02-13-2020
|
Fast Reinforcement Learning for Anti-jamming
Communications
by
Pei-Gen Ye
et al
|
|
|
|
02-13-2020
|
Notes on Tree- and Path-chromatic Number
by
Tony Huynh
et al
|
|
|
|
02-13-2020
|
Chaotic Phase Synchronization and Desynchronization in
an Oscillator Network for Object Selection
by
Fabricio A Breve
et al
|
|
|
|
02-13-2020
|
Effective Reinforcement Learning through Evolutionary
Surrogate-Assisted Prescription
by
Olivier Francon
et al
|
|
|
|
02-13-2020
|
Characterizing EOSIO Blockchain
by
Yuheng Huang
et al
|
|
|
|
02-16-2020
|
Strong convergence and asymptotic stability of explicit
numerical schemes for nonlinear stochastic differential
equations
by
Xiaoyue Li
et al
|
|
|
|
02-16-2020
|
Unifying Graph Convolutional Neural Networks and Label
Propagation
by
Hongwei Wang
et al
|
|
|
|
02-16-2020
|
Overlaid oriented Voronoi diagrams and the 1-Steiner
tree problem
by
Michael S. Payne
et al
|
|
|
|
02-14-2020
|
Pointfilter: Point Cloud Filtering via Encoder-Decoder
Modeling
by
Dongbo Zhang
et al
|
|
|
|
02-14-2020
|
Query2box: Reasoning over Knowledge Graphs in Vector
Space using Box Embeddings
by
Hongyu Ren
et al
|
|
|
|
02-14-2020
|
Context Conditional Variational Autoencoder for
Predicting Multi-Path Trajectories in Mixed Traffic
by
Hao Cheng
et al
|
|
|
|
02-14-2020
|
Integrating Discrete and Neural Features via
Mixed-feature Trans-dimensional Random Field Language
Models
by
Silin Gao
et al
|
|
|
|
02-14-2020
|
Multi-Level Feature Fusion Mechanism for Single Image
Super-Resolution
by
Jiawen Lyn
|
|
|
|
02-14-2020
|
Toward Agile Situated Visualization: An Exploratory
User Study
by
Leonel Merino
et al
|
|
|
|
02-15-2020
|
PDDLGym: Gym Environments from PDDL Problems
by
Tom Silver
et al
|
|
|
|
02-15-2020
|
MRRC: Multiple Role Representation Crossover
Interpretation for Image Captioning With R-CNN Feature
Distribution Composition (FDC)
by
Chiranjib Sur
|
|
|
|
02-14-2020
|
VisMaker: a Question-Oriented Visualization Recommender
System for Data Exploration
by
Raul de Araújo Lima
et al
|
|
|
|
02-14-2020
|
A Low-Complexity Framework for Joint User Pairing and
Power Control for Cooperative NOMA in 5G and Beyond
Cellular Networks
by
Phuc Dinh
et al
|
|
|
|
02-13-2020
|
Harvesting Ambient RF for Presence Detection Through
Deep Learning
by
Yang Liu
et al
|
|
|
|
02-13-2020
|
ACEnet: Anatomical Context-Encoding Network for
Neuroanatomy Segmentation
by
Yuemeng Li
et al
|
|
|
|
02-13-2020
|
A Unifying Network Architecture for Semi-Structured
Deep Distributional Learning
by
David Rügamer
et al
|
|
|
|
02-12-2020
|
Optimal Multiple Stopping Rule for Warm-Starting
Sequential Selection
by
Mathilde Fekom
et al
|
|
|
|
02-12-2020
|
A Combined Stochastic and Physical Framework for
Modeling Indoor 5G Millimeter Wave Propagation
by
Georges Nassif
et al
|
|
|
|
02-16-2020
|
