The Median Probability Model and Correlated Variables

The median probability model (MPM) Barbieri and Berger (2004) is defined as the model consisting of those variables whose marginal posterior probability of inclusion is at least 0.5. The MPM rule yields the best single model for prediction in orthogonal and nested correlated designs. This result was originally conceived under a specific class of priors, such as the point mass mixtures of non-informative and g-type priors. The MPM rule, however, has become so very popular that it is now being deployed for a wider variety of priors and under correlated designs, where the properties of MPM are not yet completely understood. The main thrust of this work is to shed light on properties of MPM in these contexts by (a) characterizing situations when MPM is still safe under correlated designs, (b) providing significant generalizations of MPM to a broader class of priors (such as continuous spike-and-slab priors). We also provide new supporting evidence for the suitability of g-priors, as opposed to independent product priors, using new predictive matching arguments. Furthermore, we emphasize the importance of prior model probabilities and highlight the merits of non-uniform prior probability assignments using the notion of model aggregates.


An Intersectional Definition of Fairness

We introduce a measure of fairness for algorithms and data with regard to multiple protected attributes. Our proposed definition, differential fairness, is informed by the framework of intersectionality, which analyzes how interlocking systems of power and oppression affect individuals along overlapping dimensions including race, gender, sexual orientation, class, and disability. We show that our criterion behaves sensibly for any subset of the protected attributes, and we illustrate links to differential privacy. A case study on census data demonstrates the utility of our approach.


EnsembleDAgger: A Bayesian Approach to Safe Imitation Learning

While imitation learning is often used in robotics, this approach often suffers from data mismatch and compounding errors. DAgger is an iterative algorithm that addresses these issues by aggregating training data from both the expert and novice policies, but does not consider the impact of safety. We present a probabilistic extension to DAgger, which attempts to quantify the confidence of the novice policy as a proxy for safety. Our method, EnsembleDAgger, approximates a GP using an ensemble of neural networks. Using the variance as a measure of confidence, we compute a decision rule that captures how much we doubt the novice, thus determining when it is safe to allow the novice to act. With this approach, we aim to maximize the novice’s share of actions, while constraining the probability of failure. We demonstrate improved safety and learning performance compared to other DAgger variants and classic imitation learning on an inverted pendulum and in the MuJoCo HalfCheetah environment.


Knowledge-based Transfer Learning Explanation

Machine learning explanation can significantly boost machine learning’s application in decision making, but the usability of current methods is limited in human-centric explanation, especially for transfer learning, an important machine learning branch that aims at utilizing knowledge from one learning domain (i.e., a pair of dataset and prediction task) to enhance prediction model training in another learning domain. In this paper, we propose an ontology-based approach for human-centric explanation of transfer learning. Three kinds of knowledge-based explanatory evidence, with different granularities, including general factors, particular narrators and core contexts are first proposed and then inferred with both local ontologies and external knowledge bases. The evaluation with US flight data and DBpedia has presented their confidence and availability in explaining the transferability of feature representation in flight departure delay forecasting.


Optimal noise-canceling networks

Natural and artificial networks, from the cerebral cortex to large-scale power grids, face the challenge of converting noisy inputs into robust signals. The input fluctuations often exhibit complex yet statistically reproducible correlations that reflect underlying internal or environmental processes such as synaptic noise or atmospheric turbulence. This raises the practically and biophysically relevant of question whether and how noise-filtering can be hard-wired directly into a network’s architecture. By considering generic phase oscillator arrays under cost constraints, we explore here analytically and numerically the design, efficiency and topology of noise-canceling networks. Specifically, we find that when the input fluctuations become more correlated in space or time, optimal network architectures become sparser and more hierarchically organized, resembling the vasculature in plants or animals. More broadly, our results provide concrete guiding principles for designing more robust and efficient power grids and sensor networks.


