
Jack Murtagh
et al
|
Graph & Log
|
4
|
0
|
03-15-2019
|
DFineNet: Ego-Motion Estimation and Depth Refinement
from Sparse, Noisy Depth Input with RGB Guidance
by
Yilun Zhang
et al
|
Visual Localization & Flow
|
3
|
0
|
03-14-2019
|
Are My Invariants Valid? A Learning Approach
by
Vincent J. Hellendoorn
et al
|
Program Verification & Source Code
|
3
|
0
|
03-12-2019
|
Blackbox End-to-End Verification of Ground Robot Safety
and Liveness
by
Brandon Bohrer
et al
|
Speech & Neural Networks
|
3
|
0
|
03-15-2019
|
BLVD: Building A Large-scale 5D Semantics Benchmark for
Autonomous Driving
by
Jianru Xue
et al
|
Safety & Autonomous Driving
|
3
|
0
|
03-13-2019
|
SymPas: Symbolic Program Slicing
by
Yingzhou Zhang
|
Program Verification & Source Code
|
3
|
0
|
03-14-2019
|
Data objects and documenting scientific processes: An
analysis of data events in biodiversity data papers
by
Kai Li
et al
|
Software & Students
|
3
|
0
|
03-14-2019
|
Toward Imitating Visual Attention of Experts in
Software Development Tasks
by
Yoshiharu Ikutani
et al
|
Program Verification & Source Code
|
3
|
0
|
03-12-2019
|
Cubic Planar Graphs that cannot be Drawn on few Lines
by
David Eppstein
|
Graph & Log
|
3
|
0
|
03-12-2019
|
Distributed Dependency Discovery
by
Hemant Saxena
et al
|
Distributed & Chip Memory
|
3
|
0
|
03-14-2019
|
Stitching Videos from a Fisheye Lens Camera and a
Wide-Angle Lens Camera for Telepresence Robots
by
Yanmei Dong
et al
|
Caching & Streaming
|
3
|
0
|
03-13-2019
|
Lost Silence: An emergency response early detection
service through continuous processing of
telecommunication data streams
by
Qianru Zhou
et al
|
Machine Learning & Big Data
|
3
|
0
|
03-13-2019
|
Security, Privacy and Trust for Smart Mobile-Internet
of Things (M-IoT): A Survey
by
Vishal Sharma
et al
|
Privacy & Internet Of Things (IoT)
|
3
|
0
|
03-15-2019
|
Distribution-Sensitive Bounds on Relative
Approximations of Geometric Ranges
by
Yufei Tao
et al
|
Graph & Log
|
3
|
0
|
03-14-2019
|
DysLexML: Screening Tool for Dyslexia Using Machine
Learning
by
Thomais Asvestopoulou
et al
|
Social Media & Eye
|
3
|
0
|
03-13-2019
|
Towards an Automated Unified Framework to Run
Applications for Combinatorial Interaction Testing
by
Bestoun S. Ahmed
et al
|
Testing & Test Suite
|
3
|
0
|
03-14-2019
|
Optimal Price of Anarchy in Cost-Sharing Games
by
Rahul Chandan
et al
|
Games & Multi-agent
|
3
|
0
|
03-12-2019
|
Efficient Algorithms for Ortho-Radial Graph Drawing
by
Benjamin Niedermann
et al
|
Graph & Log
|
3
|
0
|
03-12-2019
|
SoK - Security and Privacy in the Age of Drones:
Threats, Challenges, Solution Mechanisms, and
Scientific Gaps
by
Ben Nassi
et al
|
Privacy & Internet Of Things (IoT)
|
3
|
0
|
03-12-2019
|
A Path Planning Framework for a Flying Robot in Close
Proximity of Humans
by
Hyung-Jin Yoon
et al
|
Path Planning & Motion Planning
|
3
|
0
|
03-14-2019
|
The practice of self-citations: a longitudinal study
by
Silvio Peroni
et al
|
Technical Debt & Self-adaptive
|
3
|
0
|
03-12-2019
|
Counting Polygon Triangulations is Hard
by
David Eppstein
|
Graph & Log
|
3
|
0
|
03-12-2019
|
Goal-Directed Behavior under Variational Predictive
Coding: Dynamic Organization of Visual Attention and
Working Memory
by
Minju Jung
et al
|
Technical Debt & Self-adaptive
|
3
