Causal Inference for Observational Time-Series with Encoder-Decoder Networks

This paper proposes a method for estimating the causal effect of a discrete intervention in observational time-series data using encoder-decoder recurrent neural networks (RNNs). Encoder-decoder networks, which are special class of RNNs suitable for handling variable-length sequential data, are used to predict a counterfactual time-series of treated unit outcomes. The proposed method does not rely on pretreatment covariates and encoder-decoder networks are capable of learning nonconvex combinations of control unit outcomes to construct a counterfactual. To demonstrate the proposed method, I extend a field experiment studying the effect of radio advertisements on electoral competition to observational time-series.


NAG: Network for Adversary Generation

Adversarial perturbations can pose a serious threat for deploying machine learning systems. Recent works have shown existence of image-agnostic perturbations that can fool classifiers over most natural images. Existing methods present optimization approaches that solve for a fooling objective with an imperceptibility constraint to craft the perturbations. However, for a given classifier, they generate one perturbation at a time, which is a single instance from the manifold of adversarial perturbations. Also, in order to build robust models, it is essential to explore the manifold of adversarial perturbations. In this paper, we propose for the first time, a generative approach to model the distribution of adversarial perturbations. The architecture of the proposed model is inspired from that of GANs and is trained using fooling and diversity objectives. Our trained generator network attempts to capture the distribution of adversarial perturbations for a given classifier and readily generates a wide variety of such perturbations. Our experimental evaluation demonstrates that perturbations crafted by our model (i) achieve state-of-the-art fooling rates, (ii) exhibit wide variety and (iii) deliver excellent cross model generalizability. Our work can be deemed as an important step in the process of inferring about the complex manifolds of adversarial perturbations.


Robust Deep Reinforcement Learning with Adversarial Attacks

This paper proposes adversarial attacks for Reinforcement Learning (RL) and then improves the robustness of Deep Reinforcement Learning algorithms (DRL) to parameter uncertainties with the help of these attacks. We show that even a naively engineered attack successfully degrades the performance of DRL algorithm. We further improve the attack using gradient information of an engineered loss function which leads to further degradation in performance. These attacks are then leveraged during training to improve the robustness of RL within robust control framework. We show that this adversarial training of DRL algorithms like Deep Double Q learning and Deep Deterministic Policy Gradients leads to significant increase in robustness to parameter variations for RL benchmarks such as Cart-pole, Mountain Car, Hopper and Half Cheetah environment.


Cogniculture: Towards a Better Human-Machine Co-evolution

Research in Artificial Intelligence is breaking technology barriers every day. New algorithms and high performance computing are making things possible which we could only have imagined earlier. Though the enhancements in AI are making life easier for human beings day by day, there is constant fear that AI based systems will pose a threat to humanity. People in AI community have diverse set of opinions regarding the pros and cons of AI mimicking human behavior. Instead of worrying about AI advancements, we propose a novel idea of cognitive agents, including both human and machines, living together in a complex adaptive ecosystem, collaborating on human computation for producing essential social goods while promoting sustenance, survival and evolution of the agents’ life cycle. We highlight several research challenges and technology barriers in achieving this goal. We propose a governance mechanism around this ecosystem to ensure ethical behaviors of all cognitive agents. Along with a novel set of use-cases of Cogniculture, we discuss the road map ahead for this journey.


Neumann Optimizer: A Practical Optimization Algorithm for Deep Neural Networks

Progress in deep learning is slowed by the days or weeks it takes to train large models. The natural solution of using more hardware is limited by diminishing returns, and leads to inefficient use of additional resources. In this paper, we present a large batch, stochastic optimization algorithm that is both faster than widely used algorithms for fixed amounts of computation, and also scales up substantially better as more computational resources become available. Our algorithm implicitly computes the inverse Hessian of each mini-batch to produce descent directions; we do so without either an explicit approximation to the Hessian or Hessian-vector products. We demonstrate the effectiveness of our algorithm by successfully training large ImageNet models (Inception-V3, Resnet-50, Resnet-101 and Inception-Resnet-V2) with mini-batch sizes of up to 32000 with no loss in validation error relative to current baselines, and no increase in the total number of steps. At smaller mini-batch sizes, our optimizer improves the validation error in these models by 0.8-0.9%. Alternatively, we can trade off this accuracy to reduce the number of training steps needed by roughly 10-30%. Our work is practical and easily usable by others — only one hyperparameter (learning rate) needs tuning, and furthermore, the algorithm is as computationally cheap as the commonly used Adam optimizer.