PaloBoost: An Overfitting-robust TreeBoost with Out-of-Bag Sample Regularization Techniques

Stochastic Gradient TreeBoost is often found in many winning solutions in public data science challenges. Unfortunately, the best performance requires extensive parameter tuning and can be prone to overfitting. We propose PaloBoost, a Stochastic Gradient TreeBoost model that uses novel regularization techniques to guard against overfitting and is robust to parameter settings. PaloBoost uses the under-utilized out-of-bag samples to perform gradient-aware pruning and estimate adaptive learning rates. Unlike other Stochastic Gradient TreeBoost models that use the out-of-bag samples to estimate test errors, PaloBoost treats the samples as a second batch of training samples to prune the trees and adjust the learning rates. As a result, PaloBoost can dynamically adjust tree depths and learning rates to achieve faster learning at the start and slower learning as the algorithm converges. We illustrate how these regularization techniques can be efficiently implemented and propose a new formula for calculating feature importance to reflect the node coverages and learning rates. Extensive experimental results on seven datasets demonstrate that PaloBoost is robust to overfitting, is less sensitivity to the parameters, and can also effectively identify meaningful features.


Predicting the Integer Decomposition Property via Machine Learning

In this paper we investigate the ability of a neural network to approximate algebraic properties associated to lattice simplices. In particular we attempt to predict the distribution of Hilbert basis elements in the fundamental parallelepiped, from which we detect the integer decomposition property (IDP). We give a gentle introduction to neural networks and discuss the results of this prediction method when scanning very large test sets for examples of IDP simplices.


Subsampling MCMC – A review for the survey statistician

The rapid development of computing power and efficient Markov Chain Monte Carlo (MCMC) simulation algorithms have revolutionized Bayesian statistics, making it a highly practical inference method in applied work. However, MCMC algorithms tend to be computationally demanding, and are particularly slow for large datasets. Data subsampling has recently been suggested as a way to make MCMC methods scalable on massively large data, utilizing efficient sampling schemes and estimators from the survey sampling literature. These developments tend to be unknown by many survey statisticians who traditionally work with non-Bayesian methods, and rarely use MCMC. Our article reviews Subsampling MCMC, a so called pseudo-marginal MCMC approach to speeding up MCMC through data subsampling. The review is written for a survey statistician without previous knowledge of MCMC methods since our aim is to motivate survey sampling experts to contribute to the growing Subsampling MCMC literature.


On the Anonymization of Differentially Private Location Obfuscation

Obfuscation techniques in location-based services (LBSs) have been shown useful to hide the concrete locations of service users, whereas they do not necessarily provide the anonymity. We quantify the anonymity of the location data obfuscated by the planar Laplacian mechanism and that by the optimal geo-indistinguishable mechanism of Bordenabe et al. We empirically show that the latter provides stronger anonymity than the former in the sense that more users in the database satisfy k-anonymity. To formalize and analyze such approximate anonymity we introduce the notion of asymptotic anonymity. Then we show that the location data obfuscated by the optimal geo-indistinguishable mechanism can be anonymized by removing a smaller number of users from the database. Furthermore, we demonstrate that the optimal geo-indistinguishable mechanism has better utility both for users and for data analysts.


2P-DNN : Privacy-Preserving Deep Neural Networks Based on Homomorphic Cryptosystem

Machine Learning as a Service (MLaaS), such as Microsoft Azure, Amazon AWS, offers an effective DNN model to complete the machine learning task for small businesses and individuals who are restricted to the lacking data and computing power. However, here comes an issue that user privacy is ex-posed to the MLaaS server, since users need to upload their sensitive data to the MLaaS server. In order to preserve their privacy, users can encrypt their data before uploading it. This makes it difficult to run the DNN model because it is not designed for running in ciphertext domain. In this paper, using the Paillier homomorphic cryptosystem we present a new Privacy-Preserving Deep Neural Network model that we called 2P-DNN. This model can fulfill the machine leaning task in ciphertext domain. By using 2P-DNN, MLaaS is able to provide a Privacy-Preserving machine learning ser-vice for users. We build our 2P-DNN model based on LeNet-5, and test it with the encrypted MNIST dataset. The classification accuracy is more than 97%, which is close to the accuracy of LeNet-5 running with the MNIST dataset and higher than that of other existing Privacy-Preserving machine learning models


A Cache-based Optimizer for Querying Enhanced Knowledge Bases

With recent emerging technologies such as the Internet of Things (IoT), information collection on our physical world and environment can be achieved at a much higher granularity and such detailed knowledge will play a critical role in improving the productivity, operational effectiveness, decision making, and in identifying new business models for economic growth. Efficient discovery and querying such knowledge remains a key challenge due to the limited capability and high latency of connections to the interfaces of knowledge bases, e.g., the SPARQL endpoints. In this article, we present a querying system on SPARQL endpoints for knowledge bases that performs queries faster than the state-of-the-art systems. Our system features a cache-based optimization scheme to improve querying performance by prefetching and caching the results of predicted potential queries. The evaluations on query sets from SPARQL endpoints of DBpedia and Linked GeoData showcase the effectiveness of our approach.


AceKG: A Large-scale Knowledge Graph for Academic Data Mining

Most existing knowledge graphs (KGs) in academic domains suffer from problems of insufficient multi-relational information, name ambiguity and improper data format for large-scale machine pro- cessing. In this paper, we present AceKG, a new large-scale KG in academic domain. AceKG not only provides clean academic information, but also offers a large-scale benchmark dataset for researchers to conduct challenging data mining projects including link prediction, community detection and scholar classification. Specifically, AceKG describes 3.13 billion triples of academic facts based on a consistent ontology, including necessary properties of papers, authors, fields of study, venues and institutes, as well as the relations among them. To enrich the proposed knowledge graph, we also perform entity alignment with existing databases and rule-based inference. Based on AceKG, we conduct experiments of three typical academic data mining tasks and evaluate several state-of- the-art knowledge embedding and network representation learning approaches on the benchmark datasets built from AceKG. Finally, we discuss several promising research directions that benefit from AceKG.


Implementing Neural Turing Machines

Neural Turing Machines (NTMs) are an instance of Memory Augmented Neural Networks, a new class of recurrent neural networks which decouple computation from memory by introducing an external memory unit. NTMs have demonstrated superior performance over Long Short-Term Memory Cells in several sequence learning tasks. A number of open source implementations of NTMs exist but are unstable during training and/or fail to replicate the reported performance of NTMs. This paper presents the details of our successful implementation of a NTM. Our implementation learns to solve three sequential learning tasks from the original NTM paper. We find that the choice of memory contents initialization scheme is crucial in successfully implementing a NTM. Networks with memory contents initialized to small constant values converge on average 2 times faster than the next best memory contents initialization scheme.


Recent Advances in Convolutional Neural Network Acceleration

In recent years, convolutional neural networks (CNNs) have shown great performance in various fields such as image classification, pattern recognition, and multi-media compression. Two of the feature properties, local connectivity and weight sharing, can reduce the number of parameters and increase processing speed during training and inference. However, as the dimension of data becomes higher and the CNN architecture becomes more complicated, the end-to-end approach or the combined manner of CNN is computationally intensive, which becomes limitation to CNN’s further implementation. Therefore, it is necessary and urgent to implement CNN in a faster way. In this paper, we first summarize the acceleration methods that contribute to but not limited to CNN by reviewing a broad variety of research papers. We propose a taxonomy in terms of three levels, i.e.~structure level, algorithm level, and implementation level, for acceleration methods. We also analyze the acceleration methods in terms of CNN architecture compression, algorithm optimization, and hardware-based improvement. At last, we give a discussion on different perspectives of these acceleration and optimization methods within each level. The discussion shows that the methods in each level still have large exploration space. By incorporating such a wide range of disciplines, we expect to provide a comprehensive reference for researchers who are interested in CNN acceleration.


Understanding the Modeling of Computer Network Delays using Neural Networks

Recent trends in networking are proposing the use of Machine Learning (ML) techniques for the control and operation of the network. In this context, ML can be used as a computer network modeling technique to build models that estimate the network performance. Indeed, network modeling is a central technique to many networking functions, for instance in the field of optimization, in which the model is used to search a configuration that satisfies the target policy. In this paper, we aim to provide an answer to the following question: Can neural networks accurately model the delay of a computer network as a function of the input traffic For this, we assume the network as a black-box that has as input a traffic matrix and as output delays. Then we train different neural networks models and evaluate its accuracy under different fundamental network characteristics: topology, size, traffic intensity and routing. With this, we aim to have a better understanding of computer network modeling with neural nets and ultimately provide practical guidelines on how such models need to be trained.


From Bare Metal to Virtual: Lessons Learned when a Supercomputing Institute Deploys its First Cloud

As primary provider for research computing services at the University of Minnesota, the Minnesota Supercomputing Institute (MSI) has long been responsible for serving the needs of a user-base numbering in the thousands. In recent years, MSI—like many other HPC centers—has observed a growing need for self-service, on-demand, data-intensive research, as well as the emergence of many new controlled-access datasets for research purposes. In light of this, MSI constructed a new on-premise cloud service, named Stratus, which is architected from the ground up to easily satisfy data-use agreements and fill four gaps left by traditional HPC. The resulting OpenStack cloud, constructed from HPC-specific compute nodes and backed by Ceph storage, is designed to fully comply with controls set forth by the NIH Genomic Data Sharing Policy. Herein, we present twelve lessons learned during the ambitious sprint to take Stratus from inception and into production in less than 18 months. Important, and often overlooked, components of this timeline included the development of new leadership roles, staff and user training, and user support documentation. Along the way, the lessons learned extended well beyond the technical challenges often associated with acquiring, configuring, and maintaining large-scale systems.


Leveraging OpenStack and Ceph for a Controlled-Access Data Cloud

While traditional HPC has and continues to satisfy most workflows, a new generation of researchers has emerged looking for sophisticated, scalable, on-demand, and self-service control of compute infrastructure in a cloud-like environment. Many also seek safe harbors to operate on or store sensitive and/or controlled-access data in a high capacity environment. To cater to these modern users, the Minnesota Supercomputing Institute designed and deployed Stratus, a locally-hosted cloud environment powered by the OpenStack platform, and backed by Ceph storage. The subscription-based service complements existing HPC systems by satisfying the following unmet needs of our users: a) on-demand availability of compute resources, b) long-running jobs (i.e., > 30 days), c) container-based computing with Docker, and d) adequate security controls to comply with controlled-access data requirements. This document provides an in-depth look at the design of Stratus with respect to security and compliance with the NIH’s controlled-access data policy. Emphasis is placed on lessons learned while integrating OpenStack and Ceph features into a so-called ‘walled garden’, and how those technologies influenced the security design. Many features of Stratus, including tiered secure storage with the introduction of a controlled-access data ‘cache’, fault-tolerant live-migrations, and fully integrated two-factor authentication, depend on recent OpenStack and Ceph features.


Bipartite Causal Inference with Interference

Statistical methods to evaluate the effectiveness of interventions are increasingly challenged by the inherent interconnectedness of units. Specifically, a recent flurry of methods research has addressed the problem of interference between observations, which arises when one observational unit’s outcome depends not only on its treatment but also the treatment assigned to other units. We introduce the setting of bipartite causal inference with interference, which arises when 1) treatments are defined on observational units that are distinct from those at which outcomes are measured and 2) there is interference between units in the sense that outcomes for some units depend on the treatments assigned to many other units. Basic definitions and formulations are provided for this setting, highlighting similarities and differences with more commonly considered settings of causal inference with interference. Several types of causal estimands are discussed, and a simple inverse probability of treatment weighted estimator is developed for a subset of simplified estimands. The estimators are deployed to evaluate how interventions to reduce air pollution from 473 power plants in the U.S. causally affect cardiovascular hospitalization among Medicare beneficiaries residing at 23,458 zip code locations.


Contrastive Explanations for Reinforcement Learning in terms of Expected Consequences

Machine Learning models become increasingly proficient in complex tasks. However, even for experts in the field, it can be difficult to understand what the model learned. This hampers trust and acceptance, and it obstructs the possibility to correct the model. There is therefore a need for transparency of machine learning models. The development of transparent classification models has received much attention, but there are few developments for achieving transparent Reinforcement Learning (RL) models. In this study we propose a method that enables a RL agent to explain its behavior in terms of the expected consequences of state transitions and outcomes. First, we define a translation of states and actions to a description that is easier to understand for human users. Second, we developed a procedure that enables the agent to obtain the consequences of a single action, as well as its entire policy. The method calculates contrasts between the consequences of a policy derived from a user query, and of the learned policy of the agent. Third, a format for generating explanations was constructed. A pilot survey study was conducted to explore preferences of users for different explanation properties. Results indicate that human users tend to favor explanations about policy rather than about single actions.


The Vadalog System: Datalog-based Reasoning for Knowledge Graphs

Over the past years, there has been a resurgence of Datalog-based systems in the database community as well as in industry. In this context, it has been recognized that to handle the complex knowl\-edge-based scenarios encountered today, such as reasoning over large knowledge graphs, Datalog has to be extended with features such as existential quantification. Yet, Datalog-based reasoning in the presence of existential quantification is in general undecidable. Many efforts have been made to define decidable fragments. Warded Datalog+/- is a very promising one, as it captures PTIME complexity while allowing ontological reasoning. Yet so far, no implementation of Warded Datalog+/- was available. In this paper we present the Vadalog system, a Datalog-based system for performing complex logic reasoning tasks, such as those required in advanced knowledge graphs. The Vadalog system is Oxford’s contribution to the VADA research programme, a joint effort of the universities of Oxford, Manchester and Edinburgh and around 20 industrial partners. As the main contribution of this paper, we illustrate the first implementation of Warded Datalog+/-, a high-performance Datalog+/- system utilizing an aggressive termination control strategy. We also provide a comprehensive experimental evaluation.


Data Science with Vadalog: Bridging Machine Learning and Reasoning

Following the recent successful examples of large technology companies, many modern enterprises seek to build knowledge graphs to provide a unified view of corporate knowledge and to draw deep insights using machine learning and logical reasoning. There is currently a perceived disconnect between the traditional approaches for data science, typically based on machine learning and statistical modelling, and systems for reasoning with domain knowledge. In this paper we present a state-of-the-art Knowledge Graph Management System, Vadalog, which delivers highly expressive and efficient logical reasoning and provides seamless integration with modern data science toolkits, such as the Jupyter platform. We demonstrate how to use Vadalog to perform traditional data wrangling tasks, as well as complex logical and probabilistic reasoning. We argue that this is a significant step forward towards combining machine learning and reasoning in data science.


Outliers and The Ostensibly Heavy Tails

The aim of the paper is to show that the presence of one possible type of outliers is not connected to that of heavy tails of the distribution. In contrary, typical situation for outliers appearance is the case of compact supported distributions. Key words: outliers; heavy tailed distributions; compact support


NullaNet: Training Deep Neural Networks for Reduced-Memory-Access Inference

Deep neural networks have been successfully deployed in a wide variety of applications including computer vision and speech recognition. However, computational and storage complexity of these models has forced the majority of computations to be performed on high-end computing platforms or on the cloud. To cope with computational and storage complexity of these models, this paper presents a training method that enables a radically different approach for realization of deep neural networks through Boolean logic minimization. The aforementioned realization completely removes the energy-hungry step of accessing memory for obtaining model parameters, consumes about two orders of magnitude fewer computing resources compared to realizations that use floatingpoint operations, and has a substantially lower latency.


Scalable Tensor Completion with Nonconvex Regularization

Low-rank tensor completion problem aims to recover a tensor from limited observations, which has many real-world applications. Due to the easy optimization, the convex overlapping nuclear norm has been popularly used for tensor completion. However, it over-penalizes top singular values and lead to biased estimations. In this paper, we propose to use the nonconvex regularizer, which can less penalize large singular values, instead of the convex one for tensor completion. However, as the new regularizer is nonconvex and overlapped with each other, existing algorithms are either too slow or suffer from the huge memory cost. To address these issues, we develop an efficient and scalable algorithm, which is based on the proximal average (PA) algorithm, for real-world problems. Compared with the direct usage of PA algorithm, the proposed algorithm runs orders faster and needs orders less space. We further speed up the proposed algorithm with the acceleration technique, and show the convergence to critical points is still guaranteed. Experimental comparisons of the proposed approach are made with various other tensor completion approaches. Empirical results show that the proposed algorithm is very fast and can produce much better recovery performance.


Skin Lesion Analysis Towards Melanoma Detection via End-to-end Deep Learning of Convolutional Neural Networks
AutoLoc: Weakly-supervised Temporal Action Localization
Metric dimension and pattern avoidance in graphs
A Statistical Method for Object Counting
Biases in the Facebook News Feed: a Case Study on the Italian Elections
MOBA-Slice: A Time Slice Based Evaluation Framework of Relative Advantage between Teams in MOBA Games
On the rate of convergence of empirical measure in $\infty-$Wasserstein distance for unbounded density function
Modeling Brain Networks with Artificial Neural Networks
SiGAN: Siamese Generative Adversarial Network for Identity-Preserving Face Hallucination
Examining Scientific Writing Styles from the Perspective of Linguistic Complexity
Towards Privacy-Preserving Visual Recognition via Adversarial Training: A Pilot Study
Finite mixtures of matrix-variate Poisson-log normal distributions for three-way count data
Pedestrian Trajectory Prediction with Structured Memory Hierarchies
Lattices with many congruences are planar
The Focused Information Criterion for Stochastic Model Selection Problems Using $M$-Estimators
Phase Transition for the Chase-Escape Model on 2D Lattices
Real-Time Patient-Specific Lung Radiotherapy Targeting using Deep Learning
Score Permutation Based Finite Sample Inference for Generalized AutoRegressive Conditional Heteroskedasticity (GARCH) Models
Improving Automatic Skin Lesion Segmentation using Adversarial Learning based Data Argumentation
Time-to-Event Model-Assisted Designs to Accelerate Phase I Clinical Trials
Chromatic roots at 2 and at the Beraha number $B_{10}$
Visual Mesh: Real-time Object Detection Using Constant Sample Density
Occlusion-aware R-CNN: Detecting Pedestrians in a Crowd
A Stackelberg Game Approach Towards Socially-Aware Incentive Mechanisms for Mobile Crowdsensing
The largest number of weights in cyclic codes
Tree decompositions of graphs without large bipartite holes
Exact tail asymptotics for a three dimensional Brownian-driven tandem queue with intermediate inputs
Context-aware Group Buying in Ultra-dense Small Cell Networks: Unity is Strength
Prediction based on conditional distributions of vine copulas
Actor-Action Semantic Segmentation with Region Masks
Question Relevance in Visual Question Answering
Network Global Testing by Counting Graphlets
Directed Strongly Regular Cayley Graphs on Dihedral groups $D_n$
Minimizing Sum of Non-Convex but Piecewise log-Lipschitz Functions using Coresets
LinkNBed: Multi-Graph Representation Learning with Entity Linkage
Modeling event cascades using networks of additive count sequences
Learning to Play Pong using Policy Gradient Learning
More investment in Research and Development for better Education in the future
On Minimum Connecting Transition Sets in Graphs
Multimodal Social Media Analysis for Gang Violence Prevention
Levy Processes with finite variance conditioned to avoid an interval
Zero-shot keyword spotting for visual speech recognition in-the-wild
Deep attention-guided fusion network for lesion segmentation
DASN:Data-Aware Skilled Network for Accurate MR Brain Tissue Segmentation
Batch Sparse Recovery, or How to Leverage the Average Sparsity
Domain Generalization via Conditional Invariant Representation
Linearized M-stationarity conditions for general optimization problems
Learning 3D Shapes as Multi-Layered Height-maps using 2D Convolutional Networks
A Multi-Level Deep Ensemble Model for Skin Lesion Classification in Dermoscopy Images
Nonparametric Tests for Bivariate Stochastic Dominance without Continuity Assumptions
Non-Gaussian power grid frequency fluctuations characterized by Lévy-stable laws and superstatistics
Generalized Cops and Robbers: A Multi-Player Pursuit Game on Graphs
Generalization Bounds for Unsupervised Cross-Domain Mapping with WGANs
The bounded derived categories of the Tamari lattices are fractionally Calabi-Yau
The Semiparametric Cramér-Rao Bound for Complex Elliptically Symmetric Distributions
Longitudinal optical fields in light scattering from dielectric spheres and Anderson localization of light
Git Loss for Deep Face Recognition
Geostatistical modeling to capture seismic-shaking patterns from earthquake-induced landslides
Improving Deep Models of Person Re-identification for Cross-Dataset Usage
Multisensor Management Algorithm for Airborne Sensors Using Frank-Wolfe Method
Performance Analysis of Cooperative Communications at Road Intersections Using Stochastic Geometry Tools
Particle Filtering Methods for Stochastic Optimization with Application to Large-Scale Empirical Risk Minimization
Unsupervised Image-to-Image Translation with Stacked Cycle-Consistent Adversarial Networks
Classes of low-frequency earthquakes based on inter-time distribution reveal a precursor event for the 2011 Great Tohoku Earthquake
Total variation cutoff for the transpose top-$2$ with random shuffle
Set Cover and Vertex Cover with Delay
Towards a Programmable Framework for Agent Game Playing
Linear multistep methods for optimal control problems and applications to hyperbolic relaxation systems
Spacetime-Entangled Networks (I) Relativity and Observability of Stepwise Consensus
Bond and site color-avoiding percolation in scale free networks
Iterative Interaction Training for Segmentation Editing Networks
Explainable Neural Computation via Stack Neural Module Networks
MVDepthNet: Real-time Multiview Depth Estimation Neural Network
Big data analyses reveal patterns and drivers of the movements of southern elephant seals
Invisible Steganography via Generative Adversarial Network
On Enumerating Distributions for Associated Vectors in the Entropy Space
Infinite Latin Squares: Neighbor Balance and Orthogonality
Person Search by Multi-Scale Matching
Deep Dialog Act Recognition using Multiple Token, Segment, and Context Information Representations
Ideal Preconditioners for Saddle Point Systems with a Rank-Deficient Leading Block
Multi-View Fuzzy Logic System with the Cooperation between Visible and Hidden Views
3D Convolutional Neural Networks for Tumor Segmentation using Long-range 2D Context
Deep Learning from Label Proportions for Emphysema Quantification
A Frequency-Domain Characterization of Optimal Error Covariance for the Kalman-Bucy Filter
Shadows in Coxeter groups
Fast Two-Dimensional Atomic Norm Minimization in Spectrum Estimation and Denoising
On walks avoiding a quadrant
From Volcano to Toyshop: Adaptive Discriminative Region Discovery for Scene Recognition
Maximum-Likelihood Network Reconstruction for SIS Processes is NP-Hard
Region Convolutional Features for Multi-Label Remote Sensing Image Retrieval
Individual perception dynamics in drunk games
Auto-adaptive Resonance Equalization using Dilated Residual Networks
Dual Refinement Network for Single-Shot Object Detection
Almost sure limit theorems on Wiener chaos: the non-central case
$K$–User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade–Off
Impact of Relay Cooperation on the Performance of Large-scale Multipair Two-way Relay Networks
Enumerative Results on the Schröder Pattern Poset
Total non-negativity of some combinatorial matrices
Measuring collaborative emergent behavior in multi-agent reinforcement learning
ASR-free CNN-DTW keyword spotting using multilingual bottleneck features for almost zero-resource languages
Automatic Speech Recognition for Humanitarian Applications in Somali
Learning an Adversary’s Actions for Secret Communication
AI for 5G: Research Directions and Paradigms
A Bound on the Rate of Convergence in the Central Limit Theorem for Renewal Processes under Second Moment Conditions
Approximate Bayesian inference with queueing networks and coupled jump processes
Submodular Function Maximization in Parallel via the Multilinear Relaxation
On a Potential Game-theoretic Approach to Event-triggered Distributed Resource Allocation
Primal-Dual Dynamics of Distributed Support Vector Machines
Unbiased Markov chain Monte Carlo for intractable target distributions
Hybrid Diffusion: Spectral-Temporal Graph Filtering for Manifold Ranking
PS-FCN: A Flexible Learning Framework for Photometric Stereo
A class of peak polynomials related to Jacobi elliptic functions
A model specification test for the variance function in nonparametric regression
Measuring the Impact of Spectre and Meltdown
A practical example for the non-linear Bayesian filtering of model parameters
A Data Analytics Perspective of the Clarke and Related Transforms in Power Grid Analysis
Random-cluster dynamics in $\mathbb Z^2$: rapid mixing with general boundary conditions
Random Sampling Applied to the MST Problem in the Node Congested Clique Model
Round Compression for Parallel Graph Algorithms in Strongly Sublinear Space
Laplacian growth & sandpiles on the Sierpinski gasket: limit shape universality and exact solutions

Advertisements