Real-time regression analysis with deep convolutional neural networks
We discuss the development of novel deep learning algorithms to enable real-time regression analysis for time series data. We showcase the application of this new method with a timely case study, and then discuss the applicability of this approach to tackle similar challenges across science domains.
Assimilated LVEF: A Bayesian technique combining human intuition with machine measurement for sharper estimates of left ventricular ejection fraction and stronger association with outcomes
The cardiologist’s main tool for measuring systolic heart failure is left ventricular ejection fraction (LVEF). Trained cardiologist’s report both a visual and machine-guided measurement of LVEF, but only use this machine-guided measurement in analysis. We use a Bayesian technique to combine visual and machine-guided estimates from the PARTNER-IIA Trial, a cohort of patients with aortic stenosis at moderate risk treated with bioprosthetic aortic valves, and find our combined estimate reduces measurement errors and improves the association between LVEF and a 1-year composite endpoint.
Crossing points in survival analysis sensitively depend on system conditions
Crossing survival curves complicate how we interpret results from a clinical trial’s primary endpoint. We find the function to determine a crossing point’s location depends exponentially on individual survival curves. This exponential relationship between survival curves and the crossing point transforms small survival curve errors into large crossing point errors. In most cases, crossing points are sensitive to individual survival errors and may make accurately locating a crossing point unsuccessful. We argue more complicated analyses for mitigating crossing points should be reserved only after first exploring a crossing point’s variability, or hypothesis tests account for crossing point variability.
Hierarchical Temporal Memory using Memristor Networks: A Survey
This paper presents a survey of the currently available hardware designs for implementation of the human cortex inspired algorithm, Hierarchical Temporal Memory (HTM). In this review, we focus on the state of the art advances of memristive HTM implementation and related HTM applications. With the advent of edge computing, HTM can be a potential algorithm to implement on-chip near sensor data processing. The comparison of analog memristive circuit implementations with the digital and mixed-signal solutions are provided. The advantages of memristive HTM over digital implementations against performance metrics such as processing speed, reduced on-chip area and power dissipation are discussed. The limitations and open problems concerning the memristive HTM, such as the design scalability, sneak currents, leakage, parasitic effects, lack of the analog learning circuits implementations and unreliability of the memristive devices integrated with CMOS circuits are also discussed.
Efficient Design of Hardware-Enabled Recurrent Neural Networks
In this work, we propose a new approach towards the efficient design of reservoir computing hardware. First, we adapt the reservoir input mask to the structure of the data via linear autoencoders. We therefore incorporate the advantages of dimensionality reduction and dimensionality expansion achieved by conventional and efficient linear algebra procedures of principal component analysis. Second, we employ evolutionary-inspired genetic algorithm techniques resulting in a highly efficient optimization of reservoir dynamics. We illustrate the method on the so-called single-node reservoir computing architecture, especially suitable for implementation in ultrahigh-speed hardware. The combination of both methods and the resulting reduction of time required for performance optimization of a hardware system establish a strategy towards machine learning hardware capable of self-adaption to optimally solve specific problems. We confirm the validity of those principles building RC hardware based on a field-programmable gate array.
Holarchic Structures for Decentralized Deep Learning – A Performance Analysis
Structure plays a key role in learning performance. In centralized computational systems, hyperparameter optimization and regularization techniques such as dropout are computational means to enhance learning performance by adjusting the deep hierarchical structure. However, in decentralized deep learning by the Internet of Things, the structure is an actual network of autonomous interconnected devices such as smart phones that interact via complex network protocols. Adjustments in the learning structure are a challenge. Uncertainties such as network latency, node and link failures or even bottlenecks by limited processing capacity and energy availability can significantly downgrade learning performance. Network self-organization and self-management is complex, while it requires additional computational and network resources that hinder the feasibility of decentralized deep learning. In contrast, this paper introduces reusable holarchic learning structures for exploring, mitigating and boosting learning performance in distributed environments with uncertainties. A large-scale performance analysis with 864000 experiments fed with synthetic and real-world data from smart grid and smart city pilot projects confirm the cost-effectiveness of holarchic structures for decentralized deep learning.