TempLe: Learning Template of Transitions for Sample
Efficient Multi-task RL
by
Yanchao Sun
et al
|
|
|
|
02-15-2020
|
Latent Variable Modelling with Hyperbolic Normalizing
Flows
by
Avishek Joey Bose
et al
|
|
|
|
02-15-2020
|
Memristive oscillatory circuits for resolution of
NP-complete logic puzzles: Sudoku case
by
Theodoros Panagiotis Chatzinikolaou
et al
|
|
|
|
02-16-2020
|
Coresets for the Nearest-Neighbor Rule
by
Alejandro Flores Velazco
et al
|
|
|
|
02-14-2020
|
Providing a Link Prediction Model based on Structural
and Homophily Similarity in Social Networks
by
Alireza Eshaghpour
et al
|
|
|
|
02-17-2020
|
Topology optimization of fluidic flows on
two-dimensional manifolds
by
Yongbo Deng
et al
|
|
|
|
02-13-2020
|
Multiple Metric Learning for Structured Data
by
Nicolo Colombo
|
|
|
|
02-16-2020
|
Nonlinear MPC with Motor Failure Identification and
Recovery for Safe and Aggressive Multicopter Flight
by
Dimos Tzoumanikas
et al
|
|
|
|
02-16-2020
|
Adaptively Informed Trees (AIT*): Fast Asymptotically
Optimal Path Planning through Adaptive Heuristics
by
Marlin P. Strub
et al
|
|
|
|
02-16-2020
|
Speech-to-Singing Conversion in an Encoder-Decoder
Framework
by
Jayneel Parekh
et al
|
|
|
|
02-16-2020
|
Analytic Marching: An Analytic Meshing Solution from
Deep Implicit Surface Networks
by
Jiabao Lei
et al
|
|
|
|
02-16-2020
|
Pipeline Interventions
by
Eshwar Ram Arunachaleswaran
et al
|
|
|
|
02-12-2020
|
Real-Time Semantic Background Subtraction
by
Anthony Cioppa
et al
|
|
|
|
02-12-2020
|
Connecting Dualities and Machine Learning
by
Philip Betzler
et al
|
|
|
|
02-13-2020
|
Object Detection on Single Monocular Images through
Canonical Correlation Analysis
by
Zifan Yu
et al
|
|
|
|
02-12-2020
|
Quality Assessment of Online Automated Privacy Policy
Generators: An Empirical Study
by
Ruoxi Sun
et al
|
|
|
|
02-12-2020
|
Impact of Customer Reviews on Hotel Rating
by
J. Ahmad
et al
|
|
|
|
02-12-2020
|
Continual Universal Object Detection
by
Xialei Liu
et al
|
|
|
|
02-17-2020
|
Seeing Around Corners with Edge-Resolved Transient
Imaging
by
Joshua Rapp
et al
|
|
|
|
02-17-2020
|
An SMT-Based Concolic Testing Tool for Logic Programs
by
Sophie Fortz
et al
|
|
|
|
02-14-2020
|
A Survey on 3D Skeleton-Based Action Recognition Using
Learning Method
by
Bin Ren
et al
|
|
|
|
02-14-2020
|
MAGNETO: Fingerprinting USB Flash Drives via
Unintentional Magnetic Emissions
by
Omar Adel Ibrahim
et al
|
|
|
|
02-14-2020
|
Understanding patient complaint characteristics using
contextual clinical BERT embeddings
by
Budhaditya Saha
et al
|
|
|
|
02-14-2020
|
Deep learning of dynamical attractors from time series
measurements
by
William Gilpin
|
|
|
|
02-14-2020
|
Limits of Transmit and Receive Array Gain in Massive
MIMO
by
Tobias Laas
et al
|
|
|
|
02-15-2020
|
Data-Driven Variational Multiscale Reduced Order Models
by
Changhong Mou
