Can Fortran's 'do concurrent' replace directives for accelerated computing?. (arXiv:2110.10151v1 [cs.MS]) http://arxiv.org/abs/2110.10151
Identifying Stroke Indicators Using Rough Sets. (arXiv:2110.10152v1 [cs.LG]) http://arxiv.org/abs/2110.10152
Towards Puffin: The Creation of an Uncertainty Compiler. (arXiv:2110.10153v1 [cs.MS]) http://arxiv.org/abs/2110.10153
Cross-Sim-NGF: FFT-Based Global Rigid Multimodal Alignment of Image Volumes using Normalized Gradient Fields. (arXiv:2110.10156v1 [eess.IV]) http://arxiv.org/abs/2110.10156
NAS-HPO-Bench-II: A Benchmark Dataset on Joint Optimization of Convolutional Neural Network Architecture and Training Hyperparameters. (arXiv:2110.10165v1 [cs.LG]) http://arxiv.org/abs/2110.10165
Hand-Object Contact Prediction via Motion-Based Pseudo-Labeling and Guided Progressive Label Correction. (arXiv:2110.10174v1 [cs.CV]) http://arxiv.org/abs/2110.10174
Cascaded Cross MLP-Mixer GANs for Cross-View Image Translation. (arXiv:2110.10183v1 [cs.CV]) http://arxiv.org/abs/2110.10183
GenNI: Human-AI Collaboration for Data-Backed Text Generation. (arXiv:2110.10185v1 [cs.CL]) http://arxiv.org/abs/2110.10185
Sky Is Not the Limit: Tighter Rank Bounds for Elevator Automata in B\"{u}chi Automata Complementation (Technical Report). (arXiv:2110.10187v1 [cs.LO]) http://arxiv.org/abs/2110.10187
Kernel Minimum Divergence Portfolios. (arXiv:2110.09516v1 [stat.ML]) http://arxiv.org/abs/2110.09516
Protection of the patient data against intentional attacks using a hybrid robust watermarking code. (arXiv:2110.09519v1 [cs.CR]) http://arxiv.org/abs/2110.09519
Image Protection against Forgery and Pixel Tampering based on a Triple Hybrid Security Approach. (arXiv:2110.09520v1 [cs.CR]) http://arxiv.org/abs/2110.09520
Understanding GNN Computational Graph: A Coordinated Computation, IO, and Memory Perspective. (arXiv:2110.09524v1 [cs.LG]) http://arxiv.org/abs/2110.09524
Eigenbehaviour as an Indicator of Cognitive Abilities. (arXiv:2110.09525v1 [cs.LG]) http://arxiv.org/abs/2110.09525
Infinite Servers Queue Systems Busy Period Time Length Distribution and Parameters Study through Computational Simulation. (arXiv:2110.09526v1 [cs.PF]) http://arxiv.org/abs/2110.09526
Wideband and Entropy-Aware Deep Soft Bit Quantization. (arXiv:2110.09541v1 [eess.SP]) http://arxiv.org/abs/2110.09541
Path Regularization: A Convexity and Sparsity Inducing Regularization for Parallel ReLU Networks. (arXiv:2110.09548v1 [cs.LG]) http://arxiv.org/abs/2110.09548
TransFusion: Cross-view Fusion with Transformer for 3D Human Pose Estimation. (arXiv:2110.09554v1 [cs.CV]) http://arxiv.org/abs/2110.09554
On-the-fly Code Activation for Attack Surface Reduction. (arXiv:2110.09557v1 [cs.CR]) http://arxiv.org/abs/2110.09557
A Rate-Distortion Framework for Explaining Black-box Model Decisions. (arXiv:2110.08252v1 [cs.LG]) http://arxiv.org/abs/2110.08252
I toot the arXiv feed for topics in Computer Science.
#ComputerScience #CS #Programming #SoftwareEngineering #Software #SoftwareDevelopment #Computers #Science #arXiv #News #PeerReview