Expressway visibility estimation based on image entropy and piecewise stationary time series analysis

Vision-based methods for visibility estimation can play a critical role in reducing traffic accidents caused by fog and haze. To overcome the disadvantages of current visibility estimation methods, we present a novel data-driven approach based on Gaussian image entropy and piecewise stationary time series analysis (SPEV). This is the first time that Gaussian image entropy is used for estimating atmospheric visibility. To lessen the impact of landscape and sunshine illuminance on visibility estimation, we used region of interest (ROI) analysis and took into account relative ratios of image entropy, to improve estimation accuracy. We assume fog and haze cause blurred images and that fog and haze can be considered as a piecewise stationary signal. We used piecewise stationary time series analysis to construct the piecewise causal relationship between image entropy and visibility. To obtain a real-world visibility measure during fog and haze, a subjective assessment was established through a study with 36 subjects who performed visibility observations. Finally, a total of two million videos were used for training the SPEV model and validate its effectiveness. The videos were collected from the constantly foggy and hazy Tongqi expressway in Jiangsu, China. The contrast model of visibility estimation was used for algorithm performance comparison, and the validation results of the SPEV model were encouraging as 99.14% of the relative errors were less than 10%.


Model identification for ARMA time series through convolutional neural networks

In this paper, we use convolutional neural networks to address the problem of model identification for autoregressive moving average time series models. We compare the performance of several neural network architectures, trained on simulated time series, with likelihood based methods, in particular the Akaike and Bayesian information criteria. We find that our neural networks can significantly outperform these likelihood based methods in terms of accuracy and, by orders of magnitude, in terms of speed.


Causal Generative Domain Adaptation Networks

We propose a new generative model for domain adaptation, in which training data (source domain) and test data (target domain) come from different distributions. An essential problem in domain adaptation is to understand how the distribution shifts across domains. For this purpose, we propose a generative domain adaptation network to understand and identify the domain changes, which enables the generation of new domains. In addition, focusing on single domain adaptation, we demonstrate how our model recovers the joint distribution on the target domain from unlabeled target domain data by transferring valuable information between domains. Finally, to improve transfer efficiency, we build a causal generative domain adaptation network by decomposing the joint distribution of features and labels into a series of causal modules according to a causal model. Due to the modularity property of a causal model, we can improve the identification of distribution changes by modeling each causal modules separately. With the proposed adaptation networks, the predictive model on the target domain can be easily trained on data sampled from the learned networks. We demonstrate the efficacy of our method on both synthetic and real data experiments.


EventKG: A Multilingual Event-Centric Temporal Knowledge Graph

One of the key requirements to facilitate semantic analytics of information regarding contemporary and historical events on the Web, in the news and in social media is the availability of reference knowledge repositories containing comprehensive representations of events and temporal relations. Existing knowledge graphs, with popular examples including DBpedia, YAGO and Wikidata, focus mostly on entity-centric information and are insufficient in terms of their coverage and completeness with respect to events and temporal relations. EventKG presented in this paper is a multilingual event-centric temporal knowledge graph that addresses this gap. EventKG incorporates over 690 thousand contemporary and historical events and over 2.3 million temporal relations extracted from several large-scale knowledge graphs and semi-structured sources and makes them available through a canonical representation.


Feature-Based Aggregation and Deep Reinforcement Learning: A Survey and Some New Implementations

In this paper we discuss policy iteration methods for approximate solution of a finite-state discounted Markov decision problem, with a focus on feature-based aggregation methods and their connection with deep reinforcement learning schemes. We introduce features of the states of the original problem, and we formulate a smaller ‘aggregate’ Markov decision problem, whose states relate to the features. The optimal cost function of the aggregate problem, a nonlinear function of the features, serves as an architecture for approximation in value space of the optimal cost function or the cost functions of policies of the original problem. We discuss properties and possible implementations of this type of aggregation, including a new approach to approximate policy iteration. In this approach the policy improvement operation combines feature-based aggregation with reinforcement learning based on deep neural networks, which is used to obtain the needed features. We argue that the cost function of a policy may be approximated much more accurately by the nonlinear function of the features provided by aggregation, than by the linear function of the features provided by deep reinforcement learning, thereby potentially leading to more effective policy improvement.