et al
|
|
|
|
02-15-2020
|
Symmetric Arithmetic Circuits
by
Anuj Dawar
et al
|
|
|
|
02-15-2020
|
Supervised Phrase-boundary Embeddings
by
Manni Singh
et al
|
|
|
|
02-15-2020
|
Channel Estimation for RIS-Aided mmWave MIMO Channels
by
Jiguang He
et al
|
|
|
|
02-14-2020
|
Analyzing Differentiable Fuzzy Logic Operators
by
Emile van Krieken
et al
|
|
|
|
02-13-2020
|
Remove Appearance Shift for Ultrasound Image
Segmentation via Fast and Universal Style Transfer
by
Zhendong Liu
et al
|
|
|
|
02-14-2020
|
Sparse Coresets for SVD on Infinite Streams
by
Vladimir Braverman
et al
|
|
|
|
02-17-2020
|
Convergence of End-to-End Training in Deep Unsupervised
Contrasitive Learning
by
Zixin Wen
|
|
|
|
02-12-2020
|
Measuring privacy in smart metering anonymized data
by
Santi Martínez
et al
|
|
|
|
02-17-2020
|
Scalable Quantitative Verification For Deep Neural
Networks
by
Teodora Baluta
et al
|
|
|
|
02-17-2020
|
Large-scale biometry with interpretable neural network
regression on UK Biobank body MRI
by
Taro Langner
et al
|
|
|
|
02-16-2020
|
Topological Mapping for Manhattan-like Repetitive
Environments
by
Sai Shubodh Puligilla
et al
|
|
|
|
02-13-2020
|
MUST, SHOULD, DONT CARE: TCP Conformance in the Wild
by
Mike Kosek
et al
|
|
|
|
02-13-2020
|
Keyphrase Extraction with Span-based Feature
Representations
by
Funan Mu
et al
|
|
|
|
02-13-2020
|
A User-centered Approach for Optimizing Information
Visualizations
by
David Baum
et al
|
|
|
|
02-12-2020
|
Rembrandts and Robots: Using Neural Networks to Explore
Authorship in Painting
by
Steven J. Frank
et al
|
|
|
|
02-12-2020
|
Component Analysis for Visual Question Answering
Architectures
by
Camila Kolling
et al
|
|
|
|
02-12-2020
|
Development of modeling and control strategies for an
approximated Gaussian process
by
Shisheng Cui
et al
|
|
|
|
02-12-2020
|
Fundamental Limits of Biometric Identification Systems
with Strong Secrecy
by
Vamoua Yachongka
et al
|
|
|
|
02-16-2020
|
Computing Boundary Cycle of a Pseudo-Triangle Polygon
from its Visibility Graph
by
Hossein Boomari Soheila Farokhi
|
|
|
|
02-16-2020
|
Multi-layer Representation Fusion for Neural Machine
Translation
by
Qiang Wang
et al
|
|
|
|
02-17-2020
|
Computing in Covert Domain Using Data Hiding
by
Zhenxing Qian
et al
|
|
|
|
02-17-2020
|
Equivalence of Dataflow Graphs via Rewrite Rules Using
a Graph-to-Sequence Neural Model
by
Steve Kommrusch
et al
|
|
|
|
02-14-2020
|
Counting dense objects in remote sensing images
by
Guangshuai Gao
et al
|
|
|
|
02-14-2020
|
SemI2I: Semantically Consistent Image-to-Image
Translation for Domain Adaptation of Remote Sensing
Data
by
Onur Tasar
et al
|
|
|
|
02-15-2020
|
Correlated Adversarial Imitation Learning
by
Ari Azarafrooz
|
|
|
|
02-15-2020
|
Is Deadline Oblivious Scheduling Efficient for
Controlling Real-Time Traffic in Cellular Downlink
Systems?
