Certified dimension reduction in nonlinear Bayesian inverse problems

We propose a dimension reduction technique for Bayesian inverse problems with nonlinear forward operators, non-Gaussian priors, and non-Gaussian observation noise. The likelihood function is approximated by a ridge function, i.e., a map which depends non-trivially only on a few linear combinations of the parameters. We build this ridge approximation by minimizing an upper bound on the Kullback–Leibler divergence between the posterior distribution and its approximation. This bound, obtained via logarithmic Sobolev inequalities, allows one to certify the error of the posterior approximation. Computing the bound requires computing the second moment matrix of the gradient of the log-likelihood function. In practice, a sample-based approximation of the upper bound is then required. We provide an analysis that enables control of the posterior approximation error due to this sampling. Numerical and theoretical comparisons with existing methods illustrate the benefits of the proposed methodology.


Navigating Diverse Data Science Learning: Critical Reflections Towards Future Practice

Data Science is currently a popular field of science attracting expertise from very diverse backgrounds. Current learning practices need to acknowledge this and adapt to it. This paper summarises some experiences relating to such learning approaches from teaching a postgraduate Data Science module, and draws some learned lessons that are of relevance to others teaching Data Science.


Ensemble Kalman Filtering for Online Gaussian Process Regression and Learning

Gaussian process regression is a machine learning approach which has been shown its power for estimation of unknown functions. However, Gaussian processes suffer from high computational complexity, as in a basic form they scale cubically with the number of observations. Several approaches based on inducing points were proposed to handle this problem in a static context. These methods though face challenges with real-time tasks and when the data is received sequentially over time. In this paper, a novel online algorithm for training sparse Gaussian process models is presented. It treats the mean and hyperparameters of the Gaussian process as the state and parameters of the ensemble Kalman filter, respectively. The online evaluation of the parameters and the state is performed on new upcoming samples of data. This procedure iteratively improves the accuracy of parameter estimates. The ensemble Kalman filter reduces the computational complexity required to obtain predictions with Gaussian processes preserving the accuracy level of these predictions. The performance of the proposed method is demonstrated on the synthetic dataset and real large dataset of UK house prices.


Process Monitoring Using Maximum Sequence Divergence

Process Monitoring involves tracking a system’s behaviors, evaluating the current state of the system, and discovering interesting events that require immediate actions. In this paper, we consider monitoring temporal system state sequences to help detect the changes of dynamic systems, check the divergence of the system development, and evaluate the significance of the deviation. We begin with discussions of data reduction, symbolic data representation, and the anomaly detection in temporal discrete sequences. Time-series representation methods are also discussed and used in this paper to discretize raw data into sequences of system states. Markov Chains and stationary state distributions are continuously generated from temporal sequences to represent snapshots of the system dynamics in different time frames. We use generalized Jensen-Shannon Divergence as the measure to monitor changes of the stationary symbol probability distributions and evaluate the significance of system deviations. We prove that the proposed approach is able to detect deviations of the systems we monitor and assess the deviation significance in probabilistic manner.


On Causal Discovery with Equal Variance Assumption

Prior work has shown that causal structure can be uniquely identified from observational data when these follow a structural equation model whose error terms have equal variances. We show that this fact is implied by an ordering among (conditional) variances. We demonstrate that ordering estimates of these variances yields a simple yet state-of-the-art method for causal structure learning that is readily extendable to high-dimensional problems.


Interpreting and Explaining Deep Neural Networks for Classification of Audio Signals

Interpretability of deep neural networks is a recently emerging area of machine learning research targeting a better understanding of how models perform feature selection and derive their classification decisions. In this paper, two neural network architectures are trained on spectrogram and raw waveform data for audio classification tasks on a newly created audio dataset and layer-wise relevance propagation (LRP), a previously proposed interpretability method, is applied to investigate the models’ feature selection and decision making. It is demonstrated that the networks are highly reliant on feature marked as relevant by LRP through systematic manipulation of the input data. Our results show that by making deep audio classifiers interpretable, one can analyze and compare the properties and strategies of different models beyond classification accuracy, which potentially opens up new ways for model improvements.


Constrained State Estimation – A Review

This review addresses constrained state estimation for linear as well as the nonlinear state-space system. We provide a review of Bayesian recursion that is a conceptual solution. Later, we start with unconstrained estimation using Kalman filters, extended Kalman filters, unscented Kalman filters, moving horizon estimation, ensemble Kalman filters, and particle filters. Next, we review constrained state estimation using all these filters.


