Show newer

Capacity Region of Two-users Weak Gaussian Interference Channel. (arXiv:2011.12981v1 [cs.IT]) arxiv.org/abs/2011.12981

Grafit: Learning fine-grained image representations with coarse labels. (arXiv:2011.12982v1 [cs.CV]) arxiv.org/abs/2011.12982

Best response dynamics on random graphs. (arXiv:2011.12983v1 [math.CO]) arxiv.org/abs/2011.12983

Enabling GPU Accelerated Computing in the SUNDIALS Time Integration Library. (arXiv:2011.12984v1 [cs.DC]) arxiv.org/abs/2011.12984

Localism as Secrecy: Efficiency-Secrecy Tradeoffs in the Recruitment of ISIS Foreign Fighters. (arXiv:2011.12290v1 [cs.SI]) arxiv.org/abs/2011.12290

Generalized Variational Continual Learning. (arXiv:2011.12328v1 [cs.LG]) arxiv.org/abs/2011.12328

Towards Mass Adoption of Contact Tracing Apps -- Learning from Users' Preferences to Improve App Design. (arXiv:2011.12329v1 [cs.CR]) arxiv.org/abs/2011.12329

Language Generation via Combinatorial Constraint Satisfaction: A Tree Search Enhanced Monte-Carlo Approach. (arXiv:2011.12334v1 [cs.CL]) arxiv.org/abs/2011.12334

PeleNet: A Reservoir Computing Framework for Loihi. (arXiv:2011.12338v1 [cs.NE]) arxiv.org/abs/2011.12338

Zero-Shot Visual Slot Filling as Question Answering. (arXiv:2011.12340v1 [cs.AI]) arxiv.org/abs/2011.12340

Sequential convergence of AdaGrad algorithm for smooth convex optimization. (arXiv:2011.12341v1 [math.OC]) arxiv.org/abs/2011.12341

Quantization of Blackjack: Quantum Basic Strategy and Advantage. (arXiv:2011.12342v1 [quant-ph]) arxiv.org/abs/2011.12342

Trust but Verify: Assigning Prediction Credibility by Counterfactual Constrained Learning. (arXiv:2011.12344v1 [cs.LG]) arxiv.org/abs/2011.12344

The Application of Data Mining in the Production Processes. (arXiv:2011.12348v1 [econ.GN]) arxiv.org/abs/2011.12348

Explainable Multivariate Time Series Classification: A Deep Neural Network Which Learns To Attend To Important Variables As Well As Informative Time Intervals. (arXiv:2011.11631v1 [cs.LG]) arxiv.org/abs/2011.11631

MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource-Constrained IoT Edge Devices. (arXiv:2011.11632v1 [cs.CR]) arxiv.org/abs/2011.11632

An elastic framework for ensemble-based large-scale data assimilation. (arXiv:2011.11635v1 [cs.CE]) arxiv.org/abs/2011.11635

Blade Envelopes Part I: Concept and Methodology. (arXiv:2011.11636v1 [cs.CE]) arxiv.org/abs/2011.11636

Differentially Private Learning Needs Better Features (or Much More Data). (arXiv:2011.11660v1 [cs.LG]) arxiv.org/abs/2011.11660

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.