by
Sherif ElAzzouni
et al
|
|
|
|
02-15-2020
|
Universal Value Density Estimation for Imitation
Learning and Goal-Conditioned Reinforcement Learning
by
Yannick Schroecker
et al
|
|
|
|
02-15-2020
|
Pitfalls of In-Domain Uncertainty Estimation and
Ensembling in Deep Learning
by
Arsenii Ashukha
et al
|
|
|
|
02-15-2020
|
Learning to Group: A Bottom-Up Framework for 3D Part
Discovery in Unseen Categories
by
Tiange Luo
et al
|
|
|
|
02-16-2020
|
Reliable Trajectories for Dynamic Quadrupeds using
Analytical Costs and Learned Initializations
by
Oliwier Melon
et al
|
|
|
|
02-16-2020
|
To be Tough or Soft: Measuring the Impact of
Counter-Ad-blocking Strategies on User Engagement
by
Shuai Zhao
et al
|
|
|
|
02-17-2020
|
An Efficient Permissioned Blockchain Model with
Provable Reputation Mechanism
by
Hongyin Chen
et al
|
|
|
|
02-17-2020
|
HotelRec: a Novel Very Large-Scale Hotel Recommendation
Dataset
by
Diego Antognini
et al
|
|
|
|
02-16-2020
|
Untrue.News: A New Search Engine For Fake Stories
by
Vinicius Woloszyn
et al
|
|
|
|
02-16-2020
|
Automated Labelling using an Attention model for
Radiology reports of MRI scans (ALARM)
by
David A. Wood
et al
|
|
|
|
02-16-2020
|
AMOUN: Asymmetric lightweight cryptographic scheme for
wireless group communication
by
Ahmad Mansour
et al
|
|
|
|
02-14-2020
|
Programming Paradigms, Turing Completeness and
Computational Thinking
by
Greg Michaelson
|
|
|
|
02-12-2020
|
Eigenvector Component Calculation Speedup over NumPy
for High-Performance Computing
by
Shrey Dabhi
et al
|
|
|
|
02-12-2020
|
Hierarchical Auto-Regressive Model for Image
Compression Incorporating Object Saliency and a Deep
Perceptual Loss
by
Yash Patel
et al
|
|
|
|
02-12-2020
|
A Study of Potential Code Borrowing and License
Violations in Java Projects on GitHub
by
Yaroslav Golubev
et al
|
|
|
|
02-17-2020
|
Reinforcement learning for the manipulation of eye
tracking data
by
Wolfgang Fuhl
|
|
|
|
02-17-2020
|
Polarization-adjusted Convolutional (PAC) Codes: Fano
Decoding vs List Decoding
by
Mohammad Rowshan
et al
|
|
|
|
02-17-2020
|
CQ-VQA: Visual Question Answering on Categorized
Questions
by
Aakansha Mishra
et al
|
|
|
|
02-16-2020
|
SBERT-WK: A Sentence Embedding Method by Dissecting
BERT-based Word Models
by
Bin Wang
et al
|
|
|
|
02-12-2020
|
Parameterizing Branch-and-Bound Search Trees to Learn
Branching Policies
by
Giulia Zarpellon
et al
|
|
|
|
02-12-2020
|
Patternless Adversarial Attacks on Video Recognition
Networks
by
Itay Naeh
et al
|
|
|
|
02-12-2020
|
Wi-Fi Channel Saturation as a Mechanism to Improve
Passive Capture of Bluetooth Through Channel Usage
Restriction
by
Ian Low
et al
|
|
|
|
02-12-2020
|
Batch-dynamic Algorithms via Parallel Change
Propagation and Applications to Dynamic Trees
by
Umut A. Acar
et al
|
|
|
|
02-16-2020
|
Multiple Flat Projections for Cross-manifold Clustering
by
Lan Bai
et al
|
|
|
|
02-16-2020
|
Automatic Frame Selection using CNN in Ultrasound
Elastography
by
Abdelrahman Zayed