Code Generation Techniques for Raw Data Processing

The motivation of the current study was to design an algorithm that can speed up the processing of a query. The important feature is generating code dynamically for a specific query. We present the technique of code generation that is applied to query processing on a raw file. The idea was to customize a query program with a given query and generate a machine- and query-specific source code. The generated code is compiled by GCC, Clang or any other C/C++ compiler, and the compiled file is dynamically linked to the main program for further processing. Code generation reduces the cost of generalizing query processing. It also avoids the overhead of the conventional interpretation during achieve high performance. Database Management Systems (DBMSs) perform excellent jobs in many aspects of big data, such as storage, indexing, and analysis. DBMSs typically format entire data and load them into their storage layer. They increase data-to-query time, which is the cost time it takes to convert data into a specific schema and persist them in a disk. Ideally, DBMSs should adapt to the input data and extract one/some of columns, not the entire data, that is/are associated with a given query. Therefore, the query engine on a raw file can reduce the cost of conventional general operators and avoid some unnecessary procedures, such as fully scanning, tokenizing and paring the whole data. In the current study, we introduce our code-generation approach for in-situ processing of raw files, which is based on the template approach and the hype approach. The approach minimizes the data-to-query time and achieves a high performance for query processing. There are some benefits from our work: reducing branches and instructions, unrolling loops, eliminating unnecessary data type checks and optimizing the binary code with a compiler on a local machine.


Bayesian Q-learning with Assumed Density Filtering

While off-policy temporal difference methods have been broadly used in reinforcement learning due to their efficiency and simple implementation, their Bayesian counterparts have been relatively understudied. This is mainly because the max operator in the Bellman optimality equation brings non-linearity and inconsistent distributions over value function. In this paper, we introduce a new Bayesian approach to off-policy TD methods using Assumed Density Filtering, called ADFQ, which updates beliefs on action-values (Q) through an online Bayesian inference method. Uncertainty measures in the beliefs not only are used in exploration but they provide a natural regularization in the belief updates. We also present a connection between ADFQ and Q-learning. Our empirical results show the proposed ADFQ algorithms outperform comparing algorithms in several task domains. Moreover, our algorithms improve general drawbacks in BRL such as computational complexity, usage of uncertainty, and nonlinearity.


Bayesian Joint Matrix Decomposition for Data Integration with Heterogeneous Noise

Matrix decomposition is a popular and fundamental approach in machine learning and data mining. It has been successfully applied into various fields. Most matrix decomposition methods focus on decomposing a data matrix from one single source. However, it is common that data are from different sources with heterogeneous noise. A few of matrix decomposition methods have been extended for such multi-view data integration and pattern discovery. While only few methods were designed to consider the heterogeneity of noise in such multi-view data for data integration explicitly. To this end, we propose a joint matrix decomposition framework (BJMD), which models the heterogeneity of noise by Gaussian distribution in a Bayesian framework. We develop two algorithms to solve this model: one is a variational Bayesian inference algorithm, which makes full use of the posterior distribution; and another is a maximum a posterior algorithm, which is more scalable and can be easily paralleled. Extensive experiments on synthetic and real-world datasets demonstrate that BJMD considering the heterogeneity of noise is superior or competitive to the state-of-the-art methods.


Peephole: Predicting Network Performance Before Training

The quest for performant networks has been a significant force that drives the advancements of deep learning in recent years. While rewarding, improving network design has never been an easy journey. The large design space combined with the tremendous cost required for network training poses a major obstacle to this endeavor. In this work, we propose a new approach to this problem, namely, predicting the performance of a network before training, based on its architecture. Specifically, we develop a unified way to encode individual layers into vectors and bring them together to form an integrated description via LSTM. Taking advantage of the recurrent network’s strong expressive power, this method can reliably predict the performances of various network architectures. Our empirical studies showed that it not only achieved accurate predictions but also produced consistent rankings across datasets — a key desideratum in performance prediction.