Causal Inference via Kernel Deviance Measures

Discovering the causal structure among a set of variables is a fundamental problem in many areas of science. In this paper, we propose Kernel Conditional Deviance for Causal Inference (KCDC) a fully nonparametric causal discovery method based on purely observational data. From a novel interpretation of the notion of asymmetry between cause and effect, we derive a corresponding asymmetry measure using the framework of reproducing kernel Hilbert spaces. Based on this, we propose three decision rules for causal discovery. We demonstrate the wide applicability of our method across a range of diverse synthetic datasets. Furthermore, we test our method on real-world time series data and the real-world benchmark dataset Tubingen Cause-Effect Pairs where we outperform existing state-of-the-art methods.


DLL: A Blazing Fast Deep Neural Network Library

Deep Learning Library (DLL) is a new library for machine learning with deep neural networks that focuses on speed. It supports feed-forward neural networks such as fully-connected Artificial Neural Networks (ANNs) and Convolutional Neural Networks (CNNs). It also has very comprehensive support for Restricted Boltzmann Machines (RBMs) and Convolutional RBMs. Our main motivation for this work was to propose and evaluate novel software engineering strategies with potential to accelerate runtime for training and inference. Such strategies are mostly independent of the underlying deep learning algorithms. On three different datasets and for four different neural network models, we compared DLL to five popular deep learning frameworks. Experimentally, it is shown that the proposed framework is systematically and significantly faster on CPU and GPU. In terms of classification performance, similar accuracies as the other frameworks are reported.


Loss Rank Mining: A General Hard Example Mining Method for Real-time Detectors

Modern object detectors usually suffer from low accuracy issues, as foregrounds always drown in tons of backgrounds and become hard examples during training. Compared with those proposal-based ones, real-time detectors are in far more serious trouble since they renounce the use of region-proposing stage which is used to filter a majority of backgrounds for achieving real-time rates. Though foregrounds as hard examples are in urgent need of being mined from tons of backgrounds, a considerable number of state-of-the-art real-time detectors, like YOLO series, have yet to profit from existing hard example mining methods, as using these methods need detectors fit series of prerequisites. In this paper, we propose a general hard example mining method named Loss Rank Mining (LRM) to fill the gap. LRM is a general method for real-time detectors, as it utilizes the final feature map which exists in all real-time detectors to mine hard examples. By using LRM, some elements representing easy examples in final feature map are filtered and detectors are forced to concentrate on hard examples during training. Extensive experiments validate the effectiveness of our method. With our method, the improvements of YOLOv2 detector on auto-driving related dataset KITTI and more general dataset PASCAL VOC are over 5% and 2% mAP, respectively. In addition, LRM is the first hard example mining strategy which could fit YOLOv2 perfectly and make it better applied in series of real scenarios where both real-time rates and accurate detection are strongly demanded.


Detecting Malicious PowerShell Commands using Deep Neural Networks

Microsoft’s PowerShell is a command-line shell and scripting language that is installed by default on Windows machines. While PowerShell can be configured by administrators for restricting access and reducing vulnerabilities, these restrictions can be bypassed. Moreover, PowerShell commands can be easily generated dynamically, executed from memory, encoded and obfuscated, thus making the logging and forensic analysis of code executed by PowerShell challenging.For all these reasons, PowerShell is increasingly used by cybercriminals as part of their attacks’ tool chain, mainly for downloading malicious contents and for lateral movement. Indeed, a recent comprehensive technical report by Symantec dedicated to PowerShell’s abuse by cybercrimials reported on a sharp increase in the number of malicious PowerShell samples they received and in the number of penetration tools and frameworks that use PowerShell. This highlights the urgent need of developing effective methods for detecting malicious PowerShell commands.In this work, we address this challenge by implementing several novel detectors of malicious PowerShell commands and evaluating their performance. We implemented both ‘traditional’ natural language processing (NLP) based detectors and detectors based on character-level convolutional neural networks (CNNs). Detectors’ performance was evaluated using a large real-world dataset.Our evaluation results show that, although our detectors individually yield high performance, an ensemble detector that combines an NLP-based classifier with a CNN-based classifier provides the best performance, since the latter classifier is able to detect malicious commands that succeed in evading the former. Our analysis of these evasive commands reveals that some obfuscation patterns automatically detected by the CNN classifier are intrinsically difficult to detect using the NLP techniques we applied.