|
0
|
03-14-2019
|
Constrained Mutual Convex Cone Method for Image Set
Based Recognition
by
Naoya Sogi
et al
|
Image & Generative Adversarial
|
3
|
0
|
03-14-2019
|
Stable Roommates with Narcissistic, Single-Peaked, and
Single-Crossing Preferences
by
Robert Bredereck
et al
|
Games & Multi-agent
|
2
|
0
|
03-12-2019
|
UAV/UGV Autonomous Cooperation: UAV Assists UGV to
Climb a Cliff by Attaching a Tether
by
Takahiro Miki
et al
|
Visual Localization & Flow
|
2
|
1
|
03-15-2019
|
GestureKeeper: Gesture Recognition for Controlling
Devices in IoT Environments
by
Vasileios Sideridis
et al
|
Other
|
2
|
0
|
03-15-2019
|
Inferring demand from partially observed data to
address the mismatch between demand and supply of taxis
in the presence of rain
by
Seyyed Yousef Oleyaei-Motlagh
et al
|
Games & Multi-agent
|
2
|
0
|
03-14-2019
|
Using Machine Learning and Big Data Analytics to
Prioritize Outpatients in HetNets
by
Mohammed Hadi
et al
|
Machine Learning & Big Data
|
2
|
0
|
03-12-2019
|
Evaluating the Contextual Integrity of Privacy
Regulation: Parents IoT Toy Privacy Norms Versus COPPA
by
Noah Apthorpe
et al
|
Privacy & Internet Of Things (IoT)
|
2
|
0
|
03-15-2019
|
Adding Value by Combining Business and Sensor Data: An
Industry 4.0 Use Case
by
Guenter Hesse
et al
|
Other
|
2
|
0
|
03-12-2019
|
STRATA: A Unified Framework for Task Assignments in
Large Teams of Heterogeneous Robots
by
Harish Ravichandar
et al
|
Robot & Human
|
2
|
0
|
03-15-2019
|
Secure Voting Protocols with Perfect Ballot Secrecy
by
Lihi Dery
et al
|
Voting & Blockchain-based
|
2
|
0
|
03-15-2019
|
A Ground-Truth Data Set and a Classification Algorithm
for Eye Movements in 360-degree Videos
by
Ioannis Agtzidis
et al
|
Social Media & Eye
|
2
|
0
|
03-14-2019
|
Simply RaTT: A Fitch-style Modal Calculus for Reactive
Programming
by
Patrick Bahr
et al
|
Program Verification & Source Code
|
1
|
0
|
03-12-2019
|
Perpetual Assurances for Self-Adaptive Systems
by
Danny Weyns
et al
|
Technical Debt & Self-adaptive
|
1
|
0
|
03-15-2019
|
Replication-Aware Linearizability
by
Constantin Enea
et al
|
Distributed & Chip Memory
|
1
|
0
|
03-15-2019
|
Impact of Traffic Characteristics on Request
Aggregation in an NDN Router
by
Mahdieh Ahmadi
et al
|
Other
|
1
|
0
|
03-12-2019
|
Resilience by Reconfiguration: Exploiting Heterogeneity
in Robot Teams
by
Ragesh K. Ramachandran
et al
|
Robot & Human
|
1
|
0
|
03-15-2019
|
Get rid of inline assembly through trustable
verification-oriented lifting
by
Frédéric Recoules
et al
|
Program Verification & Source Code
|
1
|
0
|
03-13-2019
|
A Novel Re-Targetable Application Development Platform
for Healthcare Mobile Applications
by
Chae Ho Cho
et al
|
User & Recommendation
|
1
|
0
|
03-15-2019
|
Augmenting Visual SLAM with Wi-Fi Sensing For Indoor
Applications
by
Zakieh S. Hashemifar
et al
|
Visual Localization & Flow
|
1
|
0
|
03-12-2019
|
Search-based 3D Planning and Trajectory Optimization
for Safe Micro Aerial Vehicle Flight Under Sensor
Visibility Constraints
by
Matthias Nieuwenhuisen
et al
|
Path Planning & Motion Planning
|
1
|
0
|
03-12-2019
|
Improving the quality of healthcare through Internet of
Things
by
Cornel Turcu
et al
|
Privacy & Internet Of Things (IoT)
|
1
|
0
|
03-14-2019
|
Testing of Smart TV Applications: Key Ingredients,