An Efficient Multi-core Implementation of the Jaya Optimisation Algorithm

In this work, we propose a hybrid parallel Jaya optimisation algorithm for a multi-core environment with the aim of solving large-scale global optimisation problems. The proposed algorithm is called HHCPJaya, and combines the hyper-population approach with the hierarchical cooperation search mechanism. The HHCPJaya algorithm divides the population into many small subpopulations, each of which focuses on a distinct block of the original population dimensions. In the hyper-population approach, we increase the small subpopulations by assigning more than one subpopulation to each core, and each subpopulation evolves independently to enhance the explorative and exploitative nature of the population. We combine this hyper-population approach with the two-level hierarchical cooperative search scheme to find global solutions from all subpopulations. Furthermore, we incorporate an additional updating phase on the respective subpopulations based on global solutions, with the aim of further improving the convergence rate and the quality of solutions. Several experiments applying the proposed parallel algorithm in different settings prove that it demonstrates sufficient promise in terms of the quality of solutions and the convergence rate. Furthermore, a relatively small computational effort is required to solve complex and large-scale optimisation problems.


Word Sense Disambiguation with LSTM: Do We Really Need 100 Billion Words?

Recently, Yuan et al. (2016) have shown the effectiveness of using Long Short-Term Memory (LSTM) for performing Word Sense Disambiguation (WSD). Their proposed technique outperformed the previous state-of-the-art with several benchmarks, but neither the training data nor the source code was released. This paper presents the results of a reproduction study of this technique using only openly available datasets (GigaWord, SemCore, OMSTI) and software (TensorFlow). From them, it emerged that state-of-the-art results can be obtained with much less data than hinted by Yuan et al. All code and trained models are made freely available.


Semi-supervised Multimodal Hashing

Retrieving nearest neighbors across correlated data in multiple modalities, such as image-text pairs on Facebook and video-tag pairs on YouTube, has become a challenging task due to the huge amount of data. Multimodal hashing methods that embed data into binary codes can boost the retrieving speed and reduce storage requirement. As unsupervised multimodal hashing methods are usually inferior to supervised ones, while the supervised ones requires too much manually labeled data, the proposed method in this paper utilizes a part of labels to design a semi-supervised multimodal hashing method. It first computes the transformation matrices for data matrices and label matrix. Then, with these transformation matrices, fuzzy logic is introduced to estimate a label matrix for unlabeled data. Finally, it uses the estimated label matrix to learn hashing functions for data in each modality to generate a unified binary code matrix. Experiments show that the proposed semi-supervised method with 50% labels can get a medium performance among the compared supervised ones and achieve an approximate performance to the best supervised method with 90% labels. With only 10% labels, the proposed method can still compete with the worst compared supervised one.


A Random Attention Model

We introduce a Random Attention Model (RAM) allowing for a large class of stochastic consideration maps in the context of an otherwise canonical limited attention model for decision theory. The model relies on a new restriction on the unobserved, possibly stochastic consideration map, termed \textit{Monotonic Attention}, which is intuitive and nests many recent contributions in the literature on limited attention. We develop revealed preference theory within RAM and obtain precise testable implications for observable choice probabilities. Using these results, we show that a set (possibly a singleton) of strict preference orderings compatible with RAM is identifiable from the decision maker’s choice probabilities, and establish a representation of this identified set of unobserved preferences as a collection of inequality constrains on her choice probabilities. Given this nonparametric identification result, we develop uniformly valid inference methods for the (partially) identifiable preferences. We showcase the performance of our proposed econometric methods using simulations, and provide general-purpose software implementation of our estimation and inference results in the \texttt{R} software package \texttt{ramchoice}. Our proposed econometric methods are computationally very fast to implement.


