- Zachary Chase Lipton:
A Critical Review of Recurrent Neural Networks for Sequence Learning.
- Charles R. Doss:
Bracketing Numbers of Convex Functions on Polytopes.
- Martín Arjovsky:
Saddle-free Hessian-free optimization for Deep Learning.
- (Withdrawn) Integration of Gene Expression Data and Methylation Reveals Genetic Networks for Glioblastoma.
- Behçet Açikmese:
Linear Matrix Inequalities for Ultimate Boundedness of Dynamical Systems with Conic Uncertain/Nonlinear Terms.
- Dmytro Klets:
Modeling of Mobile Vehicle Skid in Traction Movement Mode.
- (Withdrawn) On the computational complexity of evolution.
- Eleni Rozaki:
Design and implementation for automated network troubleshooting using data mining.
- Sagi Eppel:
Using curvature to distinguish between surface reflections and vessel contents in computer vision based recognition of materials in transparent vessels.
- (Withdrawn) Forecasting popularity of videos in YouTube.
- Ruo-Wei Hung:
Hamiltonian Cycles in Linear-Convex Supergrid Graphs.
- Dmitriy S. Malyshev:
A complexity dichotomy for the dominating set problem.
- Wei Liu:
Channel Equalization and Beamforming for Quaternion-Valued Wireless Communication Systems.
- M. Andrecut:
A Matrix Public Key Cryptosystem.
- Khalid Raza:
Formal Concept Analysis for Knowledge Discovery from Biological Data.
- Ather Gattami:
Optimal Communication of States of Dynamical Systems over Gaussian Channels with Noisy Feedback: The Scalar Case.
- Silas L. Fong:
Cut-Set Bounds for Multimessage Multicast Networks with Independent Channels and Zero-Delay Edges.
- Wladmir Cardoso Brandão:
Writing and Publishing Scientific Articles in Computer Science.
- Aristides T. Hatjimihail:
Calculation of the confidence bounds for the fraction nonconforming of normal populations of measurements in clinical laboratory medicine.
- William Blacoe:
On Quantum Generalizations of Information-Theoretic Measures and their Contribution to Distributional Semantics.
- Alexander Kozachinskiy:
On Slepian-Wolf Theorem with Interaction.
- Olivier Buu:
Sensitivity Analysis of Resonant Circuits.
- Eric Rutger Leukfeldt:
Comparing Victims of Phishing and Malware Attacks: Unraveling Risk Factors and Possibilities for Situational Crime Prevention.
- Wenhao Wang:
Notes on Rainbow Distinguished Point Method.
- (Withdrawn) Classify Images with Conce