default search action
CoRR, February 2018
- Fangzhou Sun, Abhishek Dubey, Jules White:
DxNAT - Deep Neural Networks for Explaining Non-Recurring Traffic Congestion. - Babajide O. Ayinde, Jacek M. Zurada:
Deep Learning of Constrained Autoencoders for Enhanced Understanding of Data. - P. Balasubramanian:
Comments on "Dual-rail asynchronous logic multi-level implementation". - Varun Ranganathan, S. Natarajan:
A New Backpropagation Algorithm without Gradient Descent. - Mawulolo K. Ameko, Lihua Cai, Mehdi Boukhechba, Alexander Daros, Philip I. Chow, Bethany A. Teachman, Matthew S. Gerber, Laura E. Barnes:
Cluster-based Approach to Improve Affect Recognition from Passively Sensed Data. - Márcio Nicolau, Márcia Barrocas Moreira Pimentel, Casiane Salete Tibola, José Maurício Cunha Fernandes, Willingthon Pavan:
Fusarium Damaged Kernels Detection Using Transfer Learning on Deep Neural Network Architecture. - Peter Schüller:
Technical Report: Adjudication of Coreference Annotations via Answer Set Optimization. - Jason Ku, Ali Harakeh, Steven Lake Waslander:
In Defense of Classical Image Processing: Fast Depth Completion on the CPU. - Mariano G. Beiró, Loreto Bravo, Diego Caro, Ciro Cattuto, Leo Ferres, Eduardo Graells-Garrido:
Shopping Mall Attraction and Social Mixing at a City Scale. - Alexander Shapiro, Yao Xie, Rui Zhang:
Matrix completion with deterministic pattern - a geometric perspective. - Damien Anderson, Matthew Stephenson, Julian Togelius, Christoph Salge, John Levine, Jochen Renz:
Deceptive Games. - Lior Friedman, Shaul Markovitch:
Recursive Feature Generation for Knowledge-based Learning. - Christoph Heger, André van Hoorn, Dusan Okanovic, Stefan Siegl, Christian Vögele, Alexander Wert:
diagnoseIT: Expertengestützte automatische Diagnose von Performance-Probleme in Enterprise-Anwendungen (Abschlussbericht). - Max S. New, Daniel R. Licata:
Call-by-name Gradual Type Theory. - Sujitha Martin, Sourabh Vora, Kevan Yuen, Mohan M. Trivedi:
Dynamics of Driver's Gaze: Explorations in Behavior Modeling & Maneuver Prediction. - Francesca Parise, Asuman E. Ozdaglar:
Graphon games. - Faria Kalim, Le Xu, Sharanya Bathey, Richa Meherwal, Indranil Gupta:
Henge: Intent-driven Multi-Tenant Stream Processing. - David Eppstein, Vijay V. Vazirani:
NC Algorithms for Perfect Matching and Maximum Flow in One-Crossing-Minor-Free Graphs. - Marc Bosch, Christopher M. Gifford, Austin G. Dress, Clare W. Lau, Jeffrey G. Skibo, Gordon A. Christie:
Improved Image Segmentation via Cost Minimization of Multiple Hypotheses. - Matthew McClintic, Devon Maloney, Michael Scires, Gabriel Marcano, Matthew Norman, Aurora Wright:
Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain. - Hyungtae Lee, Sungmin Eum, Heesung Kwon:
Cross-domain CNN for Hyperspectral Image Classification. - Zhixiang Chi, Xiaolin Wu, Xiao Shu, Jinjin Gu:
Single Image Reflection Removal Using Deep Encoder-Decoder Network. - Marwen Zorgui, Zhiying Wang:
On the Achievability Region of Regenerating Codes for Multiple Erasures. - Teodoro Dannamann, Boris Sotomayor-Gómez, Horacio Samaniego:
The time geography of segregation during working hours. - Quanshi Zhang, Yu Yang, Ying Nian Wu, Song-Chun Zhu:
Interpreting CNNs via Decision Trees. - Sina Arefizadeh, Aria HasanzadeZonuzy, Alireza Talebpour, Srinivas Shakkottai:
Assessing Strong String Stability of Constant Spacing Policy under Speed Limit Fluctuations. - Feng Li, Yan Liu, Khidir Shaib Mohamed, Wei Wu:
A Modified Sigma-Pi-Sigma Neural Network with Adaptive Choice of Multinomials. - Jianbo Ye, Xin Lu, Zhe L. Lin, James Z. Wang:
Rethinking the Smaller-Norm-Less-Informative Assumption in Channel Pruning of Convolution Layers. - Changlong Wu, Maryam Hosseini, Narayana Santhanam:
Redundancy of unbounded memory Markov classes with continuity conditions. - Minjia Shi, Hongwei Zhu, Patrick Solé, Gérard D. Cohen:
How many weights can a linear code have? - Chen Xu, Jianqiang Yao, Zhouchen Lin, Wenwu Ou, Yuanbin Cao, Zhirong Wang, Hongbin Zha:
Alternating Multi-bit Quantization for Recurrent Neural Networks. - Daniele Antonioli, Giuseppe Bernieri, Nils Ole Tippenhauer:
Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot. - Mahmoud Afifi:
Semantic White Balance: Semantic Color Constancy Using Convolutional Neural Network. - Shehroz S. Khan, Amir Ahmad, Alex Mihailidis:
Bootstrapping and Multiple Imputation Ensemble Approaches for Missing Data. - Yu Wang, Jiebo Luo:
The Great Division. - Oleg Kolosov, Alexander Barg, Itzhak Tamo, Gala Yadgar:
Optimal LRC codes for all lenghts n≤q. - Shahbaz Rezaei, Mohammed Gharib, Ali Movaghar:
Throughput Analysis of IEEE 802.11 Multi-hop Wireless Networks with Routing Consideration: A General Framework. - Shahbaz Rezaei, Ali Mohammad Afshin Hemmatyar:
Study of Uniform Jitter Mechanism for Metric-based Wireless Routing. - Waruna Ranasinghe, Nirmal Prajapati, Tomofumi Yuki, Sanjay V. Rajopadhye:
PCOT: Cache Oblivious Tiling of Polyhedral Programs. - Jiangfan Zhang, Xiaodong Wang:
Consensus-based Distributed Quickest Detection of Attacks with Unknown Parameters. - Bao Wang, Xiyang Luo, Zhen Li, Wei Zhu, Zuoqiang Shi, Stanley J. Osher:
Deep Learning with Data Dependent Implicit Activation Function. - Zhengda Qin, Badong Chen, Nanning Zheng, José C. Príncipe:
Augmented Space Linear Model. - Xuemei Xie, Jiang Du, Guangming Shi, Chenye Wang, Xun Xu:
Perceptual Compressive Sensing. - Xuemei Xie, Chenye Wang, Jiang Du, Guangming Shi:
Full Image Recover for Block-Based Compressive Sensing. - Dario Izzo, Christopher Iliffe Sprague, Dharmesh Tailor:
Machine learning and evolutionary techniques in interplanetary trajectory design. - Christoph M. Hackl, Urs Pecha, Korbinian Schechner:
Modeling and control of permanent-magnet synchronous generators under open-switch converter faults. - Igor G. Vladimirov, Ian R. Petersen:
Spatio-temporal transfer function conditions of positive realness for translation invariant lattice networks of interacting linear systems. - Çaglar Aytekin, Xingyang Ni, Francesco Cricri, Emre Aksu:
Clustering and Unsupervised Anomaly Detection with L2 Normalized Deep Auto-Encoder Representations. - Yi Zhong, Xiaohu Ge, Tao Han, Qiang Li, Jing Zhang:
Tradeoff between Delay and Physical Layer Security in Wireless Networks. - Mnacho Echenim, Radu Iosif, Nicolas Peltier:
On the Expressive Completeness of Bernays-Schönfinkel-Ramsey Separation Logic. - Ahmed Osman, Wojciech Samek:
Dual Recurrent Attention Units for Visual Question Answering. - Yikang Li, Pak Lun Kevin Ding, Baoxin Li:
Training Neural Networks by Using Power Linear Units (PoLUs). - Vijaya Yajnanarayana, Y.-P. Eric Wang, Shiwei Gao, Siva D. Muruganathan, Xingqin Lin:
Interference Mitigation Methods for Unmanned Aerial Vehicles Served by Cellular Networks. - Dan Kondratyuk, Jake Rodden, Elmer Duran:
Integrity Coded Databases: An Evaluation of Performance, Efficiency, and Practicality. - Binny Mathew, Suman Kalyan Maity, Pratip Sarkar, Animesh Mukherjee, Pawan Goyal:
Adapting predominant and novel sense discovery algorithms for identifying corpus-specific sense differences. - Nader H. Bshouty, Waseem Makhoul:
On Polynomial time Constructions of Minimum Height Decision Tree. - Si Liu, Yao Sun, Defa Zhu, Renda Bao, Wei Wang, Xiangbo Shu, Shuicheng Yan:
Face Aging with Contextual Generative Adversarial Nets. - Xiaoda Zhang, Zhuzhong Qian, Sheng Zhang, Yize Li, Xiangbo Li, Xiaoliang Wang, Sanglu Lu:
Towards Reliable (and Efficient) Job Executions in a Practical Geo-distributed Data Analytics System. - Raúl Durán Díaz, V. Gayoso Martínez, Luis Hernández Encinas, Jaime Muñoz Masqué:
A group law for PKC purposes. - Zhengyu Zhu, Zheng Chu, Ning Wang, Zhongyong Wang, Inkyu Lee:
Energy Harvesting Fairness in AN-aided Secure MU-MIMO SWIPT Systems with Cooperative Jammer. - Augusto Ferrante, Giorgio Picci:
On the state space and dynamics selection in linear stochastic models: a spectral factorization approach. - Yu Wang, Xie Chen, Mark J. F. Gales, Anton Ragni, Jeremy Heng Meng Wong:
Phonetic and Graphemic Systems for Multi-Genre Broadcast Transcription. - Yuya Yoshikawa, Yusaku Imai:
A Nonparametric Delayed Feedback Model for Conversion Rate Prediction. - Nicolas Troquard:
Individual Resource Games and Resource Redistributions. - Timo Schindler:
Anomaly Detection in Log Data using Graph Databases and Machine Learning to Defend Advanced Persistent Threats. - Mark R. Leonard, Abdelhak M. Zoubir:
Robust Sequential Detection in Distributed Sensor Networks. - Kang Li, Xiaoguang Zhao, Jiang Bian, Min Tan:
Automatic Safety Helmet Wearing Detection. - Jingwei Zhang, Lei Tai, Yufeng Xiong, Ming Liu, Joschka Boedecker, Wolfram Burgard:
VR Goggles for Robots: Real-to-sim Domain Adaptation for Visual Control. - Kang Li, Shiying Sun, Jinting Wu, Xiaoguang Zhao, Min Tan:
Real-Time Human-Robot Interaction for a Service Robot Based on 3D Human Activity Recognition and Human-like Decision Mechanism. - Jörg Tiedemann:
Emerging Language Spaces Learned From Massively Multilingual Corpora. - Marek Kowalski, Zbigniew Nasarzewski, Grzegorz Galinski, Piotr Garbat:
HoloFace: Augmenting Human-to-Human Interactions on HoloLens. - Félix A. Miranda-Villatoro, Fulvio Forni, Rodolphe Sepulchre:
Dominance analysis of linear complementarity systems. - Zhang-Wei Hong, Yu-Ming Chen, Shih-Yang Su, Tzu-Yun Shann, Yi-Hsiang Chang, Hsuan-Kung Yang, Brian Hsi-Lin Ho, Chih-Chieh Tu, Yueh-Chuan Chang, Tsu-Ching Hsiao, Hsin-Wei Hsiao, Sih-Pin Lai, Chun-Yi Lee:
Virtual-to-Real: Learning to Control in Visual Semantic Segmentation. - Sahar Aljalbout, Gilles Falquet:
A Semantic Model for Historical Manuscripts. - Konstantinos Drossos, Stylianos Ioannis Mimilakis, Dmitriy Serdyuk, Gerald Schuller, Tuomas Virtanen, Yoshua Bengio:
MaD TwinNet: Masker-Denoiser Architecture with Twin Networks for Monaural Sound Source Separation. - Thomas H. Gibson, Lawrence Mitchell, David A. Ham, Colin J. Cotter:
A domain-specific language for the hybridization and static condensation of finite element methods. - Malika Bendechache, M. Tahar Kechadi:
Distributed Clustering Algorithm for Spatial Data Mining. - Markus Borg, Thomas Olsson, Ulrik Franke, Saïd Assar:
Digitalization of Swedish Government Agencies - A Perspective Through the Lens of a Software Development Census. - Shirin Saeedi Bidokhti, Michèle A. Wigger, Aylin Yener, Abbas El Gamal:
State-Adaptive Coded Caching for Symmetric Broadcast Channels. - Saugata Ghose, Kevin Hsieh, Amirali Boroumand, Rachata Ausavarungnirun, Onur Mutlu:
Enabling the Adoption of Processing-in-Memory: Challenges, Mechanisms, Future Research Directions. - O. Kurganskyy, A. J. Maksimova:
The entropy of a thermodynamic graph. - Mücahid Kutlu, Vivek Khetan, Matthew Lease:
Correlation and Prediction of Evaluation Metrics in Information Retrieval. - Nga Nguyen Thi, Van Loi Cao, Nhien-An Le-Khac:
One-class Collective Anomaly Detection based on Long Short-Term Memory Recurrent Neural Networks. - Marios P. Xanthidis, Joel M. Esposito, Ioannis M. Rekleitis, Jason M. O'Kane:
Analysis of Motion Planning by Sampling in Subspaces of Progressively Increasing Dimension. - Dang Lin, Liangyu Chen:
An efficient algorithm for global interval solution of nonlinear algebraic equations and its GPGPU implementation. - Jingchu Liu, Pengfei Hou, Lisen Mu, Yinan Yu, Chang Huang:
Elements of Effective Deep Reinforcement Learning towards Tactical Driving Decision Making. - Adelina Madhja, Sotiris E. Nikoletseas, Alexandros A. Voudouris:
Mobility-aware, adaptive algorithms for wireless power transfer in ad hoc networks. - Saeid Safaei, Vahid Safaei, Elizabeth D. Trippe, Karen Aguar, Hamid R. Arabnia:
Solving Minimum k-supplier in Adleman-Lipton model. - Matthias Pilz, Luluwah Al-Fagih:
A Dynamic Game Approach for Demand-Side Management: Scheduling Energy Storage with Forecasting Errors. - Michael Scire, Melissa Mears, Devon Maloney, Matthew Norman, Shaun Tux, Phoebe Monroe:
Attacking the Nintendo 3DS Boot ROMs. - Cassie Meeker, Sangwoo Park, Lauri Bishop, Joel Stein, Matei T. Ciocarlie:
EMG Pattern Classification to Control a Hand Orthosis for Functional Grasp Assistance after Stroke. - Turab Iqbal, Wenwu Wang:
Approximate Message Passing for Underdetermined Audio Source Separation. - Amitabha Karmakar:
Classifying medical notes into standard disease codes using Machine Learning. - Zheng Wu, Ruiheng Chang, Jiaxu Ma, Cewu Lu, Chi-Keung Tang:
Annotation-Free and One-Shot Learning for Instance Segmentation of Homogeneous Object Clusters. - Antigoni-Maria Founta, Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Athena Vakali, Ilias Leontiadis:
A Unified Deep Learning Architecture for Abuse Detection. - Leye Wang, Xu Geng, Xiaojuan Ma, Feng Liu, Qiang Yang:
Crowd Flow Prediction by Deep Spatio-Temporal Transfer Learning. - Antigoni-Maria Founta, Constantinos Djouvas, Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Gianluca Stringhini, Athena Vakali, Michael Sirivianos, Nicolas Kourtellis:
Large Scale Crowdsourcing and Characterization of Twitter Abusive Behavior. - (Withdrawn) Disunited Nations? A Multiplex Network Approach to Detecting Preference Affinity Blocs using Texts and Votes.