A General Memory-Bounded Learning Algorithm

In an era of big data there is a growing need for memory-bounded learning algorithms. In the last few years researchers have investigated what cannot be learned under memory constraints. In this paper we focus on the complementary question of what can be learned under memory constraints. We show that if a hypothesis class fulfills a combinatorial condition defined in this paper, there is a memory-bounded learning algorithm for this class. We prove that certain natural classes fulfill this combinatorial property and thus can be learned under memory constraints.


An Architecture Combining Convolutional Neural Network (CNN) and Support Vector Machine (SVM) for Image Classification

Convolutional neural networks (CNNs) are similar to ‘ordinary’ neural networks in the sense that they are made up of hidden layers consisting of neurons with ‘learnable’ parameters. These neurons receive inputs, performs a dot product, and then follows it with a non-linearity. The whole network expresses the mapping between raw image pixels and their class scores. Conventionally, the Softmax function is the classifier used at the last layer of this network. However, there have been studies (Alalshekmubarak and Smith, 2013; Agarap, 2017; Tang, 2013) conducted to challenge this norm. The cited studies introduce the usage of linear support vector machine (SVM) in an artificial neural network architecture. This project is yet another take on the subject, and is inspired by (Tang, 2013). Empirical data has shown that the CNN-SVM model was able to achieve a test accuracy of ~99.04% using the MNIST dataset (LeCun, Cortes, and Burges, 2010). On the other hand, the CNN-Softmax was able to achieve a test accuracy of ~99.23% using the same dataset. Both models were also tested on the recently-published Fashion-MNIST dataset (Xiao, Rasul, and Vollgraf, 2017), which is suppose to be a more difficult image classification dataset than MNIST (Zalandoresearch, 2017). This proved to be the case as CNN-SVM reached a test accuracy of ~90.72%, while the CNN-Softmax reached a test accuracy of ~91.86%. The said results may be improved if data preprocessing techniques were employed on the datasets, and if the base CNN model was a relatively more sophisticated than the one used in this study.


Inducing Interpretability in Knowledge Graph Embeddings

We study the problem of inducing interpretability in KG embeddings. Specifically, we explore the Universal Schema (Riedel et al., 2013) and propose a method to induce interpretability. There have been many vector space models proposed for the problem, however, most of these methods don’t address the interpretability (semantics) of individual dimensions. In this work, we study this problem and propose a method for inducing interpretability in KG embeddings using entity co-occurrence statistics. The proposed method significantly improves the interpretability, while maintaining comparable performance in other KG tasks.


SneakPeek: Interest Mining of Images based on User Interaction

Nowadays, eye tracking is the most used technology to detect areas of interest. This kind of technology requires specialized equipment recording user’s eyes. In this paper, we propose SneakPeek, a different approach to detect areas of interest on images displayed in web pages based on the zooming and panning actions of the users through the image. We have validated our proposed solution with a group of test subjects that have performed a test in our on-line prototype. Being this the first iteration of the algorithm, we have found both good and bad results, depending on the type of image. In specific, SneakPeek works best with medium/big objects in medium/big sized images. The reason behind it is the limitation on detection when smartphone screens keep getting bigger and bigger. SneakPeek can be adapted to any website by simply adapting the controller interface for the specific case.


Analysis-of-marginal-Tail-Means – a new method for robust parameter optimization

This paper presents a novel method, called Analysis-of-marginal-Tail-Means (ATM), for parameter optimization over a large, discrete design space. The key advantage of ATM is that it offers effective and robust optimization performance for both smooth and rugged response surfaces, using only a small number of function evaluations. This method can therefore tackle a wide range of engineering problems, particularly in applications where the performance metric to optimize is ‘black-box’ and expensive to evaluate. The ATM framework unifies two parameter optimization methods in the literature: the Analysis-of-marginal-Means (AM) approach (Taguchi, 1986), and the Pick-the-Winner (PW) approach (Wu et al., 1990). In this paper, we show that by providing a continuum between AM and PW via the novel idea of marginal tail means, the proposed method offers a balance between three fundamental trade-offs. By adaptively tuning these trade-offs, ATM can then provide excellent optimization performance over a broad class of response surfaces using limited data. We illustrate the effectiveness of ATM using several numerical examples, and demonstrate how such a method can be used to solve two real-world engineering design problems.


