


default search action
CoRR, January 2018
- Jenny Novacescu

, Joshua E. G. Peek, Sarah Weissman, Scott W. Fleming, Karen Levay, Elizabeth Fraser:
A Model for Data Citation in Astronomical Research using Digital Object Identifiers (DOIs). - Walter Schneider:

Analytical Inverter Delay Modeling Using Matlab's Curve Fitting Toolbox. - Bhavin J. Shastri, Alexander N. Tait, Thomas Ferreira de Lima, Mitchell A. Nahmias, Hsuan-Tung Peng, Paul R. Prucnal:

Principles of Neuromorphic Photonics. - Wangyan Feng, Shuning Wu, Xiaodan Li, Kevin Kunkle:

A Deep Belief Network Based Machine Learning System for Risky Host Detection. - Luis A. Mateos:

LaMMos - Latching Mechanism based on Motorized-screw for Reconfigurable Robots and Exoskeleton Suits. - Renzo Angles, Claudio Gutierrez:

An introduction to Graph Data Management. - Andrea Pizzo, Daniel Verenzuela, Luca Sanguinetti, Emil Björnson:

Network Deployment for Maximal Energy Efficiency in Uplink with Multislope Path Loss. - Daniel C. McNamee:

Characterizing optimal hierarchical policy inference on graphs via non-equilibrium thermodynamics. - Amaç Herdagdelen:

Personal Names in Modern Turkey. - Kaiyang Zhou, Yu Qiao:

Deep Reinforcement Learning for Unsupervised Video Summarization with Diversity-Representativeness Reward. - Aliaksandr Siarohin, Enver Sangineto, Stéphane Lathuilière, Nicu Sebe:

Deformable GANs for Pose-based Human Image Generation. - Boris Belousov, Jan Peters:

f-Divergence constrained policy improvement. - Kyu Jeong Han, Akshay Chandrashekaran, Jungsuk Kim, Ian R. Lane:

The CAPIO 2017 Conversational Speech Recognition System. - José Novoa, Juan Pablo Escudero, Josué Fredes, Jorge Wuth, Rodrigo Mahú, Néstor Becerra Yoma:

Multichannel Robot Speech Recognition Database: MChRSR. - Bogdan S. Chlebus:

Randomized Communication in Radio Networks. - Tong Guo, Huilin Gao:

Bidirectional Attention for SQL Generation. - Xing Di, Vishal M. Patel:

Face Synthesis from Visual Attributes via Sketch using Conditional VAEs and GANs. - Elie M. Shaccour, Mohammad M. Mansour:

A Loop-Based Methodology for Reducing Computational Redundancy in Workload Sets. - Xin Wang, Yinlong Xu, Richard T. B. Ma:

Paid Peering, Settlement-Free Peering, or Both? - Uche Afam Nnolim:

A PDE-based log-agnostic illumination correction algorithm. - Dylan J. Foster, Satyen Kale, Mehryar Mohri, Karthik Sridharan:

Parameter-free online learning via model selection. - Yi Tay, Luu Anh Tuan, Siu Cheung Hui:

A Compare-Propagate Architecture with Alignment Factorization for Natural Language Inference. - Mostafa Javedankherad, Zolfa Zeinalpour-Yazdi:

Content Placement in Cache Networks Using Graph-Coloring. - Sheng-Hao Chiang, Jian-Jhih Kuo, Shan-Hsiang Shen, De-Nian Yang, Wen-Tsuen Chen:

Online Multicast Traffic Engineering for Software-Defined Networks. - Wlodzimierz Funika, Pawel Koperek:

Towards co-evolution of fitness predictors and Deep Neural Networks. - S. M. Riazul Islam, Ming Zeng, Octavia A. Dobre, Kyung Sup Kwak:

Resource Allocation for Downlink NOMA Systems: Key Techniques and Open Issues. - Marten Lohstroh:

Why the Equifax Breach Should Not Have Mattered. - Cong Tran, Won-Yong Shin, Andreas Spitz:

Community Detection in Partially Observable Social Networks. - Zhao Li, Canyu Shu, Fengjuan Guo, Kang G. Shin, Jia Liu:

Dynamic Interference Steering in Heterogeneous Cellular Networks. - Ramon Ferrer-i-Cancho, Michael S. Vitevitch:

The origins of Zipf's meaning-frequency law. - Konstantinos Pitas, Mike E. Davies, Pierre Vandergheynst:

PAC-Bayesian Margin Bounds for Convolutional Neural Networks - Technical Report. - Tomaso A. Poggio, Kenji Kawaguchi, Qianli Liao, Brando Miranda, Lorenzo Rosasco, Xavier Boix, Jack Hidary, Hrushikesh N. Mhaskar:

Theory of Deep Learning III: explaining the non-overfitting puzzle. - Xiao-Yun Zhou, Guang-Zhong Yang, Su-Lin Lee:

A Real-time and Registration-free Framework for Dynamic Shape Instantiation. - Raeid Saqur:

H4-Writer: A Text Entry Method Designed For Gaze Controlled Environment with Low KSPC and Spatial Footprint. - Piero Mazzarisi, Paolo Barucca, Fabrizio Lillo, Daniele Tantari:

A dynamic network model with persistent links and node-specific latent variables, with an application to the interbank market. - Avirup Bhattacharyya, Ayan Kumar Bhunia, Prithaj Banerjee, Partha Pratim Roy, Subrahmanyam Murala:

Fractional Local Neighborhood Intensity Pattern for Image Retrieval using Genetic Algorithm. - Ali Javidani, Ahmad Mahmoudi Aznaveh:

A Unified Method for First and Third Person Action Recognition. - Bogdan S. Chlebus, Dariusz R. Kowalski, Mariusz A. Rokicki:

Maximum Throughput of Multiple Access Channels in Adversarial Environments. - Marco Bressan, Enoch Peserico, Luca Pretto:

On approximating the stationary distribution of time-reversible Markov chains. - Pablo San Segundo, Jorge Artieda, Darren Strash:

Efficiently Enumerating all Maximal Cliques with Bit-Parallelism. - Xiangyu Zhao, Liang Zhang, Zhuoye Ding, Dawei Yin, Yihong Zhao, Jiliang Tang:

Deep Reinforcement Learning for List-wise Recommendations. - Simon Stiebellehner, Jun Wang, Shuai Yuan:

Learning Continuous User Representations through Hybrid Filtering with doc2vec. - Mingliang Xu, Chaochao Li, Pei Lv, Wei Chen, Dinesh Manocha, Zhigang Deng, Bing Zhou:

Crowd Simulation Model Integrating "Physiology-Psychology-Physics" Factors. - Mateusz Krzysztof Tarkowski, Tomasz P. Michalak, Talal Rahwan, Michael J. Wooldridge:

Game-theoretic Network Centrality: A Review. - Junyu Liu, Min Sheng, Jiandong Li:

Limitation of SDMA in Ultra-Dense Small Cell Networks. - Qiang Zheng, Yong Fan:

Integrating semi-supervised label propagation and random forests for multi-atlas based hippocampus segmentation. - Qiang Zheng, Gregory Tasian, Yong Fan:

Transfer learning for diagnosis of congenital abnormalities of the kidney and urinary tract in children based on Ultrasound imaging data. - Saurabh Misra, Mengxuan Tan, Mostafa Rezazad, Ngai-Man Cheung:

Early detection of Crossfire attacks using deep learning. - Bogdan S. Chlebus, Leszek Gasieniec, Andrzej Pelc:

Deterministic Computations on a PRAM with Static Processor and Memory Faults. - Aparna Vegendla, Anh Nguyen-Duc, Shang Gao, Guttorm Sindre:

A Systematic Mapping Study on Requirements Engineering in Software Ecosystems. - Youngsam Kim, Hyopil Shin:

A New Approach for Measuring Sentiment Orientation based on Multi-Dimensional Vector Space. - Mahdi Ahmadi, Mohsen Hajabdollahi, Nader Karimi, Shadrokh Samavi:

Context aware saliency map generation using semantic segmentation. - Bernardo Alves Furtado:

PolicySpace: a modeling platform. - Arnaud Benard, Michael Gygli:

Interactive Video Object Segmentation in the Wild. - Ganhua Wu:

Efficient priority queueing routing strategy on mobile networks. - Jie Jia, Honggang Zhou, Yunchun Li:

Using Deep Neural Network Approximate Bayesian Network. - Klaus Broelemann, Thomas Gottron, Gjergji Kasneci:

Restricted Boltzmann Machines for Robust and Fast Latent Truth Discovery. - Paula Severi:

Two Light Modalities for Recursion. - Ugur Demir, Gözde B. Ünal:

Deep Stacked Networks with Residual Polishing for Image Inpainting. - Reza Ghaffari, Roger A. Sauer:

Modal analysis of graphene-based structures for large deformations, contact and material nonlinearities. - Zahra Mahoor, Bruce J. MacLennan, Allen C. McBride:

Neurally Plausible Model of Robot Reaching Inspired by Infant Motor Babbling. - João A. Silva, Hervé Paulino, João M. Lourenço, João Leitão, Nuno M. Preguiça:

Time-Aware Publish/Subscribe for Networks of Mobile Devices. - Pramod Kumar Maurya, Satya Bagchi:

Cyclic group based mutual authentication protocol for RFID system. - Eli Haim, Yuval Kochman:

On Binary Distributed Hypothesis Testing. - Jaroslaw Byrka, Mateusz Lewandowski, Joachim Spoerhase:

Approximating Node-Weighted k-MST on Planar Graphs. - Rami Daknama:

Pull and Push&Pull in Random Evolving Graphs. - Manoel Horta Ribeiro, Pedro H. Calais, Yuri A. Santos, Virgílio A. F. Almeida, Wagner Meira Jr.:

"Like Sheep Among Wolves": Characterizing Hateful Users on Twitter. - Abien Fred Agarap

, Francis John Hill Pepito:
Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine (SVM) for Malware Classification. - Christian Vorhemus, Erich Schikuta

:
Blackboard Meets Dijkstra for Optimization of Web Service Workflows. - Yu-Ren Liu, Yi-Qi Hu, Hong Qian, Yang Yu, Chao Qian:

ZOOpt/ZOOjl: Toolbox for Derivative-Free Optimization. - Seyed-Vahid Sanei-Mehri, Ahmet Erdem Sariyüce, Srikanta Tirthapura:

Butterfly Counting in Bipartite Networks. - Christian Bessiere, Nadjib Lazaar

, Yahia Lebbah, Mehdi Maamar:
Users Constraints in Itemset Mining. - Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter:

Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition. - Syed Ali Asif, Zarif Masud, Rubaida Easmin, Alim Ul Gias:

SAFFRON: A Semi-Automated Framework for Software Requirements Prioritization. - Amit P. Sheth, Utkarshani Jaimini, Hong Yung Yip:

How will the Internet of Things enable Augmented Personalized Health? - Jason Toy:

SenseNet: 3D Objects Database and Tactile Simulator. - Bogdan S. Chlebus, Karol Golab, Dariusz R. Kowalski:

Broadcasting Spanning Forests on a Multiple-Access Channel. - Walid Shalaby, BahaaEddin AlAila, Mohammed Korayem, Layla Pournajaf, Khalifeh AlJadda, Shannon Quinn, Wlodek Zadrozny:

Help Me Find a Job: A Graph-based Approach for Job Recommendation at Scale. - Mehrnaz Najafi, Lifang He

, Philip S. Yu:
Error-Robust Multi-View Clustering. - Ruta Desai, Beichen Li

, Ye Yuan, Stelian Coros:
Interactive Co-Design of Form and Function for Legged Robots using the Adjoint Method. - Dian-Wu Yue, Shuai Xu, Ha H. Nguyen:

Diversity Analysis of Millimeter-Wave Massive MIMO Systems. - Walid Shalaby, Wlodek Zadrozny, Hongxia Jin:

Beyond Word Embeddings: Learning Entity and Concept Representations from Large Scale Knowledge Bases. - Muhammad Bilal

, Moonsoo Kang:
Throughput Enhancement by Concurrent Transmission in WPAN with Multiple Antennas. - Muhammad Bilal

, Shin-Gak Kang:
Time Aware Least Recent Used (TLRU) Cache Management Policy in ICN. - Manolis C. Tsakiris, René Vidal:

Theoretical Analysis of Sparse Subspace Clustering with Missing Entries. - Pratik Patil, Wei Yu:

Generalized Compression Strategy for the Downlink Cloud Radio Access Network. - Morteza Noshad, Alfred O. Hero III:

Scalable Hash-Based Estimation of Divergence Measures. - Mahesh Babu Vaddi, B. Sundar Rajan:

Reduced Dimensional Optimal Vector Linear Index Codes for Index Coding Problems with Symmetric Neighboring and Consecutive Side-information. - Haris Bin Zia, Agha Ali Raza, Awais Athar:

PronouncUR: An Urdu Pronunciation Lexicon Generator. - Ezak Ahmad, Manu Goyal, Jamie S. McPhee, Hans Degens, Moi Hoon Yap:

Semantic Segmentation of Human Thigh Quadriceps Muscle in Magnetic Resonance Images. - Neelamadhav Gantayat, Rahul Aralikatte, Naveen Panwar, Anush Sankaran, Senthil Mani:

Sanskrit Sandhi Splitting using seq2(seq)2. - Onel L. Alcaraz López, Evelio M. G. Fernández, Richard D. Souza, Hirley Alves:

