Real-time regression analysis with deep convolutional neural networks

We discuss the development of novel deep learning algorithms to enable real-time regression analysis for time series data. We showcase the application of this new method with a timely case study, and then discuss the applicability of this approach to tackle similar challenges across science domains.


Assimilated LVEF: A Bayesian technique combining human intuition with machine measurement for sharper estimates of left ventricular ejection fraction and stronger association with outcomes

The cardiologist’s main tool for measuring systolic heart failure is left ventricular ejection fraction (LVEF). Trained cardiologist’s report both a visual and machine-guided measurement of LVEF, but only use this machine-guided measurement in analysis. We use a Bayesian technique to combine visual and machine-guided estimates from the PARTNER-IIA Trial, a cohort of patients with aortic stenosis at moderate risk treated with bioprosthetic aortic valves, and find our combined estimate reduces measurement errors and improves the association between LVEF and a 1-year composite endpoint.


Crossing points in survival analysis sensitively depend on system conditions

Crossing survival curves complicate how we interpret results from a clinical trial’s primary endpoint. We find the function to determine a crossing point’s location depends exponentially on individual survival curves. This exponential relationship between survival curves and the crossing point transforms small survival curve errors into large crossing point errors. In most cases, crossing points are sensitive to individual survival errors and may make accurately locating a crossing point unsuccessful. We argue more complicated analyses for mitigating crossing points should be reserved only after first exploring a crossing point’s variability, or hypothesis tests account for crossing point variability.


Hierarchical Temporal Memory using Memristor Networks: A Survey

This paper presents a survey of the currently available hardware designs for implementation of the human cortex inspired algorithm, Hierarchical Temporal Memory (HTM). In this review, we focus on the state of the art advances of memristive HTM implementation and related HTM applications. With the advent of edge computing, HTM can be a potential algorithm to implement on-chip near sensor data processing. The comparison of analog memristive circuit implementations with the digital and mixed-signal solutions are provided. The advantages of memristive HTM over digital implementations against performance metrics such as processing speed, reduced on-chip area and power dissipation are discussed. The limitations and open problems concerning the memristive HTM, such as the design scalability, sneak currents, leakage, parasitic effects, lack of the analog learning circuits implementations and unreliability of the memristive devices integrated with CMOS circuits are also discussed.


Efficient Design of Hardware-Enabled Recurrent Neural Networks

In this work, we propose a new approach towards the efficient design of reservoir computing hardware. First, we adapt the reservoir input mask to the structure of the data via linear autoencoders. We therefore incorporate the advantages of dimensionality reduction and dimensionality expansion achieved by conventional and efficient linear algebra procedures of principal component analysis. Second, we employ evolutionary-inspired genetic algorithm techniques resulting in a highly efficient optimization of reservoir dynamics. We illustrate the method on the so-called single-node reservoir computing architecture, especially suitable for implementation in ultrahigh-speed hardware. The combination of both methods and the resulting reduction of time required for performance optimization of a hardware system establish a strategy towards machine learning hardware capable of self-adaption to optimally solve specific problems. We confirm the validity of those principles building RC hardware based on a field-programmable gate array.


Holarchic Structures for Decentralized Deep Learning – A Performance Analysis

Structure plays a key role in learning performance. In centralized computational systems, hyperparameter optimization and regularization techniques such as dropout are computational means to enhance learning performance by adjusting the deep hierarchical structure. However, in decentralized deep learning by the Internet of Things, the structure is an actual network of autonomous interconnected devices such as smart phones that interact via complex network protocols. Adjustments in the learning structure are a challenge. Uncertainties such as network latency, node and link failures or even bottlenecks by limited processing capacity and energy availability can significantly downgrade learning performance. Network self-organization and self-management is complex, while it requires additional computational and network resources that hinder the feasibility of decentralized deep learning. In contrast, this paper introduces reusable holarchic learning structures for exploring, mitigating and boosting learning performance in distributed environments with uncertainties. A large-scale performance analysis with 864000 experiments fed with synthetic and real-world data from smart grid and smart city pilot projects confirm the cost-effectiveness of holarchic structures for decentralized deep learning.