A Cascade Architecture for Keyword Spotting on Mobile Devices

We present a cascade architecture for keyword spotting with speaker verification on mobile devices. By pairing a small computational footprint with specialized digital signal processing (DSP) chips, we are able to achieve low power consumption while continuously listening for a keyword.


Cascading collapse of online social networks

Online social networks have increasing influence on our society, they may play decisive roles in politics and can be crucial for the fate of companies. Such services compete with each other and some may even break down rapidly. Using social network datasets we show the main factors leading to such a dramatic collapse. At early stage mostly the loosely bound users disappear, later collective effects play the main role leading to cascading failures. We present a theory based on a generalised threshold model to explain the findings and show how the collapse time can be estimated in advance using the dynamics of the churning users. Our results shed light to possible mechanisms of instabilities in other competing social processes.


Deep convolutional neural networks for brain image analysis on magnetic resonance imaging: a review

In recent years, deep convolutional neural networks (CNNs) have shown record-shattering performance in a variety of computer vision problems, such as visual object recognition, detection and segmentation. These methods have also been utilized in medical image analysis domain for lesion segmentation, anatomical segmentation and classification. We present an extensive literature review of CNN techniques applied in brain magnetic resonance imaging (MRI) analysis, focusing on the architectures, pre-processing, data-preparation and post-processing strategies available in these works. The aim of this study is three-fold. Our primary goal is to report how different CNN architectures have evolved, now entailing state-of-the-art methods by extensive discussion of the architectures and examining the pros and cons of the models when evaluating their performance using public datasets. Second, this paper is intended to be a detailed reference of the research activity in deep CNN for brain MRI analysis. Finally, our goal is to present a perspective on the future of CNNs, which we believe will be among the growing approaches in brain image analysis in subsequent years.


StrassenNets: Deep learning with a multiplication budget

A large fraction of the arithmetic operations required to evaluate deep neural networks (DNNs) are due to matrix multiplications, both in convolutional and fully connected layers. Matrix multiplications can be cast as 2-layer sum-product networks (SPNs) (arithmetic circuits), disentangling multiplications and additions. We leverage this observation for end-to-end learning of low-cost (in terms of multiplications) approximations of linear operations in DNN layers. Specifically, we propose to replace matrix multiplication operations by SPNs, with widths corresponding to the budget of multiplications we want to allocate to each layer, and learning the edges of the SPNs from data. Experiments on CIFAR-10 and ImageNet show that this method applied to ResNet yields significantly higher accuracy than existing methods for a given multiplication budget, or leads to the same or higher accuracy compared to existing methods while using significantly fewer multiplications. Furthermore, our approach allows fine-grained control of the tradeoff between arithmetic complexity and accuracy of DNN models. Finally, we demonstrate that the proposed framework is able to rediscover Strassen’s matrix multiplication algorithm, i.e., it can learn to multiply 2 \times 2 matrices using only 7 multiplications instead of 8.


Saving Gradient and Negative Curvature Computations: Finding Local Minima More Efficiently

We propose a family of nonconvex optimization algorithms that are able to save gradient and negative curvature computations to a large extent, and are guaranteed to find an approximate local minimum with improved runtime complexity. At the core of our algorithms is the division of the entire domain of the objective function into small and large gradient regions: our algorithms only perform gradient descent based procedure in the large gradient region, and only perform negative curvature descent in the small gradient region. Our novel analysis shows that the proposed algorithms can escape the small gradient region in only one negative curvature descent step whenever they enter it, and thus they only need to perform at most N_{\epsilon} negative curvature direction computations, where N_{\epsilon} is the number of times the algorithms enter small gradient regions. For both deterministic and stochastic settings, we show that the proposed algorithms can potentially beat the state-of-the-art local minima finding algorithms. For the finite-sum setting, our algorithm can also outperform the best algorithm in a certain regime.