EngineCL: Usability and Performance in Heterogeneous Computing
Heterogeneous systems composed by a CPU and a set of hardware accelerators have become one of the most common architectures today, thanks to their excellent performance and energy consumption. However, due to their heterogeneity they are very complex to program and even more to achieve performance portability on different devices. This paper presents EngineCL, a new OpenCL-based runtime system that notably simplifies the execution of a single massive data-parallel kernel on a heterogeneous system. It performs a set of low level tasks regarding the management of devices and their disjoint memory spaces. EngineCL has been validated in two different architectures with a set of devices. Experimental results show that it has excellent usability and a negligible overhead compared to the native version.
Deception in Optimal Control
In this paper, we consider an adversarial scenario where one agent seeks to achieve an objective and its adversary seeks to learn the agent’s intentions and prevent the agent from achieving its objective. The agent has an incentive to try to deceive the adversary about its intentions, while at the same time working to achieve its objective. The primary contribution of this paper is to introduce a mathematically rigorous framework for the notion of deception within the context of optimal control. The central notion introduced in the paper is that of a belief-induced reward: a reward dependent not only on the agent’s state and action, but also adversary’s beliefs. Design of an optimal deceptive strategy then becomes a question of optimal control design on the product of the agent’s state space and the adversary’s belief space. The proposed framework allows for deception to be defined in an arbitrary control system endowed with a reward function, as well as with additional specifications limiting the agent’s control policy. In addition to defining deception, we discuss design of optimally deceptive strategies under uncertainties in agent’s knowledge about the adversary’s learning process. In the latter part of the paper, we focus on a setting where the agent’s behavior is governed by a Markov decision process, and show that the design of optimally deceptive strategies under lack of knowledge about the adversary naturally reduces to previously discussed problems in control design on partially observable or uncertain Markov decision processes. Finally, we present two examples of deceptive strategies: a ‘cops and robbers’ scenario and an example where an agent may use camouflage while moving. We show that optimally deceptive strategies in such examples follow the intuitive idea of how to deceive an adversary in the above settings.
Parallel Computation of PDFs on Big Spatial Data Using Spark
We consider big spatial data, which is typically produced in scientific areas such as geological or seismic interpretation. The spatial data can be produced by observation (e.g. using sensors or soil instrument) or numerical simulation programs and correspond to points that represent a 3D soil cube area. However, errors in signal processing and modeling create some uncertainty, and thus a lack of accuracy in identifying geological or seismic phenomenons. Such uncertainty must be carefully analyzed. To analyze uncertainty, the main solution is to compute a Probability Density Function (PDF) of each point in the spatial cube area. However, computing PDFs on big spatial data can be very time consuming (from several hours to even months on a parallel computer). In this paper, we propose a new solution to efficiently compute such PDFs in parallel using Spark, with three methods: data grouping, machine learning prediction and sampling. We evaluate our solution by extensive experiments on different computer clusters using big data ranging from hundreds of GB to several TB. The experimental results show that our solution scales up very well and can reduce the execution time by a factor of 33 (in the order of seconds or minutes) compared with a baseline method.
A review of neuro-fuzzy systems based on intelligent control
The system’s ability to adapt and self-organize are two key factors when it comes to how well the system can survive the changes to the environment and the plant they work within. Intelligent control improves these two factors in controllers. Considering the increasing complexity of dynamic systems along with their need for feedback controls, using more complicated controls has become necessary and intelligent control can be a suitable response to this necessity. This paper briefly describes the structure of intelligent control and provides a review on fuzzy logic and neural networks which are some of the base methods for intelligent control. The different aspects of these two methods are then compared together and an example of a combined method is presented.
