


Остановите войну!
for scientists:


default search action
CoRR, December 2019
- Nurettin Turan, Wolfgang Utschick:
Reproducible Evaluation of Neural Network Based Channel Estimators And Predictors Using A Generic Dataset. - (Withdrawn) Randpay: The Technology for Blockchain Micropayments and Transactions Which Require Recipient's Consent.
- Shiyuan Li:
MSTDP: A More Biologically Plausible Learning. - Flavio Ferrarotti, Senén González, Klaus-Dieter Schewe, José Maria Turull Torres:
A Restricted Second-Order Logic for Non-deterministic Poly-Logarithmic Time. - Jaelle Scheuerman, Jason L. Harman, Nicholas Mattei, Kristen Brent Venable:
Heuristic Strategies in Uncertain Approval Voting Environments. - Rob Arthan, Paulo Oliva:
Negative Translations for Affine and Lukasiewicz Logic. - Deniz Ekiz, Yekta Said Can, Cem Ersoy:
Long Short-Term Network Based Unobtrusive Perceived Workload Monitoring with Consumer Grade Smartwatches in the Wild. - Tinghao Zhang, Jingxu Li, Jingfeng Li, Ling Wang, Feng Li, Jie Liu:
Model Embedded DRL for Intelligent Greenhouse Control. - Shuowen Zhang, Rui Zhang:
Radio Map Based 3D Path Planning for Cellular-Connected UAV. - Angela Dai, Christian Diller, Matthias Nießner:
SG-NN: Sparse Generative Neural Networks for Self-Supervised Scene Completion of RGB-D Scans. - Chandan Pradhan, Ang Li, Lingyang Song, Branka Vucetic, Yonghui Li:
Hybrid Precoding Design for Reconfigurable Intelligent Surface aided mmWave Communication Systems. - Christina Winkler, Daniel E. Worrall, Emiel Hoogeboom, Max Welling:
Learning Likelihoods with Conditional Normalizing Flows. - Serguei Barannikov
, Alexander Korotin, Dmitry Oganesyan, Daniil Emtsev, Evgeny Burnaev:
Barcodes as summary of objective function's topology. - (Withdrawn) An HLL Riemann solver for the hybridised discontinuous Galerkin formulation of compressible flows.
- Jonnatan Arroyo, Ramiro Velazquez:
Mechanism for Embossing Braille Characters on Paper: Conceptual Design. - Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion, Matthias Hein:
Square Attack: a query-efficient black-box adversarial attack via random search. - Grigorios Loukides, George Theodorakopoulos:
Location histogram privacy by sensitive location hiding and target histogram avoidance/resemblance (extended version). - Henning Petzka, Linara Adilova, Michael Kamp, Cristian Sminchisescu:
A Reparameterization-Invariant Flatness Measure for Deep Neural Networks. - Vishwanath A. Sindagi, Poojan Oza, Rajeev Yasarla, Vishal M. Patel:
Prior-based Domain Adaptive Object Detection for Adverse Weather Conditions. - Kyriakos Polymenakos, Luca Laurenti, Andrea Patane, Jan-Peter Calliess, Luca Cardelli, Marta Kwiatkowska, Alessandro Abate, Stephen J. Roberts:
Safety Guarantees for Planning Based on Iterative Gaussian Processes. - Pin Wang, Hanhan Li, Ching-Yao Chan:
Quadratic Q-network for Learning Continuous Control for Autonomous Vehicles. - Zicong Fan, Si Yi Meng, Leonid Sigal, James J. Little:
OptiBox: Breaking the Limits of Proposals for Visual Grounding. - Itay Mosafi, Eli David, Nathan S. Netanyahu:
DeepMimic: Mentor-Student Unlabeled Data Based Training. - Dario Frascaria, Neil Olver:
Algorithms for flows over time with scheduling costs. - Chi Zhang, Baoxiong Jia, Feng Gao, Yixin Zhu, Hongjing Lu, Song-Chun Zhu:
Learning Perceptual Inference by Contrasting. - Stefano Siccardi, Andrew Adamatzky, Jack A. Tuszynski, Florian Huber, Jörg Schnauß
:
Actin Networks Voltage Circuits. - Peng Yin, Jianing Qian, Yibo Cao, David Held, Howie Choset:
FusionMapping: Learning Depth Prediction with Monocular Images and 2D Laser Scans. - Hideki Ochiai, Patrick Mitran, H. Vincent Poor:
Capacity-Approaching Polar Codes with Long Codewords and Successive Cancellation Decoding Based on Improved Gaussian Approximation. - Thomas Bosman, Neil Olver:
Improved Approximation Algorithms for Inventory Problems. - Siming Ma, David Brooks, Gu-Yeon Wei:
A binary-activation, multi-level weight RNN and training algorithm for processing-in-memory inference with eNVM. - Xinyang Deng:
Belief and plausibility measures for D numbers. - Xuewen Shi, Heyan Huang, Shuyang Zhao, Ping Jian, Yi-Kun Tang:
Tag Recommendation by Word-Level Tag Sequence Modeling. - (Withdrawn) Validation of Automatically Generated Patches: An Appetizer.