Challenges and Proposed Solutions
by
Bestoun S. Ahmed
et al
|
Privacy & Internet Of Things (IoT)
|
1
|
0
|
03-12-2019
|
Teaching Programming Concepts by Developing Games
by
Kailash Chandra
et al
|
Software & Students
|
1
|
0
|
03-13-2019
|
On the Efficacy and High-Performance Implementation of
Quaternion Matrix Multiplication
by
David Williams-Young
et al
|
Software & Students
|
1
|
0
|
03-12-2019
|
Suite of Meshless Algorithms for Accurate Computation
of Soft Tissue Deformation for Surgical Simulation
by
Grand Joldes
et al
|
Parallel & Optimization Problems
|
1
|
0
|
03-13-2019
|
GNA: new framework for statistical data analysis
by
Anna Fatkina
et al
|
Visual Localization & Flow
|
1
|
0
|
03-12-2019
|
RocketRML - A NodeJS implementation of a use-case
specific RML mapper
by
Umutcan Şimşek
et al
|
Testing & Test Suite
|
1
|
0
|
03-13-2019
|
Safety Analysis for Vehicle Guidance Systems with
Dynamic Fault Trees
by
Majdi Ghadhab
et al
|
Safety & Autonomous Driving
|
1
|
0
|
03-14-2019
|
A Formal Verification Technique for Architecture-based
Embedded Systems in EAST-ADL
by
Eun-Young Kang
|
Program Verification & Source Code
|
1
|
0
|
03-14-2019
|
Nuclear Environments Inspection with Micro Aerial
Vehicles: Algorithms and Experiments
by
Dinesh Thakur
et al
|
Visual Localization & Flow
|
1
|
2
|
03-13-2019
|
Compact Representation of Value Function in Partially
Observable Stochastic Games
by
Karel Horák
et al
|
Games & Multi-agent
|
1
|
0
|
03-13-2019
|
Automated Construction of Metric Maps using a
Stochastic Robotic Swarm Leveraging Received Signal
Strength
by
Ragesh K. Ramachandran
et al
|
Robot & Human
|
1
|
0
|
03-13-2019
|
The Emergence of Software Diversity in Maven Central
by
César Soto-Valero
et al
|
Software & Students
|
1
|
0
|
03-14-2019
|
A Hybrid Data Cleaning Framework using Markov Logic
Networks
by
Yunjun Gao
et al
|
Program Verification & Source Code
|
1
|
0
|
03-13-2019
|
Is the Stack Distance Between Test Case and Method
Correlated With Test Effectiveness?
by
Rainer Niedermayr
et al
|
Testing & Test Suite
|
1
|
0
|
03-14-2019
|
Notation for Subject Answer Analysis
by
Lucjan Janowski
et al
|
Caching & Streaming
|
1
|
0
|
03-13-2019
|
Robustness against Agent Failure in Hedonic Games
by
Ayumi Igarashi
et al
|
Games & Multi-agent
|
1
|
0
|
03-15-2019
|
A Quantum Annealing Algorithm for Finding Pure Nash
Equilibria in Graphical Games
by
Christoph Roch
et al
|
Games & Multi-agent
|
1
|
0
|
03-13-2019
|
CIMAX: Collective Information Maximization in Robotic
Swarms Using Local Communication
by
Hannes Hornischer
et al
|
Robot & Human
|
1
|
0
|
03-14-2019
|
ETGuard: Detecting D2D Attacks using Wireless Evil
Twins
by
Vineeta Jain
et al
|
Energy & Mining
|
1
|
0
|
03-12-2019
|
Information correlated L\evy walk exploration and
distributed mapping using a swarm of robots
by
Ragesh K. Ramachandran
et al
|
Robot & Human
|
1
|
0
|
03-14-2019
|
Automatically Generating Documentation for Lambda
Expressions in Java
by
Anwar Alqaimi
et al
|
Program Verification & Source Code
|
0
|
0
|
03-14-2019
|
Varying-order NURBS discretization: An accurate and
efficient method for isogeometric analysis of large
deformation contact problems
by
Vishal Agrawal
et al
|
Parallel & Optimization Problems
|
0
|
0
|