EngineCL: Usability and Performance in Heterogeneous Computing

Heterogeneous systems composed by a CPU and a set of hardware accelerators have become one of the most common architectures today, thanks to their excellent performance and energy consumption. However, due to their heterogeneity they are very complex to program and even more to achieve performance portability on different devices. This paper presents EngineCL, a new OpenCL-based runtime system that notably simplifies the execution of a single massive data-parallel kernel on a heterogeneous system. It performs a set of low level tasks regarding the management of devices and their disjoint memory spaces. EngineCL has been validated in two different architectures with a set of devices. Experimental results show that it has excellent usability and a negligible overhead compared to the native version.


Deception in Optimal Control

In this paper, we consider an adversarial scenario where one agent seeks to achieve an objective and its adversary seeks to learn the agent’s intentions and prevent the agent from achieving its objective. The agent has an incentive to try to deceive the adversary about its intentions, while at the same time working to achieve its objective. The primary contribution of this paper is to introduce a mathematically rigorous framework for the notion of deception within the context of optimal control. The central notion introduced in the paper is that of a belief-induced reward: a reward dependent not only on the agent’s state and action, but also adversary’s beliefs. Design of an optimal deceptive strategy then becomes a question of optimal control design on the product of the agent’s state space and the adversary’s belief space. The proposed framework allows for deception to be defined in an arbitrary control system endowed with a reward function, as well as with additional specifications limiting the agent’s control policy. In addition to defining deception, we discuss design of optimally deceptive strategies under uncertainties in agent’s knowledge about the adversary’s learning process. In the latter part of the paper, we focus on a setting where the agent’s behavior is governed by a Markov decision process, and show that the design of optimally deceptive strategies under lack of knowledge about the adversary naturally reduces to previously discussed problems in control design on partially observable or uncertain Markov decision processes. Finally, we present two examples of deceptive strategies: a ‘cops and robbers’ scenario and an example where an agent may use camouflage while moving. We show that optimally deceptive strategies in such examples follow the intuitive idea of how to deceive an adversary in the above settings.


Parallel Computation of PDFs on Big Spatial Data Using Spark

We consider big spatial data, which is typically produced in scientific areas such as geological or seismic interpretation. The spatial data can be produced by observation (e.g. using sensors or soil instrument) or numerical simulation programs and correspond to points that represent a 3D soil cube area. However, errors in signal processing and modeling create some uncertainty, and thus a lack of accuracy in identifying geological or seismic phenomenons. Such uncertainty must be carefully analyzed. To analyze uncertainty, the main solution is to compute a Probability Density Function (PDF) of each point in the spatial cube area. However, computing PDFs on big spatial data can be very time consuming (from several hours to even months on a parallel computer). In this paper, we propose a new solution to efficiently compute such PDFs in parallel using Spark, with three methods: data grouping, machine learning prediction and sampling. We evaluate our solution by extensive experiments on different computer clusters using big data ranging from hundreds of GB to several TB. The experimental results show that our solution scales up very well and can reduce the execution time by a factor of 33 (in the order of seconds or minutes) compared with a baseline method.


A review of neuro-fuzzy systems based on intelligent control

The system’s ability to adapt and self-organize are two key factors when it comes to how well the system can survive the changes to the environment and the plant they work within. Intelligent control improves these two factors in controllers. Considering the increasing complexity of dynamic systems along with their need for feedback controls, using more complicated controls has become necessary and intelligent control can be a suitable response to this necessity. This paper briefly describes the structure of intelligent control and provides a review on fuzzy logic and neural networks which are some of the base methods for intelligent control. The different aspects of these two methods are then compared together and an example of a combined method is presented.


Online Connected Dominating Set Leasing

We introduce the \emph{Online Connected Dominating Set Leasing} problem (OCDSL) in which we are given an undirected connected graph G = (V, E), a set \mathcal{L} of lease types each characterized by a duration and cost, and a sequence of subsets of V arriving over time. A node can be leased using lease type l for cost c_l and remains active for time d_l. The adversary gives in each step t a subset of nodes that need to be dominated by a connected subgraph consisting of nodes active at time t. The goal is to minimize the total leasing costs. OCDSL contains the \emph{Parking Permit Problem}~\cite{PPP} as a special subcase and generalizes the classical offline \emph{Connected Dominating Set} problem~\cite{Guha1998}. It has an \Omega(\log ^2 n + \log |\mathcal{L}|) randomized lower bound resulting from lower bounds for the \emph{Parking Permit Problem} and the \emph{Online Set Cover} problem~\cite{Alon:2003:OSC:780542.780558,Korman}, where |\mathcal{L}| is the number of available lease types and n is the number of nodes in the input graph. We give a randomized \mathcal{O}(\log ^2 n + \log |\mathcal{L}| \log n)-competitive algorithm for OCDSL. We also give a deterministic algorithm for a variant of OCDSL in which the dominating subgraph need not be connected, the \emph{Online Dominating Set Leasing} problem. The latter is based on a simple primal-dual approach and has an \mathcal{O}(|\mathcal{L}| \cdot \Delta)-competitive ratio, where \Delta is the maximum degree of the input graph.


Predicting Graph Categories from Structural Properties

Complex networks are often categorized according to the underlying phenomena that they represent such as molecular interactions, re-tweets, and brain activity. In this work, we investigate the problem of predicting the category (domain) of arbitrary networks. This includes complex networks from different domains as well as synthetically generated graphs from five different network models. A classification accuracy of 96.6\% is achieved using a random forest classifier with both real and synthetic networks. This work makes two important findings. First, our results indicate that complex networks from various domains have distinct structural properties that allow us to predict with high accuracy the category of a new previously unseen network. Second, synthetic graphs are trivial to classify as the classification model can predict with near-certainty the network model used to generate it. Overall, the results demonstrate that networks drawn from different domains (and network models) are trivial to distinguish using only a handful of simple structural properties.


Image Super-Resolution via Dual-State Recurrent Networks

Advances in image super-resolution (SR) have recently benefited significantly from rapid developments in deep neural networks. Inspired by these recent discoveries, we note that many state-of-the-art deep SR architectures can be reformulated as a single-state recurrent neural network (RNN) with finite unfoldings. In this paper, we explore new structures for SR based on this compact RNN view, leading us to a dual-state design, the Dual-State Recurrent Network (DSRN). Compared to its single state counterparts that operate at a fixed spatial resolution, DSRN exploits both low-resolution (LR) and high-resolution (HR) signals jointly. Recurrent signals are exchanged between these states in both directions (both LR to HR and HR to LR) via delayed feedback. Extensive quantitative and qualitative evaluations on benchmark datasets and on a recent challenge demonstrate that the proposed DSRN performs favorably against state-of-the-art algorithms in terms of both memory consumption and predictive accuracy.


Constructing an Interaction Behavior Model for Web Image Search

User interaction behavior is a valuable source of implicit relevance feedback. In Web image search a different type of search result presentation is used than in general Web search, which leads to different interaction mechanisms and user behavior. For example, image search results are self-contained, so that users do not need to click the results to view the landing page as in general Web search, which generates sparse click data. Also, two-dimensional result placement instead of a linear result list makes browsing behaviors more complex. Thus, it is hard to apply standard user behavior models (e.g., click models) developed for general Web search to Web image search. In this paper, we conduct a comprehensive image search user behavior analysis using data from a lab-based user study as well as data from a commercial search log. We then propose a novel interaction behavior model, called grid-based user browsing model (GUBM), whose design is motivated by observations from our data analysis. GUBM can both capture users’ interaction behavior, including cursor hovering, and alleviate position bias. The advantages of GUBM are two-fold: (1) It is based on an unsupervised learning method and does not need manually annotated data for training. (2) It is based on user interaction features on search engine result pages (SERPs) and is easily transferable to other scenarios that have a grid-based interface such as video search engines. We conduct extensive experiments to test the performance of our model using a large-scale commercial image search log. Experimental results show that in terms of behavior prediction (perplexity), and topical relevance and image quality (normalized discounted cumulative gain (NDCG)), GUBM outperforms state-of-the-art baseline models as well as the original ranking. We make the implementation of GUBM and related datasets publicly available for future studies.