et al
|
|
|
|
02-16-2020
|
SpotTheFake: An Initial Report on a New CNN-Enhanced
Platform for Counterfeit Goods Detection
by
Alexandru Şerban
et al
|
|
|
|
02-16-2020
|
Directional Deep Embedding and Appearance Learning for
Fast Video Object Segmentation
by
Yingjie Yin
et al
|
|
|
|
02-16-2020
|
Four-valued monitorability of ωω-regular languages
by
Zhe Chen
et al
|
|
|
|
02-16-2020
|
A two-stage algorithm for aircraft conflict resolution
with trajectory recovery
by
Fernando H. C. Dias
et al
|
|
|
|
02-13-2020
|
Dynamic Role-Based Access Control for Decentralized
Applications
by
Arnab Chatterjee
et al
|
|
|
|
02-14-2020
|
Multi-variate Probabilistic Time Series Forecasting via
Conditioned Normalizing Flows
by
Kashif Rasul
et al
|
|
|
|
02-15-2020
|
On the Search for Tight Frames of Low Coherence
by
Xuemei Chen
et al
|
|
|
|
02-13-2020
|
SpotNet: Self-Attention Multi-Task Network for Object
Detection
by
Hughes Perreault
et al
|
|
|
|
02-13-2020
|
Ressource Efficient Stabilization for Local Tasks
despite Unknown Capacity Links
by
Lélia Blin
et al
|
|
|
|
02-13-2020
|
Recurrent Attention Model with Log-Polar Mapping is
Robust against Adversarial Attacks
by
Taro Kiritani
et al
|
|
|
|
02-12-2020
|
Solving Missing-Annotation Object Detection with
Background Recalibration Loss
by
Han Zhang
et al
|
|
|
|
02-17-2020
|
DeepDualMapper: A Gated Fusion Network for Automatic
Map Extraction using Aerial Images and Trajectories
by
Hao Wu
et al
|
|
|
|
02-14-2020
|
The Next Decade in AI: Four Steps Towards Robust
Artificial Intelligence
by
Gary Marcus
|
|
|
|
02-14-2020
|
Improving accuracy of the fifth-order WENO scheme by
using the exponential approximation space
by
Youngsoo Ha
et al
|
|
|
|
02-16-2020
|
Predicting trends in the quality of state-of-the-art
neural networks without access to training or testing
data
by
Charles H. Martin
et al
|
|
|
|
02-13-2020
|
Self-Distillation Amplifies Regularization in Hilbert
Space
by
Hossein Mobahi
et al
|
|
|
|
02-12-2020
|
Leveraging Affect Transfer Learning for Behavior
Prediction in an Intelligent Tutoring System
by
Nataniel Ruiz
et al
|
|
|
|
02-13-2020
|
Age of Information with Gilbert-Elliot Servers and
Samplers
by
Baturalp Buyukates
et al
|
|
|
|
02-16-2020
|
BatchEnsemble: an Alternative Approach to Efficient
Ensemble and Lifelong Learning
by
Yeming Wen
et al
|
|
|
|
02-13-2020
|
Multi-objective Ranking via Constrained Optimization
by
Michinari Momma
et al
|
|
|
|
02-16-2020
|
Robustness Verification for Transformers
by
Zhouxing Shi
et al
|
|
|
|
02-16-2020
|
A gradient system approach for Hankel structured
low-rank approximation
by
Antonio Fazzi
et al
|
|
|
|
02-13-2020
|
Vision-Based Real-Time Indoor Positioning System for
Multiple Vehicles
by
Maximilian Kloock
et al
|
|
|
|
02-16-2020
|
Active Bayesian Assessment for Black-Box Classifiers
by
Disi Ji
et al
|
|
|
|
02-16-2020
|
An optimal mechanism charging for priority in a queue
by
Moshe Haviv
et al
|
|
|
|
02-16-2020
|