Online Connected Dominating Set Leasing
We introduce the \emph{Online Connected Dominating Set Leasing} problem (OCDSL) in which we are given an undirected connected graph
, a set
of lease types each characterized by a duration and cost, and a sequence of subsets of
arriving over time. A node can be leased using lease type
for cost
and remains active for time
. The adversary gives in each step
a subset of nodes that need to be dominated by a connected subgraph consisting of nodes active at time
. The goal is to minimize the total leasing costs. OCDSL contains the \emph{Parking Permit Problem}~\cite{PPP} as a special subcase and generalizes the classical offline \emph{Connected Dominating Set} problem~\cite{Guha1998}. It has an
randomized lower bound resulting from lower bounds for the \emph{Parking Permit Problem} and the \emph{Online Set Cover} problem~\cite{Alon:2003:OSC:780542.780558,Korman}, where
is the number of available lease types and
is the number of nodes in the input graph. We give a randomized
-competitive algorithm for OCDSL. We also give a deterministic algorithm for a variant of OCDSL in which the dominating subgraph need not be connected, the \emph{Online Dominating Set Leasing} problem. The latter is based on a simple primal-dual approach and has an
-competitive ratio, where
is the maximum degree of the input graph.
Predicting Graph Categories from Structural Properties
Complex networks are often categorized according to the underlying phenomena that they represent such as molecular interactions, re-tweets, and brain activity. In this work, we investigate the problem of predicting the category (domain) of arbitrary networks. This includes complex networks from different domains as well as synthetically generated graphs from five different network models. A classification accuracy of
is achieved using a random forest classifier with both real and synthetic networks. This work makes two important findings. First, our results indicate that complex networks from various domains have distinct structural properties that allow us to predict with high accuracy the category of a new previously unseen network. Second, synthetic graphs are trivial to classify as the classification model can predict with near-certainty the network model used to generate it. Overall, the results demonstrate that networks drawn from different domains (and network models) are trivial to distinguish using only a handful of simple structural properties.
Image Super-Resolution via Dual-State Recurrent Networks
Advances in image super-resolution (SR) have recently benefited significantly from rapid developments in deep neural networks. Inspired by these recent discoveries, we note that many state-of-the-art deep SR architectures can be reformulated as a single-state recurrent neural network (RNN) with finite unfoldings. In this paper, we explore new structures for SR based on this compact RNN view, leading us to a dual-state design, the Dual-State Recurrent Network (DSRN). Compared to its single state counterparts that operate at a fixed spatial resolution, DSRN exploits both low-resolution (LR) and high-resolution (HR) signals jointly. Recurrent signals are exchanged between these states in both directions (both LR to HR and HR to LR) via delayed feedback. Extensive quantitative and qualitative evaluations on benchmark datasets and on a recent challenge demonstrate that the proposed DSRN performs favorably against state-of-the-art algorithms in terms of both memory consumption and predictive accuracy.
Constructing an Interaction Behavior Model for Web Image Search
User interaction behavior is a valuable source of implicit relevance feedback. In Web image search a different type of search result presentation is used than in general Web search, which leads to different interaction mechanisms and user behavior. For example, image search results are self-contained, so that users do not need to click the results to view the landing page as in general Web search, which generates sparse click data. Also, two-dimensional result placement instead of a linear result list makes browsing behaviors more complex. Thus, it is hard to apply standard user behavior models (e.g., click models) developed for general Web search to Web image search. In this paper, we conduct a comprehensive image search user behavior analysis using data from a lab-based user study as well as data from a commercial search log. We then propose a novel interaction behavior model, called grid-based user browsing model (GUBM), whose design is motivated by observations from our data analysis. GUBM can both capture users’ interaction behavior, including cursor hovering, and alleviate position bias. The advantages of GUBM are two-fold: (1) It is based on an unsupervised learning method and does not need manually annotated data for training. (2) It is based on user interaction features on search engine result pages (SERPs) and is easily transferable to other scenarios that have a grid-based interface such as video search engines. We conduct extensive experiments to test the performance of our model using a large-scale commercial image search log. Experimental results show that in terms of behavior prediction (perplexity), and topical relevance and image quality (normalized discounted cumulative gain (NDCG)), GUBM outperforms state-of-the-art baseline models as well as the original ranking. We make the implementation of GUBM and related datasets publicly available for future studies.
