Analysis of tunnel failure characteristics under multiple explosion loads based on persistent homology-based machine learning. (arXiv:2009.10069v1 [cs.CE]) http://arxiv.org/abs/2009.10069
QR and LQ Decomposition Matrix Backpropagation Algorithms for Square, Wide, and Deep Matrices and Their Software Implementation. (arXiv:2009.10071v1 [math.NA]) http://arxiv.org/abs/2009.10071
Topology Optimization through Differentiable Finite Element Solver. (arXiv:2009.10072v1 [cs.CE]) http://arxiv.org/abs/2009.10072
Contextual Bandits for adapting to changing User preferences over time. (arXiv:2009.10073v1 [cs.LG]) http://arxiv.org/abs/2009.10073
On the Theory of Modern Quantum Algorithms. (arXiv:2009.10088v1 [quant-ph]) http://arxiv.org/abs/2009.10088
Curved Schemes for SDEs on Manifolds. (arXiv:2009.10113v1 [math.NA]) http://arxiv.org/abs/2009.10113
Extreme compression of grayscale images. (arXiv:2009.10115v1 [cs.CV]) http://arxiv.org/abs/2009.10115
Evaluating phase synchronization methods in fMRI: a comparison study and new approaches. (arXiv:2009.10126v1 [eess.SP]) http://arxiv.org/abs/2009.10126
On uncertainty inequalities related to subcube partitions and additive energy. (arXiv:2009.10127v1 [cs.DM]) http://arxiv.org/abs/2009.10127
Claraprint: a chord and melody based fingerprint for western classical music cover detection. (arXiv:2009.10128v1 [cs.IR]) http://arxiv.org/abs/2009.10128
Exploiting Diversity for Ultra-Reliable and Low-Latency Wireless Control. (arXiv:2009.08975v1 [cs.IT]) http://arxiv.org/abs/2009.08975
AI-Driven Interface Design for Intelligent Tutoring System Improves Student Engagement. (arXiv:2009.08976v1 [cs.CY]) http://arxiv.org/abs/2009.08976
Modeling Online Behavior in Recommender Systems: The Importance of Temporal Context. (arXiv:2009.08978v1 [cs.IR]) http://arxiv.org/abs/2009.08978
Psoriasis Severity Assessment with a Similarity-Clustering Machine Learning Approach Reduces Intra- and Inter-observation variation. (arXiv:2009.08997v1 [cs.CV]) http://arxiv.org/abs/2009.08997
Thermal and IR Drop Analysis Using Convolutional Encoder-Decoder Networks. (arXiv:2009.09009v1 [cs.AR]) http://arxiv.org/abs/2009.09009
Experimental Review of Neural-based approaches for Network Intrusion Management. (arXiv:2009.09011v1 [cs.NI]) http://arxiv.org/abs/2009.09011
Presenting Simultaneous Translation in Limited Space. (arXiv:2009.09016v1 [cs.CL]) http://arxiv.org/abs/2009.09016
On the Threat of npm Vulnerable Dependencies in Node.js Applications. (arXiv:2009.09019v1 [cs.SE]) http://arxiv.org/abs/2009.09019
Natural Graph Wavelet Packet Dictionaries. (arXiv:2009.09020v1 [eess.SP]) http://arxiv.org/abs/2009.09020
Optimal Convergence Rate of Self-Consistent Field Iteration for Solving Eigenvector-dependent Nonlinear Eigenvalue Problems. (arXiv:2009.09022v1 [math.NA]) http://arxiv.org/abs/2009.09022
I toot the arXiv feed for topics in Computer Science.
#ComputerScience #CS #Programming #SoftwareEngineering #Software #SoftwareDevelopment #Computers #Science #arXiv #News #PeerReview