Ultra-Reliable Cooperative Short-Packet Communications with Wireless Energy Transfer. - Michal Smolik, Václav Skala, Ondrej Nedved:

A Comparative Study of LOWESS and RBF Approximations for Visualization. - Mahdi Nangir, Reza Asvadi, Mahmoud Ahmadian-Attari, Jun Chen:

Analysis and Code Design for the Binary CEO Problem under Logarithmic Loss. - Václav Skala:

A Fast Algorithm for Line Clipping by Convex Polyhedron in E3. - Václav Skala:

O(lgN) Line Clipping Algorithm in E2. - Qingqing Wu, Jie Xu, Rui Zhang:

Capacity Characterization of UAV-Enabled Two-User Broadcast Channel. - Qingqing Wu, Rui Zhang:

Common Throughput Maximization in UAV-Enabled OFDMA Systems with Delay Consideration. - Aigerim Tankimanova, Akshay Kumar Maan, Alex Pappachen James:

Level-Shifted Neural Encoded Analog-to-Digital Converter. - Olga Krestinskaya, Alex Pappachen James:

Facial emotion recognition using min-max similarity classifier. - Akzharkyn Izbassarova, Aidana Irmanova, Alex Pappachen James:

Automated rating of recorded classroom presentations using speech analysis in kazakh. - Diana Sadykova, Alex Pappachen James:

Quality assessment metrics for edge detection and edge-aware filtering: A tutorial review. - Sholpan Kauanova, Ivan Vorobjev, Alex Pappachen James:

Automated image segmentation for detecting cell spreading for metastasizing assessments of cancer development. - Soma Suzuki:

Comparative Analysis of Human Movement Prediction: Space Syntax and Inverse Reinforcement Learning. - Ankan Kumar Bhunia, Aishik Konwer, Abir Bhowmick, Ayan Kumar Bhunia, Partha Pratim Roy, Umapada Pal:

Script Identification in Natural Scene Image and Video Frame using Attention based Convolutional-LSTM Network. - Rose Bohrer, Karl Crary:

TWAM: A Certifying Abstract Machine for Logic Programs. - Zhiwei Zhong, Xiaohu You, Chuan Zhang:

Auto-Generation of Pipelined Hardware Designs for Polar Encoder. - Farzin Ghorban, Javier Marín, Yu Su, Alessandro Colombo, Anton Kummert:

Aggregated Channels Network for Real-Time Pedestrian Detection. - Rafatul Faria, Kerem Yunus Çamsari, Supriyo Datta:

Implementing Bayesian Networks with Embedded Stochastic MRAM. - Gal Dalal, Elad Gilboa, Shie Mannor, Louis Wehenkel:

Chance-Constrained Outage Scheduling using a Machine Learning Proxy. - Chris Ying, Katerina Fragkiadaki:

Depth-Adaptive Computational Policies for Efficient Visual Tracking. - Haik Manukian, Fabio L. Traversa, Massimiliano Di Ventra:

Accelerating Deep Learning with Memcomputing. - John N. Maidens, Murat Arcak:

Exploiting symmetry for discrete-time reachability computations. - Khaled Q. Abdelfadeel, Victor Cionca, Dirk Pesch:

A Fair Adaptive Data Rate Algorithm for LoRaWAN. - Dan Xu, Wanli Ouyang, Xavier Alameda-Pineda, Elisa Ricci, Xiaogang Wang, Nicu Sebe:

Learning Deep Structured Multi-Scale Features using Attention-Gated CRFs for Contour Prediction. - Matthew K. Gelber, Greg Hurst, Rohit Bhargava:

Freeform Assembly Planning. - Ronald L. Rivest:

Bayesian Tabulation Audits: Explained and Extended. - Shaonan Wang, Jiajun Zhang, Chengqing Zong:

Learning Multimodal Word Representation via Dynamic Fusion Methods. - Yuhao Yi, Zhongzhi Zhang, Stacy Patterson:

Scale-free Loopy Structure is Resistant to Noise in Consensus Dynamics in Complex Networks. - Apoorve Mohan, Ata Turk, Ravi S. Gudimetla, Sahil Tikale, Jason Hennessey, Emine Ugur Kaynar, Gene Cooperman, Peter Desnoyers, Orran Krieger:

M2: Malleable Metal as a Service. - Yujia Zhang, Xiaodan Liang, Dingwen Zhang, Min Tan, Eric P. Xing:

Unsupervised Object-Level Video Summarization with Online Motion Auto-Encoder. - Facundo Mémoli, Anastasios Sidiropoulos, Kritika Singhal:

Sketching and Clustering Metric Measure Spaces. - Junan Zhu, Dror Baron:

Performance Limits with Additive Error Metrics in Noisy Multi-Measurement Vector Problem. - Naveed Akhtar, Ajmal Mian:

Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey. - Moustafa Alzantot, Bharathan Balaji, Mani B. Srivastava:

Did you hear that? Adversarial Examples Against Automatic Speech Recognition. - Ishhanie Majumdar:

Block Diagonalization Type Precoding Algorithms for IEEE 802.11ac Systems. - Clemens Blöchl, Rana Ali Amjad, Bernhard C. Geiger:

Co-Clustering via Information-Theoretic Markov Aggregation. - Xi Zhang, Yunjia Zhang, Senzhang Wang, Yuntao Yao, Binxing Fang, Philip S. Yu:

Improving Stock Market Prediction via Heterogeneous Information Fusion. - Sergio Barrachina-Muñoz, Francesc Wilhelmi, Boris Bellalta:

Performance Analysis of Dynamic Channel Bonding in Spatially Distributed High Density WLANs. - Xi Zhang, Jiawei Shi, Di Wang, Binxing Fang:

Exploiting Investors Social Network for Stock Prediction in China's Market. - (Withdrawn) Static Free Space Detection with Laser Scanner using Occupancy Grid Maps.

- Kai Qiao, Chi Zhang, Linyuan Wang, Bin Yan, Jian Chen, Lei Zeng, Li Tong:

Accurate reconstruction of image stimuli from human fMRI based on the decoding model with capsule network architecture. - Afonso M. Teodoro, José M. Bioucas-Dias, Mário A. T. Figueiredo:

Scene-Adapted Plug-and-Play Algorithm with Guaranteed Convergence: Applications to Data Fusion in Imaging. - Sarah Kamel, Mireille Sarkiss, Michèle Angela Wigger, Ghaya Rekaya-Ben Othman:

Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels. - Ke Li, Renzhi Chen, Dragan A. Savic, Xin Yao:

Interactive Decomposition Multi-Objective Optimization via Progressively Learned Value Functions. - Shishir Kolathaya, Jacob Reher, Aaron D. Ames:

Input to State Stability of Bipedal Walking Robots: Application to DURUS. - Suriyadeepan Ramamoorthy, Selvakumar Murugan:

An Attentive Sequence Model for Adverse Drug Event Extraction from Biomedical Text. - Gary Marcus:

Deep Learning: A Critical Appraisal. - Cedric De Boom, Thomas Demeester, Bart Dhoedt:

Character-level Recurrent Neural Networks in Practice: Comparing Training and Sampling Schemes. - Simant Dube:

High Dimensional Spaces, Deep Learning and Adversarial Examples. - Payman Behnam:

Validation of Hardware Security and Trust: A Survey. - Caelan Reed Garrett, Tomás Lozano-Pérez, Leslie Pack Kaelbling:

Sampling-Based Methods for Factored Task and Motion Planning. - Ilya Sergey

, Amrit Kumar, Aquinas Hobor:
Scilla: a Smart Contract Intermediate-Level LAnguage. - Nicola Strisciuglio:

Learning audio and image representations with bio-inspired trainable feature extractors. - Yuval Tassa, Yotam Doron, Alistair Muldal, Tom Erez, Yazhe Li, Diego de Las Casas, David Budden, Abbas Abdolmaleki, Josh Merel, Andrew Lefrancq, Timothy P. Lillicrap, Martin A. Riedmiller:

DeepMind Control Suite. - Antonia Creswell, Alison Pouplin, Anil A. Bharath:

Denoising Adversarial Autoencoders: Classifying Skin Lesions Using Limited Labelled Training Data. - Krzysztof Cabaj, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Alan Woodward, Sebastian Zander:

The New Threats of Information Hiding: the Road Ahead. - Xinyang Deng, Wen Jiang:

A total uncertainty measure for D numbers based on belief intervals. - Liuyuan Deng, Ming Yang, Hao Li, Tianyi Li, Bing Hu, Chunxiang Wang:

Restricted Deformable Convolution based Road Scene Semantic Segmentation Using Surround View Cameras. - Shiliang Sun, Rongqing Huang, Ya Gao:

Network-Scale Traffic Modeling and Forecasting with Graphical Lasso and Neural Networks. - Luis A. A. Meira, Paulo Sérgio Martins, Mauro Menzori, Guilherme A. Zeni

:
Multi-Objective Vehicle Routing Problem Applied to Large Scale Post Office Deliveries. - Semih Yagli, Paul Cuff:

Exact Soft-Covering Exponent. - Max Bannach, Till Tantau:

Computing Hitting Set Kernels By AC^0-Circuits. - Charles Truong, Laurent Oudre, Nicolas Vayatis:

A review of change point detection methods. - Pegah Karimi, Nicholas Davis, Kazjon Grace, Mary Lou Maher:

Deep Learning for Identifying Potential Conceptual Shifts for Co-creative Drawing. - Robert B. Allen, Yoonhwan Kim:

Semantic Modeling with Foundries. - David Heckerman:

Accounting for hidden common causes when inferring cause and effect from observational data. - Tim Roughgarden:

Complexity Theory, Game Theory, and Economics. - Michael Blondin, Javier Esparza, Stefan Jaax:

Large Flocks of Small Birds: On the Minimal Size of Population Protocols. - Cláudio Reginaldo Alexandre, João Balsa:

Um Sistema Multiagente no Combate ao Braqueamento de Capitais. - Yu Ji, Youhui Zhang, Wenguang Chen, Yuan Xie:

Bridging the Gap Between Neural Networks and Neuromorphic Hardware with A Neural Network Compiler. - Roy Karasik, Osvaldo Simeone, Shlomo Shamai:

Fundamental Latency Limits for D2D-Aided Content Delivery in Fog Wireless Networks. - Yijie Han:

Sorting Real Numbers in O(n√(log n)) Time and Linear Space. - Alexander Shananin, Sergey Tarasov:

Effective algorithms for homogeneous utility functions. - Zhijian Liu, Di Wu, Hongyu Wei, Guoqing Cao:

Machine Learning for Building Energy and Indoor Environment: A Perspective. - Yu Zhou, Jianbin Huang, Heli Sun:

A Semantic-Rich Similarity Measure in Heterogeneous Information Networks. - Kyriakos Papadopoulos, Apostolos Syropoulos:

Robots That Do Not Avoid Obstacles. - Nicolai Pogrebnyakov, Edgar A. Maldonado:

Identifying emergency stages in Facebook posts of police departments with convolutional and recurrent neural networks and support vector machines. - Wojciech Kordecki:

Secretary problem: graphs, matroids and greedoids. - Michael J. Kurtz

:
Advice from the Oracle: Really Intelligent Information Retrieval. - Jindong Wang, Yiqiang Chen, Lisha Hu, Xiaohui Peng, Philip S. Yu:

Stratified Transfer Learning for Cross-domain Activity Recognition. - Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal:

MVG Mechanism: Differential Privacy under Matrix-Valued Query. - Chinmay Chinara, Nishant Nath, Subhajeet Mishra, Sangram Keshari Sahoo, Farida Ashraf Ali:

A Novel Approach to Skew-Detection and Correction of English Alphabets for OCR. - Rajarshi Bhattacharyya, Ki-Yeob Lee, Bainan Xia, Vamseedhar R. Reddyvari, Abhay Anand, Vasudev Gohil, Srinivas Shakkottai, Amogh Dhamdhere, Jean-François Chamberland-Tremblay, Gregory H. Huff:

FlowBazaar: A Market-Mediated Software Defined Communications Ecosystem at the Wireless Edge. - Matthias Boehm, Berthold Reinwald, Dylan Hutchison, Alexandre V. Evfimievski, Prithviraj Sen:

On Optimizing Operator Fusion Plans for Large-Scale Machine Learning in SystemML. - Eren Balevi, Richard D. Gitlin:

Optimizing the Number of Fog Nodes for Cloud-Fog-Thing Networks. - Mohammad Noormohammadpour, Cauligi S. Raghavendra, Srikanth Kandula, Sriram Rao:

QuickCast: Fast and Efficient Inter-Datacenter Transfers using Forwarding Tree Cohorts. - Rashid Hatami, Hossein Bahramgiri, Ahmad Khonsari:

High Performance Architecture for Flow-Table Lookup in SDN on FPGA. - Kanishka Rao, Hasim Sak, Rohit Prabhavalkar:

Exploring Architectures, Data and Units For Streaming End-to-End Speech Recognition with RNN-Transducer. - Grey Ballard, Christian Ikenmeyer, J. M. Landsberg, Nick Ryder:

The geometry of rank decompositions of matrix multiplication II: 3×3 matrices. - Hang Hu, Gang Wang:

Revisiting Email Spoofing Attacks. - Varun Murali, Han-Pang Chiu, Supun Samarasekera, Rakesh Kumar:

Utilizing Semantic Visual Landmarks for Precise Vehicle Navigation. - Alexander Kirillov, Kaiming He, Ross B. Girshick, Carsten Rother, Piotr Dollár:

Panoptic Segmentation. - Aquib Mustafa, Hamidreza Modares:

Attack Analysis and Resilient Control Design for Discrete-time Distributed Multi-agent Systems. - Ayan Kumar Bhunia, Avirup Bhattacharyya, Prithaj Banerjee, Partha Pratim Roy, Subrahmanyam Murala:

A Novel Feature Descriptor for Image Retrieval by Combining Modified Color Histogram and Diagonally Symmetric Co-occurrence Texture Pattern. - Mohammad Haft-Javaherian, Linjing Fang, Victorine P. Muse, Chris B. Schaffer, Nozomi Nishimura, Mert R. Sabuncu:

Deep convolutional neural networks for segmenting 3D in vivo multiphoton images of vasculature in Alzheimer disease mouse models. - Lingxiao He, Jian Liang, Haiqing Li, Zhenan Sun:

Deep Spatial Feature Reconstruction for Partial Person Re-identification: Alignment-Free Approach. - Sunrita Poddar, Mathews Jacob:

Recovery of Point Clouds on Surfaces: Application to Image Reconstruction. - Huanru Henry Mao, Taylor Shin, Garrison W. Cottrell:

DeepJ: Style-Specific Music Generation. - Sunrita Poddar, Mathews Jacob:

Recovery of Noisy Points on Band-limited Surfaces: Kernel Methods Re-explained. - Hanqing Wang, Wan-Ting Shih, Chao-Kai Wen, Shi Jin:

Reliable OFDM Transmission with Ultra-Low Resolution ADC. - Yuqi Chen, Christopher M. Poskitt

, Jun Sun:
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System. - Tae-Hoon Kim, Jonghyun Choi:

ScreenerNet: Learning Curriculum for Neural Networks. - Mayank Singh, Abhishek Sinha, Balaji Krishnamurthy:

Neural Networks in Adversarial Setting and Ill-Conditioned Weight Space. - Aayush Ojha, Raghunath Tewari:

Circuit Complexity of Bounded Planar Cutwidth Graph Matching. - Siyang Li, Bryan Seybold, Alexey Vorobyov, Alireza Fathi, Qin Huang, C.-C. Jay Kuo:

Instance Embedding Transfer to Unsupervised Video Object Segmentation. - Santosh Devasia:

Rapid Information Transfer in Networks with Delayed Self Reinforcement. - Hsuan-Lei Shao, Sieh-Chuen Huang

, Yun-Cheng Tsai:
How the Taiwanese Do China Studies: Applications of Text Mining. - Jarkko Peltomäki, Markus A. Whiteland:

More on the dynamics of the symbolic square root map. - Bojie Lv, Lexiang Huang, Rui Wang:

Joint Content Delivery and Caching Placement via Dynamic Programming. - Huazhu Fu, Jun Cheng, Yanwu Xu, Damon Wing Kee Wong, Jiang Liu, Xiaochun Cao:

Joint Optic Disc and Cup Segmentation Based on Multi-label Deep Network and Polar Transformation. - Hasindu Gamaarachchi

, Harsha Ganegoda:
Power Analysis Based Side Channel Attack. - Jan-Ole Malchow, Benjamin Güldenring, Volker Roth:

New Directions for Trust in the Certificate Authority Ecosystem. - Yixin Bao, Yanghua Peng, Chuan Wu, Zongpeng Li:

Online Job Scheduling in Distributed Machine Learning Clusters. - Jukka Ruohonen:

A Look at the Time Delays in CVSS Vulnerability Scoring. - Rocío González-Díaz, María José Jiménez, Belén Medrano:

Topological Tracking of Connected Components in Image Sequences. - Sha Hu, Fredrik Rusek:

Modulus Zero-Forcing Detection for MIMO Channels. - Van-Dinh Nguyen, Hieu V. Nguyen, Octavia A. Dobre, Oh-Soon Shin:

A New Design Paradigm for Secure Full-Duplex Multiuser Systems. - Huan Zhang, Yulong Liu, Hong Lei:

Phase Transition of Convex Programs for Linear Inverse Problems with Multiple Prior Constraints. - Yi Xiao, Xiang Cao, Xianyi Zhu, Renzhi Yang, Yan Zheng:

Joint convolutional neural pyramid for depth map super-resolution. - Nikolay V. Shilov, Igor S. Anureev, Mikhail Berdyshev, Dmitry Kondratev, Aleksey V. Promsky:

Towards platform-independent verification of the standard mathematical functions: the square root function. - Abdelkrime Aries

, Djamel Eddine Zegour, Walid-Khaled Hidouci:
Sentence Object Notation: Multilingual sentence notation based on Wordnet. - Changyang She, Chenyang Yang, Tony Q. S. Quek:

Joint Uplink and Downlink Resource Configuration for Ultra-reliable and Low-latency Communications. - Ke Wang, Youlong Wu, Yingying Ma:

The Capacity on Degraded Relay Broadcast Channel. - Christopher Schulze, Marcus Schulze:

ViZDoom: DRQN with Prioritized Experience Replay, Double-Q Learning, & Snapshot Ensembling. - Shuai Ma, Jia Li, Chunming Hu, Xudong Liu, Jinpeng Huai:

Graph Pattern Matching for Dynamic Team Formation. - Sambarta Dasgupta, Keivan Ebrahimi, Umesh Vaidya:

Particle Clustering Machine: A Dynamical System Based Approach. - Assaf Ben-Yishai, Ofer Shayevitz, Young-Han Kim:

Shannon Capacity is Achievable for Binary Interactive First-Order Markovian Protocols. - Jie Zhang, Feng Li, Dan Hao, Meng Wang, Lu Zhang:

How Does Bug-Handling Effort Differ Among Different Programming Languages? - Jakob Ablinger:

Computing the Inverse Mellin Transform of Holonomic Sequences using Kovacic's Algorithm. - Chee-Wooi Ten, Koji Yamashita, Zhiyuan Yang, Athanasios V. Vasilakos, Andrew Ginter:

Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems. - Georg Pichler, Günther Koliander:

Information Bottleneck on General Alphabets. - Junhui Wu, Yun Ye, Yu Chen, Zhi Weng:

Spot the Difference by Object Detection. - Timur M. Khanipov:

Computational complexity lower bounds of certain discrete Radon transform approximations. - Jarek Duda:

Polynomial-based rotation invariant features. - Bartlomiej Dudek, Pawel Gawrychowski:

Slowing Down Top Trees for Better Worst-Case Bounds. - Shirin Jalali:

Theoretical links between universal and Bayesian compressed sensing algorithms. - Eugenia-Maria Kontopoulou, Ananth Grama, Wojciech Szpankowski, Petros Drineas:

Randomized Linear Algebra Approaches to Estimate the Von Neumann Entropy of Density Matrices. - Petr Jancar, Petr Osicka, Zdenek Sawa:

EXPSPACE-hardness of behavioural equivalences of succinct one-counter nets. - Abhimitra Meka, Maxim Maximov, Michael Zollhöfer, Avishek Chatterjee, Christian Richardt, Christian Theobalt:

Live Intrinsic Material Estimation. - Hojjat Salehinejad, Julianne Baarbe, Sharan Sankar, Joseph Barfett, Errol Colak, Shahrokh Valaee:

Recent Advances in Recurrent Neural Networks. - Pichao Wang, Wanqing Li, Jun Wan, Philip Ogunbona

, Xinwang Liu:
Cooperative Training of Deep Aggregation Networks for RGB-D Action Recognition. - Pavlos Sermpezis, Vasileios Kotronis, Petros Gigis, Xenofontas A. Dimitropoulos, Danilo Cicalese, Alistair King, Alberto Dainotti:

ARTEMIS: Neutralizing BGP Hijacking within a Minute. - Eric Tutu Tchao, Kwesi Diawuo, Christiana Selorm Aggor, Seth Djane Kotey:

Ghanaian Consumers Online Privacy Concerns: Causes and its Effects on E-Commerce Adoption. - Rajrup Ghosh, Siva Prakash Reddy Komma, Yogesh Simmhan:

Adaptive Energy-aware Scheduling of Dynamic Event Analytics across Edge and Cloud Resources. - Gholamreza Anbarjafari, Rain Eric Haamer, Iiris Lüsi, Toomas Tikk, Lembit Valgma:

3D Face Reconstruction with Region Based Best Fit Blending Using Mobile Phone for Virtual Reality Based Social Media. - Tomasz Kociumaka, Jakub Radoszewski, Wojciech Rytter, Tomasz Walen:

On Periodicity Lemma for Partial Words. - Barathi Ganesh H. B.:

Social Media Analysis based on Semanticity of Streaming and Batch Data. - Sven Jäger, Martin Skutella:

Generalizing the Kawaguchi-Kyan bound to stochastic parallel machine scheduling. - Tingjun Chen, Jelena Diakonikolas, Javad Ghaderi, Gil Zussman:

Hybrid Scheduling in Heterogeneous Half- and Full-Duplex Wireless Networks. - Alena Zemanová, Jan Zeman, Tomás Janda, Jaroslav Schmidt, Michal Sejnoha:

On modal analysis of laminated glass: Usability of simplified methods and enhanced effective thickness. - Bo-Yuan Huang, Hongce Zhang, Pramod Subramanyan, Yakir Vizel, Aarti Gupta, Sharad Malik:

Instruction-Level Abstraction (ILA): A Uniform Specification for System-on-Chip (SoC) Verification. - Fenglei Fan, Ge Wang

:
Learning from Pseudo-Randomness With an Artificial Neural Network - Does God Play Pseudo-Dice? - Bérenger Bramas, Pavel Kus:

Computing the Sparse Matrix Vector Product using Block-Based Kernels Without Zero Padding on Processors with AVX-512 Instructions. - Mouna Boumezbeur, Sihem Mesnager, Kenza Guenda:

Vectorial Boolean functions and linear codes in the context of algebraic attacks. - Mathias Kanzler, Marc Rautenhaus, Rüdiger Westermann:

A Voxel-based Rendering Pipeline for Large 3D Line Sets. - Junjie Ma, Ji Xu, Arian Maleki:

Optimization-based AMP for Phase Retrieval: The Impact of Initialization and 𝓁2-regularization. - Jumana Dakka, Kristof Farkas-Pall, Vivek Balasubramanian, Matteo Turilli, David W. Wright, Shunzhou Wan, Stefan J. Zasada, Peter V. Coveney, Shantenu Jha:

Rapid, concurrent and adaptive extreme scale binding free energy calculation. - Francesco Alessandro Massucci, Jonathan Wheeler, Raul Beltran-Debon, Jorge Joven, Marta Sales-Pardo, Roger Guimerà:

Inferring propagation paths for sparsely observed perturbations on complex networks. - Rob J. van Glabbeek, Bas Luttik, Linda Spaninks:

Rooted Divergence-Preserving Branching Bisimilarity is a Congruence. - Ramakrishnan Venkatraman, Siddhartha Kumar Khaitan, Venkataramana Ajjarapu:

Dynamic Co-Simulation Methods for Combined Transmission-Distribution System and Integration Time Step Impact on Convergence. - Ali Dabouei, Hadi Kazemi, Seyed Mehdi Iranmanesh, Jeremy M. Dawson, Nasser M. Nasrabadi:

Fingerprint Distortion Rectification using Deep Convolutional Neural Networks. - Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:

Spectre Attacks: Exploiting Speculative Execution. - Theodora S. Brisimi, Tingting Xu, Taiyao Wang, Wuyang Dai, William G. Adams, Ioannis Ch. Paschalidis:

Predicting Chronic Disease Hospitalizations from Electronic Health Records: An Interpretable Classification Approach. - Moritz Lipp, Michael Schwarz, Daniel Gruss

, Thomas Prescher, Werner Haas, Stefan Mangard
, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. - Aayush Gupta, Daniel Bessonov, Patrick Li:

A Decision-theoretic Approach to Detection-based Target Search with a UAV. - Justin Fagnan, Afra Abnar, Reihaneh Rabbany, Osmar R. Zaïane:

Modular Networks for Validating Community Detection Algorithms. - Amar Hadzihasanovic, Giovanni de Felice, Kang Feng Ng:

A diagrammatic axiomatisation of fermionic quantum circuits. - Christopher J. Holder, Toby P. Breckon, Xiong Wei:

Depth Not Needed - An Evaluation of RGB-D Feature Encodings for Off-Road Scene Understanding by Convolutional Neural Network. - (Withdrawn) A pairwise discriminative task for speech emotion recognition.