Identical synchronization of nonidentical oscillators: when only birds of different feathers flock together
On the size-Ramsey number of tight paths
Social Emotion Mining Techniques for Facebook Posts Reaction Prediction
Transformational Sparse Coding
Heat kernel estimates for Dirichlet fractional Laplacian with gradient perturbation
Compressive Phase Retrieval of Structured Signal
Nintendo Super Smash Bros. Melee: An ‘Untouchable’ Agent
Fast Low-Rank Matrix Estimation without the Condition Number
Spatio-temporal complexity in dual delay nonlinear laser dynamics: chimeras and dissipative solitons
Device-to-Device Networking Meets Cellular via Network Coding
Nonparametric Composite Hypothesis Testing in an Asymptotic Regime
Posterior distribution existence and error control in Banach spaces
Reliability-centered maintenance: analyzing failure in harvest sugarcane machine using some generalizations of the Weibull distribution
False Discovery Control for Pairwise Comparisons – An Asymptotic Solution to Williams, Jones and Tukey’s Conjecture
Maximum entropy low-rank matrix recovery
A note on the localization number of random graphs: diameter two case
Data Aggregation Over Multiple Access Wireless Sensors Network
IQA: Visual Question Answering in Interactive Environments
Testing homogeneity of proportions from sparse binomial data with a large number of groups
On a general class of inhomogeneous random digraphs
Fine-Grained Object Recognition and Zero-Shot Learning in Remote Sensing Imagery
On Independence for Capacities with Law of Large Numbers
Multilevel Diversity Coding with Secure Regeneration: Separate Coding Achieves the MBR Point
Progressive Bit-Flipping Decoding of Polar Codes Over Layered Critical Sets
Site percolation on non-regular pseudo-random graphs
MapNet: Geometry-Aware Learning of Maps for Camera Localization
The Frobenius problem for homomorphic embeddings of languages into the integers
Variational auto-encoding of protein sequences
Improved Space-efficient Linear Time Algorithms for Some Classical Graph Problems
Variational Inference over Non-differentiable Cardiac Simulators using Bayesian Optimization
Stochastic Restricted Biased Estimators in misspecified regression model with incomplete prior information
Risk averse single machine scheduling – complexity and approximation
A Deep Recurrent Framework for Cleaning Motion Capture Data
Noise Level Estimation for Overcomplete Dictionary Learning Based on Tight Asymptotic Bounds
Visual aesthetic analysis using deep neural network: model and techniques to increase accuracy without transfer learning
Alternating Direction Method of Multipliers for Truss Topology Optimization with Limited Number of Nodes: A Cardinality-Constrained Second-Order Cone Programming Approach
Powers of doubly-affine integer square matrices with one non-zero eigenvalue
Weak convergence of stochastic integrals with respect to the state occupation measure of a Markov chain
A Characterization of Antidegradable Qubit Channels
Deep Koalarization: Image Colorization using CNNs and Inception-ResNet-v2
Poisson percolation on the square lattice
Elastic-net regularized High-dimensional Negative Binomial Regression: Consistency and Weak Signals Detection
On the saturation number of graphs
Cost-Sensitive Approach to Batch Size Adaptation for Gradient Descent
Aspect Extraction and Sentiment Classification of Mobile Apps using App-Store Reviews
Caching and Coded Delivery over Gaussian Broadcast Channels for Energy Efficiency
Assessing Achievability of Queries and Constraints
Efficient Implementation of the Room Simulator for Training Deep Neural Network Acoustic Models
A module-theoretic approach to matroids
Modulating and attending the source image during encoding improves Multimodal Translation
Reduction Theorems for Hybrid Dynamical Systems
CycleGAN Face-off
SPP-Net: Deep Absolute Pose Regression with Synthetic Views
Single-Shot Multi-Person 3D Body Pose Estimation From Monocular RGB Input
On the generalized Erdős–Kneser conjecture: proofs and reductions
Reinforced dynamics of large atomic and molecular systems
Learning Interpretable Spatial Operations in a Rich 3D Blocks World