On the Feasibility of Sybil Attacks in Shard-Based
Permissionless Blockchains
by
Tayebeh Rajab
et al
|
|
|
|
02-14-2020
|
3D Dynamic Scene Graphs: Actionable Spatial Perception
with Places, Objects, and Humans
by
Antoni Rosinol
et al
|
|
|
|
02-17-2020
|
Large-Scale Evaluation of Shape-Aware Neighborhood
Weights & Neighborhood Sizes
by
Martin Skrodzki
et al
|
|
|
|
02-14-2020
|
Leveraging Coupled BBR and Adaptive Packet Scheduling
to Boost MPTCP
by
Jiangping Han
et al
|
|
|
|
02-14-2020
|
Non-asymptotic Convergence of Adam-type Reinforcement
Learning Algorithms under Markovian Sampling
by
Huaqing Xiong
et al
|
|
|
|
02-14-2020
|
I-nteract: A cyber-physical system for real-time
interaction with physical and virtual objects using
mixed reality technologies for additive manufacturing
by
Ammar Malik
et al
|
|
|
|
02-14-2020
|
Accurate Stress Assessment based on functional Near
Infrared Spectroscopy using Deep Learning Approach
by
Mahya Mirbagheri
et al
|
|
|
|
02-16-2020
|
Interactive Text-to-Speech via Semi-supervised Style
Transfer Learning
by
Yang Gao
et al
|
|
|
|
02-13-2020
|
Replacing Mobile Camera ISP with a Single Deep Learning
Model
by
Andrey Ignatov
et al
|
|
|
|
02-13-2020
|
Understanding individual behaviour: from virtual to
physical patterns
by
Marco De Nadai
et al
|
|
|
|
02-13-2020
|
The universal pre-Lie-Rinehart algebras of aromatic
trees
by
Gunnar Fløystad
et al
|
|
|
|
02-16-2020
|
Tensor denoising and completion based on ordinal
observations
by
Chanwoo Lee
et al
|
|
|
|
02-12-2020
|
Using Automated Theorem Provers for Mistake Diagnosis
in the Didactics of Mathematics
by
Merlin Carl
|
|
|
|
02-12-2020
|
A Matching Mechanism with Anticipatory Tolls for
Congestion Pricing
by
J Ceasar Aguma
et al
|
|
|
|
02-17-2020
|
Unique key Horn functions
by
Kristóf Bérczi
et al
|
|
|
|
02-17-2020
|
Pandoras Box Problem with Order Constraints
by
Shant Boodaghians
et al
|
|
|
|
02-16-2020
|
Advanced BIT* (ABIT*): Sampling-Based Planning with
Advanced Graph-Search Techniques
by
Marlin P. Strub
et al
|
|
|
|
02-17-2020
|
Precision Gating: Improving Neural Network Efficiency
with Dynamic Dual-Precision Activations
by
Yichi Zhang
et al
|
|
|
|
02-17-2020
|
Pass-Efficient Randomized LU Algorithms for Computing
Low-Rank Matrix Approximation
by
Bolong Zhang
et al
|
|
|
|
02-13-2020
|
DSCEP: An Infrastructure for Distributed Semantic
Complex Event Processing
by
Vitor Pinheiro de Almeida
et al
|
|
|
|
02-13-2020
|
AoI-Delay Tradeoff in Mobile Edge Caching with
Freshness-Aware Content Refreshing
by
Shan Zhang
et al
|
|
|
|
02-13-2020
|
Transformers as Soft Reasoners over Language
by
Peter Clark
et al
|
|
|
|
02-16-2020
|
Congestion Attacks in Payment Channel Networks
by
Ayelet Mizrahi
et al
|
|
|
|
02-16-2020
|
A Real-Time Deep Network for Crowd Counting
by
Xiaowen Shi
et al
|
|
|
|
02-16-2020
|
BinaryDuo: Reducing Gradient Mismatch in Binary
Activation Network by Coupling Binary Activations
by
Hyungjun Kim
et al
|
|
|
|
02-16-2020
|