Attention-based Hierarchical Neural Query Suggestion

Query suggestions help users of a search engine to refine their queries. Previous work on query suggestion has mainly focused on incorporating directly observable features such as query co-occurrence and semantic similarity. The structure of such features is often set manually, as a result of which hidden dependencies between queries and users may be ignored. We propose an AHNQS model that combines a hierarchical structure with a session-level neural network and a user-level neural network to model the short- and long-term search history of a user. An attention mechanism is used to capture user preferences. We quantify the improvements of AHNQS over state-of-the-art RNN-based query suggestion baselines on the AOL query log dataset, with improvements of up to 21.86% and 22.99% in terms of MRR@10 and Recall@10, respectively, over the state-of-the-art; improvements are especially large for short sessions.


Several Tunable GMM Kernels

While tree methods have been popular in practice, researchers and practitioners are also looking for simple algorithms which can reach similar accuracy of trees. In 2010, (Ping Li UAI’10) developed the method of ‘abc-robust-logitboost’ and compared it with other supervised learning methods on datasets used by the deep learning literature. In this study, we propose a series of ‘tunable GMM kernels’ which are simple and perform largely comparably to tree methods on the same datasets. Note that ‘abc-robust-logitboost’ substantially improved the original ‘GDBT’ in that (a) it developed a tree-split formula based on second-order information of the derivatives of the loss function; (b) it developed a new set of derivatives for multi-class classification formulation. In the prior study in 2017, the ‘generalized min-max’ (GMM) kernel was shown to have good performance compared to the ‘radial-basis function’ (RBF) kernel. However, as demonstrated in this paper, the original GMM kernel is often not as competitive as tree methods on the datasets used in the deep learning literature. Since the original GMM kernel has no parameters, we propose tunable GMM kernels by adding tuning parameters in various ways. Three basic (i.e., with only one parameter) GMM kernels are the ‘eGMM kernel’, ‘pGMM kernel’, and ‘\gammaGMM kernel’, respectively. Extensive experiments show that they are able to produce good results for a large number of classification tasks. Furthermore, the basic kernels can be combined to boost the performance.


Tile2Vec: Unsupervised representation learning for remote sensing data

Remote sensing lacks methods like the word vector representations and pre-trained networks that significantly boost performance across a wide range of natural language and computer vision tasks. To fill this gap, we introduce Tile2Vec, an unsupervised representation learning algorithm that extends the distributional hypothesis from natural language — words appearing in similar contexts tend to have similar meanings — to geospatial data. We demonstrate empirically that Tile2Vec learns semantically meaningful representations on three datasets. Our learned representations significantly improve performance in downstream classification tasks and similarly to word vectors, visual analogies can be obtained by simple arithmetic in the latent space.


Online normalizer calculation for softmax

The Softmax function is ubiquitous in machine learning, multiple previous works suggested faster alternatives for it. In this paper we propose a way to compute classical Softmax with fewer memory accesses and hypothesize that this reduction in memory accesses should improve Softmax performance on actual hardware. The benchmarks confirm this hypothesis: Softmax accelerates by up to 1.3x and Softmax+TopK combined by up to 5x.


Finding Frequent Entities in Continuous Data

In many applications that involve processing high-dimensional data, it is important to identify a small set of entities that account for a significant fraction of detections. Rather than formalize this as a clustering problem, in which all detections must be grouped into hard or soft categories, we formalize it as an instance of the frequent items or heavy hitters problem, which finds groups of tightly clustered objects that have a high density in the feature space. We show that the heavy hitters formulation generates solutions that are more accurate and effective than the clustering formulation. In addition, we present a novel online algorithm for heavy hitters, called HAC, which addresses problems in continuous space, and demonstrate its effectiveness on real video and household domains.


