**A Data as a Service (DaaS) Model for GPU-based Data Analytics**

**Adviser Networks: Learning What Question to Ask for Human-In-The-Loop Viewpoint Estimation**

**Deep Learning with a Rethinking Structure for Multi-label Classification**

**Weakly-supervised Dictionary Learning**

**Shared Autonomy via Deep Reinforcement Learning**

**Texygen: A Benchmarking Platform for Text Generation Models**

**A Survey Of Methods For Explaining Black Box Models**

• Resilience of scrambling measurements

• Learning from Richer Human Guidance: Augmenting Comparison-Based Learning with Feature Queries

• Dimension-scalable recurrence threshold estimation

• On The Circular Altitude of Graphs

• Fast and accurate approximation of the full conditional for gamma shape parameters

• Re-Weighted Learning for Sparsifying Deep Neural Networks

• Predictive Second Order Sliding Control of Constrained Linear Systems with Application to Automotive Control Systems

• Generalized Analysis and Optimization of D2D Communications in Cellular Networks

• Convergence of Maximum Bisection Ratio of Sparse Random Graphs

• Estimation of Viterbi path in Bayesian hidden Markov models

• Volatility options in rough volatility models

• Anagram-Free Chromatic Number is not Pathwidth-Bounded

• Real-Time Rejection and Mitigation of Time Synchronization Attacks on the Global Positioning System

• Entrance and exit at infinity for stable jump diffusions

• Modelling of Non-linear Control Systems using the Discrete Urysohn Operator

• Bernstein operators and super-Schur functions: combinatorial aspects

• Some results on counting linearizations of posets

• A useful variant of Wilks’ theorem for grouped data

• A regularised Dean–Kawasaki model: derivation and analysis

• A Bayesian Nonparametric Approach to Dynamical Noise Reduction

• Compressive Light Field Reconstructions using Deep Learning

• Local Wealth Redistribution Promotes Cooperation in Multiagent Systems

• Internet – assisted risk assessment of infectious diseases in women sexual and reproductive health

• About the Noether’s theorem for fractional Lagrangian systems and a generalization of the classical Jost method of proof

• Bayesian Coreset Construction via Greedy Iterative Geodesic Ascent

• Toward Marker-free 3D Pose Estimation in Lifting: A Deep Multi-view Solution

• Near-Optimal Coresets of Kernel Density Estimates

• How to select the best set of ads: Can we do better than Greedy Algorithm?

• Dynamic Spatial Panel Models: Networks, Common Shocks, and Sequential Exogeneity

• Highly accurate model for prediction of lung nodule malignancy with CT scans

• Simple networks on complex cellular automata: From de Bruijn diagrams to jump-graphs

• Training Generative Adversarial Networks via Primal-Dual Subgradient Methods: A Lagrangian Perspective on GAN

• Question-Answer Selection in User to User Marketplace Conversations

• Scale-recurrent Network for Deep Image Deblurring

• Utility Decomposition with Deep Corrections for Scalable Planning under Uncertainty

• Brute-Force Facial Landmark Analysis With A 140,000-Way Classifier

• Isotropic Subspaces of Schur Modules

• Goal Inference Improves Objective and Perceived Performance in Human-Robot Collaboration

• Mining Public Opinion about Economic Issues: Twitter and the U.S. Presidential Election

• Resilient Blocks for Summarising Distributed Data

• Optimal Scheduling across Heterogeneous Air Interfaces of LTE/WiFi Aggregation

• Detection of sustained signals and its relation to coherent feedforward loops

• Channel Diagonalization for Cloud Radio Access

• Mixed Link Networks

• Decoding-History-Based Adaptive Control of Attention for Neural Machine Translation

• Byte-Level Recursive Convolutional Auto-Encoder for Text

• Fog Computing in IoT Aided Smart Grid Transition- Requirements, Prospects, Status Quos and Challenges

• Rollable Latent Space for SAR Target Recognition of Un-seen Views

• Geometry-Contrastive Generative Adversarial Network for Facial Expression Synthesis

