Unconventional Bio-Inspired Model for Design of Logic Gates. (arXiv:2002.05767v1 [cs.ET]) http://arxiv.org/abs/2002.05767
The Efficiency of Human Cognition Reflects Planned Information Processing. (arXiv:2002.05769v1 [cs.AI]) http://arxiv.org/abs/2002.05769
Harvesting Ambient RF for Presence Detection Through Deep Learning. (arXiv:2002.05770v1 [cs.LG]) http://arxiv.org/abs/2002.05770
ACEnet: Anatomical Context-Encoding Network for Neuroanatomy Segmentation. (arXiv:2002.05773v1 [eess.IV]) http://arxiv.org/abs/2002.05773
Graph Similarity Using PageRank and Persistent Homology. (arXiv:2002.05158v1 [cs.CG]) http://arxiv.org/abs/2002.05158
Optimal Multiple Stopping Rule for Warm-Starting Sequential Selection. (arXiv:2002.05160v1 [cs.AI]) http://arxiv.org/abs/2002.05160
A Combined Stochastic and Physical Framework for Modeling Indoor 5G Millimeter Wave Propagation. (arXiv:2002.05162v1 [cs.NI]) http://arxiv.org/abs/2002.05162
Connecting Dualities and Machine Learning. (arXiv:2002.05169v1 [physics.comp-ph]) http://arxiv.org/abs/2002.05169
Beyond single-shot fault-tolerant quantum error correction. (arXiv:2002.05180v1 [quant-ph]) http://arxiv.org/abs/2002.05180
The empirical duality gap of constrained statistical learning. (arXiv:2002.05183v1 [cs.LG]) http://arxiv.org/abs/2002.05183
Optical designs for realization of a set of schemes for quantum cryptography. (arXiv:2002.05184v1 [quant-ph]) http://arxiv.org/abs/2002.05184
A Tensor Network Approach to Finite Markov Decision Processes. (arXiv:2002.05185v1 [cond-mat.stat-mech]) http://arxiv.org/abs/2002.05185
Social and Child Care Provision in Kinship Networks: an Agent-Based Model. (arXiv:2002.05188v1 [cs.CY]) http://arxiv.org/abs/2002.05188
Intrinsic Motivation for Encouraging Synergistic Behavior. (arXiv:2002.05189v1 [cs.LG]) http://arxiv.org/abs/2002.05189
Constructing a Highlight Classifier with an Attention Based LSTM Neural Network. (arXiv:2002.04608v1 [cs.CL]) http://arxiv.org/abs/2002.04608
Session: A Model for End-To-End Encrypted Conversations With Minimal Metadata Leakage. (arXiv:2002.04609v1 [cs.CR]) http://arxiv.org/abs/2002.04609
Finding novelty with uncertainty. (arXiv:2002.04626v1 [cs.CV]) http://arxiv.org/abs/2002.04626
Single supply of electrical energy in the supply distribution model: using GAMS to model the effects of network parameters on the level of consumer demand. (arXiv:2002.04630v1 [eess.SY]) http://arxiv.org/abs/2002.04630
Ask the Experts: What Should Be on an IoT Privacy and Security Label?. (arXiv:2002.04631v1 [cs.CY]) http://arxiv.org/abs/2002.04631
Differentiating the Black-Box: Optimization with Local Generative Surrogates. (arXiv:2002.04632v1 [cs.LG]) http://arxiv.org/abs/2002.04632
I toot the arXiv feed for topics in Computer Science.
#ComputerScience #CS #Programming #SoftwareEngineering #Software #SoftwareDevelopment #Computers #Science #arXiv #News #PeerReview