Two numerical methods to evaluate stop-loss premiums
Identifiability of Kronecker-structured Dictionaries for Tensor Data
Geometry Guided Adversarial Facial Expression Synthesis
Capsule Network Performance on Complex Data
Improving Malware Detection Accuracy by Extracting Icon Information
Hybrid Analog-Digital Beamforming for Massive MIMO Systems
On the accuracy of the poissonisation in the infinite occupancy scheme
3D Facial Expression Reconstruction using Cascaded Regression
The minimum stretch spanning tree problem for typical graphs
Edge rings with $3$-linear resolutions
Convergence to equilibrium for time inhomogeneous jump diffusions with state dependent jump intensity
Comparative analysis of criteria for filtering time series of word usage frequencies
A Note on Approximate Revenue Maximization with Two Items
Graphs with prescribed local neighborhoods of their universal coverings
Finite sample Bernstein – von Mises theorems for functionals and spectral projectors of covariance matrix
Criticality in weakly disordered Flat Bands
Variational formulae for the capacity induced by second-order elliptic differential operators
Exploration of User Groups in VEXUS
Wireless Energy Beamforming Using Signal Strength Feedback
Dynamics Transfer GAN: Generating Video by Transferring Arbitrary Temporal Dynamics from a Source Video to a Single Target Image
The minimum forcing number of perfect matchings in the hypercube
Multi-Task Learning for Mental Health using Social Media Text
Overcoming Endurance Issue: UAV-Enabled Communications with Proactive Caching
Multi-cell Massive MIMO Beamforming in Assuring QoS for Large Numbers of Users
Simulation of Quantum Circuits via Stabilizer Frames
Stochastic Answer Networks for Machine Reading Comprehension
Ensembles of Regularized Linear Models
DGCNN: Disordered Graph Convolutional Neural Network Based on the Gaussian Mixture Model
Limit theorems for multivariate Brownian semistationary processes and feasible results
Asymptotic results on Hoppe trees and its variations
‘Active-set complexity’ of proximal gradient: How long does it take to find the sparsity pattern?
Steering the distribution of agents in mean-field and cooperative games
A Ky Fan minimax inequality for quasiequilibria on finite dimensional spaces
Diffusive limit and Fourier’s law for the discrete Schroedinger equation
Sketch Layer Separation in Multi-Spectral Historical Document Images
Shape optimization in laminar flow with a label-guided variational autoencoder
Sensitivity Analysis for Predictive Uncertainty in Bayesian Neural Networks
Gradient Normalization & Depth Based Decay For Deep Learning
Towards Fully Environment-Aware UAVs: Real-Time Path Planning with Online 3D Wind Field Prediction in Complex Terrain
Contextualized Word Representations for Reading Comprehension
Statistical manifolds from optimal transport
Central Limit Theorems for a Stationary Semicircular Sequence in Free Probability
A Generalization of Schur’s Theorem
Interactions between Health Searchers and Search Engines
Examining the Effects of Objective Hurricane Risks and Community Resilience on Risk Perceptions of Hurricanes at the County Level in the U.S. Gulf Coast: An Innovative Approach
A Martingale Approach for Fractional Brownian Motions and Related Path Dependent PDEs
The PhaseLift for Non-quadratic Gaussian Measurements
Ulam Sphere Size Analysis for Permutation and Multipermutation Codes Correcting Translocation Errors
Selfdecomposability of Variance Generalised Gamma Convolutions
DeePMD-kit: A deep learning package for many-body potential energy representation and molecular dynamics
Long-Range Correlation Underlying Childhood Language and Generative Models
Dynamic Mixed Frequency Synthesis for Economic Nowcasting
The chromatic distinguishing index of certain graphs
Short-Packet Two-Way Amplify-and-Forward Relaying
Performance Analysis and Application of Mobile Blockchain
Distributed Mapper
Scale Up Event Extraction Learning via Automatic Training Data Generation
Berry-Esseen bounds for self-normalized martingales
A very simple proof of the LSI for high temperature spin systems
Optimal Odd Arm Identification with Fixed Confidence