Attention-based Hierarchical Neural Query Suggestion
Query suggestions help users of a search engine to refine their queries. Previous work on query suggestion has mainly focused on incorporating directly observable features such as query co-occurrence and semantic similarity. The structure of such features is often set manually, as a result of which hidden dependencies between queries and users may be ignored. We propose an AHNQS model that combines a hierarchical structure with a session-level neural network and a user-level neural network to model the short- and long-term search history of a user. An attention mechanism is used to capture user preferences. We quantify the improvements of AHNQS over state-of-the-art RNN-based query suggestion baselines on the AOL query log dataset, with improvements of up to 21.86% and 22.99% in terms of MRR@10 and Recall@10, respectively, over the state-of-the-art; improvements are especially large for short sessions.
Several Tunable GMM Kernels
While tree methods have been popular in practice, researchers and practitioners are also looking for simple algorithms which can reach similar accuracy of trees. In 2010, (Ping Li UAI’10) developed the method of ‘abc-robust-logitboost’ and compared it with other supervised learning methods on datasets used by the deep learning literature. In this study, we propose a series of ‘tunable GMM kernels’ which are simple and perform largely comparably to tree methods on the same datasets. Note that ‘abc-robust-logitboost’ substantially improved the original ‘GDBT’ in that (a) it developed a tree-split formula based on second-order information of the derivatives of the loss function; (b) it developed a new set of derivatives for multi-class classification formulation. In the prior study in 2017, the ‘generalized min-max’ (GMM) kernel was shown to have good performance compared to the ‘radial-basis function’ (RBF) kernel. However, as demonstrated in this paper, the original GMM kernel is often not as competitive as tree methods on the datasets used in the deep learning literature. Since the original GMM kernel has no parameters, we propose tunable GMM kernels by adding tuning parameters in various ways. Three basic (i.e., with only one parameter) GMM kernels are the ‘
GMM kernel’, ‘
GMM kernel’, and ‘
GMM kernel’, respectively. Extensive experiments show that they are able to produce good results for a large number of classification tasks. Furthermore, the basic kernels can be combined to boost the performance.
Tile2Vec: Unsupervised representation learning for remote sensing data
Remote sensing lacks methods like the word vector representations and pre-trained networks that significantly boost performance across a wide range of natural language and computer vision tasks. To fill this gap, we introduce Tile2Vec, an unsupervised representation learning algorithm that extends the distributional hypothesis from natural language — words appearing in similar contexts tend to have similar meanings — to geospatial data. We demonstrate empirically that Tile2Vec learns semantically meaningful representations on three datasets. Our learned representations significantly improve performance in downstream classification tasks and similarly to word vectors, visual analogies can be obtained by simple arithmetic in the latent space.
Online normalizer calculation for softmax
The Softmax function is ubiquitous in machine learning, multiple previous works suggested faster alternatives for it. In this paper we propose a way to compute classical Softmax with fewer memory accesses and hypothesize that this reduction in memory accesses should improve Softmax performance on actual hardware. The benchmarks confirm this hypothesis: Softmax accelerates by up to 1.3x and Softmax+TopK combined by up to 5x.
Finding Frequent Entities in Continuous Data
In many applications that involve processing high-dimensional data, it is important to identify a small set of entities that account for a significant fraction of detections. Rather than formalize this as a clustering problem, in which all detections must be grouped into hard or soft categories, we formalize it as an instance of the frequent items or heavy hitters problem, which finds groups of tightly clustered objects that have a high density in the feature space. We show that the heavy hitters formulation generates solutions that are more accurate and effective than the clustering formulation. In addition, we present a novel online algorithm for heavy hitters, called HAC, which addresses problems in continuous space, and demonstrate its effectiveness on real video and household domains.
Augmenting Recurrent Neural Networks with High-Order User-Contextual Preference for Session-Based Recommendation
The recent adoption of recurrent neural networks (RNNs) for session modeling has yielded substantial performance gains compared to previous approaches. In terms of context-aware session modeling, however, the existing RNN-based models are limited in that they are not designed to explicitly model rich static user-side contexts (e.g., age, gender, location). Therefore, in this paper, we explore the utility of explicit user-side context modeling for RNN session models. Specifically, we propose an augmented RNN (ARNN) model that extracts high-order user-contextual preference using the product-based neural network (PNN) in order to augment any existing RNN session model. Evaluation results show that our proposed model outperforms the baseline RNN session model by a large margin when rich user-side contexts are available.