Privaros: A Framework for Privacy-Compliant Drones
by
Rakesh Rajan Beck
et al
|
|
|
|
02-16-2020
|
Facial Attribute Capsules for Noise Face Super
Resolution
by
Jingwei Xin
et al
|
|
|
|
02-17-2020
|
Byzantine Lattice Agreement in Asynchronous Systems
by
Xiong Zheng
et al
|
|
|
|
02-16-2020
|
Unsupervised Image-generation Enhanced Adaptation for
Object Detection in Thermal images
by
Wanyi Li
et al
|
|
|
|
02-17-2020
|
Differentiable Bandit Exploration
by
Craig Boutilier
et al
|
|
|
|
02-17-2020
|
Residual Continual Learning
by
Janghyeon Lee
et al
|
|
|
|
02-17-2020
|
How to 0wn NAS in Your Spare Time
by
Sanghyun Hong
et al
|
|
|
|
02-13-2020
|
Differentially Private Call Auctions and Market Impact
by
Emily Diana
et al
|
|
|
|
02-13-2020
|
Neuromorphologicaly-preserving Volumetric data encoding
using VQ-VAE
by
Petru-Daniel Tudosiu
et al
|
|
|
|
02-13-2020
|
Conditional Disclosure of Secrets: A Noise and Signal
Alignment Approach
by
Zhou Li
et al
|
|
|
|
02-16-2020
|
Predicting event attendance exploring social influence
by
Fatemeh Salehi Rizi
et al
|
|
|
|
02-17-2020
|
Graded Algebraic Theories
by
Satoshi Kura
|
|
|
|
02-17-2020
|
DAWGs for parameterized matching: online construction
and related indexing structures
by
Katsuhito Nakashima
et al
|
|
|
|
02-16-2020
|
Reinforced active learning for image segmentation
by
Arantxa Casanova
et al
|
|
|
|
02-14-2020
|
A Hybrid 3DCNN and 3DC-LSTM based model for 4D
Spatio-temporal fMRI data: An ABIDE Autism
Classification study
by
Ahmed El-Gazzar
et al
|
|
|
|
02-14-2020
|
Reusing Static Analysis across Different
Domain-Specific Languages using Reference Attribute
Grammars
by
Johannes Mey
et al
|
|
|
|
02-14-2020
|
Robust Contract Evolution in a TypeSafe MicroServices
Architecture
by
João Costa Seco
et al
|
|
|
|
02-14-2020
|
Implementing a Language for Distributed Systems:
Choices and Experiences with Type Level and Macro
Programming in Scala
by
Pascal Weisenburger
et al
|
|
|
|
02-14-2020
|
Constructing Hybrid Incremental Compilers for
Cross-Module Extensibility with an Internal Build
System
by
Jeff Smits
et al
|
|
|
|
02-14-2020
|
Sub-method, partial behavioral reflection with
Reflectivity: Looking back on 10 years of use
by
Steven Costiou
et al
|
|
|
|
02-14-2020
|
Stochasticity of Deterministic Gradient Descent: Large
Learning Rate for Multiscale Objective Function
by
Lingkai Kong
et al
|
|
|
|
02-14-2020
|
Gavial: Programming the web with multi-tier FRP
by
Bob Reynders
et al
|
|
|
|
02-17-2020
|
A Sparse Deep Factorization Machine for Efficient CTR
prediction
by
Wei Deng
et al
|
|
|
|
02-12-2020
|
Recreating Bat Behavior on Quad-rotor UAVs-A Simulation
Approach
by
M. Hassan Tanveer
et al
|
|
|
|
02-12-2020
|
A Bayesian Approach to Conversational Recommendation
Systems
by
Francesca Mangili
et al
|
|
|
|
02-12-2020
|
On Termination of Transactions over Semantic Document
Models
by
Andrei Mantsivoda
et al
|
|
|
|
02-12-2020
|
Fast Generation of High Fidelity RGB-D Images by