- James Owen Weatherall, Cailin O'Connor, Justin Bruner:

How to Beat Science and Influence People: Policy Makers and Propaganda in Epistemic Networks. - Gang Yang, Qianqian Zhang, Ying-Chang Liang:

Cooperative Ambient Backscatter Communications for Green Internet-of-Things. - Reinhard Heckel, Max Simchowitz, Kannan Ramchandran, Martin J. Wainwright:

Approximate Ranking from Pairwise Comparisons. - Yoseob Han, Jingu Kang, Jong Chul Ye:

Deep Learning Reconstruction for 9-View Dual Energy CT Baggage Scanner. - Si Liu, Yao Sun, Defa Zhu, Guanghui Ren

, Yu Chen, Jiashi Feng, Jizhong Han:
Cross-domain Human Parsing via Adversarial Feature and Label Adaptation. - Yi Zhang, Houjun Huang, Haifeng Zhang, Liao Ni, Wei Xu, Nasir Uddin Ahmed, Md. Shakil Ahmed, Yilun Jin, Yingjie Chen, Jingxuan Wen, Wenxin Li:

ICFVR 2017: 3rd International Competition on Finger Vein Recognition. - Chifu Yang, Shuang Gao, Zhu Xue:

Improving the Closed-Loop Tracking Performance Using the First-Order Hold Sensing Technique with Experiments. - Igal Sason, Sergio Verdú:

Improved Bounds on Lossless Source Coding and Guessing Moments via Rényi Measures. - Mehdi Bennis, Mérouane Debbah, H. Vincent Poor:

Ultra-Reliable and Low-Latency Wireless Communication: Tail, Risk and Scale. - Senthil Mani, Anush Sankaran, Rahul Aralikatte:

DeepTriage: Exploring the Effectiveness of Deep Learning for Bug Triaging. - Matthieu Grard, Romain Brégier, Florian Sella, Emmanuel Dellandréa, Liming Chen:

Object segmentation in depth maps with one user click and a synthetically trained fully convolutional network. - Jeanne Pellerin, Jean-François Remacle:

Enumerating combinatorial triangulations of the hexahedron. - Tuomas Haarnoja, Aurick Zhou, Pieter Abbeel, Sergey Levine:

Soft Actor-Critic: Off-Policy Maximum Entropy Deep Reinforcement Learning with a Stochastic Actor. - Mustapha Hached, Khalide Jbilou:

Approximate solutions to large nonsymmetric differential Riccati problems. - Kesav Kaza, Rahul Meshram, Varun Mehta, S. N. Merchant:

Lazy Restless Bandits for Decision Making with Limited Observation Capability: Applications in Wireless Networks. - Chong Di:

Learning automata based SVM for intrusion detection. - Dan Deng, Haifeng Liu, Xuelong Li, Deng Cai:

PixelLink: Detecting Scene Text via Instance Segmentation. - Agnese Chiatti, Mu Jung Cho, Anupriya Gagneja, Xiao Yang, Miriam Brinberg, Katie Roehrick, Sagnik Ray Choudhury, Nilam Ram, Byron Reeves, C. Lee Giles:

Text Extraction and Retrieval from Smartphone Screenshots: Building a Repository for Life in Media. - Tao Yang, Yan Wu, Junqiao Zhao, Linting Guan:

Semantic Segmentation via Highly Fused Convolutional Network with Multiple Soft Cost Functions. - Liliana Bounegru, Tommaso Venturini, Jonathan Gray, Mathieu Jacomy:

Narrating Networks. - Thanh Vu, Dat Quoc Nguyen, Dai Quoc Nguyen, Mark Dras, Mark Johnson:

VnCoreNLP: A Vietnamese Natural Language Processing Toolkit. - Xiao-Long Ren, Niels Gleinig, Dirk Helbing, Nino Antulov-Fantulin:

Generalized Network Dismantling. - (Withdrawn) Effective usage of random routing on networks of mobile agents.

- Sheng Zhang, Bo Liao, Fei Liao:

Computation of Optimal Control Problems with Terminal Constraint via Variation Evolution. - Pushparaja Murugan:

Implementation of Deep Convolutional Neural Network in Multi-class Categorical Image Classification. - Devesh Walawalkar:

A fully automated framework for lung tumour detection, segmentation and analysis. - Garance Gourdel, Tomasz Kociumaka, Jakub Radoszewski, Wojciech Rytter, Arseny M. Shur, Tomasz Walen:

String Periods in the Order-Preserving Model. - Christoph Feichtenhofer, Axel Pinz, Richard P. Wildes, Andrew Zisserman:

What have we learned from deep representations for action recognition? - Kazuyuki Shudo, Kenji Saito:

Towards Application Portability on Blockchains. - Louise A. Dennis, Michael Fisher:

Practical Challenges in Explicit Ethical Machine Reasoning. - Joan Serrà, Dídac Surís, Marius Miron, Alexandros Karatzoglou:

Overcoming catastrophic forgetting with hard attention to the task. - Anurag Ghosh, C. V. Jawahar:

SmartTennisTV: Automatic indexing of tennis videos. - Charles B. Schaff, David Yunis, Ayan Chakrabarti, Matthew R. Walter:

Jointly Learning to Construct and Control Agents using Deep Reinforcement Learning. - Bashir Olaniyi Sadiq

, Emmanuel Adewale Adedokun, Z. M. Abubakar:
The Impact of Mobility Model in the Optimal placement of Sensor Nodes in Wireless Body Sensor Network. - Rithesh Kumar, Jose Sotelo, Kundan Kumar, Alexandre de Brébisson, Yoshua Bengio:

ObamaNet: Photo-realistic lip-sync from text. - Filipe Rolim Cordeiro, Wellington Pinheiro dos Santos, Abel Guilhermino da Silva Filho:

A semi-supervised fuzzy GrowCut algorithm to segment and classify regions of interest of mammographic images. - Guang Chen, Shu Liu, Gereon Hinz, Zhongnan Qu, Alois C. Knoll:

Deep Anticipation: Light Weight Intelligent Mobile Sensing in IoT by Recurrent Architecture. - Justus Thies, Michael Zollhöfer, Matthias Nießner:

IMU2Face: Real-time Gesture-driven Facial Reenactment. - Takumi Moriya, Kazuyuki Saito, Hiroya Tanaka:

3D Surface-to-Structure Translation using Deep Convolutional Networks. - Eric Kauderer-Abrams:

Quantifying Translation-Invariance in Convolutional Neural Networks. - (Withdrawn) Reducing Deep Network Complexity with Fourier Transform Methods.

- Weiwen Wu, Yanbo Zhang, Qian Wang, Fenglin Liu, Peijun Chen, Hengyong Yu:

Low-dose spectral CT reconstruction using L0 image gradient and tensor dictionary. - Mark Kibanov, Martin Becker, Juergen Mueller, Martin Atzmueller, Andreas Hotho, Gerd Stumme:

Adaptive kNN using Expected Accuracy for Classification of Geo-Spatial Data. - Guillermo Gallego, Elias Mueggler, Peter F. Sturm:

Translation of "Zur Ermittlung eines Objektes aus zwei Perspektiven mit innerer Orientierung" by Erwin Kruppa (1913). - Sunrita Poddar, Mathews Jacob:

Clustering of Data with Missing Entries. - Thibault de Valroger:

Deep Random based Key Exchange protocol resisting unlimited MITM. - Rahul Mitra, Nehal Doiphode, Utkarsh Gautam, Sanath Narayan, Shuaib Ahmed, Sharat Chandran, Arjun Jain:

A Large Dataset for Improving Patch Matching. - Hussain Syed Kazmi, Fahad Mehmood, Stefan Lodeweyckx, Johan Driesen:

Deep Reinforcement Learning based Optimal Control of Hot Water Systems. - Seyed Mehdi Iranmanesh, Ali Dabouei, Hadi Kazemi, Nasser M. Nasrabadi:

Deep Cross Polarimetric Thermal-to-visible Face Recognition. - Michel S. Bonfim, Kelvin Lopes Dias, Stenio F. L. Fernandes:

Integrated NFV/SDN Architectures: A Systematic Literature Review. - Mindaugas Bloznelis, Justinas Petuchovas:

Correlation between clustering and degree in affiliation networks. - Martin Lackner, Piotr Skowron:

A Quantitative Analysis of Multi-Winner Rules. - Zhenhua Zhang, Qing He, Jing Gao, Ming Ni:

A deep learning approach for detecting traffic accidents from social media data. - Kevin K. Bowden, JiaQi Wu, Shereen Oraby, Amita Misra, Marilyn A. Walker:

Slugbot: An Application of a Novel and Scalable Open Domain Socialbot Framework. - Yuri I. Manin, Matilde Marcolli:

Asymptotic bounds for spherical codes. - Michael Witbrock, Marco Zagha:

An Implementation of Back-Propagation Learning on GF11, a Large SIMD Parallel Computer. - Javad Fotouhi, Clayton P. Alexander, Mathias Unberath, Giacomo Taylor, Sing Chun Lee, Bernhard Fuerst, Alex Johnson, Greg Osgood, Russell H. Taylor, Harpal Khanuja, Mehran Armand, Nassir Navab:

Plan in 2D, execute in 3D: An augmented reality solution for cup placement in total hip arthroplasty. - Sebastian Andress, Alex Johnson, Mathias Unberath, Alexander Winkler, Kevin Yu, Javad Fotouhi, Simon Weidert, Greg Osgood, Nassir Navab:

On-the-fly Augmented Reality for Orthopaedic Surgery Using a Multi-Modal Fiducial. - Filipe Assunção, Nuno Lourenço, Penousal Machado, Bernardete Ribeiro:

DENSER: Deep Evolutionary Network Structured Representation. - João Antunes, Pedro F. Santana:

A study on the use of eye tracking to adapt gameplay and procedural content generation in first-person shooter games. - Evan Cavallo

, Robert Harper:
Computational Higher Type Theory IV: Inductive Types. - Randy C. Paffenroth, Kathleen Kay, Les Servi:

Robust PCA for Anomaly Detection in Cyber Networks. - Guoxiang Zhang, YangQuan Chen:

LoopSmart: Smart Visual SLAM Through Surface Loop Closure. - Meik Dörpinghaus, Izaak Neri, Édgar Roldán, Heinrich Meyr, Frank Jülicher:

Testing Optimality of Sequential Decision-Making. - Karl Crary:

Hygienic Source-Code Generation Using Functors. - Arun Balajee Vasudevan, Dengxin Dai, Luc Van Gool:

Object Referring in Videos with Language and Human Gaze. - David Charte, Francisco Charte, Salvador García, María José del Jesus, Francisco Herrera:

A practical tutorial on autoencoders for nonlinear feature fusion: Taxonomy, models, software and guidelines. - Prateek Verma, Julius O. Smith III:

Neural Style Transfer for Audio Spectograms. - Ahmed El Alaoui, Florent Krzakala:

Estimation in the Spiked Wigner Model: A Short Proof of the Replica Formula. - Xinyang Zhang, Shouling Ji, Ting Wang:

Differentially Private Releasing via Deep Generative Model. - Jiazhuo Wang, Jason Xu, Xuejun Wang:

Combination of Hyperband and Bayesian Optimization for Hyperparameter Optimization in Deep Learning. - Han Xiao:

Intelligence Graph. - Yingzhen Yang, Jianchao Yang, Ning Xu, Wei Han:

Learning 3D-FilterMap for Deep Convolutional Neural Networks. - Jaouhar Fattahi, Mohamed Mejri:

Secrecy by Witness-Functions under Equational Theories. - Fei Wu, Yin Sun, Lu Chen, Jackie Xu, Kannan Srinivasan, Ness B. Shroff:

High Throughput Low Delay Wireless Multicast via Multi-Channel Moving Window Codes. - Hanbyul Joo, Tomas Simon, Yaser Sheikh:

Total Capture: A 3D Deformation Model for Tracking Faces, Hands, and Bodies. - Kai Mast, Lequn Chen, Emin Gün Sirer:

Enabling Strong Database Integrity using Trusted Execution Environments. - Qinxue Meng, Jia Wu, John Ellisy, Paul J. Kennedy

:
Dynamic Island Model based on Spectral Clustering in Genetic Algorithm. - Pornpit Wongthongtham, Bilal Abu-Salih:

Ontology-based Approach for Semantic Data Extraction from Social Big Data: State-of-the-art and Research Directions. - Yuhao Zhang, Qimei Cui, Ning Wang:

Optimal Pilot Symbols Ratio in terms of Spectrum and Energy Efficiency in Uplink CoMP Networks. - Soumya Ukil, Swarnendu Ghosh, Sk Md Obaidullah, KC Santosh, Kaushik Roy, Nibaran Das:

Deep learning for word-level handwritten Indic script identification. - Muhammed O. Sayin, Tamer Basar:

Secure Sensor Design Against Undetected Infiltration: Minimum Impact-Minimum Damage. - Guibing Guo, Songlin Zhai, Fajie Yuan, Yuan Liu, Xingwei Wang:

VSE-ens: Visual-Semantic Embeddings with Efficient Negative Sampling. - Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiaofeng Wang, Kehuan Zhang:

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild. - Liu Yang, Qingyao Ai, Jiafeng Guo, W. Bruce Croft:

aNMM: Ranking Short Answer Texts with Attention-Based Neural Matching Model. - Yuhao Zhang, Qimei Cui, Ning Wang:

Energy-Efficient User Access Control and Resource Allocation in HCNs with Non-Ideal Circuitry. - Yuhao Zhang, Qimei Cui, Ning Wang:

Energy Efficiency Maximization for CoMP Joint Transmission with Non-Ideal Power Amplifiers. - Olivier Cailloux, Sébastien Destercke:

Reasons and Means to Model Preferences as Incomplete. - Hyeonjun Yun, Hyungbo Shim, Hyo-Sung Ahn:

Initialization-free Privacy-guaranteed Distributed Algorithm for Economic Dispatch Problem. - Yuhao Zhang, Zhiyan Cui, Qimei Cui, Xinlei Yu, Yinjun Liu, Weiliang Xie, Yong Zhao:

Energy Efficiency Analysis of Heterogeneous Cellular Networks With Extra Cell Range Expansion. - Kiran Garimella, Gianmarco De Francisci Morales, Aristides Gionis, Michael Mathioudakis:

Political Discourse on Social Media: Echo Chambers, Gatekeepers, and the Price of Bipartisanship. - Xuebo Liu, Ding Liang, Shi Yan, Dagui Chen, Yu Qiao, Junjie Yan:

FOTS: Fast Oriented Text Spotting with a Unified Network. - Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong:

VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. - Xingcheng Zhang, Lei Yang, Junjie Yan, Dahua Lin:

Accelerated Training for Massive Classification via Dynamic Class Selection. - Erik D. Demaine, Sándor P. Fekete, Phillip Keldenich, Henk Meijer, Christian Scheffer:

Coordinated Motion Planning: Reconfiguring a Swarm of Labeled Robots with Bounded Stretch. - Keyang Zhou, Bernhard Kainz:

Efficient Image Evidence Analysis of CNN Classification Results. - Mohammad Mahdi Moghimi, Maryam Nayeri, Majid Pourahmadi, Mohammad Kazem Moghimi:

Moving Vehicle Detection Using AdaBoost and Haar-Like Feature in Surveillance Videos. - Jun Yoshizawa, Shota Saito, Toshiyasu Matsushima:

Variable-Length Intrinsic Randomness Allowing Positive Value of the Average Variational Distance. - Javier Mata, Ignacio de Miguel, Ramó n J. Durá n, Noemí Merayo, Sandeep Kumar Singh, Admela Jukan, Mohit Chamania:

Artificial Intelligence (AI) Methods in Optical Networks: A Comprehensive Survey. - Martijn van Otterlo:

Gatekeeping Algorithms with Human Ethical Bias: The ethics of algorithms in archives, libraries and society. - Olivier Gouvert, Thomas Oberlin, Cédric Févotte:

Negative Binomial Matrix Factorization for Recommender Systems. - Qimei Cui, Yuhao Zhang, Wei Ni, Mikko Valkama, Riku Jäntti:

Energy Efficiency Maximization of Full-Duplex Two-Way Relay With Non-Ideal Power Amplifiers and Non-Negligible Circuit Power. - Stefan Marksteiner, Benjamin Rainer, Oliver Maurhart:

On the Resilience of a QKD Key Synchronization Protocol for IPsec. - Subodh Deolekar, Siby Abraham:

Tree based classification of tabla strokes. - Luca Baldesi, Athina Markopoulou, Carter T. Butts:

Spectral Graph Forge: Graph Generation Targeting Modularity. - Jingang Wang, Junfeng Tian, Long Qiu, Sheng Li, Jun Lang, Luo Si, Man Lan:

A Multi-task Learning Approach for Improving Product Title Compression with User Search Log Data. - Peilun Li, Xiaodan Liang, Daoyuan Jia, Eric P. Xing:

Semantic-aware Grad-GAN for Virtual-to-Real Urban Scene Adaption. - Purushottam D. Dixit:

Entropy production rate as a criterion for inconsistency in decision theory. - Yuhao Zhang, Qimei Cui, Ning Wang, Yanzhao Hou, Weiliang Xie:

Energy-efficient resource allocation for hybrid bursty services in multi-relay OFDM networks. - Melody Y. Guan, Heinrich Jiang:

Nonparametric Stochastic Contextual Bandits. - Natasha Paunkoska, Ninoslav Marina, Venceslav Kafedziski:

Improving the Secrecy of Distributed Storage Systems using Interference Alignment. - Alessio Capitanelli, Marco Maratea, Fulvio Mastrogiovanni, Mauro Vallati:

On the manipulation of articulated objects in human-robot cooperation scenarios. - Chengyuan Zhang, Lin Wu, Yang Wang:

Crossing Generative Adversarial Networks for Cross-View Person Re-identification. - Syrine Belakaria, Mustafa Ammous, Sameh Sorour, Ahmed Abdel-Rahim:

Optimal Vehicle Dimensioning for Multi-Class Autonomous Electric Mobility On-Demand Systems. - Jean Cardinal, Timothy M. Chan, John Iacono

, Stefan Langerman, Aurélien Ooms:
Subquadratic Encodings for Point Configurations. - Corina Florescu, Wei Jin:

Learning Feature Representations for Keyphrase Extraction. - Suichan Li:

3D-DETNet: a Single Stage Video-Based Vehicle Detector. - Karl Schlechta:

A Reliability Theory of Truth. - Apostolos Destounis, Georgios S. Paschos, David Gesbert:

Selective Fair Scheduling over Fading Channels. - Kuan Hsieh, Cynthia Rush, Ramji Venkataramanan:

Spatially Coupled Sparse Regression Codes: Design and State Evolution Analysis. - Igor Kadota, Abhishek Sinha, Elif Uysal-Biyikoglu, Rahul Singh, Eytan H. Modiano:

Scheduling Policies for Minimizing Age of Information in Broadcast Wireless Networks. - Fabrício Olivetti de França:

A Greedy Search Tree Heuristic for Symbolic Regression. - Neal Bushaw, Craig E. Larson, Nicolas Van Cleemput:

Automated Conjecturing VII: The Graph Brain Project & Big Mathematics. - Carlo Condo, Seyyed Ali Hashemi, Arash Ardakani, Furkan Ercan, Warren J. Gross:

Design and Implementation of a Polar Codes Blind Detection Scheme. - Andrés Arcia-Moret, Ioannis Psaras, Jon Crowcroft:

Bringing Information Centric Networking to Challenged Environments: An overview of the Second Workshop on Future Internet Architecture for Developing Regions. - Danish Contractor, Barun Patra, Mausam, Parag Singla:

Towards Understanding and Answering Multi-Sentence Recommendation Questions on Tourism. - Nestor Rodriguez, Sergio Rojas Galeano:

Shielding Google's language toxicity model against adversarial attacks. - André Merzky

, Matteo Turilli, Manuel Maldonado, Shantenu Jha:
Design and Performance Characterization of RADICAL-Pilot on Titan. - Camilo Bermudez, Andrew J. Plassard, Larry T. Davis, Allen T. Newton, Susan M. Resnick, Bennett A. Landman:

Learning Implicit Brain MRI Manifolds with Deep Learning. - Kai Zhao, Wei Shen, Shanghua Gao, Dandan Li, Ming-Ming Cheng:

Hi-Fi: Hierarchical Feature Integration for Skeleton Detection. - Uzi Pereg, Yossef Steinberg:

The Arbitrarily Varying Relay Channel. - Mohamed Adel Attia, Ravi Tandon:

Near Optimal Coded Data Shuffling for Distributed Learning. - Neil R. Smalheiser, Gary Bonifield:

Unsupervised Low-Dimensional Vector Representations for Words, Phrases and Text that are Transparent, Scalable, and produce Similarity Metrics that are Complementary to Neural Embeddings. - Van Chan Ngo, Mario Dehesa-Azuara, Matthew Fredrikson

, Jan Hoffmann:
Verifying and Synthesizing Constant-Resource Implementations with Types. - Hongfu Liu, Jun Li, Yue Wu, Yun Fu:

Clustering with Outlier Removal. - Devendra Singh Chaplot, Ruslan Salakhutdinov:

Knowledge-based Word Sense Disambiguation using Topic Models. - Eleni Bakali:

On randomized counting versus randomised decision. - Anisur Rahaman Molla, Gopal Pandurangan:

Local Mixing Time: Distributed Computation and Applications. - Wenfei Xu:

Urban Explorations: Analysis of Public Park Usage using Mobile GPS Data. - Mikhail Bessmeltsev, Justin Solomon:

Vectorization of Line Drawings via PolyVector Fields. - Alexander Novikov, Pavel Izmailov, Valentin Khrulkov, Michael Figurnov, Ivan V. Oseledets:

Tensor Train decomposition on TensorFlow (T3F). - Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal:

Tempest: Temporal Dynamics in Anonymity Systems. - Mao-Chuang Yeh, Shuai Tang:

Improved Style Transfer by Respecting Inter-layer Correlations. - Seyed Amin Pouriyeh, Mehdi Allahyari, Krys J. Kochut, Hamid R. Arabnia:

A Comprehensive Survey of Ontology Summarization: Measures and Methods. - Nicholas Carlini, David A. Wagner:

Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. - Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang:

Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections. - Heung-Yeung Shum, Xiaodong He, Di Li:

From Eliza to XiaoIce: Challenges and Opportunities with Social Chatbots. - Amir Mazaheri, Mubarak Shah:

Visual Text Correction. - Daichi Nishio, Satoshi Yamane:

Faster Deep Q-learning using Neural Episodic Control. - Jonathan Pan:

Using Malware Self-Defence Mechanism to Harden Defence and Remediation Tools. - Zecang Gu, Ling Dong:

Distance formulas capable of unifying Euclidian space and probability space. - Fania Mokhayeri, Eric Granger, Guillaume-Alexandre Bilodeau:

Domain-Specific Face Synthesis for Video Face Recognition from a Single Sample Per Person. - Daisuke Ito, Satoshi Takabe, Tadashi Wadayama:

Trainable ISTA for Sparse Signal Recovery. - Anis Elgabli, Ke Liu, Vaneet Aggarwal:

Optimized Preference-Aware Multi-path Video Streaming with Scalable Video Coding. - Peter G. Boyvalenkov, Danyo Danev, Maya Stoyanova:

Refinements of Levenshtein bounds in q-ary Hamming spaces. - Xu Wang, Randall Berry:

The impact of bundling licensed and unlicensed wireless service. - Fuhui Zhou, Yongpeng Wu, Rose Qingyang Hu, Yuhao Wang, Kai-Kit Wong:

Energy-Efficient NOMA Enabled Heterogeneous Cloud Radio Access Networks. - Fuhui Zhou, Yongpeng Wu, Ying-Chang Liang, Zan Li, Yuhao Wang, Kai-Kit Wong:

State of the Art, Taxonomy, and Open Issues on Cognitive Radio Networks with NOMA. - Mikulas Zelinka:

Using reinforcement learning to learn how to play text-based games. - Vivek Parmar

, Manan Suri:
Design Exploration of Hybrid CMOS-OxRAM Deep Generative Architectures. - Shyambhu Mukherjee, Joydeb Pal, Satya Bagchi:

On decoding procedures of intertwining codes. - Jy-yong Sohn, Beongjun Choi, Jaekyun Moon:

A Class of MSR Codes for Clustered Distributed Storage. - Li Wang, Ting Liu, Bing Wang, Xulei Yang, Gang Wang:

Learning Hierarchical Features for Visual Object Tracking with Recursive Neural Networks. - Justinas Miseikis, Patrick Knöbelreiter, Inka Brijacak, Saeed Yahyanejad, Kyrre Glette, Ole Jakob Elle, Jim Tørresen:

Robot Localisation and 3D Position Estimation Using a Free-Moving Camera and Cascaded Convolutional Neural Networks. - Henry M. Kim, Marek Laskowski, Ning Nan:

A First Step in the Co-Evolution of Blockchain and Ontologies: Towards Engineering an Ontology of Governance at the Blockchain Protocol Level. - Yoones Hashemi, Amir H. Banihashemi:

Characterization and Efficient Search of Non-Elementary Trapping Sets of LDPC Codes with Applications to Stopping Sets. - Henry M. Kim, Marek Laskowski:

A Perspective on Blockchain Smart Contracts: Reducing Uncertainty and Complexity in Value Exchange. - Ruichi Yu, Hongcheng Wang, Larry S. Davis:

ReMotENet: Efficient Relevant Motion Event Detection for Large-scale Home Surveillance Videos. - Carola Doerr:

Complexity Theory for Discrete Black-Box Optimization Heuristics. - Krishna Dasaratha, Benjamin Golub, Nir Hak:

Bayesian Social Learning in a Dynamic Environment. - Arthur M. Jacobs:

Explorations in an English Poetry Corpus: A Neurocognitive Poetics Perspective. - Yuke Li, A. Stephen Morse:

Game of Power Allocation on Networks: Balancing Equilibrium. - Maximilian Harr, Christoph Schaefer:

Robust Dead Reckoning: Calibration, Covariance Estimation, Fusion and Integrity Monitoring. - Nujoom Sageer Karat, Anoop Thomas, B. Sundar Rajan:

Optimal Error Correcting Delivery Scheme for an Optimal Coded Caching Scheme with Small Buffers. - Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott D. Stoller, V. N. Venkatakrishnan:

SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. - Lei You, Qi Liao, Nikolaos Pappas, Di Yuan:

Resource Optimization with Flexible Numerology and Frame Structure for Heterogeneous Services. - Emre Yilmaz, Hakan Ferhatosmanoglu, Erman Ayday, Remzi Can Aksoy:

Privacy-Preserving Aggregate Queries for Optimal Location Selection. - Tomasz Jurczyk, Amit Deshmane, Jinho D. Choi:

Analysis of Wikipedia-based Corpora for Question Answering. - Thomas B. Preußer:

QBM - Mapping User-Specified Functions to Programmable Logic through a QBF Satisfiability Problem. - Muhammad Bilal, Moonsoo Kang:

Future Mobile Network Architecture: Challenges and Issues. - Zhi Wang, Yue Xu, Lihua Li, Hui Tian, Shuguang Cui:

Handover Control in Wireless Systems via Asynchronous Multi-User Deep Reinforcement Learning. - Muhammad Bilal