Using Simpson’s Paradox to Discover Interesting Patterns in Behavioral Data
We describe a data-driven discovery method that leverages Simpson’s paradox to uncover interesting patterns in behavioral data. Our method systematically disaggregates data to identify subgroups within a population whose behavior deviates significantly from the rest of the population. Given an outcome of interest and a set of covariates, the method follows three steps. First, it disaggregates data into subgroups, by conditioning on a particular covariate, so as minimize the variation of the outcome within the subgroups. Next, it models the outcome as a linear function of another covariate, both in the subgroups and in the aggregate data. Finally, it compares trends to identify disaggregations that produce subgroups with different behaviors from the aggregate. We illustrate the method by applying it to three real-world behavioral datasets, including Q\&A site Stack Exchange and online learning platforms Khan Academy and Duolingo.
Learning on the Edge: Explicit Boundary Handling in CNNs
Convolutional neural networks (CNNs) handle the case where filters extend beyond the image boundary using several heuristics, such as zero, repeat or mean padding. These schemes are applied in an ad-hoc fashion and, being weakly related to the image content and oblivious of the target task, result in low output quality at the boundary. In this paper, we propose a simple and effective improvement that learns the boundary handling itself. At training-time, the network is provided with a separate set of explicit boundary filters. At testing-time, we use these filters which have learned to extrapolate features at the boundary in an optimal way for the specific task. Our extensive evaluation, over a wide range of architectural changes (variations of layers, feature channels, or both), shows how the explicit filters result in improved boundary handling. Consequently, we demonstrate an improvement of 5% to 20% across the board of typical CNN applications (colorization, de-Bayering, optical flow, and disparity estimation).
• Modeling, Simulation and Fairness Analysis of Wi-Fi and Unlicensed LTE Coexistence
• FASK with Interventional Knowledge Recovers Edges from the Sachs Model
• A Spiking Neural Dynamical Drift-Diffusion Model on Collective Decision Making with Self-Organized Criticality
• Polynomial Convergence of Gradient Descent for Training One-Hidden-Layer Neural Networks
• Multichannel Distributed Local Pattern for Content Based Indexing and Retrieval
• Traversing the Schrödinger Bridge strait: Robert Fortet’s marvelous proof redux
• Span Program for Non-binary Functions
• Anti-van der Waerden Numbers of Graph Products
• Synaptic Cleft Segmentation in Non-Isotropic Volume Electron Microscopy of the Complete Drosophila Brain
• Detecting Compressed Cleartext Traffic from Consumer Internet of Things Devices
• Building Disease Detection Algorithms with Very Small Numbers of Positive Samples
• Learning Optical Flow via Dilated Networks and Occlusion Reasoning
• Variable Support Control for the Wave Equation: A Multiplier Approach
• A Ramsey theorem for pairs in trees
• A theory for the dynamics of glassy mixtures with particle size swaps
• Verisimilar Percept Sequences Tests for Autonomous Driving Intelligent Agent Assessment
• Multi-agent formation control for circumnavigation of dynamic shapes
• 3D printing of a leaf spring: A demonstration of closed-loop control in additive manufacturing
• Phase dynamics of oscillating magnetizations coupled via spin pumping
• What game are we playing? End-to-end learning in normal and extensive form games
• Theoretical challenges towards cutting-plane selection
• Fast Online Exact Solutions for Deterministic MDPs with Sparse Rewards
• ReGAN: RE[LAX|BAR|INFORCE] based Sequence Generation using GANs
• Robust Estimation of Reactive Power for an Active Distribution System
• Live Recovery of Bit Corruptions in Datacenter Storage Systems
• FFNet: Video Fast-Forwarding via Reinforcement Learning
• Combo Loss: Handling Input and Output Imbalance in Multi-Organ Segmentation
• Potential Negative Impact on Reliability of Distributed Generation under Temporary Faults
• Convergence of random variables and convergence rates in the law of large numbers
• Polarization Weight Family Methods for Polar Code Construction