Deep-Learning with Adaptive Convolution
by
Chuhua Xian
et al
|
|
|
|
02-12-2020
|
Complexity of Combinatorial Matrix Completion With
Diameter Constraints
by
Tomohiro Koana
et al
|
|
|
|
02-12-2020
|
Explainable Deep Modeling of Tabular Data using
TableGraphNet
by
Gabriel Terejanu
et al
|
|
|
|
02-12-2020
|
Deep compositional robotic planners that follow natural
language commands
by
Yen-Ling Kuo
et al
|
|
|
|
02-12-2020
|
LOGAN: High-Performance GPU-Based X-Drop Long-Read
Alignment
by
Alberto Zeni
et al
|
|
|
|
02-17-2020
|
Handling Missing Annotations in Supervised Learning
Data
by
Alaa E. Abdel-Hakim
et al
|
|
|
|
02-17-2020
|
Targeted Forgetting and False Memory Formation in
Continual Learners through Adversarial Backdoor Attacks
by
Muhammad Umer
et al
|
|
|
|
02-17-2020
|
On the Power and Limits of Dynamic Pricing in
Combinatorial Markets
by
Ben Berger
et al
|
|
|
|
02-13-2020
|
Real-time speech enhancement using equilibriated RNN
by
Daiki Takeuchi
et al
|
|
|
|
02-13-2020
|
Graph Prolongation Convolutional Networks: Explicitly
Multiscale Machine Learning on Graphs, with
Applications to Modeling of Biological Systems
by
C. B. Scott
et al
|
|
|
|
02-13-2020
|
Sound Event Detection by Multitask Learning of Sound
Events and Scenes with Soft Scene Labels
by
Keisuke Imoto
et al
|
|
|
|
02-14-2020
|
eSPICE: Probabilistic Load Shedding from Input Event
Streams in Complex Event Processing
by
Ahmad Slo
et al
|
|
|
|
02-17-2020
|
Simulating Performance of ML Systems with Offline
Profiling
by
Hongming Huang
et al
|
|
|
|
02-17-2020
|
Detecting kk-(Sub-)Cadences and Equidistant Subsequence
Occurrences
by
Mitsuru Funakoshi
et al
|
|
|
|
02-13-2020
|
Superpixel Image Classification with Graph Attention
Networks
by
Pedro H. C. Avelar
et al
|
|
|
|
02-12-2020
|
Conditional Path Analysis in Singly-Connected Path
Diagrams
by
Jose M. Peña
|
|
|
|
02-17-2020
|
Citation Recommendation: Approaches and Datasets
by
Michael Färber
et al
|
|
|
|
02-17-2020
|
Computing rank-revealing factorizations of matrices
stored out-of-core
by
Nathan Heavner
et al
|
|
|
|
02-17-2020
|
Learning Architectures for Binary Networks
by
Kunal Pratap Singh
et al
|
|
|
|
02-17-2020
|
Investigating the Compositional Structure Of Deep
Neural Networks
by
Francesco Craighero
et al
|
|
|
|
02-17-2020
|
CoBeam: Beamforming-based Spectrum Sharing With Zero
Cross-Technology Signaling for 5G Wireless Networks
by
Lorenzo Bertizzolo
et al
|
|
|
|
02-12-2020
|
Fridges on the Highway: Road Traffic Poisoning of
Navigation Apps
by
Simone Raponi
et al
|
|
|
|
02-16-2020
|
A posteriori error estimates of finite element methods
by preconditioning
by
Yuwen Li
et al
|
|
|
|
02-12-2020
|
Detect and Correct Bias in Multi-Site Neuroimaging
Datasets
by
Christian Wachinger
et al
|
|
|
|
02-12-2020
|
Intra-Camera Supervised Person Re-Identification
by
Xiangping Zhu
et al
|
|
|
|
02-12-2020
|
Data Efficient Training for Reinforcement Learning with
Adaptive Behavior Policy Sharing
by
Ge Liu
et al
|
|
|
|