Localism as Secrecy: Efficiency-Secrecy Tradeoffs in the Recruitment of ISIS Foreign Fighters. (arXiv:2011.12290v1 [cs.SI]) http://arxiv.org/abs/2011.12290
Generalized Variational Continual Learning. (arXiv:2011.12328v1 [cs.LG]) http://arxiv.org/abs/2011.12328
Towards Mass Adoption of Contact Tracing Apps -- Learning from Users' Preferences to Improve App Design. (arXiv:2011.12329v1 [cs.CR]) http://arxiv.org/abs/2011.12329
Language Generation via Combinatorial Constraint Satisfaction: A Tree Search Enhanced Monte-Carlo Approach. (arXiv:2011.12334v1 [cs.CL]) http://arxiv.org/abs/2011.12334
PeleNet: A Reservoir Computing Framework for Loihi. (arXiv:2011.12338v1 [cs.NE]) http://arxiv.org/abs/2011.12338
Zero-Shot Visual Slot Filling as Question Answering. (arXiv:2011.12340v1 [cs.AI]) http://arxiv.org/abs/2011.12340
Sequential convergence of AdaGrad algorithm for smooth convex optimization. (arXiv:2011.12341v1 [math.OC]) http://arxiv.org/abs/2011.12341
Quantization of Blackjack: Quantum Basic Strategy and Advantage. (arXiv:2011.12342v1 [quant-ph]) http://arxiv.org/abs/2011.12342
Trust but Verify: Assigning Prediction Credibility by Counterfactual Constrained Learning. (arXiv:2011.12344v1 [cs.LG]) http://arxiv.org/abs/2011.12344
The Application of Data Mining in the Production Processes. (arXiv:2011.12348v1 [econ.GN]) http://arxiv.org/abs/2011.12348
Explainable Multivariate Time Series Classification: A Deep Neural Network Which Learns To Attend To Important Variables As Well As Informative Time Intervals. (arXiv:2011.11631v1 [cs.LG]) http://arxiv.org/abs/2011.11631
MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource-Constrained IoT Edge Devices. (arXiv:2011.11632v1 [cs.CR]) http://arxiv.org/abs/2011.11632
An elastic framework for ensemble-based large-scale data assimilation. (arXiv:2011.11635v1 [cs.CE]) http://arxiv.org/abs/2011.11635
Blade Envelopes Part I: Concept and Methodology. (arXiv:2011.11636v1 [cs.CE]) http://arxiv.org/abs/2011.11636
Nudge Attacks on Point-Cloud DNNs. (arXiv:2011.11637v1 [cs.CR]) http://arxiv.org/abs/2011.11637
Differentially Private Learning Needs Better Features (or Much More Data). (arXiv:2011.11660v1 [cs.LG]) http://arxiv.org/abs/2011.11660
Recognizing Proper Tree-Graphs. (arXiv:2011.11670v1 [cs.CC]) http://arxiv.org/abs/2011.11670
Streaming Multi-speaker ASR with RNN-T. (arXiv:2011.11671v1 [eess.AS]) http://arxiv.org/abs/2011.11671
Characterization and Computation of Feasible Trajectories for an Articulated Probe with a Variable-Length End Segment. (arXiv:2011.11672v1 [cs.CG]) http://arxiv.org/abs/2011.11672
Does BERT Understand Sentiment? Leveraging Comparisons Between Contextual and Non-Contextual Embeddings to Improve Aspect-Based Sentiment Models. (arXiv:2011.11673v1 [cs.CL]) http://arxiv.org/abs/2011.11673
I toot the arXiv feed for topics in Computer Science.
#ComputerScience #CS #Programming #SoftwareEngineering #Software #SoftwareDevelopment #Computers #Science #arXiv #News #PeerReview