- Matthew Shunshi Zhang, Bradly C. Stadie:
One-Shot Pruning of Recurrent Neural Networks by Jacobian Spectrum Evaluation. - Jihyeon Janel Lee, Sho Arora:
A Free Lunch in Generating Datasets: Building a VQG and VQA System with Attention and Humans in the Loop. - Md. Hasibur Rahman, Chowdhury Rafeed Rahman, Ruhul Amin, Md. Habibur Rahman Sifat, Afra Anika:
A Hybrid Approach Towards Two Stage Bengali Question Classification Utilizing Smart Data Balancing Technique. - Kallista A. Bonawitz, Fariborz Salehi, Jakub Konecný, Brendan McMahan, Marco Gruteser:
Federated Learning with Autotuned Communication-Efficient Secure Aggregation. - Rafaela C. Nascimento, Yania Molina Souto, Eduardo S. Ogasawara, Fábio Porto, Eduardo Bezerra:
STConvS2S: Spatiotemporal Convolutional Sequence to Sequence Network for Weather Forecasting. - Yannick Wend Kuni Zoetgnandé, Geoffroy Cormier, Alain-Jérôme Fougères, Jean-Louis Dillenseger:
Sub-pixel matching method for low-resolution thermal stereo images. - Christian Marzahl, Marc Aubreville, Christof A. Bertram, Stefan Gerlach, Jennifer Maier, Jörn Voigt, Jenny Hill, Robert Klopfleisch, Andreas K. Maier:
Fooling the Crowd with Deep Learning-based Methods. - Siddhartha Jain:
Inapproximability of Additive Weak Contraction under SSEH and Strong UGC. - Huangxing Lin, Weihong Zeng, Xinghao Ding, Yue Huang, Chenxi Huang, John W. Paisley:
Learning Rate Dropout. - Biao Zhang, Peter Wonka:
Point Cloud Instance Segmentation using Probabilistic Embeddings. - Ishaan Lodha, Lakshana Kolur, K. Sree Hari, Honnavalli Prasad:
Secure Wireless Internet of Things Communication using Virtual Private Networks. - Bin He, Di Zhou, Jinghui Xiao, Xin Jiang, Qun Liu, Nicholas Jing Yuan, Tong Xu:
Integrating Graph Contextualized Knowledge into Pre-trained Language Models. - Muhammet Abdullah Soytürk, Konstantinos Parasyris, Behzad Salami, Osman S. Unsal, Gulay Yalcin, Leonardo Bautista-Gomez:
Hardware Versus Software Fault Injection of Modern Undervolted SRAMs. - Jie Qiao, Zijian Li
, Boyan Xu, Ruichu Cai, Kun Zhang:
Disentanglement Challenge: From Regularization to Reconstruction. - Shady Abu Hussein, Tom Tirer, Raja Giryes:
Correction Filter for Single Image Super-Resolution: Robustifying Off-the-Shelf Deep Super-Resolvers. - Lucy Linder, Michael Jungo, Jean Hennebert, Claudiu Musat, Andreas Fischer:
Automatic Creation of Text Corpora for Low-Resource Languages from the Internet: The Case of Swiss German. - Gaurav Sinha, Ayush Chauhan, Aurghya Maiti, Naman Poddar, Pulkit Goel:
Dis-entangling Mixture of Interventions on a Causal Bayesian Network Using Aggregate Observations. - Ramadan Abdul-Rashid:
An Energy Efficient Distributed Gossip Algorithm for Wireless Sensor Networks based on a Randomized Markovian Duty-Cycling. - Michael Luo, Jiahao Yao, Richard Liaw, Eric Liang, Ion Stoica:
IMPACT: Importance Weighted Asynchronous Architectures with Clipped Target Networks. - Xiyuan Liu, Li Qiu:
Bird Flocking Inspired Control Strategy for Multi-UAV Collective Motion. - Nadia Labai, Tomer Kotek, Magdalena Ortiz, Helmut Veith:
Pebble-Intervals Automata and FO2 with Two Orders (Extended Version). - Anton Kolonin:
Generalized Reputation Computation Ontology and Temporal Graph Architecture. - Jeffrey Hawke, Richard Shen, Corina Gurau, Siddharth Sharma, Daniele Reda, Nikolay Nikolov, Przemyslaw Mazur, Sean Micklethwaite, Nicolas Griffiths, Amar Shah, Alex Kendall:
Urban Driving with Conditional Imitation Learning. - Yang Feng, Wanying Xie, Shuhao Gu, Chenze Shao, Wen Zhang, Zhengxin Yang, Dong Yu:
Modeling Fluency and Faithfulness for Diverse Neural Machine Translation. - Anton Kolonin:
Latent Semantic Search and Information Extraction Architecture. - Yang Song, Qiyu Kang, Wee Peng Tay:
Error-Correcting Neural Network. - Isac Arnekvist, Dmytro Kalpakchi:
[Re] Learning to Learn By Self-Critique. - Paulo José Fernandes Almeida, Julia Lieb:
Constructions of (2, 1, 2) complete j-MDP convolutional codes. - Ramadan Abdul-Rashid, Basit Olakunle Alawode:
Robustness Evaluation of the Butterfly Optimization Algorithm on a Control System. - Mohsen Tajallifar, Sina Ebrahimi
, Mohammad Reza Javan, Nader Mokari, Luca Chiaraviglio:
QoS-Aware Joint Power Allocation and Task Offloading in a MEC/NFV-enabled C-RAN Network. - Shi-Gui Yang, Yuan-Yuan Wang, Di Liu, Xu Jiang, Hui Fang, Yu Yang, Mingxiong Zhao:
ReLeTA: Reinforcement Learning for Thermal-Aware Task Allocation on Multicore. - Junning Huang, Sirui Xie, Jiankai Sun, Qiurui Ma, Chunxiao Liu, Jianping Shi, Dahua Lin, Bolei Zhou:
Learning Driving Decisions by Imitating Drivers' Control Behaviors. - Sina Ebrahimi
, Abulfazl Zakeri, Behzad Akbari, Nader Mokari:
Joint Resource and Admission Management for Slice-enabled Networks. - Guohao Li, Guocheng Qian
, Itzel C. Delgadillo, Matthias Müller, Ali K. Thabet
, Bernard Ghanem
:
SGAS: Sequential Greedy Architecture Search. - Andrei B. Bogatyrev:
Projective view at Optimization Problem for Multiband Filter. - Abdullah Salama, Oleksiy Ostapenko, Tassilo Klein, Moin Nabi:
Pruning at a Glance: Global Neural Pruning for Model Compression. - Zhimin Yuan, Jialin Peng:
EM-NET: Centerline-Aware Mitochondria Segmentation in EM Images via Hierarchical View-Ensemble Convolutional Network. - Mingtao Feng, Syed Zulqarnain Gilani, Yaonan Wang, Liang Zhang, Ajmal Mian:
Relation Graph Network for 3D Object Detection in Point Clouds. - Joachim von zur Gathen, Mark Giesbrecht, Konstantin Ziegler:
Counting invariant subspaces and decompositions of additive polynomials. - Cinjon Resnick, Zeping Zhan, Joan Bruna:
Probing the State of the Art: A Critical Look at Visual Representation Evaluation. - Christos N. Efrem, Athanasios D. Panagopoulos:
Energy Efficiency Optimization: A New Trade-off Between Fairness and Total System Performance. - Michael J. Curry, John P. Dickerson, Karthik Abinav Sankararaman, Aravind Srinivasan, Yuhao Wan, Pan Xu:
Mix and Match: Markov Chains & Mixing Times for Matching in Rideshare. - Emil Pricop, Sanda Florentina Mihalache:
Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems. - Fernando Alegre, John Underwoood, Juana Moreno, Mario Alegre:
Introduction to Computational Thinking: a new high school curriculum using CodeWorld. - Edoardo Galimberti, Chiara Madeddu, Francesco Bonchi, Giancarlo Ruffo:
Visualizing structural balance in signed networks. - Charlotte Rochereau, Benoît Sagot, Emmanuel Dupoux:
Modeling German Verb Argument Structures: LSTMs vs. Humans. - Christian Schulz:
Scalable Graph Algorithms. - Brian Swenson, H. Vincent Poor:
Smooth Fictitious Play in N×2 Potential Games. - Ngai Meng Kou, Cheng Peng, Hang Ma, T. K. Satish Kumar, Sven Koenig:
Idle Time Optimization for Target Assignment and Path Finding in Sortation Centers. - Amnon Geifman, Yoni Kasten, Meirav Galun, Ronen Basri:
Averaging Essential and Fundamental Matrices in Collinear Camera Settings. - Junfeng Ding, Chen Wang, Cewu Lu:
Transferable Force-Torque Dynamics Model for Peg-in-hole Task. - Chenglong Fu, Qiang Zeng, Xiaojiang Du:
Towards Efficient Integration of Blockchain for IoT Security: The Case Study of IoT Remote Access. - Yipeng Li, Qiao Chen, Xuebin Wang, Xiangmin Jiao:
WLS-ENO Remap: Superconvergent and Non-Oscillatory Weighted Least Squares Data Transfer on Surfaces. - Shervin Minaee, AmirAli Abdolrashidi, Hang Su, Mohammed Bennamoun, David Zhang:
Biometric Recognition Using Deep Learning: A Survey. - Guangmo Tong, Ruiqi Wang, Zheng Dong:
On Multi-Cascade Influence Maximization: Model, Hardness and Algorithmic Framework. - Minghua Liu, Lu Sheng, Sheng Yang, Jing Shao, Shi-Min Hu:
Morphing and Sampling Network for Dense Point Cloud Completion. - Jack H. Lutz, Neil Lutz:
Who Asked Us? How the Theory of Computing Answers Questions about Analysis. - Alexey Svyatkovskiy, Julian Kates-Harbeck, William Tang:
Training Distributed Deep Recurrent Neural Networks with Mixed Precision on GPU Clusters. - Muntadher Sallal, Steve A. Schneider, Matthew Casey, Constantin Catalin Dragan, François Dupressoir, Luke Riley, Helen Treharne, Joe Wadsworth, Phil Wright:
VMV: Augmenting an Internet Voting System with Selene Verifiability. - Edward Kim, Divya Gopinath, Corina S. Pasareanu, Sanjit A. Seshia:
A Programmatic and Semantic Approach to Explaining and DebuggingNeural Network Based Object Detectors. - Yue Zhao, Maciej K. Hryniewicki:
XGBOD: Improving Supervised Outlier Detection with Unsupervised Representation Learning. - Prabu Ravindran, Emmanuel Ebanyenle, Alberta Asi Ebeheakey, Kofi Bonsu Abban, Ophilious Lambog, Richard Soares, Adriana Costa, Alex C. Wiedenhoeft:
Image Based Identification of Ghanaian Timbers Using the XyloTron: Opportunities, Risks and Challenges. - Han Zhang, Hong Xu:
MANELA: A Multi-Agent Algorithm for Learning Network Embeddings. - Yiyi Zhang, Li Niu, Ziqi Pan, Meichao Luo, Jianfu Zhang, Dawei Cheng, Liqing Zhang:
Exploiting Motion Information from Unlabeled Videos for Static Image Action Recognition. - Sarthak Garg, Joel Ruben Antony Moniz, Anshu Aviral, Priyatham Bollimpalli:
Learning to Relate from Captions and Bounding Boxes. - Eric Deng, Bilge Mutlu, Maja J. Mataric:
Embodiment in Socially Interactive Robots. - Xiao Zhang, Manish Marwah, I-Ta Lee, Martin F. Arlitt, Dan Goldwasser:
An Anomaly Contribution Explainer for Cyber-Security Applications. - Yuchen Guo, Nicholas Hanoian, Zhexiao Lin, Nicholas Liskij, Hanbaek Lyu, Deanna Needell, Jiahao Qu, Henry Sojico, Yuliang Wang, Zhe Xiong, Zhenhong Zou:
Topic-aware chatbot using Recurrent Neural Networks and Nonnegative Matrix Factorization. - Daniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Jeffrey S. Foster, Michelle L. Mazurek:
An Observational Investigation of Reverse Engineers' Processes. - Wen Zhang, Dongrui Wu:
Transferability versus Discriminability: Joint Probability Distribution Adaptation (JPDA). - Bo Li, Jie Feng, Bingfeng Zhou:
A SVBRDF Modeling Pipeline using Pixel Clustering. - Vinayak Mathur, Jinesh Mehta, Sanjay Singh:
HCA-DBSCAN: HyperCube Accelerated Density Based Spatial Clustering for Applications with Noise. - Yuan Xiao, Yinqian Zhang, Radu Teodorescu:
SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities. - Zhaoyuan Gu, Zhenzhong Jia, Howie Choset:
Adversary A3C for Robust Reinforcement Learning. - Lisai Zhang, Qingcai Chen, Dongfang Li, Buzhou Tang:
Integrate Image Representation to Text Model on Sentence Level: a Semi-supervised Framework. - Santosh Mohan Rajkumar, Sayan Chakraborty, Rajeeb Dey:
Development of Embedded Speed Control System for DC Servo Motor using Wireless Communication. - Won-Ik Cho, Young Ki Moon, Sangwhan Moon, Seok Min Kim, Nam Soo Kim:
Machines Getting with the Program: Understanding Intent Arguments of Non-Canonical Directives. - Santosh Mohan Rajkumar, Sayan Chakraborty, Rajeeb Dey, Dipankar Deb:
Online Delay Estimation and Adaptive Compensation in Wireless Networked System: An Embedded Control Design. - Lanqing Xue, Xiaopeng Li, Nevin L. Zhang:
Not All Attention Is Needed: Gated Attention Network for Sequence Data. - Defang Chen
, Jian-Ping Mei, Can Wang, Yan Feng, Chun Chen:
Online Knowledge Distillation with Diverse Peers. - Pulkit Sharma, Farah E. Shamout, David A. Clifton:
Preserving Patient Privacy while Training a Predictive Model of In-hospital Mortality. - Ke Ma, Jinshan Zeng, Qianqian Xu, Xiaochun Cao, Wei Liu, Yuan Yao:
Fast Stochastic Ordinal Embedding with Variance Reduction and Adaptive Step Size. - Shir Gur, Tal Shaharabany, Lior Wolf:
End to End Trainable Active Contours via Differentiable Rendering. - Roger K. Moore:
Talking with Robots: Opportunities and Challenges. - Mahdi Abolghasemi, Rob J. Hyndman, Garth Tarr, Christoph Bergmeir:
Machine learning applications in time series hierarchical forecasting. - Junhong Kim, Doo-Hyun Cho, Jaemyung Ahn, Han-Lim Choi:
Task Scheduling of Multiple Agile Satellites with Transition Time and Stereo Imaging Constraints. - Min Ren, Yunlong Wang, Zhenan Sun, Tieniu Tan:
Dynamic Graph Representation for Partially Occluded Biometrics. - Yiru Wang, Pengda Si, Zeyang Lei, Guangxu Xun
, Yujiu Yang:
HSCJN: A Holistic Semantic Constraint Joint Network for Diverse Response Generation. - Swathikiran Sudhakaran, Sergio Escalera, Oswald Lanz:
Gate-Shift Networks for Video Action Recognition. - Min Ren, Caiyong Wang, Yunlong Wang, Zhenan Sun, Tieniu Tan:
Alignment Free and Distortion Robust Iris Recognition. - Zhaohui Yang, Miaojing Shi, Yannis Avrithis, Chao Xu, Vittorio Ferrari:
Training Object Detectors from Few Weakly-Labeled and Many Unlabeled Images. - Ismail Elezi, Sebastiano Vascon, Alessandro Torcinovich, Marcello Pelillo, Laura Leal-Taixé:
The Group Loss for Deep Metric Learning. - Hayoung Um, Heeyoul Choi:
Active Search for Nearest Neighbors. - Shuhan Zhang, Wenlong Lyu, Fan Yang, Changhao Yan, Dian Zhou, Xuan Zeng, Xiangdong Hu:
An Efficient Multi-fidelity Bayesian Optimization Approach for Analog Circuit Synthesis. - Rujing Yao, Linlin Hou, Lei Yang, Jie Gui, Qing Yin, Ou Wu:
Deep Human Answer Understanding for Natural Reverse QA. - Shuhan Zhang, Wenlong Lyu, Fan Yang, Changhao Yan, Dian Zhou, Xuan Zeng:
Bayesian Optimization Approach for Analog Circuit Synthesis Using Neural Network. - Dean Zadok, Daniel McDuff, Ashish Kapoor:
Affect-based Intrinsic Rewards for Learning General Representations. - Zhiyao Tang, Liang Sun, Lu Cao, Shutong Qi, Yong Feng:
Reconsidering Design of Multi-Antenna NOMA Systems with Limited Feedback.