• Blockchain for the IoT: Opportunities and Challenges
• How Cox models react to a study-specific confounder in a patient-level pooled dataset: Random-effects better cope with an imbalanced covariate across trials unless baseline hazards differ
• Hierarchical Structured Model for Fine-to-coarse Manifesto Text Analysis
• N2RPP: An Adversarial Network to Rebuild Plantar Pressure for ACLD Patients
• Optimal Subspace Estimation Using Overidentifying Vectors via Generalized Method of Moments
• Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit
• Identification of Hessian matrix in distributed gradient-based multi-agent coordination control systems
• Weakly-Supervised Video Object Grounding from Text by Loss Weighting and Object Interaction
• Continuous-time Opinion Dynamics on Multiple Interdependent Topics
• A Memory Network Approach for Story-based Temporal Summarization of 360° Videos
• Fighting Accounting Fraud Through Forensic Data Analytics
• Upper Energy Bounds for Spherical Designs of Relatively Small Cardinalities
• Flexible Multi-Numerology Systems for 5G New Radio
• Learning Generalized Hypergeometric Distribution (GHD) DAG models
• Joint Cell Nuclei Detection and Segmentation in Microscopy Images Using 3D Convolutional Networks
• Dichotomy Results for Classified Rank-Maximal Matchings and Popular Matchings
• Reasoning with Sarcasm by Reading In-between
• On the Conditional Logic of Simulation Models
• Visual Attribute-augmented Three-dimensional Convolutional Neural Network for Enhanced Human Action Recognition
• Synthesizing Efficient Solutions for Patrolling Problems in the Internet Environment
• Recursion formulas of q-Appell functions
• Low-Latency Human Action Recognition with Weighted Multi-Region Convolutional Neural Network
• Single parameter model of marriage divorce dynamics with countries classification
• Affirmative Solutions On Local Antimagic Chromatic Number
• Erratum for ‘Regularity structures and renormalisation of FitzHugh-Nagumo SPDEs in three space dimensions’
• Note on Schramm-Loewner evolution for superconformal algebras
• Movie rating prediction using content-based and link stream features
• Driving maneuvers prediction based on cognition-driven and data-driven method
• Survey and cross-benchmark comparison of remaining time prediction methods in business process monitoring
• Simulation Study on Local Influence Diagnosis for Poisson Mixed-Effect Linear Model
• Image Ordinal Classification and Understanding: Grid Dropout with Masking Label
• Reliability-Based Windowed Decoding for Spatially-Coupled LDPC Codes
• Doing good vs. avoiding bad in prosocial choice: A refined test and extension of the morality preference hypothesis
• Profitable Bandits
• Analysis of the optimal exercise boundary of American put option with delivery lags
• Sets of Arithmetical Invariants in Transfer Krull Monoids
• The Complexity of Limited Belief Reasoning — The Quantifier-Free Case
• One ‘Ruler’ for All Languages: Multi-Lingual Dialogue Evaluation with Adversarial Multi-Task Learning
• A High-Throughput Architecture of List Successive Cancellation Polar Codes Decoder with Large List Size
• Interpretable Adversarial Perturbation in Input Embedding Space for Text
• Learning Short-Cut Connections for Object Counting
• Comparing phonemes and visemes with DNN-based lipreading
• Cooperative Control of Multiple Agents with Unknown High-frequency Gain Signs under Unbalanced and Switching Topologies
• An analogue of Edmonds’ Branching Theorem for infinite digraphs
• Phoneme-to-viseme mappings: the good, the bad, and the ugly
• Improving Character-level Japanese-Chinese Neural Machine Translation with Radicals as an Additional Input Feature
• Error Rates for Unvalidated Medical Age Assessment Procedures
• The interval number of a planar graph is at most three
• Comparing heterogeneous visual gestures for measuring the diversity of visual speech signals
• Combinatorial Hopf algebra for interconnected nonlinear systems
• A Regression Model of Recurrent Deep Neural Networks for Noise Robust Estimation of the Fundamental Frequency Contour of Speech
• Levelness of Order Polytopes
• Multinomial Logit Bandit with Linear Utility Functions
• Massively Parallel Algorithms for Finding Well-Connected Components in Sparse Graphs