Augmenting Recurrent Neural Networks with High-Order User-Contextual Preference for Session-Based Recommendation

The recent adoption of recurrent neural networks (RNNs) for session modeling has yielded substantial performance gains compared to previous approaches. In terms of context-aware session modeling, however, the existing RNN-based models are limited in that they are not designed to explicitly model rich static user-side contexts (e.g., age, gender, location). Therefore, in this paper, we explore the utility of explicit user-side context modeling for RNN session models. Specifically, we propose an augmented RNN (ARNN) model that extracts high-order user-contextual preference using the product-based neural network (PNN) in order to augment any existing RNN session model. Evaluation results show that our proposed model outperforms the baseline RNN session model by a large margin when rich user-side contexts are available.


Using Simpson’s Paradox to Discover Interesting Patterns in Behavioral Data

We describe a data-driven discovery method that leverages Simpson’s paradox to uncover interesting patterns in behavioral data. Our method systematically disaggregates data to identify subgroups within a population whose behavior deviates significantly from the rest of the population. Given an outcome of interest and a set of covariates, the method follows three steps. First, it disaggregates data into subgroups, by conditioning on a particular covariate, so as minimize the variation of the outcome within the subgroups. Next, it models the outcome as a linear function of another covariate, both in the subgroups and in the aggregate data. Finally, it compares trends to identify disaggregations that produce subgroups with different behaviors from the aggregate. We illustrate the method by applying it to three real-world behavioral datasets, including Q\&A site Stack Exchange and online learning platforms Khan Academy and Duolingo.


Learning on the Edge: Explicit Boundary Handling in CNNs

Convolutional neural networks (CNNs) handle the case where filters extend beyond the image boundary using several heuristics, such as zero, repeat or mean padding. These schemes are applied in an ad-hoc fashion and, being weakly related to the image content and oblivious of the target task, result in low output quality at the boundary. In this paper, we propose a simple and effective improvement that learns the boundary handling itself. At training-time, the network is provided with a separate set of explicit boundary filters. At testing-time, we use these filters which have learned to extrapolate features at the boundary in an optimal way for the specific task. Our extensive evaluation, over a wide range of architectural changes (variations of layers, feature channels, or both), shows how the explicit filters result in improved boundary handling. Consequently, we demonstrate an improvement of 5% to 20% across the board of typical CNN applications (colorization, de-Bayering, optical flow, and disparity estimation).