Deep Differential Recurrent Neural Networks

Due to the special gating schemes of Long Short-Term Memory (LSTM), LSTMs have shown greater potential to process complex sequential information than the traditional Recurrent Neural Network (RNN). The conventional LSTM, however, fails to take into consideration the impact of salient spatio-temporal dynamics present in the sequential input data. This problem was first addressed by the differential Recurrent Neural Network (dRNN), which uses a differential gating scheme known as Derivative of States (DoS). DoS uses higher orders of internal state derivatives to analyze the change in information gain caused by the salient motions between the successive frames. The weighted combination of several orders of DoS is then used to modulate the gates in dRNN. While each individual order of DoS is good at modeling a certain level of salient spatio-temporal sequences, the sum of all the orders of DoS could distort the detected motion patterns. To address this problem, we propose to control the LSTM gates via individual orders of DoS and stack multiple levels of LSTM cells in an increasing order of state derivatives. The proposed model progressively builds up the ability of the LSTM gates to detect salient dynamical patterns in deeper stacked layers modeling higher orders of DoS, and thus the proposed LSTM model is termed deep differential Recurrent Neural Network (d2RNN). The effectiveness of the proposed model is demonstrated on two publicly available human activity datasets: NUS-HGA and Violent-Flows. The proposed model outperforms both LSTM and non-LSTM based state-of-the-art algorithms.


Learning Topics using Semantic Locality

The topic modeling discovers the latent topic probability of the given text documents. To generate the more meaningful topic that better represents the given document, we proposed a new feature extraction technique which can be used in the data preprocessing stage. The method consists of three steps. First, it generates the word/word-pair from every single document. Second, it applies a two-way TF-IDF algorithm to word/word-pair for semantic filtering. Third, it uses the K-means algorithm to merge the word pairs that have the similar semantic meaning. Experiments are carried out on the Open Movie Database (OMDb), Reuters Dataset and 20NewsGroup Dataset. The mean Average Precision score is used as the evaluation metric. Comparing our results with other state-of-the-art topic models, such as Latent Dirichlet allocation and traditional Restricted Boltzmann Machines. Our proposed data preprocessing can improve the generated topic accuracy by up to 12.99\%.


Word2Vec applied to Recommendation: Hyperparameters Matter

Skip-gram with negative sampling, a popular variant of Word2vec originally designed and tuned to create word embeddings for Natural Language Processing, has been used to create item embeddings with successful applications in recommendation. While these fields do not share the same type of data, neither evaluate on the same tasks, recommendation applications tend to use the same already tuned hyperparameters values, even if optimal hyperparameters values are often known to be data and task dependent. We thus investigate the marginal importance of each hyperparameter in a recommendation setting, with an extensive joint hyperparameter optimization on various datasets. Results reveal that optimizing neglected hyperparameters, namely negative sampling distribution, number of epochs, subsampling parameter and window-size, significantly improves performance on a recommendation task, and can increase it up to a factor of 10.


VoroTop: Voronoi Cell Topology Visualization and Analysis Toolkit

This paper introduces a new open-source software program called VoroTop, which uses Voronoi topology to analyze local structure in atomic systems. Strengths of this approach include its abilities to analyze high-temperature systems and to characterize complex structure such as grain boundaries. This approach enables the automated analysis of systems and mechanisms previously not possible.


A Large-scale Attribute Dataset for Zero-shot Learning

Zero-Shot Learning (ZSL) has attracted huge research attention over the past few years; it aims to learn the new concepts that have never been seen before. In classical ZSL algorithms, attributes are introduced as the intermediate semantic representation to realize the knowledge transfer from seen classes to unseen classes. Previous ZSL algorithms are tested on several benchmark datasets annotated with attributes. However, these datasets are defective in terms of the image distribution and attribute diversity. In addition, we argue that the ‘co-occurrence bias problem’ of existing datasets, which is caused by the biased co-occurrence of objects, significantly hinders models from correctly learning the concept. To overcome these problems, we propose a Large-scale Attribute Dataset (LAD). Our dataset has 78,017 images of 5 super-classes, 230 classes. The image number of LAD is larger than the sum of the four most popular attribute datasets. 359 attributes of visual, semantic and subjective properties are defined and annotated in instance-level. We analyze our dataset by conducting both supervised learning and zero-shot learning tasks. Seven state-of-the-art ZSL algorithms are tested on this new dataset. The experimental results reveal the challenge of implementing zero-shot learning on our dataset.