• A Simple and Efficient Strategy for the Coin Weighing Problem with a Spring Scale
• Price-based Resource Allocation for Edge Computing: A Market Equilibrium Approach
• Hierarchical inference for genome-wide association studies: a view on methodology with software
• On Secure Exact-repair Regenerating Codes with a Single Pareto Optimal Point
• Differential Equations for Modeling Asynchronous Algorithms
• Bayesian models in geographic profiling
• Moiré Photo Restoration Using Multiresolution Convolutional Neural Networks
• Category-Based Deep CCA for Fine-Grained Venue Discovery from Multimodal Data
• On the number of vertex-disjoint cycles in digraphs
• An Implementation of List Successive Cancellation Decoder with Large List Size for Polar Codes
• NeuRec: On Nonlinear Transformation for Personalized Ranking
• Understanding the enhanced synchronization of delay-coupled networks with fluctuating topology
• Efficient online learning for large-scale peptide identification
• The Semi-Smooth Newton Method for a Class of Variational Inequalities
• Disorder effects on the coupling strength of coupled photonic crystal slab cavities
• Asymptotically Optimal One-Bit Quantizer Design for Weak-signal Detection in Generalized Gaussian Noise and Lossy Binary Communication Channel
• Information Storage in the Stochastic Ising Model
• A subgradient-based approach for finding the maximum feasible subsystem with respect to a set
• Ideal Relative Flow Distribution on Directed Network
• Binary Sparse Bayesian Learning Algorithm for One-bit Compressed Sensing
• Lévy processes with respect to the index Whittaker convolution
• Towards Accurate and High-Speed Spiking Neuromorphic Systems with Data Quantization-Aware Deep Networks
• Parallel Graph Connectivity in Log Diameter Rounds
• Fitting a function to time-dependent ensemble averaged data
• Recurrent CNN for 3D Gaze Estimation using Appearance and Shape Cues
• Overcoming the Imbalance Between Tag Recommendation Approaches and Real-World Folksonomy Structures with Cognitive-Inspired Algorithms
• Association and other forms of positive dependence for Feller evolution systems
• Active Object Reconstruction Using a Guided View Planner
• Multipath Stealth Communication with Jammers
• Fast Feature Extraction with CNNs with Pooling Layers
• Functional Variable Selection for EMG-based Control of a Robotic Hand Prosthetic
• Necessary Conditions for K/2 Degrees of Freedom
• Ordinal Approximation for Social Choice, Matching, and Facility Location Problems given Candidate Positions
• Secrecy Capacity under Limited Discussion Rate for Minimally Connected Hypergraphical Sources
• On $k$-connected-homogeneous graphs
• Distributed Multiple Access with Multiple Transmission Options at The Link Layer
• Local, algebraic simplifications of Gaussian random fields
• Bleaching Text: Abstract Features for Cross-lingual Gender Prediction
• The extinction problem for a class of distylous plant populations
• Population dynamics with moderate tails of the underlying random walk
• Image Retrieval with Mixed Initiative and Multimodal Feedback
• High-resolution medical image synthesis using progressively grown generative adversarial networks
• PAD-Net: A Perception-Aided Single Image Dehazing Network
• Round-Hashing for Data Storage: Distributed Servers and External-Memory Tables
• Symmetry of minimizers of a Gaussian isoperimetric problem
• Polite Dialogue Generation Without Parallel Data
• Garden-of-Eden states and fixed points of monotone dynamical systems
• Fair Allocation of Indivisible Public Goods
• A construction of product blocks with a fixed block size
• A reworked SOBI algorithm based on SCHUR Decomposition for EEG data processing
• Superresolution method for data deconvolution by superposition of point sources
• Visual Global Localization with a Hybrid WNN-CNN Approach
• Dense sets of joint distributions appearing in filtration enlargements, stochastic control, and causal optimal transport
• New methods to find patches of invisible integer lattice points
• Learning image-to-image translation using paired and unpaired training samples
• The Computational Complexity of Finding Hamiltonian Cycles in Grid Graphs of Semiregular Tessellations
• Coordination Using Individually Shared Randomness
• Suburban Residential Building Penetration Loss at 28 GHz for Fixed Wireless Access
Like this:
Like Loading...