Modeling, Simulation and Fairness Analysis of Wi-Fi and Unlicensed LTE Coexistence
FASK with Interventional Knowledge Recovers Edges from the Sachs Model
A Spiking Neural Dynamical Drift-Diffusion Model on Collective Decision Making with Self-Organized Criticality
Polynomial Convergence of Gradient Descent for Training One-Hidden-Layer Neural Networks
Multichannel Distributed Local Pattern for Content Based Indexing and Retrieval
Traversing the Schrödinger Bridge strait: Robert Fortet’s marvelous proof redux
Span Program for Non-binary Functions
Anti-van der Waerden Numbers of Graph Products
Synaptic Cleft Segmentation in Non-Isotropic Volume Electron Microscopy of the Complete Drosophila Brain
Detecting Compressed Cleartext Traffic from Consumer Internet of Things Devices
Building Disease Detection Algorithms with Very Small Numbers of Positive Samples
Learning Optical Flow via Dilated Networks and Occlusion Reasoning
Variable Support Control for the Wave Equation: A Multiplier Approach
A Ramsey theorem for pairs in trees
A theory for the dynamics of glassy mixtures with particle size swaps
Verisimilar Percept Sequences Tests for Autonomous Driving Intelligent Agent Assessment
Multi-agent formation control for circumnavigation of dynamic shapes
3D printing of a leaf spring: A demonstration of closed-loop control in additive manufacturing
Phase dynamics of oscillating magnetizations coupled via spin pumping
What game are we playing? End-to-end learning in normal and extensive form games
Theoretical challenges towards cutting-plane selection
Fast Online Exact Solutions for Deterministic MDPs with Sparse Rewards
ReGAN: RE[LAX|BAR|INFORCE] based Sequence Generation using GANs
Robust Estimation of Reactive Power for an Active Distribution System
Live Recovery of Bit Corruptions in Datacenter Storage Systems
FFNet: Video Fast-Forwarding via Reinforcement Learning
Combo Loss: Handling Input and Output Imbalance in Multi-Organ Segmentation
Potential Negative Impact on Reliability of Distributed Generation under Temporary Faults
Convergence of random variables and convergence rates in the law of large numbers
Polarization Weight Family Methods for Polar Code Construction
Blockchain for the IoT: Opportunities and Challenges
How Cox models react to a study-specific confounder in a patient-level pooled dataset: Random-effects better cope with an imbalanced covariate across trials unless baseline hazards differ
Hierarchical Structured Model for Fine-to-coarse Manifesto Text Analysis
N2RPP: An Adversarial Network to Rebuild Plantar Pressure for ACLD Patients
Optimal Subspace Estimation Using Overidentifying Vectors via Generalized Method of Moments
Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit
Identification of Hessian matrix in distributed gradient-based multi-agent coordination control systems
Weakly-Supervised Video Object Grounding from Text by Loss Weighting and Object Interaction
Continuous-time Opinion Dynamics on Multiple Interdependent Topics
A Memory Network Approach for Story-based Temporal Summarization of 360° Videos
Fighting Accounting Fraud Through Forensic Data Analytics
Upper Energy Bounds for Spherical Designs of Relatively Small Cardinalities
Flexible Multi-Numerology Systems for 5G New Radio
Learning Generalized Hypergeometric Distribution (GHD) DAG models
Joint Cell Nuclei Detection and Segmentation in Microscopy Images Using 3D Convolutional Networks
Dichotomy Results for Classified Rank-Maximal Matchings and Popular Matchings
Reasoning with Sarcasm by Reading In-between
On the Conditional Logic of Simulation Models
Visual Attribute-augmented Three-dimensional Convolutional Neural Network for Enhanced Human Action Recognition
Synthesizing Efficient Solutions for Patrolling Problems in the Internet Environment
Recursion formulas of q-Appell functions
Low-Latency Human Action Recognition with Weighted Multi-Region Convolutional Neural Network
Single parameter model of marriage divorce dynamics with countries classification
Affirmative Solutions On Local Antimagic Chromatic Number
Erratum for ‘Regularity structures and renormalisation of FitzHugh-Nagumo SPDEs in three space dimensions’
Note on Schramm-Loewner evolution for superconformal algebras
Movie rating prediction using content-based and link stream features
Driving maneuvers prediction based on cognition-driven and data-driven method
Survey and cross-benchmark comparison of remaining time prediction methods in business process monitoring
Simulation Study on Local Influence Diagnosis for Poisson Mixed-Effect Linear Model
Image Ordinal Classification and Understanding: Grid Dropout with Masking Label
Reliability-Based Windowed Decoding for Spatially-Coupled LDPC Codes
Doing good vs. avoiding bad in prosocial choice: A refined test and extension of the morality preference hypothesis
Profitable Bandits
Analysis of the optimal exercise boundary of American put option with delivery lags
Sets of Arithmetical Invariants in Transfer Krull Monoids
The Complexity of Limited Belief Reasoning — The Quantifier-Free Case
One ‘Ruler’ for All Languages: Multi-Lingual Dialogue Evaluation with Adversarial Multi-Task Learning
A High-Throughput Architecture of List Successive Cancellation Polar Codes Decoder with Large List Size
Interpretable Adversarial Perturbation in Input Embedding Space for Text