Variational Composite Autoencoders

Learning in the latent variable model is challenging in the presence of the complex data structure or the intractable latent variable. Previous variational autoencoders can be low effective due to the straightforward encoder-decoder structure. In this paper, we propose a variational composite autoencoder to sidestep this issue by amortizing on top of the hierarchical latent variable model. The experimental results confirm the advantages of our model.


Learned Deformation Stability in Convolutional Neural Networks

Conventional wisdom holds that interleaved pooling layers in convolutional neural networks lead to stability to small translations and deformations. In this work, we investigate this claim empirically. We find that while pooling confers stability to deformation at initialization, the deformation stability at each layer changes significantly over the course of training and even decreases in some layers, suggesting that deformation stability is not unilaterally helpful. Surprisingly, after training, the pattern of deformation stability across layers is largely independent of whether or not pooling was present. We then show that a significant factor in determining deformation stability is filter smoothness. Moreover, filter smoothness and deformation stability are not simply a consequence of the distribution of input images, but depend crucially on the joint distribution of images and labels. This work demonstrates a way in which biases such as deformation stability can in fact be learned and provides an example of understanding how a simple property of learned network weights contributes to the overall network computation.


A New Generative Statistical Model for Graphs: The Latent Order Logistic (LOLOG) Model

Full probability models are critical for the statistical modeling of complex networks, and yet there are few general, flexible and widely applicable generative methods. We propose a new family of probability models motivated by the idea of network growth, which we call the Latent Order Logistic (LOLOG) model. LOLOG is a fully general framework capable of describing any probability distribution over graph configurations, though not all distributions are easily expressible or estimable as a LOLOG. We develop inferential procedures based on Monte Carlo Method of Moments, Generalized Method of Moments and variational inference. To show the flexibility of the model framework, we show how so-called scale-free networks can be modeled as LOLOGs via preferential attachment. The advantages of LOLOG in terms of avoidance of degeneracy, ease of sampling, and model flexibility are illustrated. Connections with the popular Exponential-family Random Graph model (ERGM) are also explored, and we find that they are identical in the case of dyadic independence. Finally, we apply the model to a social network of collaboration within a corporate law firm, a friendship network among adolescent students, and the friendship relations in an online social network.