:
An Intelligent Future Mobile Terminal Architecture. - Jian Li, Faheem Zafari, Don Towsley, Kin K. Leung, Ananthram Swami:

Joint Data Compression and Caching: Approaching Optimality with Guarantees. - Mohammadhassan Izadyyazdanabadi, Evgenii Belykh, Nikolay Martirosyan, Jennifer Eschbacher, Peter Nakaji, Yezhou Yang, Mark C. Preul:

Improving utility of brain tumor confocal laser endomicroscopy: objective value assessment and diagnostic frame detection with convolutional neural networks. - Omid Kashefi:

MIZAN: A Large Persian-English Parallel Corpus. - Mengye Ren, Andrei Pokrovsky, Bin Yang, Raquel Urtasun:

SBNet: Sparse Blocks Network for Fast Inference. - Luca Carlone, Giuseppe Carlo Calafiore:

Convex Relaxations for Pose Graph Optimization with Outliers. - Somayeh Kafaie, Yuanzhu Chen, Mohamed Hossam Ahmed, Octavia A. Dobre:

Network Coding with Link Layer Cooperation in Wireless Mesh Networks. - Somayeh Kafaie, Mohamed Hossam Ahmed, Yuanzhu Chen, Octavia A. Dobre:

Throughput Analysis of Network Coding in Multi-Hop Wireless Mesh Networks Using Queueing Theory. - Somayeh Kafaie, Yuanzhu Peter Chen, Octavia A. Dobre, Mohamed Hossam Ahmed:

Network Coding Implementation Details: A Guidance Document. - Mahmoud Sadeghi, Ali Zakerolhosseini, Ali Sonboli:

Architecture Based Classification of Leaf Images. - Ramakrishnan Durairajan, Sathiya Kumaran Mani, Paul Barford, Robert D. Nowak, Joel Sommers:

TimeWeaver: Opportunistic One Way Delay Measurement via NTP. - Yuya Onuma, Rachelle Rivero, Tsuyoshi Kato:

Threshold Auto-Tuning Metric Learning. - Somayeh Kafaie, Yuanzhu Chen, Mohamed Hossam Ahmed, Octavia A. Dobre:

FlexONC: Joint Cooperative Forwarding and Network Coding with Precise Encoding Conditions. - Zhiyong Cui, Ruimin Ke, Yinhai Wang:

Deep Bidirectional and Unidirectional LSTM Recurrent Neural Network for Network-wide Traffic Speed Prediction. - Risi Kondor, Hy Truong Son, Horace Pan, Brandon M. Anderson, Shubhendu Trivedi:

Covariant Compositional Networks For Learning Graphs. - Lican Huang:

Authorization Policies and Co-Operating Strategies of DSCloud Platform. - Homayoun Hamedmoghadam, Nima Joorabloo, Mahdi Jalili:

Australia's long-term electricity demand forecasting using deep neural networks. - Amirreza Mahdavi-Shahri, Mahboobeh Houshmand, Mahdi Yaghoobi, Mehrdad Jalali:

Applying an Ensemble Learning Method for Improving Multi-label Classification Performance. - Salman Faraji, Philippe Müllhaupt, Auke Jan Ijspeert:

Time-projection control to recover inter-sample disturbances, application to bipedal walking control. - Salman Faraji, Hamed Razavi, Auke Jan Ijspeert:

Push recovery with stepping strategy based on time-projection control. - Truc D. T. Nguyen, Quan M. B. Nguyen, Hoang-Anh Pham:

Publish-Subscribe Framework for Event Management in IoT-based Applications. - Malvika Singh:

Binning based algorithm for Pitch Detection in Hindustani Classical Music. - Jialin Dong, Kai Yang, Yuanming Shi:

Blind Demixing for Low-Latency Communication. - Prosenjit Bose, Jean-Lou De Carufel, Elena Khramtcova, Sander Verdonschot:

Reconstructing a convex polygon from its ω-cloud. - Alexandre Attia, Sharone Dayan:

Detection and segmentation of the Left Ventricle in Cardiac MRI using Deep Learning. - Vivek Nair, Zhe Yu, Tim Menzies, Norbert Siegmund, Sven Apel:

Finding Faster Configurations using FLASH. - Tom Kenter, Alexey Borisov, Christophe Van Gysel, Mostafa Dehghani, Maarten de Rijke, Bhaskar Mitra:

Neural Networks for Information Retrieval. - Michalis Rizakis, Stylianos I. Venieris, Alexandros Kouris, Christos-Savvas Bouganis:

Approximate FPGA-based LSTMs under Computation Time Constraints. - Michal Sustr, Jan Malý, Michal Certický:

Multi-platform Version of StarCraft: Brood War in a Docker Container: Technical Report. - David A. Karpuk:

Private Computation of Systematically Encoded Data with Colluding Servers. - Kaan Bingöl, Bahaeddin Eravci, Çagri Özgenç Etemoglu, Hakan Ferhatosmanoglu, Bugra Gedik:

Topic-Based Influence Computation in Social Networks under Resource Constraints. - Hiroshi Hirai, Yuni Iwamasa, Kazuo Murota, Stanislav Zivný:

A tractable class of binary VCSPs via M-convex intersection. - Dídac Surís, Amanda Cardoso Duarte, Amaia Salvador, Jordi Torres, Xavier Giró-i-Nieto:

Cross-modal Embeddings for Video and Audio Retrieval. - Vahid Garousi, Michael Felderer, Feyza Nur Kilicaslan:

What we know about software testability: a survey. - Prerna Agarwal, Richa Verma, Angshul Majumdar:

Indian Regional Movie Dataset for Recommender Systems. - Chao Yao, Xiaoyang Wang, Zijie Zheng, Guangyu Sun, Lingyang Song:

EdgeFlow: Open-Source Multi-layer Data Flow Processing in Edge Computing for 5G and Beyond. - Yi Wu, Yuxin Wu, Georgia Gkioxari, Yuandong Tian:

Building Generalizable Agents with a Realistic and Rich 3D Environment. - Martin Braun, Oleg Lobachev, Phil Trinder:

Arrows for Parallel Computation. - Somayeh Kafaie, Mohamed Hossam Ahmed, Yuanzhu Chen, Octavia A. Dobre:

Performance Analysis of Network Coding with IEEE 802.11 DCF in Multi-Hop Wireless Networks. - Long Ang Lim, Hacer Yalim Keles:

Foreground Segmentation Using a Triplet Convolutional Neural Network for Multiscale Feature Encoding. - Dmitry Gavinsky, Troy Lee, Miklos Santha:

On the randomised query complexity of composition. - Riccardo Cavallari, Stavros Toumpis, Roberto Verdone, Ioannis Kontoyiannis:

Analysis of Geographic/Delay-Tolerant Routing in Mobile Wireless Networks. - Radu Stefan Mincu

, Alexandru Popa:
Local search algorithms for wireless mesh networks. - Catherine Xiao, Wanfeng Chen:

Trading the Twitter Sentiment with Reinforcement Learning. - Siwei Feng, Marco F. Duarte:

Graph Autoencoder-Based Unsupervised Feature Selection with Broad and Local Data Structure Preservation. - Adèle Pass-Lanneau, Ayumi Igarashi, Frédéric Meunier:

Perfect graphs with polynomially computable kernels. - Chiyuan Zhang, Qianli Liao, Alexander Rakhlin, Brando Miranda, Noah Golowich, Tomaso A. Poggio:

Theory of Deep Learning IIb: Optimization Properties of SGD. - Avi Ben-Cohen, Eyal Klang, Michal Marianne Amitai, Jacob Goldberger, Hayit Greenspan:

Anatomical Data Augmentation For CNN based Pixel-wise Classification. - Atiyeh Ashari Ghomi, Allan Borodin, Omer Lev:

Seasonal Goods and Spoiled Milk: Pricing for a Limited Shelf-Life. - Payap Sirinam, Mohsen Imani, Marc Juarez, Matthew Wright:

Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. - Benjamin Spector, Serge J. Belongie:

Sample-Efficient Reinforcement Learning through Transfer and Architectural Priors. - Bernhard Hengst, Maurice Pagnucco, David Rajaratnam, Claude Sammut, Michael Thielscher:

Perceptual Context in Cognitive Hierarchies. - Fatemeh Shiri, Xin Yu

, Fatih Porikli, Richard Hartley, Piotr Koniusz:
Identity-preserving Face Recovery from Portraits. - Vatsal Mahajan:

Winograd Schema - Knowledge Extraction Using Narrative Chains. - Jy-yong Sohn, Jaekyun Moon:

Explicit Construction of MBR Codes for Clustered Distributed Storage. - Eunjin Oh, Hee-Kap Ahn:

Voronoi Diagrams for a Moderate-Sized Point-Set in a Simple Polygon. - Shampa Shahriyar, M. Manzur Murshed, Mortuza Ali, Manoranjan Paul:

Depth Sequence Coding with Hierarchical Partitioning and Spatial-domain Quantisation. - Hamed Rezaei, Nima Ghazanfari Motlagha, Yaghoub Farjami, Mohammad Hossein Yektaei:

A Novel Framework for DDoS Detectionin Huge Scale Networks, Thanksto QoS Features. - Riccardo Spica, Davide Falanga, Eric Cristofalo, Eduardo Montijano, Davide Scaramuzza, Mac Schwager:

A Real-Time Game Theoretic Planner for Autonomous Two-Player Drone Racing. - Yanxiang Jiang, Peng Li, Zhiguo Ding, Fuchun Zheng, Miaoli Ma, Xiaohu You:

Joint Transmitter and Receiver Design for Pattern Division Multiple Access. - Yeow Meng Chee, Johan Chrisnata, Han Mao Kiah, Tuan Thanh Nguyen:

Efficient Encoding/Decoding of Irreducible Words for Codes Correcting Tandem Duplications. - Wentu Song, Kui Cai:

Generalized Reed-Solomon Codes with Sparsest and Balanced Generator Matrices. - Li Chen, Salmin Sultana, Ravi Sahita:

HeNet: A Deep Learning Approach on Intel® Processor Trace for Effective Exploit Detection. - Jingke Xu, Zhifang Zhang:

Building Capacity-Achieving PIR Schemes with Optimal Sub-Packetization over Small Fields. - Jie Lyu, Zejian Yuan, Dapeng Chen:

Long-term Multi-granularity Deep Framework for Driver Drowsiness Detection. - Yu Cheng, Kin Yeung Wong, Kevin Hung, Zhizhong Li, Weitong Li:

Deep Nearest Class Mean Model for Incremental Odor Classification. - Tuvi Etzion, Hui Zhang:

Grassmannian Codes with New Distance Measures for Network Coding. - Mohammad Almseidin, Maen Alzubi, Szilveszter Kovács, Mouhammd Alkasassbeh:

Evaluation of Machine Learning Algorithms for Intrusion Detection System. - Roy Henha Eyono:

Behavioural Analytics: Beyond Risk-based MFA. - Yunlong Mi, Yong Shi, Jinhai Li, Jiabin Liu, Biao Li:

A generalized concept-cognitive learning: A machine learning viewpoint. - Ahmad B. A. Hassanat, Esra'a Alkafaween:

On Enhancing Genetic Algorithms Using New Crossovers. - Ahmad Abadleh, Eshraq Al-Hawari, Esra'a Alkafaween, Hamad Al-Sawalqah:

Step Detection Algorithm For Accurate Distance Estimation Using Dynamic Step Length. - Nguyen Van Huynh, Dinh Thai Hoang, Dusit Niyato, Ping Wang, Dong In Kim:

Optimal Time Scheduling for Wireless-Powered Backscatter Communication Networks. - Jinho Choi:

A Game-Theoretic Approach for NOMA-ALOHA. - Mingyuan Li, Xiaoheng Jiang, Ning-Bo Gu, Weiwei Xu, Junxiao Xue, Bing Zhou, Mingliang Xu:

Efficiently Disassemble-and-Pack for Mechanism. - Divesh Aggarwal, Priyanka Mukhopadhyay:

Faster algorithms for SVP and CVP in the 𝓁∞ norm. - Jana Pazúriková, Jaroslav Olha, Ales Krenek, Vojtech Spiwok:

Acceleration of Mean Square Distance Calculations with Floating Close Structure in Metadynamics Simulations. - Hossein Hojjat, Philipp Rümmer:

Deciding and Interpolating Algebraic Data Types by Reduction (Technical Report). - Tao Guo, Raymond W. Yeung:

The Explicit Coding Rate Region of Symmetric Multilevel Diversity Coding. - Olivier Marceau, Jean Michel Vanpeperstraete:

AUV Optimal Path for Leak Detection. - Erik van der Kouwe, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Gernot Heiser:

Benchmarking Crimes: An Emerging Threat in Systems Security. - Xianwen Wang, Yunxue Cui, Qingchun Li, Xinhui Guo:

Social Media Attention Increases Article Visits: An Investigation on Article-Level Referral Data of PeerJ. - Wilson Cai, Anish Doshi, Rafael Valle:

Attacking Speaker Recognition With Deep Generative Models. - Maayan Frid-Adar, Eyal Klang, Michal Amitai, Jacob Goldberger, Hayit Greenspan:

Synthetic Data Augmentation using GAN for Improved Liver Lesion Classification. - Arnon Avron, Liron Cohen:

Applicable Mathematics in a Minimal Computational Theory of Sets. - Yin Sun, Elif Uysal-Biyikoglu, Sastry Kompella:

Age-Optimal Updates of Multiple Information Flows. - Huan Zhao, Quanming Yao, Yangqiu Song, James T. Kwok, Dik Lun Lee:

Learning with Heterogeneous Side Information Fusion for Recommender Systems. - Shahram Najam Syed, Aamir Zeb Shaikh, Shabbar Naqvi:

A Novel Hybrid Biometric Electronic Voting System: Integrating Finger Print and Face Recognition. - Kaiyi Ji, Guocong Quan, Jian Tan:

Asymptotic Miss Ratio of LRU Caching with Consistent Hashing. - Yupei Wang, Xin Zhao, Yin Li, Kaiqi Huang:

Deep Crisp Boundaries: From Boundaries to Higher-level Tasks. - Weijun Zhu, ShaoHuan Ban, Yongwen Fan:

How to find a GSMem malicious activity via an AI approach. - Ali Bereyhi, Mohammad Ali Sedaghat, Ralf R. Müller:

Precoding via Approximate Message Passing with Instantaneous Signal Constraints. - Danielle Ezuz, Justin Solomon, Mirela Ben-Chen:

Reversible Harmonic Maps between Discrete Surfaces. - Arthur van Goethem, Kevin Verbeek:

Optimal Morphs of Planar Orthogonal Drawings. - Tuba Yavuz, Chelsea A. Metcalf:

Heuristics for Selecting Predicates for Partial Predicate Abstraction. - Peter Sjögårde, Per Ahlgren:

Granularity of algorithmically constructed publication-level classifications of research publications: Identification of topics. - (Withdrawn) Ensemble One-dimensional Convolution Neural Networks for Skeleton-based Action Recognition.