- Yanshan Wang, Sijia Liu, Naveed Afzal, Majid Rastegar-Mojarad, Liwei Wang, Feichen Shen, Paul R. Kingsbury, Hongfang Liu:
A Comparison of Word Embeddings for the Biomedical Natural Language Processing. - Klaus Grobe, Jörg-Peter Elbers:
Analysis of WDM-PON for Next-Generation Back- and Fronthaul. - Jacques Carette, William M. Farmer, Patrick Laskowski:
HOL Light QE. - Bo Yang, Stefano Rosa, Andrew Markham, Niki Trigoni, Hongkai Wen:
3D Object Dense Reconstruction from a Single Depth View. - Nishant Shakya, Fan Li, Jinyuan Chen:
Distributed Computing with Heterogeneous Communication Constraints: The Worst-Case Computation Load and Proof by Contradiction. - Anish Athalye, Nicholas Carlini, David A. Wagner:
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples. - Srijan Das, Michal Koperski, François Brémond, Gianpiero Francesca:
A Fusion of Appearance based CNNs and Temporal evolution of Skeleton with LSTM for Daily Living Action Recognition. - Abdulrahman Baknina, Sennur Ulukus:
Coded Status Updates in an Energy Harvesting Erasure Channel. - Ramina Ghods, Andrew S. Lan, Tom Goldstein, Christoph Studer:
PhaseLin: Linear Phase Retrieval. - Riza Alp Güler, Natalia Neverova, Iasonas Kokkinos:
DensePose: Dense Human Pose Estimation In The Wild. - Chathika Gunaratne, Ivan Garibay:
Evolutionary Model Discovery of Factors for Farm Selection by the Artificial Anasazi. - Hamid Reza Zohouri, Artur Podobas, Satoshi Matsuoka:
Combined Spatial and Temporal Blocking for High-Performance Stencil Computation on FPGAs Using OpenCL. - Zhao Song, Lin F. Yang, Peilin Zhong:
Sensitivity Sampling Over Dynamic Geometric Data Streams with Applications to k-Clustering. - Fu-Jen Chu, Ruinian Xu, Zhenxuan Zhang, Patricio A. Vela, Maysam Ghovanloo:
The Helping Hand: An Assistive Manipulation Framework Using Augmented Reality and a Tongue-Drive. - Ayelet Heimowitz, Joakim Andén, Amit Singer:
APPLE Picker: Automatic Particle Picking, a Low-Effort Cryo-EM Framework. - Paul Vernaza, Manmohan Chandraker:
Learning random-walk label propagation for weakly-supervised semantic segmentation. - Boris Bukh, Christopher Cox:
On a fractional version of Haemers' bound. - Paul Wild, Lutz Schröder, Dirk Pattinson, Barbara König:
A van Benthem Theorem for Fuzzy Modal Logic. - Thomas A. Grossman, Vijay Mehrotra, Mouwafac Sidaoui:
Alternative Spreadsheet Model Designs for an Operations Management Model Embedded in a Periodic Business Process. - Peixian Liang, Jianxu Chen, Pavel A. Brodskiy, Qinfeng Wu, Yejia Zhang, Yizhe Zhang, Lin Yang, Jeremiah J. Zartman, Danny Z. Chen:
A New Registration Approach for Dynamic Analysis of Calcium Signals in Organs. - Mária Csernoch, Piroska Biró:
Edu-Edition Spreadsheet Competency Framework. - Sascha Kurz:
Approximating power by weights. - Vladimir Ilievski, Claudiu Musat, Andreea Hossmann, Michael Baeriswyl:
Goal-Oriented Chatbot Dialog Management Bootstrapping with Transfer Learning. - Diana Valverde-Mendez, Manuel Ortega-Rodríguez, Hugo Solís-Sánchez, Ariadna Venegas-Li:
The effects of anger on automated long-term-spectra based speaker-identification. - Dmitrii Kuvaiskii, Somnath Chakrabarti, Mona Vij:
Snort Intrusion Detection System with Intel Software Guard Extension (Intel SGX). - Linwei Ye, Zhi Liu, Yang Wang:
Learning Semantic Segmentation with Diverse Supervision. - Daniel Li, Asim Kadav:
Adaptive Memory Networks. - Saiprasad Ravishankar, Anna Ma, Deanna Needell:
Analysis of Fast Alternating Minimization for Structured Dictionary Learning. - Fu-Jen Chu, Ruinian Xu, Patricio A. Vela:
Deep Grasp: Detection and Localization of Grasps with Deep Neural Networks. - Frank Gabriel, Anil Kumar Chorppath, Ievgenii Tsokalo, Frank H. P. Fitzek:
Multipath Communication with Finite Sliding Window Network Coding for Ultra-Reliability and Low Latency. - Joel D. Day, Vijay Ganesh, Paul He, Florin Manea, Dirk Nowotka:
The Satisfiability of Extended Word Equations: The Boundary Between Decidability and Undecidability. - Shaojie Tang:
Toward Optimal Coupon Allocation in Social Networks: An Approximate Submodular Optimization Approach. - Alexander Brown, Sau