Show newer

Analysis of tunnel failure characteristics under multiple explosion loads based on persistent homology-based machine learning. (arXiv:2009.10069v1 [cs.CE]) arxiv.org/abs/2009.10069

QR and LQ Decomposition Matrix Backpropagation Algorithms for Square, Wide, and Deep Matrices and Their Software Implementation. (arXiv:2009.10071v1 [math.NA]) arxiv.org/abs/2009.10071

Topology Optimization through Differentiable Finite Element Solver. (arXiv:2009.10072v1 [cs.CE]) arxiv.org/abs/2009.10072

Contextual Bandits for adapting to changing User preferences over time. (arXiv:2009.10073v1 [cs.LG]) arxiv.org/abs/2009.10073

On the Theory of Modern Quantum Algorithms. (arXiv:2009.10088v1 [quant-ph]) arxiv.org/abs/2009.10088

Curved Schemes for SDEs on Manifolds. (arXiv:2009.10113v1 [math.NA]) arxiv.org/abs/2009.10113

Extreme compression of grayscale images. (arXiv:2009.10115v1 [cs.CV]) arxiv.org/abs/2009.10115

Evaluating phase synchronization methods in fMRI: a comparison study and new approaches. (arXiv:2009.10126v1 [eess.SP]) arxiv.org/abs/2009.10126

On uncertainty inequalities related to subcube partitions and additive energy. (arXiv:2009.10127v1 [cs.DM]) arxiv.org/abs/2009.10127

Claraprint: a chord and melody based fingerprint for western classical music cover detection. (arXiv:2009.10128v1 [cs.IR]) arxiv.org/abs/2009.10128

Exploiting Diversity for Ultra-Reliable and Low-Latency Wireless Control. (arXiv:2009.08975v1 [cs.IT]) arxiv.org/abs/2009.08975

AI-Driven Interface Design for Intelligent Tutoring System Improves Student Engagement. (arXiv:2009.08976v1 [cs.CY]) arxiv.org/abs/2009.08976

Modeling Online Behavior in Recommender Systems: The Importance of Temporal Context. (arXiv:2009.08978v1 [cs.IR]) arxiv.org/abs/2009.08978

Psoriasis Severity Assessment with a Similarity-Clustering Machine Learning Approach Reduces Intra- and Inter-observation variation. (arXiv:2009.08997v1 [cs.CV]) arxiv.org/abs/2009.08997

Thermal and IR Drop Analysis Using Convolutional Encoder-Decoder Networks. (arXiv:2009.09009v1 [cs.AR]) arxiv.org/abs/2009.09009

Experimental Review of Neural-based approaches for Network Intrusion Management. (arXiv:2009.09011v1 [cs.NI]) arxiv.org/abs/2009.09011

Presenting Simultaneous Translation in Limited Space. (arXiv:2009.09016v1 [cs.CL]) arxiv.org/abs/2009.09016

On the Threat of npm Vulnerable Dependencies in Node.js Applications. (arXiv:2009.09019v1 [cs.SE]) arxiv.org/abs/2009.09019

Natural Graph Wavelet Packet Dictionaries. (arXiv:2009.09020v1 [eess.SP]) arxiv.org/abs/2009.09020

Optimal Convergence Rate of Self-Consistent Field Iteration for Solving Eigenvector-dependent Nonlinear Eigenvalue Problems. (arXiv:2009.09022v1 [math.NA]) arxiv.org/abs/2009.09022

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.