- Andras Rozsa, Manuel Günther, Ethan M. Rudd, Terrance E. Boult:

Facial Attributes: Accuracy and Adversarial Robustness. - Srinivas Pinisetty, Thibaud Antignac, David Sands, Gerardo Schneider:

Monitoring Data Minimisation. - Shota Saito, Toshiyasu Matsushima:

Cumulant Generating Function of Codeword Lengths in Variable-Length Lossy Compression Allowing Positive Excess Distortion Probability. - Borzoo Rassouli, Deniz Gündüz:

Optimal Utility-Privacy Trade-off with the Total Variation Distance as the Privacy Measure. - Primavera De Filippi, Samer Hassan:

Blockchain Technology as a Regulatory Technology: From Code is Law to Law is Code. - Ella M. Gale

:
Spiking memristor logic gates are a type of time-variant perceptron. - Zhijie Ren, Zekeriya Erkin:

A Scale-out Blockchain for Value Transfer with Spontaneous Sharding. - Ke Liu, Zhongbin Zha, Wenkai Wan, Vaneet Aggarwal, Binzhang Fu, Mingyu Chen:

Optimizing TCP Loss Recovery Performance Over Mobile Data Networks. - Florian Daniel, Pavel Kucherbaev, Cinzia Cappiello, Boualem Benatallah, Mohammad Allahbakhsh:

Quality Control in Crowdsourcing: A Survey of Quality Attributes, Assessment Techniques and Assurance Actions. - John McKay, Isaac Gerg, Vishal Monga:

Bridging the Gap: Simultaneous Fine Tuning for Data Re-Balancing. - Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Giuseppe Caire:

Gaussian 1-2-1 Networks: Capacity Results for mmWave Communications. - Yasutada Oohama, Bagus Santoso:

Information Theoretic Security for Side-Channel Attacks to the Shannon Cipher System. - Enrique Romero Merino, Ferran Mazzanti Castrillejo, Jordi Delgado Pin, David Buchaca Prats:

Weighted Contrastive Divergence. - Abel Nieto:

Tamarin: Concolic Disequivalence for MIPS. - Soumil Mandal, Dipankar Das:

Analyzing Roles of Classifiers and Code-Mixed factors for Sentiment Identification. - Mojtaba Sedigh Fazli, Stephen Andrew Vella, Silvia N. J. Moreno, Shannon Quinn:

Unsupervised Discovery of Toxoplasma gondii Motility Phenotypes. - Richard Combes, Asma Ghorbel, Mari Kobayashi, Sheng Yang:

Utility Optimal Scheduling for Coded Caching in General Topologies. - Ngo Thi Hien, Do Long Van:

Codes induced by alternative codes. - Ngo Thi Hien:

On strong alt-induced codes. - Thijs Vogels, Octavian-Eugen Ganea, Carsten Eickhoff:

Web2Text: Deep Structured Boilerplate Removal. - Danny Karmon, Daniel Zoran, Yoav Goldberg:

LaVAN: Localized and Visible Adversarial Noise. - Yanjie Dong, Ahmed El Shafie, Md. Jahangir Hossain, Julian Cheng, Naofal Al-Dhahir, Victor C. M. Leung:

Secure Beamforming in Full-Duplex SWIPT Systems With Loopback Self-Interference Cancellation. - Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, Dawn Song:

Generating Adversarial Examples with Adversarial Networks. - Chaowei Xiao, Jun-Yan Zhu, Bo Li, Warren He, Mingyan Liu, Dawn Song:

Spatially Transformed Adversarial Examples. - Xingjun Ma, Bo Li, Yisen Wang, Sarah M. Erfani, Sudanthi N. R. Wijewickrema, Michael E. Houle, Grant Schoenebeck, Dawn Song, James Bailey:

Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality. - Karthik Airani, Rohit Guttal:

A Machine Learning Framework for Register Placement Optimization in Digital Circuit Design. - Fariha Afsana, Md. Asif-Ur-Rahman, Muhammad R. Ahmed, Mufti Mahmud, M. Shamim Kaiser:

An Energy Conserving Routing Scheme for Wireless Body Sensor Nanonetwork Communication. - Trang Pham, Truyen Tran, Svetha Venkatesh:

Graph Memory Networks for Molecular Activity Prediction. - Marco Singh, Akshay Pai:

Boundary Optimizing Network (BON). - Ming Tai Ha, Matteo Turilli, André Merzky

, Shantenu Jha:
Towards General Distributed Resource Selection. - Javad Doliskani:

On Division Polynomial PIT and Supersingularity. - Ting-Hao (Kenneth) Huang, Joseph Chee Chang, Jeffrey P. Bigham:

Evorus: A Crowd-powered Conversational Assistant Built to Automate Itself Over Time. - Munindar P. Singh, Amit K. Chopra:

Violable Contracts and Governance for Blockchain Applications. - Le Liang, Shijie Xie, Geoffrey Ye Li, Zhi Ding, Xingxing Yu:

Graph-Based Radio Resource Management for Vehicular Networks. - Lina J. Karam, Tejas S. Borkar, Yu Cao, Junseok Chae:

Generative Sensing: Transforming Unreliable Sensor Data for Reliable Recognition. - Ehab Zaghloul, Kai Zhou, Jian Ren:

P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing. - (Withdrawn) Towards Multi-Object Detection and Tracking in Urban Scenario under Uncertainties.

- Sheikh Muhammad Sarwar, John Foley, James Allan:

Term Relevance Feedback for Contextual Named Entity Retrieval. - (Withdrawn) Joint Resource Allocation and Antenna Selection In the Uplink of OFDMA Networks.

- Abelino Jimenez, Benjamin Elizalde, Bhiksha Raj:

DCASE 2017 Task 1: Acoustic Scene Classification Using Shift-Invariant Kernels and Random Features. - Fengjiao Peng, Veronica LaBelle, Emily Christen Yue, Rosalind W. Picard:

A Trip to the Moon: Personalized Animated Movies for Self-reflection. - Jiehua Chen, Rolf Niedermeier, Piotr Skowron:

Stable Marriage with Multi-Modal Preferences. - Abhishek Agarwal, Sidharth Jaggi, Arya Mazumdar:

Novel Impossibility Results for Group-Testing. - Babak Alipour, Leonardo Tonetto, Aaron Yi Ding, Roozbeh Ketabi, Jörg Ott, Ahmed Helmy:

Analyzing Mobility-Traffic Correlations in Large WLAN Traces: Flutes vs. Cellos. - Adrian Albert, Emanuele Strano, Jasleen Kaur, Marta C. González:

Modeling urbanization patterns with generative adversarial networks. - Qimin You, Yonghui Li, Soung Chang Liew, Branka Vucetic:

Duality of Channel Encoding and Decoding - Part II: Rate-1 Non-binary Convolutional Codes. - Mehran Mahmoudi, Sarah Nadi:

An Empirical Study of Android Changes in CyanogenMod. - Zichen Zhang, Min Tang, Dana Cobzas, Dornoosh Zonoobi, Martin Jägersand, Jacob L. Jaremko:

End-to-end detection-segmentation network with ROI convolution. - Eliya Nachmani, Yaron Bachar, Elad Marciano, David Burshtein, Yair Be'ery:

Near Maximum Likelihood Decoding with Deep Learning. - Yuhua Chen, Yibin Xie, Zhengwei Zhou, Feng Shi, Anthony G. Christodoulou, Debiao Li:

Brain MRI Super Resolution Using 3D Deep Densely Connected Neural Networks. - Mario Michael Krell, Anett Seeland, Su Kyoung Kim:

Data Augmentation for Brain-Computer Interfaces: Analysis on Event-Related Potentials Data. - Gayane Vardoyan, C. V. Hollot, Don Towsley:

Towards Stability Analysis of Data Transport Mechanisms: a Fluid Model and an Application. - Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl:

A Large Scale Investigation of Obfuscation Use in Google Play. - Dongdong Jiang, Ying Cui:

Enhancing Performance of Random Caching in Large-Scale Wireless Networks with Multiple Receive Antennas. - Mahdi Cheraghchi, João Ribeiro:

Improved Capacity Upper Bounds for the Discrete-Time Poisson Channel. - Takwa Omrani, Adel Dallali, Bilgacem Chibani Rhaimi, Jaouhar Fattahi:

Fusion of ANN and SVM Classifiers for Network Attack Detection. - Wengling Chen, James Hays:

SketchyGAN: Towards Diverse and Realistic Sketch to Image Synthesis. - Jack Parker-Holder, Sam Gass:

Compressing Deep Neural Networks: A New Hashing Pipeline Using Kac's Random Walk Matrices. - Minghui Liao, Baoguang Shi, Xiang Bai:

TextBoxes++: A Single-Shot Oriented Scene Text Detector. - Yuanfang Guo, Xiaochun Cao, Wei Zhang, Rui Wang:

Fake Colorized Image Detection. - Justin Gilmer, Luke Metz, Fartash Faghri, Samuel S. Schoenholz, Maithra Raghu, Martin Wattenberg, Ian J. Goodfellow:

Adversarial Spheres. - Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Prateek Mittal, Mung Chiang:

Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos. - Junhee Park, Hoon Lee, Subin Eom, Inkyu Lee:

Minimum Throughput Maximization in UAV-Aided Wireless Powered Communication Networks. - Subin Eom, Hoon Lee, Junhee Park, Inkyu Lee:

UAV-Aided Wireless Communication Designs With Propulsion Energy Limitations. - Ian Dewancker, Jakob Bauer, Michael McCourt:

Sequential Preference-Based Optimization. - Nahid Yahyapoor, Hamed Yaghoobian, Manijeh Keshtgari:

An efficient and secure two-party key agreement protocol based on chaotic maps. - Deeparnab Chakrabarty, Sanjeev Khanna:

Better and Simpler Error Analysis of the Sinkhorn-Knopp Algorithm for Matrix Scaling. - Sepehr Assadi, Sanjeev Khanna:

Tight Bounds on the Round Complexity of the Distributed Maximum Coverage Problem. - Yize Chen

, Quanlai Li, Hao Wang:
Towards Trusted Social Networks with Blockchain Technology. - Xinyu Wu, Vishal Saxena:

Dendritic-Inspired Processing Enables Bio-Plausible STDP in Compound Binary Synapses. - Jong Gyu Jang, Hyun Jong Yang, Hyekyung Jwa:

Resource Allocation and Power Control in Cooperative Small Cell Networks in Frequency Selective Channels with Backhaul Constraint. - Jie Gong, Tsung-Hui Chang, Chao Shen, Xiang Chen:

Aviation Time Minimization of UAV for Data Collection over Wireless Sensor Networks. - Lex Fridman, Benedikt Jenik, Jack Terwilliger:

DeepTraffic: Driving Fast through Dense Traffic with Deep Reinforcement Learning. - Zhiyuan Chen, Nianzu Ma, Bing Liu:

Lifelong Learning for Sentiment Classification. - Wei Wang, Shiyue He, Lin Yang, Qian Zhang, Tao Jiang:

Wi-Fi Teeter-Totter: Overclocking OFDM for Internet of Things. - Nan Yu, Chifu Yang, Miao Li:

A Planar Tracking Game with Sensing Delays and its MATLAB Implementation. - Deeparnab Chakrabarty, C. Seshadhri:

Adaptive Boolean Monotonicity Testing in Total Influence Time. - Satoshi Takabe, Tadashi Wadayama:

k-connectivity of Random Graphs and Random Geometric Graphs in Node Fault Model. - Esra'a Alkafaween:

Novel Methods for Enhancing the Performance of Genetic Algorithms. - Wenqian Wu, Xiqi Gao, Yongpeng Wu, Chengshan Xiao:

Beam domain secure transmission for massive MIMO communications. - Ferenc Galkó, Carsten Eickhoff:

Biomedical Question Answering via Weighted Neural Network Passage Retrieval. - Martine Lenders, Peter Kietzmann, Oliver Hahm, Hauke Petersen, Cenk Gündogan, Emmanuel Baccelli, Kaspar Schleiser, Thomas C. Schmidt, Matthias Wählisch:

Connecting the World of Embedded Mobiles: The RIOT Approach to Ubiquitous Networking for the Internet of Things. - Bela Amro:

Malware detection techniques for mobile devices. - Yongshuai Liu, Jiyu Chen, Hao Chen:

Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks. - Igor Adamski, Robert Adamski, Tomasz Grel, Adam Jedrych, Kamil Kaczmarek, Henryk Michalewski:

Distributed Deep Reinforcement Learning: Learn how to play Atari games in 21 minutes. - Zeyad M. Alfawaer, Mohammad Riyaz Belgaum:

An enhanced Multipath Strategy in Mobile Ad hoc Routing Protocols. - Nathan D. Ratliff, Jan Issac, Daniel Kappler:

Riemannian Motion Policies. - Youssef Arbach, David S. Karcher, Kirstin Peters

, Uwe Nestmann:
Dynamic Causality in Event Structures. - Liping Li, Zuzheng Xu, Yanjun Hu:

Channel Estimation with Systematic Polar Codes. - Ilya Musabirov, Denis Bulygin, Paul Okopny, Ksenia Konstantinova:

Between an Arena and a Sports Bar: Online Chats of eSports Spectators. - Suman Ghosh, Lakshmi Prasad Natarajan:

Linear Codes for Broadcasting with Noisy Side Information. - Jun Muramatsu, Shigeki Miyake:

Multi-Terminal Codes Using Constrained-Random-Number Generators. - Yuta Sakai

:
Generalized Fano-Type Inequality for Countably Infinite Systems with List-Decoding. - Stefan Dierks, Gerhard Kramer, Berthold Panzner, Wolfgang Zirwas:

Analysis of Massive MIMO and Base Station Cooperation in an Indoor Scenario. - Arpan Mukhopadhyay, Nidhi Hegde, Marc Lelarge

:
Optimal Content Replication and Request Matching in Large Caching Systems. - Yuting Fang, Adam Noel, Nan Yang, Andrew W. Eckford, Rodney A. Kennedy:

Symbol-by-Symbol Maximum Likelihood Detection for Cooperative Molecular Communication. - Kunal Swami, Saikat Kumar Das

:
CANDY: Conditional Adversarial Networks based Fully End-to-End System for Single Image Haze Removal. - Jiwook Choi, Yunseo Nam, Namyoon Lee:

Spatial Lattice Modulation for MIMO Systems. - Han Xiao:

Convexification of Neural Graph. - Ana Lucía Schmidt, Fabiana Zollo, Antonio Scala, Cornelia Betsch, Walter Quattrociocchi:

Polarization of the Vaccination Debate on Facebook. - Michal Feldman, Ophir Friedler, Aviad Rubinstein:

99\% Revenue via Enhanced Competition. - Konstantinos Poularakis, George Iosifidis, Leandros Tassiulas:

SDN-enabled Tactical Ad Hoc Networks: Extending Programmable Control to the Edge. - Harsh Thakkar

, Dharmen Punjani, Yashwant Keswani, Jens Lehmann, Sören Auer:
A Stitch in Time Saves Nine - SPARQL querying of Property Graphs using Gremlin Traversals. - Laura Luzzi, Roope Vehkalahti:

The DMT classification of real and quaternionic lattice codes. - Miroslav Vodolán, Filip Jurcícek:

Denotation Extraction for Interactive Learning in Dialogue Systems. - Pavlos Sermpezis, Vasileios Kotronis, Alberto Dainotti, Xenofontas A. Dimitropoulos:

A Survey among Network Operators on BGP Prefix Hijacking. - Hiroshi Inoue:

Data Augmentation by Pairing Samples for Images Classification. - Yoshinari Takeishi, Jun'ichi Takeuchi:

An Improved Analysis of Least Squares Superposition Codes with Bernoulli Dictionary. - Vishnu S. Chipade, Abhishek, Mangal Kothari, Rushikesh R. Chaudhari:

Systematic design methodology for development and flight testing of a variable pitch quadrotor biplane VTOL UAV for payload delivery. - Robert J. Rovetto:

An Ontology for Satellite Databases. - Alex Huang, Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly:

Adversarial Deep Learning for Robust Detection of Binary Encoded Malware. - Milad Zafar Nezhad, Dongxiao Zhu, Najibesadat Sadati, Kai Yang:

A Predictive Approach Using Deep Feature Learning for Electronic Medical Records: A Comparative Study. - Yushen Long, Shuai Liu, Lihua Xie:

Iterative Learning Economic Model Predictive Control. - Dimitrios Vasilas:

Search on Secondary Attributes in Geo-Distributed Systems. - Mahdi Nangir, Reza Asvadi, Mahmoud Ahmadian-Attari, Jun Chen:

Binary CEO Problem under Log-Loss with BSC Test-Channel Model. - Paul Fergus, Casimiro Aday Curbelo Montañez, Basma Abdulaimma, Paulo Lisboa, Carl Chalmers:

Utilising Deep Learning and Genome Wide Association Studies for Epistatic-Driven Preterm Birth Classification in African-American Women. - Zeyuan Allen-Zhu:

How To Make the Gradients Small Stochastically. - Dian-Wu Yue, Ha H. Nguyen, Shuai Xu:

Multiplexing Analysis of Millimeter-Wave Massive MIMO Systems. - Ivona Tautkute, Tomasz Trzcinski, Aleksander Skorupa, Lukasz Brocki, Krzysztof Marasek:

DeepStyle: Multimodal Search Engine for Fashion and Interior Design. - Lise Verlaet

, Sidonie Gallot
:
Between collective intelligence and semantic web : hypermediating sites. Contribution to technologies of intelligence. - Yun-Cheng Tsai, Jun-Hao Chen, Junjie Wang:

Predict Forex Trend via Convolutional Neural Networks. - Gadi Fibich, Tomer Levin, Oren Yakir:

Boundary Effects in the Discrete Bass Model. - Kuntal Dey, Ritvik Shrivastava, Saroj Kaushik:

Topical Stance Detection for Twitter: A Two-Phase LSTM Model Using Attention. - Patryk Orzechowski, Moshe Sipper, Xiuzhen Huang, Jason H. Moore:

EBIC: an artificial intelligence-based parallel biclustering algorithm for pattern discovery. - Qifa Yan, Michèle A. Wigger, Sheng Yang:

Placement Delivery Array Design for Combination Networks with Edge Caching. - Eunbyung Park, Alexander C. Berg:

Meta-Tracker: Fast and Robust Online Adaptation for Visual Object Trackers. - Imon Banerjee, Michael Francis Gensheimer, Douglas J. Wood, Solomon Henry, Daniel T. Chang, Daniel L. Rubin:

Probabilistic Prognostic Estimates of Survival in Metastatic Cancer Patients (PPES-Met) Utilizing Free-Text Clinical Narratives. - Gaurav Kumar Agarwal, Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli:

Secure Communication over 1-2-1 Networks. - Mehmet Deveci, Christian Trott, Sivasankaran Rajamanickam:

Multi-threaded Sparse Matrix-Matrix Multiplication for Many-Core and GPU Architectures. - (Withdrawn) Capacity Results for Finite-Field X-Channels with Delayed CSIT.

- Tingjun Chen, Mahmood Baraani Dastjerdi, Jin Zhou, Harish Krishnaswamy, Gil Zussman:

Open-Access Full-Duplex Wireless in the ORBIT Testbed. - Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:

Game of Drones - Detecting Streamed POI from Encrypted FPV Channel. - Karim A. Banawan, Sennur Ulukus:

Asymmetry Hurts: Private Information Retrieval Under Asymmetric Traffic Constraints. - Wolfgang Orthuber:

Why informatics and general science need a conjoint basic definition of information. - Gabriel Schwartz, Ko Nishino:

Recognizing Material Properties from Images. - Igor Gitman, Deepak Dilipkumar, Ben Parr:

Convergence Analysis of Gradient Descent Algorithms with Proportional Updates. - Ben Parr:

Deep In-GPU Experience Replay. - Yuxing Tang, Josiah Wang, Xiaofang Wang, Boyang Gao, Emmanuel Dellandréa, Robert J. Gaizauskas, Liming Chen:

Visual and Semantic Knowledge Transfer for Large Scale Semi-supervised Object Detection. - B. Ravi Kiran, Dilip Mathew Thomas, Ranjith Parakkal:

An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos. - Mathew Monfort, Bolei Zhou, Sarah Adel Bargal, Alex Andonian, Tom Yan, Kandan Ramakrishnan, Lisa M. Brown, Quanfu Fan, Dan Gutfreund, Carl Vondrick, Aude Oliva:

Moments in Time Dataset: one million videos for event understanding. - Marco Mondelli, S. Hamed Hassani, Rüdiger L. Urbanke:

A New Coding Paradigm for the Primitive Relay Channel. - Sariel Har-Peled

, Haim Kaplan, Wolfgang Mulzer, Liam Roditty, Paul Seiferth, Micha Sharir, Max Willert:
Stabbing pairwise intersecting disks by five points. - Martin Mose Bentzen, Felix Lindner:

A Formalization of Kant's Second Formulation of the Categorical Imperative. - John Kluesner, Michael B. Monagan:

Resolving zero-divisors using Hensel lifting. - Matthias Rost, Stefan Schmid:

NP-Completeness and Inapproximability of the Virtual Network Embedding Problem and Its Variants. - Jian-Jia Weng, Lin Song, Fady Alajaji, Tamás Linder:

Sufficient Conditions for the Tightness of Shannon's Capacity Bounds for Two-Way Channels. - Justin Gottschlich:

Paranom: A Parallel Anomaly Dataset Generator. - Tae-Jun Lee, Justin Gottschlich, Nesime Tatbul, Eric Metcalf, Stan Zdonik:

Greenhouse: A Zero-Positive Machine Learning System for Time-Series Anomaly Detection. - Tae Jun Lee, Justin Gottschlich, Nesime Tatbul, Eric Metcalf, Stan Zdonik:

Precision and Recall for Range-Based Anomaly Detection. - Min Xian, Yingtao Zhang, Heng-Da Cheng, Fei Xu, Kuan Huang, Boyu Zhang, Jianrui Ding, Chunping Ning, Ying Wang:

A Benchmark for Breast Ultrasound Image Segmentation (BUSIS). - Kevin P. Knudson, Bei Wang:

Discrete Stratified Morse Theory: A User's Guide. - Charalampos E. Tsourakakis, Shreyas Sekar, Johnson Lam, Liu Yang:

Risk-Averse Matchings over Uncertain Graph Databases. - Tom Gur, Igor Shinkar:

An Entropy Lower Bound for Non-Malleable Extractors. - Zheng Zhou, Weiming Zhang, Nenghai Yu:

IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals. - Ruoyu Li, Sheng Wang, Feiyun Zhu, Junzhou Huang:

Adaptive Graph Convolutional Neural Networks. - Swalpa Kumar Roy, Nilavra Bhattacharya, Bhabatosh Chanda, Bidyut B. Chaudhuri, Dipak Kumar Ghosh:

FWLBP: A Scale Invariant Descriptor for Texture Classification. - Sarfaraz Hussein, Maria M. J. Chuquicusma, Pujan Kandel, Candice W. Bolan, Michael B. Wallace, Ulas Bagci:

Supervised and Unsupervised Tumor Characterization in the Deep Learning Era. - Mohammadreza Esfandiari, Senjuti Basu Roy, Sihem Amer-Yahia:

Eliciting Worker Preference for Task Completion. - Min Zhu, David G. M. Mitchell, Michael Lentmaier, Daniel J. Costello Jr., Baoming Bai:

Combating Error Propagation in Window Decoding of Braided Convolutional Codes. - John N. Maidens, Axel Barrau, Silvère Bonnabel, Murat Arcak:

Symmetry reduction for dynamic programming. - M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, Farinaz Koushanfar:

Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications. - Ashutosh Kumar, Arijit Biswas, Subhajit Sanyal:

eCommerceGAN : A Generative Adversarial Network for E-commerce. - Ziqiang Zheng, Chao Wang, Zhibin Yu, Haiyong Zheng, Bing Zheng:

Instance Map based Image Synthesis with a Denoising Generative Adversarial Network. - Arijit Ghosh, Sudeshna Kolay, Gopinath Mishra:

FPT algorithms for embedding into low complexity graphic metrics. - Dong Liu, Chenyang Yang, Victor C. M. Leung:

When Exploiting Individual User Preference Is Beneficial for Caching at Base Stations? - Longyue Wang, Zhaopeng Tu, Shuming Shi, Tong Zhang, Yvette Graham, Qun Liu:

Translating Pro-Drop Languages with Reconstruction Models. - Ori Shmuel, Asaf Cohen, Omer Gurewitz:

Asymptotically Optimal Scheduling for Compute-and-Forward. - Zeyuan Hu, Julia Strout:

Exploring Stereotypes and Biased Data with the Crowd. - Chen-Yu Wei, Haipeng Luo:

More Adaptive Algorithms for Adversarial Bandits. 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID