Show newer

Can Fortran's 'do concurrent' replace directives for accelerated computing?. (arXiv:2110.10151v1 [cs.MS]) arxiv.org/abs/2110.10151

Identifying Stroke Indicators Using Rough Sets. (arXiv:2110.10152v1 [cs.LG]) arxiv.org/abs/2110.10152

Towards Puffin: The Creation of an Uncertainty Compiler. (arXiv:2110.10153v1 [cs.MS]) arxiv.org/abs/2110.10153

Cross-Sim-NGF: FFT-Based Global Rigid Multimodal Alignment of Image Volumes using Normalized Gradient Fields. (arXiv:2110.10156v1 [eess.IV]) arxiv.org/abs/2110.10156

NAS-HPO-Bench-II: A Benchmark Dataset on Joint Optimization of Convolutional Neural Network Architecture and Training Hyperparameters. (arXiv:2110.10165v1 [cs.LG]) arxiv.org/abs/2110.10165

Hand-Object Contact Prediction via Motion-Based Pseudo-Labeling and Guided Progressive Label Correction. (arXiv:2110.10174v1 [cs.CV]) arxiv.org/abs/2110.10174

Cascaded Cross MLP-Mixer GANs for Cross-View Image Translation. (arXiv:2110.10183v1 [cs.CV]) arxiv.org/abs/2110.10183

GenNI: Human-AI Collaboration for Data-Backed Text Generation. (arXiv:2110.10185v1 [cs.CL]) arxiv.org/abs/2110.10185

Sky Is Not the Limit: Tighter Rank Bounds for Elevator Automata in B\"{u}chi Automata Complementation (Technical Report). (arXiv:2110.10187v1 [cs.LO]) arxiv.org/abs/2110.10187

Kernel Minimum Divergence Portfolios. (arXiv:2110.09516v1 [stat.ML]) arxiv.org/abs/2110.09516

Protection of the patient data against intentional attacks using a hybrid robust watermarking code. (arXiv:2110.09519v1 [cs.CR]) arxiv.org/abs/2110.09519

Image Protection against Forgery and Pixel Tampering based on a Triple Hybrid Security Approach. (arXiv:2110.09520v1 [cs.CR]) arxiv.org/abs/2110.09520

Understanding GNN Computational Graph: A Coordinated Computation, IO, and Memory Perspective. (arXiv:2110.09524v1 [cs.LG]) arxiv.org/abs/2110.09524

Eigenbehaviour as an Indicator of Cognitive Abilities. (arXiv:2110.09525v1 [cs.LG]) arxiv.org/abs/2110.09525

Infinite Servers Queue Systems Busy Period Time Length Distribution and Parameters Study through Computational Simulation. (arXiv:2110.09526v1 [cs.PF]) arxiv.org/abs/2110.09526

Wideband and Entropy-Aware Deep Soft Bit Quantization. (arXiv:2110.09541v1 [eess.SP]) arxiv.org/abs/2110.09541

Path Regularization: A Convexity and Sparsity Inducing Regularization for Parallel ReLU Networks. (arXiv:2110.09548v1 [cs.LG]) arxiv.org/abs/2110.09548

TransFusion: Cross-view Fusion with Transformer for 3D Human Pose Estimation. (arXiv:2110.09554v1 [cs.CV]) arxiv.org/abs/2110.09554

On-the-fly Code Activation for Attack Surface Reduction. (arXiv:2110.09557v1 [cs.CR]) arxiv.org/abs/2110.09557

A Rate-Distortion Framework for Explaining Black-box Model Decisions. (arXiv:2110.08252v1 [cs.LG]) arxiv.org/abs/2110.08252

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.