Taking Ethics, Fairness, and Bias Seriously in Machine Learning for Disaster Risk Management. (arXiv:1912.05538v1 [cs.CY]) http://arxiv.org/abs/1912.05538
Deep One-bit Compressive Autoencoding. (arXiv:1912.05539v1 [cs.LG]) http://arxiv.org/abs/1912.05539
Fundamental Entropic Laws and $\mathcal{L}_p$ Limitations of Feedback Systems: Implications for Machine-Learning-in-the-Loop Control. (arXiv:1912.05541v1 [eess.SY]) http://arxiv.org/abs/1912.05541
Forging quantum data: classically defeating an IQP-based quantum test. (arXiv:1912.05547v1 [quant-ph]) http://arxiv.org/abs/1912.05547
Neural Voice Puppetry: Audio-driven Facial Reenactment. (arXiv:1912.05566v1 [cs.CV]) http://arxiv.org/abs/1912.05566
Representation of Federated Learning via Worst-Case Robust Optimization Theory. (arXiv:1912.05571v1 [cs.LG]) http://arxiv.org/abs/1912.05571
Object Recognition with Human in the Loop Intelligent Frameworks. (arXiv:1912.05575v1 [cs.CV]) http://arxiv.org/abs/1912.05575
The Rise of Multiple Institutional Affiliations. (arXiv:1912.05576v1 [econ.GN]) http://arxiv.org/abs/1912.05576
Peek Inside the Closed World: Evaluating Autoencoder-Based Detection of DDoS to Cloud. (arXiv:1912.05590v1 [cs.NI]) http://arxiv.org/abs/1912.05590
Self Organizing Nebulous Growths for Robust and Incremental Data Visualization. (arXiv:1912.04896v1 [cs.CV]) http://arxiv.org/abs/1912.04896
An algorithm for bounding extremal functions of forbidden sequences. (arXiv:1912.04897v1 [cs.DM]) http://arxiv.org/abs/1912.04897
Modelling curvature of a bent paper leaf. (arXiv:1912.04898v1 [cs.GR]) http://arxiv.org/abs/1912.04898
Datamorphic Testing: A Methodology for Testing AI Applications. (arXiv:1912.04900v1 [cs.SE]) http://arxiv.org/abs/1912.04900
Learning Precisely Timed Feedforward Control of the Sensor-Denied Inverted Pendulum. (arXiv:1912.04922v1 [eess.SY]) http://arxiv.org/abs/1912.04922
The Hidden Assumptions Behind Counterfactual Explanations and Principal Reasons. (arXiv:1912.04930v1 [cs.CY]) http://arxiv.org/abs/1912.04930
A Cooperative Spectrum Sensing Scheme Based on Compressive Sensing for Cognitive Radio Networks. (arXiv:1912.04935v1 [cs.IT]) http://arxiv.org/abs/1912.04935
Get Real: Realism Metrics for Robust Limit Order Book Market Simulations. (arXiv:1912.04941v1 [q-fin.TR]) http://arxiv.org/abs/1912.04941
SKD: Unsupervised Keypoint Detecting for Point Clouds using Embedded Saliency Estimation. (arXiv:1912.04943v1 [cs.CV]) http://arxiv.org/abs/1912.04943
Nonlinear simulation of an elastic tumor-host interface. (arXiv:1912.04944v1 [math.NA]) http://arxiv.org/abs/1912.04944
[Invited talk] Building a Disaster-resilient Storage Layer for Next Generation Networks: The Role of Redundancy. (arXiv:1912.04269v1 [cs.NI]) http://arxiv.org/abs/1912.04269
I toot the arXiv feed for topics in Computer Science.
#ComputerScience #CS #Programming #SoftwareEngineering #Software #SoftwareDevelopment #Computers #Science #arXiv #News #PeerReview