Generalized uncertain theory: concepts and fundamental principles

Although there are many mathematical theories to address uncertain phenomena however, these theories are presented under implicit presupposition that uncertainty of objects is accurately measurable while not considering that the measure of uncertainty itself may be inaccurate. Considering this evident but critical overlook, on the basis of reviewing and commenting several widely used mathematical theories of uncertainty, the fundamental concepts and axiomatic system of generalized uncertain theory (GUT)are proposed for the purpose of describing and analyzing that imprecision of objects has inaccurate attributes. We show that current main stream theories of studying uncertain phenomena, such as probability theory, fuzzy mathematics, etc., are the special cases of generalized uncertain theory. So the generalized uncertain theory could cover previous main stream theories of studying uncertainty. Further research directions and possible application realms are discussed. It may be a beneficial endeavor for enriching and developing current uncertainty mathematical theories.


An Adaptive Learning Method of Deep Belief Network by Layer Generation Algorithm

Deep Belief Network (DBN) has a deep architecture that represents multiple features of input patterns hierarchically with the pre-trained Restricted Boltzmann Machines (RBM). A traditional RBM or DBN model cannot change its network structure during the learning phase. Our proposed adaptive learning method can discover the optimal number of hidden neurons and weights and/or layers according to the input space. The model is an important method to take account of the computational cost and the model stability. The regularities to hold the sparse structure of network is considerable problem, since the extraction of explicit knowledge from the trained network should be required. In our previous research, we have developed the hybrid method of adaptive structural learning method of RBM and Learning Forgetting method to the trained RBM. In this paper, we propose the adaptive learning method of DBN that can determine the optimal number of layers during the learning. We evaluated our proposed model on some benchmark data sets.


Automatic Rumor Detection on Microblogs: A Survey

The ever-increasing amount of multimedia content on modern social media platforms are valuable in many applications. While the openness and convenience features of social media also foster many rumors online. Without verification, these rumors would reach thousands of users immediately and cause serious damages. Many efforts have been taken to defeat online rumors automatically by mining the rich content provided on the open network with machine learning techniques. Most rumor detection methods can be categorized in three paradigms: the hand-crafted features based classification approaches, the propagation-based approaches and the neural networks approaches. In this survey, we introduce a formal definition of rumor in comparison with other definitions used in literatures. We summary the studies of automatic rumor detection so far and present details in three paradigms of rumor detection. We also give an introduction on existing datasets for rumor detection which would benefit following researches in this area. We give our suggestions for future rumors detection on microblogs as a conclusion.


DLOPT: Deep Learning Optimization Library

Deep learning hyper-parameter optimization is a tough task. Finding an appropriate network configuration is a key to success, however most of the times this labor is roughly done. In this work we introduce a novel library to tackle this problem, the Deep Learning Optimization Library: DLOPT. We briefly describe its architecture and present a set of use examples. This is an open source project developed under the GNU GPL v3 license and it is freely available at https://…/dlopt


Algebraic Equivalence of Linear Structural Equation Models

Despite their popularity, many questions about the algebraic constraints imposed by linear structural equation models remain open problems. For causal discovery, two of these problems are especially important: the enumeration of the constraints imposed by a model, and deciding whether two graphs define the same statistical model. We show how the half-trek criterion can be used to make progress in both of these problems. We apply our theoretical results to a small-scale model selection problem, and find that taking the additional algebraic constraints into account may lead to significant improvements in model selection accuracy.


Parallel Architecture Hardware and General Purpose Operating System Co-design

Because most optimisations to achieve higher computational performance eventually are limited, parallelism that scales is required. Parallelised hardware alone is not sufficient, but software that matches the architecture is required to gain best performance. For decades now, hardware design has been guided by the basic design of existing software, to avoid the higher cost to redesign the latter. In doing so, however, quite a variety of superior concepts is excluded a priori. Consequently, co-design of both hardware and software is crucial where highest performance is the goal. For special purpose application, this co-design is common practice. For general purpose application, however, a precondition for usability of a computer system is an operating system which is both comprehensive and dynamic. As no such operating system has ever been designed, a sketch for a comprehensive dynamic operating system is presented, based on a straightforward hardware architecture to demonstrate how design decisions regarding software and hardware do coexist and harmonise.


Construction of Confidence Intervals

Introductory texts on statistics typically only cover the classical ‘two sigma’ confidence interval for the mean value and do not describe methods to obtain confidence intervals for other estimators. The present technical report fills this gap by first defining different methods for the construction of confidence intervals, and then by their application to a binomial proportion, the mean value, and to arbitrary estimators. Beside the frequentist approach, the likelihood ratio and the highest posterior density approach are explained. Two methods to estimate the variance of general maximum likelihood estimators are described (Hessian, Jackknife), and for arbitrary estimators the bootstrap is suggested. For three examples, the different methods are evaluated by means of Monte Carlo simulations with respect to their coverage probability and interval length. R code is given for all methods, and the practitioner obtains a guideline which method should be used in which cases.


Revisiting the Hierarchical Multiscale LSTM

Hierarchical Multiscale LSTM (Chung et al., 2016a) is a state-of-the-art language model that learns interpretable structure from character-level input. Such models can provide fertile ground for (cognitive) computational linguistics studies. However, the high complexity of the architecture, training procedure and implementations might hinder its applicability. We provide a detailed reproduction and ablation study of the architecture, shedding light on some of the potential caveats of re-purposing complex deep-learning architectures. We further show that simplifying certain aspects of the architecture can in fact improve its performance. We also investigate the linguistic units (segments) learned by various levels of the model, and argue that their quality does not correlate with the overall performance of the model on language modeling.


Ontology-based multi-agent system to support business users and management

For some decision processes a significant added value is achieved when enterprises’ internal Data Warehouse (DW) can be integrated and combined with external data gained from web sites of competitors and other relevant Web sources. In this paper we discuss the agent-based integration approach using ontologies (DSS-MAS). In this approach data from internal DW and external sources are scanned by coordinated group of agents, while semantically integrated and relevant data is reported to business users according to business rules. After data from internal DW, Web sources and business rules are acquired, agents using these data and rules can infer new knowledge and therefore facilitate decision making process. Knowledge represented in enterprises’ ontologies is acquired from business users without extensive technical knowledge using user friendly user interface based on constraints and predefined templates. The approach presented in the paper was verified using the case study from the domain of mobile communications with the emphasis on supply and demand of mobile phones.


TrialChain: A Blockchain-Based Platform to Validate Data Integrity in Large, Biomedical Research Studies

The governance of data used for biomedical research and clinical trials is an important requirement for generating accurate results. To improve the visibility of data quality and analysis, we developed TrialChain, a blockchain-based platform that can be used to validate data integrity from large, biomedical research studies. We implemented a private blockchain using the MultiChain platform and integrated it with a data science platform deployed within a large research center. An administrative web application was built with Python to manage the platform, which was built with a microservice architecture using Docker. The TrialChain platform was integrated during data acquisition into our existing data science platform. Using NiFi, data were hashed and logged within the local blockchain infrastructure. To provide public validation, the local blockchain state was periodically synchronized to the public Ethereum network. The use of a combined private/public blockchain platform allows for both public validation of results while maintaining additional security and lower cost for blockchain transactions. Original data and modifications due to downstream analysis can be logged within TrialChain and data assets or results can be rapidly validated when needed using API calls to the platform. The TrialChain platform provides a data governance solution to audit the acquisition and analysis of biomedical research data. The platform provides cryptographic assurance of data authenticity and can also be used to document data analysis.


Event Detection and Retrieval on Social Media

In the recent years, we have witnessed the rapid adoption of social media platforms, such as Twitter, Facebook and YouTube, and their use as part of the everyday life of billions of people worldwide. Given the habit of people to use these platforms to share thoughts, daily activities and experiences it is not surprising that the amount of user generated content has reached unprecedented levels, with a substantial part of that content being related to real-world events, i.e. actions or occurrences taking place at a certain time and location. Given the key role of events in our life, the task of annotating and organizing social media content around them is of crucial importance for ensuring real-time and future access to multimedia content about an event of interest. In this chapter, we present several research efforts from recent years that tackle two main problems: a) event detection and b) event-based media retrieval and summarization. Given archived collections or live streams of social media items, the purpose of event detection methods is to identify previously unknown events in the form of sets of items that describe them. In general, the events could be of any type, but there are also approaches aiming at events of specific type. Given a target event the goal of event summarization is first to identify relevant content and then to represent it in a concise way, selecting the most appealing and representative content.


Customised Structural Elicitation

Established methods for structural elicitation typically rely on code modelling standard graphical models classes, most often Bayesian networks. However, more appropriate models may arise from asking the expert questions in common language about what might relate to what and exploring the logical implications of the statements. Only after identifying the best matching structure should this be embellished into a fully quantified probability model. Examples of the efficacy and potential of this more flexible approach are shown below for four classes of graphical models: Bayesian networks, Chain Event Graphs, Multi-regression Dynamic Models, and Flow Graphs. We argue that to be fully effective any structural elicitation phase must first be customised to an application and if necessary new types of structure with their own bespoke semantics elicited.


Representation Learning with Contrastive Predictive Coding

While supervised learning has enabled great progress in many applications, unsupervised learning has not seen such widespread adoption, and remains an important and challenging endeavor for artificial intelligence. In this work, we propose a universal unsupervised learning approach to extract useful representations from high-dimensional data, which we call Contrastive Predictive Coding. The key insight of our model is to learn such representations by predicting the future in latent space by using powerful autoregressive models. We use a probabilistic contrastive loss which induces the latent space to capture information that is maximally useful to predict future samples. It also makes the model tractable by using negative sampling. While most prior work has focused on evaluating representations for a particular modality, we demonstrate that our approach is able to learn useful representations achieving strong performance on four distinct domains: speech, images, text and reinforcement learning in 3D environments.


Interferometry-based modal analysis with finite aperture effects
Constructing Concrete Hard Instances of the Maximum Independent Set Problem
Sparse Representation and Non-Negative Matrix Factorization for image denoise
The Impact of Ridesharing in Mobility-on-Demand Systems: Simulation Case Study in Prague
Algebraic Voting Theory & Representations of $S_m \wr S_n$
The SAGE Project: a Storage Centric Approach for Exascale Computing
Interpretable Patient Mortality Prediction with Multi-value Rule Sets
Video Captioning with Boundary-aware Hierarchical Language Decoding and Joint Video Prediction
Hölder Conditions of Local Times and Exact Moduli of non-differentiability for Spherical Gaussian fields
Representation of Hamilton-Jacobi equation in optimal control theory with unbounded control set
Study of Switched Max-Link Buffer-Aided Relay Selection for Cooperative MIMO Systems
Decision making under uncertainty using imprecise probabilities
Optimization of a SSP’s Header Bidding Strategy using Thompson Sampling
Foreign English Accent Adjustment by Learning Phonetic Patterns
Spectral Analysis of Jet Substructure with Neural Network: Boosted Higgs Case
Symmetries and many-body excited states with neural-network quantum states
Adaptive Adversarial Attack on Scene Text Recognition
Optimum Transmission Delay for Function Computation in NFV-based Networks: the role of Network Coding and Redundant Computing
A Three-by-Three matrix representation of a generalized Tribonacci sequence
Troubling Trends in Machine Learning Scholarship
PCL: Proposal Cluster Learning for Weakly Supervised Object Detection
Complex Fully Convolutional Neural Networks for MR Image Reconstruction
Using Swarm Optimization To Enhance Autoencoders Images
Blind Identification of SFBC-OFDM Signals Based on the Central Limit Theorem
HDFD — A High Deformation Facial Dynamics Benchmark for Evaluation of Non-Rigid Surface Registration and Classification
Reddening sequences for Banff quivers and the class $\mathcal{P}$
Weakly-Supervised Convolutional Neural Networks for Multimodal Image Registration
Talk the Walk: Navigating New York City through Grounded Dialogue
n-metrics for multiple graph alignment
Predictive Directions for Individualized Treatment Selection in Clinical Trials
Beyond Pixels: Image Provenance Analysis Leveraging Metadata
Online Scoring with Delayed Information: A Convex Optimization Viewpoint
An Attention Model for group-level emotion recognition
Multicore architecture and cache optimization techniques for solving graph problems
Axioms for shifted tableau crystals
Evolving Multimodal Robot Behavior via Many Stepping Stones with the Combinatorial Multi-Objective Evolutionary Algorithm
Towards Non-Parametric Learning to Rank
On Training Recurrent Networks with Truncated Backpropagation Through Time in Speech Recognition
Detecting Levels of Depression in Text Based on Metrics
Jointly Embedding Entities and Text with Distant Supervision
High-Resolution Mammogram Synthesis using Progressive Generative Adversarial Networks
IGLOO: Slicing the Features Space to Represent Long Sequences
Optimal Parameter Choices via Precise Black-Box Analysis
Hierarchical Visualization of Materials Space with Graph Convolutional Neural Networks
High Fidelity Semantic Shape Completion for Point Clouds using Latent Optimization
Who is Killed by Police: Introducing Supervised Attention for Hierarchical LSTMs
Graphon Control of Large-scale Networks of Linear Systems
What to make of non-inferiority and equivalence testing with a post-specified margin
Capacity of Two-Way Channels with Symmetry Properties
A GPU-Oriented Algorithm Design for Secant-Based Dimensionality Reduction
Using Block Designs in Crossing Number Bounds
A New Variational Model for Binary Classification in the Supervised Learning Context
Unsupervised Domain Adaptation for Automatic Estimation of Cardiothoracic Ratio
Improved Approximations for Free-Order Prophets and Second-Price Auctions
Bayesian Linear Regression for Multivariate Responses Under Group Sparsity
Developing Brain Atlas through Deep Learning
Signals as Parametric Curves: Application to Independent Component Analysis and Blind Source Separation
Enhancing network synchronization by phase modulation
Approximation of Beta-Jacobi ensembles by Beta-Laguerre ensembles
Predicting property damage from tornadoes with deep learning
A Curious Result on Breaking Ties among Sample Medians
SceneEDNet: A Deep Learning Approach for Scene Flow Estimation
The Kannan-Lovász-Simonovits Conjecture
Pairwise Covariates-adjusted Block Model for Community Detection
Learning a Single Tucker Decomposition Network for Lossy Image Compression with Multiple Bits-Per-Pixel Rates
On Controller Design for Systems on Manifolds in Euclidean Space
Shape analysis of framed space curves
An Adaptive Learning Method of Restricted Boltzmann Machine by Neuron Generation and Annihilation Algorithm
Efficient Reassembling of Three-Regular Planar Graphs
Neural Task Graphs: Generalizing to Unseen Tasks from a Single Video Demonstration
Fine Tuning Method by using Knowledge Acquisition from Deep Belief Network
Dynamics of Taxi-like Logistics Systems: Theory and Microscopic Simulations
Easing Embedding Learning by Comprehensive Transcription of Heterogeneous Information Networks
Deep-speare: A Joint Neural Model of Poetic Language, Meter and Rhyme
The Recommendation System to SNS Community for Tourists by Using Altruistic Behaviors
A Recommendation System of Grants to Acquire External Funds
Significance-based Estimation-of-Distribution Algorithms
Recurrence and winding number for a revolving random walk
Recovering affine features from orientation- and scale-invariant ones
Automatic trajectory recognition in Active Target Time Projection Chambers data by means of hierarchical clustering
Topic-Guided Attention for Image Captioning
A Reinforcement Learning Approach to Jointly Adapt Vehicular Communications and Planning for Optimized Driving
Parallel Gaussian Channels Corrupted by Independent States With a State-Cognitive Helper
Multiresolution Tree Networks for 3D Point Cloud Processing
Privacy-Adversarial User Representations in Recommender Systems
On the minimum weights of binary linear complementary dual codes
Construction of Adaptive Short LDPC Codes for Distributed Transmit Beamforming
Deep Underwater Image Enhancement
Robust Differential Received Signal Strength-Based Localization
An elliptic Harnack inequality for random walk in balanced environments
Underwater Source Localization Using TDOA and FDOA Measurements with Unknown Propagation Speed and Sensor Parameter Errors
A finite element method for the Monge–Ampère equation with transport boundary conditions
Borel-de Siebenthal theory for affine reflection systems
Near-infrared Mira Period-Luminosity Relations in M33
Dual optimization for convex constrained objectives without the gradient-Lipschitz assumption
Accurate Scene Text Detection through Border Semantics Awareness and Bootstrapping
Multiuser One-Bit Massive MIMO Precoding Under MPSK Signaling
An Empirical Approach For Probing the Definiteness of Kernels
Bandits with Side Observations: Bounded vs. Logarithmic Regret
Exact value for the average optimal cost of bipartite traveling-salesman and 2-factor problems in two dimensions
DXRAM’s Fault-Tolerance Mechanisms Meet High Speed I/O Devices
On the ergodicity of certain Markov chains in random environments
Small-Variance Asymptotics for Nonparametric Bayesian Overlapping Stochastic Blockmodels
A Game-Based Approximate Verification of Deep Neural Networks with Provable Guarantees
Strong renewal theorems and local large deviations for multivariate random walks and renewals
SiL: An Approach for Adjusting Applications to Heterogeneous Systems Under Perturbations
Cost-Efficient Orchestration of Containers in Clouds: A Vision, Architectural Elements, and Future Directions
Type B Gaussian Statistics as Noncommutative Central Limits
Multi-D Kneser-Ney Smoothing Preserving the Original Marginal Distributions
Difficulty Controllable Question Generation for Reading Comprehension
Two-stage iterative Procrustes match algorithm and its application for VQ-based speaker verification
Paired Comparison Sentiment Scores
Estimating Wealth Distribution: Top Tail and Inequality
Efficient Evaluation of the Number of False Alarm Criterion
Successive Cancellation List Decoding of BMERA Codes with Application to Higher-Order Modulation
Essential Tensor Learning for Multi-view Spectral Clustering
Computing Kernels in Parallel: Lower and Upper Bounds
Window Opening Model using Deep Learning Methods
Theoretical Model of Computation and Algorithms for FPGA-based Hardware Accelerators
Revisiting Synthesis Model of Sparse Audio Declipper
Convolutional neural network based automatic plaque characterization from intracoronary optical coherence tomography images
Detecting Antagonistic and Allied Communities on Social Media
A note on the integrality gap of the configuration LP for restricted Santa Claus
Stochastic evolution of genealogies of spatial populations: state description, characterization of dynamics and properties
A Technique for Multi-User MIMO using Spatial Channel Model for out-door environments
On a Class of Stochastic Multilayer Networks
Towards Head Motion Compensation Using Multi-Scale Convolutional Neural Networks
Handling Incomplete Heterogeneous Data using VAEs
Linguistic Characteristics of Censorable Language on SinaWeibo
Enriching Knowledge Bases with Counting Quantifiers
Threshold $q$-voter model
Orbits of monomials and factorization into products of linear forms
IAM at CLEF eHealth 2018: Concept Annotation and Coding in French Death Certificates
On the choice of weight functions for linear representations of persistence diagrams
Polynomial bounds for centered colorings on proper minor-closed graph classes
Inside the Right-Leaning Echo Chambers: Characterizing Gab, an Unmoderated Social System
Deep Learning on Low-Resource Datasets
Lie symmetries methods in boundary crossing problems for diffusion processes
Generalized deterministic policy gradient algorithms
Recurrent Auto-Encoder Model for Large-Scale Industrial Sensor Signal Analysis
Geometric Generalization Based Zero-Shot Learning Dataset Infinite World: Simple Yet Powerful
Counting fixed points free vector fields on $\mathbb{B}^{2}$
Improved Space-Time Tradeoffs for kSUM
On the complexity of the (approximate) nearest colored node problem
Understanding VAEs in Fisher-Shannon Plane
Unit distance graphs and algebraic integers
Network Classification in Temporal Networks Using Motifs
Enhanced Diffusivity in Perturbed Senile Reinforced Random Walk Models
On the Performance of NOMA with Hybrid ARQ
Scalable Sparse Subspace Clustering via Ordered Weighted $\ell_1$ Regression
Dynamic Allocation of Serverless Functions in IoT Environments
Latent Alignment and Variational Attention
SimArch: A Multi-agent System For Human Path Simulation In Architecture Design
Suburban Fixed Wireless Access Channel Measurements and Models at 28 GHz for 90% Outdoor Coverage
Tower Diagrams and Pieri’s Rule
Is Q-learning Provably Efficient
Efficient Decoding Algorithms for Polar Codes based on $2\times2$ Non-Binary Kernels
Induced subgraphs of graphs with large chromatic number. XIII. New brooms
Kernel-Based Learning for Smart Inverter Control
Efficient identification, localization and quantification of grapevine inflorescences in unprepared field images using Fully Convolutional Networks
Correlation between the algebraic length of words in a Fuchsian fundamental group and the geometric length of their corresponding closed geodesics
CIRL: Controllable Imitative Reinforcement Learning for Vision-based Self-driving

Advertisements