Learning Short-Cut Connections for Object Counting
Comparing phonemes and visemes with DNN-based lipreading
Cooperative Control of Multiple Agents with Unknown High-frequency Gain Signs under Unbalanced and Switching Topologies
An analogue of Edmonds’ Branching Theorem for infinite digraphs
Phoneme-to-viseme mappings: the good, the bad, and the ugly
Improving Character-level Japanese-Chinese Neural Machine Translation with Radicals as an Additional Input Feature
Error Rates for Unvalidated Medical Age Assessment Procedures
The interval number of a planar graph is at most three
Comparing heterogeneous visual gestures for measuring the diversity of visual speech signals
Combinatorial Hopf algebra for interconnected nonlinear systems
A Regression Model of Recurrent Deep Neural Networks for Noise Robust Estimation of the Fundamental Frequency Contour of Speech
Levelness of Order Polytopes
Multinomial Logit Bandit with Linear Utility Functions
Massively Parallel Algorithms for Finding Well-Connected Components in Sparse Graphs
A Simple and Efficient Strategy for the Coin Weighing Problem with a Spring Scale
Price-based Resource Allocation for Edge Computing: A Market Equilibrium Approach
Hierarchical inference for genome-wide association studies: a view on methodology with software
On Secure Exact-repair Regenerating Codes with a Single Pareto Optimal Point
Differential Equations for Modeling Asynchronous Algorithms
Bayesian models in geographic profiling
Moiré Photo Restoration Using Multiresolution Convolutional Neural Networks
Category-Based Deep CCA for Fine-Grained Venue Discovery from Multimodal Data
On the number of vertex-disjoint cycles in digraphs
An Implementation of List Successive Cancellation Decoder with Large List Size for Polar Codes
NeuRec: On Nonlinear Transformation for Personalized Ranking
Understanding the enhanced synchronization of delay-coupled networks with fluctuating topology
Efficient online learning for large-scale peptide identification
The Semi-Smooth Newton Method for a Class of Variational Inequalities
Disorder effects on the coupling strength of coupled photonic crystal slab cavities
Asymptotically Optimal One-Bit Quantizer Design for Weak-signal Detection in Generalized Gaussian Noise and Lossy Binary Communication Channel
Information Storage in the Stochastic Ising Model
A subgradient-based approach for finding the maximum feasible subsystem with respect to a set
Ideal Relative Flow Distribution on Directed Network
Binary Sparse Bayesian Learning Algorithm for One-bit Compressed Sensing
Lévy processes with respect to the index Whittaker convolution
Towards Accurate and High-Speed Spiking Neuromorphic Systems with Data Quantization-Aware Deep Networks
Parallel Graph Connectivity in Log Diameter Rounds
Fitting a function to time-dependent ensemble averaged data
Recurrent CNN for 3D Gaze Estimation using Appearance and Shape Cues
Overcoming the Imbalance Between Tag Recommendation Approaches and Real-World Folksonomy Structures with Cognitive-Inspired Algorithms
Association and other forms of positive dependence for Feller evolution systems
Active Object Reconstruction Using a Guided View Planner
Multipath Stealth Communication with Jammers
Fast Feature Extraction with CNNs with Pooling Layers
Functional Variable Selection for EMG-based Control of a Robotic Hand Prosthetic
Necessary Conditions for K/2 Degrees of Freedom
Ordinal Approximation for Social Choice, Matching, and Facility Location Problems given Candidate Positions
Secrecy Capacity under Limited Discussion Rate for Minimally Connected Hypergraphical Sources
On $k$-connected-homogeneous graphs
Distributed Multiple Access with Multiple Transmission Options at The Link Layer
Local, algebraic simplifications of Gaussian random fields
Bleaching Text: Abstract Features for Cross-lingual Gender Prediction
The extinction problem for a class of distylous plant populations
Population dynamics with moderate tails of the underlying random walk
Image Retrieval with Mixed Initiative and Multimodal Feedback
High-resolution medical image synthesis using progressively grown generative adversarial networks
PAD-Net: A Perception-Aided Single Image Dehazing Network
Round-Hashing for Data Storage: Distributed Servers and External-Memory Tables
Symmetry of minimizers of a Gaussian isoperimetric problem
Polite Dialogue Generation Without Parallel Data
Garden-of-Eden states and fixed points of monotone dynamical systems
Fair Allocation of Indivisible Public Goods
A construction of product blocks with a fixed block size
A reworked SOBI algorithm based on SCHUR Decomposition for EEG data processing
Superresolution method for data deconvolution by superposition of point sources
Visual Global Localization with a Hybrid WNN-CNN Approach
Dense sets of joint distributions appearing in filtration enlargements, stochastic control, and causal optimal transport
New methods to find patches of invisible integer lattice points
Learning image-to-image translation using paired and unpaired training samples
The Computational Complexity of Finding Hamiltonian Cycles in Grid Graphs of Semiregular Tessellations
Coordination Using Individually Shared Randomness
Suburban Residential Building Penetration Loss at 28 GHz for Fixed Wireless Access