A Mathematical Approach to Comply with Ethical Constraints in Compassionate Use Treatments
Assessment of Breast Cancer Histology using Densely Connected Convolutional Networks
Pilot Comparative Study of Different Deep Features for Palmprint Identification in Low-Quality Images
Outline Objects using Deep Reinforcement Learning
Discovery and usage of joint attention in images
Representation of Hamilton-Jacobi equation in optimal control theory with compact control set
When optimizing nonlinear objectives is no harder than linear objectives
Scheduling Asynchronous Round-Robin Tournaments
Demoiréing of Camera-Captured Screen Images Using Deep Convolutional Neural Network
On a characterisation theorem for probability distributions on discrete Abelian groups
Text2Colors: Guiding Image Colorization through Text-Driven Palette Generation
Some hypergeometric integrals for linear forms in zeta values
In-phase synchronization in complex oscillator networks by adaptive delayed feedback control
Machine Learning DDoS Detection for Consumer Internet of Things Devices
Differentiable Learning of Quantum Circuit Born Machine
KS(conf ): A Light-Weight Test if a ConvNet Operates Outside of Its Specifications
k-regular subgraphs near the k-core threshold of a random graph
An extended version of portfolio problems with two levels decision-makers: Optimal portfolio selection with Pricing decisions on transaction costs
Approximating Edit Distance in Truly Subquadratic Time: Quantum and MapReduce
Coevolutionary Neural Population Models
Automatically Infer Human Traits and Behavior from Social Media Data
Monochromatic balanced components, matchings, and paths in multicolored complete bipartite graphs
Derivation and Extensions of the Linear Feedback Particle Filter based on Duality Formalisms
Introduction to WOSPP: Wave Oriented Swarm Programming Paradigm
Multi-scale Neural Networks for Retinal Blood Vessels Segmentation
The spatial sign covariance operator: Asymptotic results and applications
Evaluating Word Embedding Hyper-Parameters for Similarity and Analogy Tasks
View Extrapolation of Human Body from a Single Image
Optimal Unbiased Estimation for Expected Cumulative Cost
Market Making via Reinforcement Learning
Quenched Central Limit Theorem in a Corner Growth Setting
Exploiting Task-Oriented Resources to Learn Word Embeddings for Clinical Abbreviation Expansion
Reflected Brownian motion on simple nested fractals
Sparse Bayesian Factor Analysis when the Number of Factors is Unknown
Adafactor: Adaptive Learning Rates with Sublinear Memory Cost
Stabilization of DLA in a wedge
FI-sets with relations
Graph Sketching Against Adaptive Adversaries Applied to the Minimum Degree Algorithm
Capsules for Object Segmentation
English Out-of-Vocabulary Lexical Evaluation Task
Zero-energy bound state decay for non-local Schrödinger operators
Random-cluster correlation inequalities for Gibbs fields
Empirical Investigation of Non-Convexities in Optimal Power Flow Problems
A Likelihood Ratio Approach for Precise Discovery of Truly Relevant Protein Markers
Improved Horvitz-Thompson Estimator in Survey Sampling
Hate Lingo: A Target-based Linguistic Analysis of Hate Speech in Social Media
Learning Rigidity in Dynamic Scenes with a Moving Camera for 3D Motion Field Estimation
Graph Pattern Matching Preserving Label-Repetition Constraints
The Voice Conversion Challenge 2018: Promoting Development of Parallel and Nonparallel Methods
Dualities in Tree Representations
Training a Ranking Function for Open-Domain Question Answering
A Capsule Network-based Embedding Model for Search Personalization
Energy Efficient Distributed Worst Case Robust Power Allocation in Massive MIMO
Incomplete Contracting and AI Alignment
Deep Neural Networks motivated by Partial Differential Equations
VITAL: VIsual Tracking via Adversarial Learning
Existence of transport plans with domain constraints
Combating catastrophic forgetting with developmental compression
Bilateral Teleoperation of Multiple Robots under Scheduling Communication
Taylor approximation and variance reduction for PDE-constrained optimal control under uncertainty
The effect of a Durbin-Watson pretest on confidence intervals in regression
Exact Reconstruction of Euclidean Distance Geometry Problem Using Low-rank Matrix Completion
Clustering via Boundary Erosion
Entangled photons for competitive multi-armed bandit problem: achievement of maximum social reward, equality, and deception prevention
Cross-Modal Retrieval with Implicit Concept Association
Local reservoir model for choice-based learning
STAIR Actions: A Video Dataset of Everyday Home Actions
Attention-based Group Recommendation
The convergence rate of the Gibbs sampler for generalized $1-$D Ising model
MelanoGANs: High Resolution Skin Lesion Synthesis with GANs
Benchmark data and method for real-time people counting in cluttered scenes using depth sensors
Zero-Shot Object Detection
A two-stage 3D Unet framework for multi-class segmentation on full resolution image
Equilibrium interfaces of biased voter models
On Using Non-Volatile Memory in Apache Lucene
Stability-Optimized High Order Methods and Stiffness Detection for Pathwise Stiff Stochastic Differential Equations
Automatic Generation of Communication Requirements for Enforcing Multi-Agent Safety
Capacity Preserving Operators
Global SNR Estimation of Speech Signals using Entropy and Uncertainty Estimates from Dropout Networks
Efficiently Combining Pseudo Marginal and Particle Gibbs Sampling