• Transversals in Uniform Linear Hypergraphs

• A Neurobiologically Motivated Analysis of Distributional Semantic Models

• Space-homogeneous quantum walks on Z from the viewpoint of complex analysis

• Real Tropical Singularities and Bergman Fans

• Quantifying dependencies for sensitivity analysis with multivariate input sample data

• A large deviation approach to super-critical bootstrap percolation on the random graph $G_{n,p}$

• RDMAvisor: Toward Deploying Scalable and Simple RDMA as a Service in Datacenters

• Fast Piecewise-Affine Motion Estimation Without Segmentation

• Every Smile is Unique: Landmark-Guided Diverse Smile Generation

• Unbounded largest eigenvalue of large sample covariance matrices: Asymptotics, fluctuations and applications

• Integrated design optimization of structural bending filter and gain schedules for rocket attitude control system

• Testing for equivalence: an intersection-union permutation solution

• Learning Image Representations by Completing Damaged Jigsaw Puzzles

• Girth-regular graphs

• The steerable graph Laplacian and its application to filtering image data-sets

• On the width of transitive sets: bounds on matrix coefficients of finite groups

• Cantor combinatorics and almost finiteness

• Polynomial algorithm for k-partition minimization of submodular system with strong symmetry

• Hidden regular variation, copula models, and the limit behavior of conditional excess risk measures

• Attribute-Guided Network for Cross-Modal Zero-Shot Hashing

• $q$-Analouges of two Ramanujan-type forumlas for $1/π$

• The additive hazard estimator is consistent for continuous time marginal structural models

• Random cliques in random graphs

• Volume growth, curvature, and Buser-type inequalities in graphs

• Multimodal Image Captioning for Marketing Analysis

• The performances of R GPU implementations of the GMRES method

• Hydrodynamic Limit for an Anharmonic Chain under Boundary Tension

• Boundary representations of $λ$-harmonic and polyharmonic functions on trees

• Roots of Polynomials and The Derangement Problem

• Storage-Latency Trade-off in Cache-Aided Fog Radio Access Networks

• A hierarchical model of non-homogeneous Poisson processes for Twitter retweets

• Strong Algorithms for the Ordinal Matroid Secretary Problem

• On the structure of random graphs that are locally indistinguishable from a lattice

• The nonparametric LAN expansion for discretely observed diffusions

• Orthogonally Regularized Deep Networks For Image Super-resolution

• Brain-inspired photonic signal processor for periodic pattern generation and chaotic system emulation

• Improving Variational Encoder-Decoders in Dialogue Generation

• Multispectral Compressive Imaging Strategies using Fabry-Pérot Filtered Sensors

• A Distance Between Channels: the average error of mismatched channels

• Optimal Data Reduction for Graph Coloring Using Low-Degree Polynomials

• Système de traduction automatique statistique Anglais-Arabe

• One-sided continuity properties for the Schonmann projection

• Entropy-based approach to missing-links prediction

• Fixing monotone Boolean networks asynchronously

• Splitting models for multivariate count data

• Uplink Channel Estimation and Data Transmission in Millimeter-Wave CRAN with Lens Antenna Arrays

• Dynkin isomorphism and Mermin–Wagner theorems for hyperbolic sigma models and recurrence of the two-dimensional vertex-reinforced jump process

• Multi-Temporal Land Cover Classification with Sequential Recurrent Encoders

• A Log-Euclidean and Total Variation based Variational Framework for Computational Sonography

• Structural Recurrent Neural Network (SRNN) for Group Activity Analysis

• High-precision simulation of the height distribution for the KPZ equation

• Observation of the topological Anderson insulator in disordered atomic wires

• Investigations on Knowledge Base Embedding for Relation Prediction and Extraction

• Non-Projective Dependency Parsing via Latent Heads Representation (LHR)

• How to Mobilize mmWave: A Joint Beam and Channel Tracking Approach

• Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges

• Generalizing Multiple Access Wiretap and Wiretap II Channel Models: Achievable Rates and Cost of Strong Secrecy