A practical guide and software for analysing pairwise comparison experiments
FHEDN: A based on context modeling Feature Hierarchy Encoder-Decoder Network for face detection
On the Saxl graph of a permutation group
The Effectiveness of Data Augmentation for Detection of Gastrointestinal Diseases from Endoscopical Images
On Stochastic Orders and Fast Fading Multiuser Channels with Statistical CSIT
Faster integer and polynomial multiplication using cyclotomic coefficient rings
Limit laws for random matrix products
A condition for long-range order in discrete spin systems with application to the antiferromagnetic Potts model
Efficient enumeration of solutions produced by closure operations
A simple characterization of special matchings in lower Bruhat intervals
Novel model-based heuristics for energy optimal motion planning of an autonomous vehicle using A*
Can We Teach Computers to Understand Art? Domain Adaptation for Enhancing Deep Networks Capacity to De-Abstract Art
Wetting and layering for Solid-on-Solid II: Layering transitions, Gibbs states, and regularity of the free energy
Learning Surrogate Models of Document Image Quality Metrics for Automated Document Image Processing
Autonomous UAV Navigation with Domain Adaptation
Optimal locally repairable codes via elliptic curves
Low-Latency Multiuser Two-Way Wireless Relaying for Spectral and Energy Efficiencies
A Framework for Optimizing Multi-cell NOMA: Delivering Demand with Less Resource
Large deviations for the capacity in dynamic spatial relay networks
Embeddings of weighted graphs in Erdős-type settings
Comparing Graph Spectra of Adjacency and Laplacian Matrices
Discrete disorder models for many-body localization
Learning Nested Sparse Structures in Deep Neural Networks
Operads in algebraic combinatorics
Identifying the Mislabeled Training Samples of ECG Signals using Machine Learning
Transition to Collective Oscillations in Finite Kuramoto Ensembles
Continuous-discrete smoothing of diffusions
On the asymptotic variance of reversible Markov chain without cycles
Limit distributions for Euclidean random permutations
Error Correction for Dense Semantic Image Labeling
Unsupervised Feature Learning for Audio Analysis
Local limits of spatial Gibbs random graphs
On Quadratic Penalties in Elastic Weight Consolidation
Asymptotically optimal empirical Bayes inference in a piecewise constant sequence model
Fast nonparametric near-maximum likelihood estimation of a mixing density
Heavy-Traffic Analysis of Sojourn Time under the Foreground-Background Scheduling Policy
Using a single RGB frame for real time 3D hand pose estimation in the wild
The space of ends of pairs of disjoint paths
Generalized Zero-Shot Learning via Synthesized Examples
Edge statistics of Dyson Brownian motion
Functionally Fractal Urban Networks: Geospatial Co-location and Homogeneity of Infrastructure
On supersolvable and nearly supersolvable line arrangements
A semi-implicit scheme based on Arrow-Hurwicz method for saddle point problems
Exceedance as a measure of sparsity
Towards reduction of autocorrelation in HMC by machine learning
Learning Modality-Invariant Representations for Speech and Images
Achieving Private Information Retrieval Capacity in Distributed Storage Using an Arbitrary Linear Code
A Novel Way of Identifying Cyber Predators
Feature Mapping for Learning Fast and Accurate 3D Pose Inference from Synthetic Images
A Non-Cooperative Game Approach to Autonomous Racing
3D Hand Pose Estimation: From Current Achievements to Future Goals
MINOS: Multimodal Indoor Simulator for Navigation in Complex Environments
On the Benefit of Combining Neural, Statistical and External Features for Fake News Identification
Transition from Tracy-Widom to Gaussian fluctuations of extremal eigenvalues of sparse Erdős-Rényi graphs
Reconstruction of symmetric convex bodies from Ehrhart-like data
Tunable artificial vortex ice in nanostructured superconductors with frustrated kagome lattice of paired antidots
Fast Nearest-Neighbor Classification using RNN in Domains with Large Number of Classes
Age Minimization in Energy Harvesting Communications: Energy-Controlled Delays

Advertisements