Show newer

Diffusion synthetic acceleration for heterogeneous domains, compatible with voids. (arXiv:2001.09196v1 [math.NA]) arxiv.org/abs/2001.09196

Using a Generative Adversarial Network for CT Normalization and its Impact on Radiomic Features. (arXiv:2001.08741v1 [eess.IV]) arxiv.org/abs/2001.08741

Text Extraction and Restoration of Old Handwritten Documents. (arXiv:2001.08742v1 [cs.CV]) arxiv.org/abs/2001.08742

Chameleon: Adaptive Code Optimization for Expedited Deep Neural Network Compilation. (arXiv:2001.08743v1 [cs.LG]) arxiv.org/abs/2001.08743

Compressive MRI quantification using convex spatiotemporal priors and deep auto-encoders. (arXiv:2001.08746v1 [cs.CV]) arxiv.org/abs/2001.08746

Reducing the Representation Error of GAN Image Priors Using the Deep Decoder. (arXiv:2001.08747v1 [cs.LG]) arxiv.org/abs/2001.08747

Fine-Tuning a Transformer-Based Language Model to Avoid Generating Non-Normative Text. (arXiv:2001.08764v1 [cs.CL]) arxiv.org/abs/2001.08764

Interventions for Ranking in the Presence of Implicit Bias. (arXiv:2001.08767v1 [cs.CY]) arxiv.org/abs/2001.08767

Cloud-Net+: A Cloud Segmentation CNN for Landsat 8 Remote Sensing Imagery Optimized with Filtered Jaccard Loss Function. (arXiv:2001.08768v1 [cs.CV]) arxiv.org/abs/2001.08768

Data Inference from Encrypted Databases: A Multi-dimensional Order-Preserving Matching Approach. (arXiv:2001.08773v1 [cs.CR]) arxiv.org/abs/2001.08773

Whose Tweets are Surveilled for the Police: An Audit of Social-Media Monitoring Tool via Log Files. (arXiv:2001.08777v1 [cs.CY]) arxiv.org/abs/2001.08777

Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and Devices. (arXiv:2001.08211v1 [cs.CR]) arxiv.org/abs/2001.08211

Active Perception with A Monocular Camera for Multiscopic Vision. (arXiv:2001.08212v1 [cs.CV]) arxiv.org/abs/2001.08212

Nonlinear Blockchain Scalability: a Game-Theoretic Perspective. (arXiv:2001.08231v1 [cs.CR]) arxiv.org/abs/2001.08231

Search-Based Software Engineering for Self-Adaptive Systems: One Survey, Five Disappointments and Six Opportunities. (arXiv:2001.08236v1 [cs.SE]) arxiv.org/abs/2001.08236

The divergence-conforming immersed boundary method: Application to vesicle and capsule dynamics. (arXiv:2001.08244v1 [physics.flu-dyn]) arxiv.org/abs/2001.08244

Signalling Acts of Punishment Promotes the Emergence of Cooperation and Enhanced Social Welfare in Evolutionary Games. (arXiv:2001.08245v1 [cs.GT]) arxiv.org/abs/2001.08245

PENet: Object Detection using Points Estimation in Aerial Images. (arXiv:2001.08247v1 [cs.CV]) arxiv.org/abs/2001.08247

How Much Position Information Do Convolutional Neural Networks Encode?. (arXiv:2001.08248v1 [cs.CV]) arxiv.org/abs/2001.08248

Talek: Private Group Messaging with Hidden Access Patterns. (arXiv:2001.08250v1 [cs.CR]) arxiv.org/abs/2001.08250

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.