Automatic Detection and Characterization of Coronary Artery Plaque and Stenosis using a Recurrent Convolutional Neural Network in Coronary CT Angiography
The spectrum for large sets of $(3,λ)$-GDDs of type $g^u$
Generative Adversarial Training for MRA Image Synthesis Using Multi-Contrast MRI
BigSR: an empirical study of real-time expressive RDF stream reasoning on modern Big Data platforms
Regularisation of Neural Networks by Enforcing Lipschitz Continuity
Image Correction via Deep Reciprocating HDR Transformation
Infinite-Duration Poorman-Bidding Games
On linear codes and distinct weights
Fast Gaussian Process Based Gradient Matching for Parameter Identification in Systems of Nonlinear ODEs
Amobee at SemEval-2018 Task 1: GRU Neural Network with a CNN Attention Mechanism for Sentiment Classification
Blood Vessel Geometry Synthesis using Generative Adversarial Networks
Iterative fully convolutional neural networks for automatic vertebra segmentation
Design of Polar Codes in 5G New Radio
MGGAN: Solving Mode Collapse using Manifold Guided Training
Multi-Label Wireless Interference Identification with Convolutional Neural Networks
Random walk on barely supercritical branching random walk
Social Anchor-Unit Graph Regularized Tensor Completion for Large-Scale Image Retagging
Stochastic Learning in Potential Games: Communication and Payoff-Based Approaches
Cashtag piggybacking: uncovering spam and bot activity in stock microblogs on Twitter
Optimizing Query Evaluations using Reinforcement Learning for Web Search
Unsupervised Discovery of Object Landmarks as Structural Representations
Joint Localization and Mapping through Millimeter Wave MIMO in 5G Systems – Extended Version
Transformation on Computer-Generated Facial Image to Avoid Detection by Spoofing Detector
Exploiting feature representations through similarity learning, post-ranking and ranking aggregation for person re-identification
Regularized Greedy Column Subset Selection
A short note on mixing time of Glauber dynamics
The distribution of the maximum number of common neighbors in the random graph
Numerical computation of the data-rate limit for state estimation under communication constraints
Extraction of Airways using Graph Neural Networks
Temporal Interpolation via Motion Field Prediction
Multilevel Particle Filters for Lévy-driven stochastic differential equations
Total Generalized Variation Regularization in Variational Data Assimilation for Burgers’ Equation
Simple Domain Adaptation with Class Prediction Uncertainty Alignment
Distort-and-Recover: Color Enhancement using Deep Reinforcement Learning
Solving Bongard Problems with a Visual Language and Pragmatic Reasoning
CubeNet: Equivariance to 3D Rotation and Translation
Optimal $2$-D $(n\times m,3,2,1)$-optical orthogonal codes and related equi-difference conflict avoiding codes
Generative models for local network community detection
Learning Multilingual Embeddings for Cross-Lingual Information Retrieval in the Presence of Topically Aligned Corpora
A high-level C++ approach to manage local errors, asynchrony and faults in an MPI application
PCN: Part and Context Information for Pedestrian Detection with CNNs
Deep Autoencoding Models for Unsupervised Anomaly Segmentation in Brain MR Images
On Dividing by Two in Constructive Mathematics
The Euler and Springer numbers as moment sequences
Factorization theorems for classical group characters, with applications to alternating sign matrices and plane partitions
Simultaneous Fidelity and Regularization Learning for Image Restoration
SoccerNet: A Scalable Dataset for Action Spotting in Soccer Videos
Online convex optimization and no-regret learning: Algorithms, guarantees and applications
On the Spatial Performance of Users in Indoor VLC Networks with Multiple Reflections
The Channel Capacity of Channelrhodopsin and Other Intensity-Driven Signal Transduction Receptors
On partial convolution and mean comparison
Regula falsi based automatic regularization method for PDE constrained optimization
Unique Reconstruction of Coded Strings from Multiset Substring Spectra
Seed-Point Based Geometric Partitioning of Nuclei Clumps
Trajectory Factory: Tracklet Cleaving and Re-connection by Deep Siamese Bi-GRU for Multiple Object Tracking
A noniterative sample size procedure for tests based on t distributions
Dynamic and thermodynamic crossover scenarios in the Kob-Andersen mixture: Insights from multi-CPU and multi-GPU simulations
Towards integrating spatial localization in convolutional neural networks for brain image segmentation
Latent Geometry Inspired Graph Dissimilarities Enhance Affinity Propagation Community Detection in Complex Networks
A fuzzy process of individuation
Graph Reconstruction from Path Correlation Data
Point defects in the 1$T’$ and 2$H$ phases of single-layer MoS$_2$: A comparative first-principles study
Multiple Observations and Goodness of Fit in Generalized Inverse Optimization
The quantum K-theory of a homogeneous space is finite
A Power-Efficient Scheme for Cellular Uplink with Inter-cell Interference
Deformation Aware Image Compression
Single-layer $1T’$-MoS$_2$ under electron irradiation from $ab$ $initio$ molecular dynamics
Cutoff for the mean-field zero-range process
Pix3D: Dataset and Methods for Single-Image 3D Shape Modeling
Impulsive Noise Robust Sparse Recovery via Continuous Mixed Norm
Bisimplicial complexes and asphericity
CERES: Distantly Supervised Relation Extraction from the Semi-Structured Web
Fast Counting in Machine Learning Applications
An efficient CNN for spectral reconstruction from RGB images

Advertisements