Show more

Visual Summarization of Lecture Video Segments for Enhanced Navigation. (arXiv:2006.02434v1 [cs.CV]) arxiv.org/abs/2006.02434

A Distributed Trust Framework for Privacy-Preserving Machine Learning. (arXiv:2006.02456v1 [cs.CR]) arxiv.org/abs/2006.02456

Shallow Neural Hawkes: Non-parametric kernel estimation for Hawkes processes. (arXiv:2006.02460v1 [stat.ML]) arxiv.org/abs/2006.02460

Algorithms for Mitigating the Effect of Uncertain Geomagnetic Disturbances in Electric Grids. (arXiv:2006.02461v1 [math.OC]) arxiv.org/abs/2006.02461

Serving DNNs like Clockwork: Performance Predictability from the Bottom Up. (arXiv:2006.02464v1 [cs.DC]) arxiv.org/abs/2006.02464

Detecting Misinformation on WhatsApp without Breaking Encryption. (arXiv:2006.02471v1 [cs.CY]) arxiv.org/abs/2006.02471

Technological impact of biomedical research: the role of basicness and novelty. (arXiv:2006.02472v1 [cs.DL]) arxiv.org/abs/2006.02472

CircleNet: Anchor-free Detection with Circle Representation. (arXiv:2006.02474v1 [cs.CV]) arxiv.org/abs/2006.02474

R\'{e}nyi Generative Adversarial Networks. (arXiv:2006.02479v1 [cs.LG]) arxiv.org/abs/2006.02479

Tangles: a new paradigm for clusters and types. (arXiv:2006.01830v1 [cs.AI]) arxiv.org/abs/2006.01830

Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques -- An Experiment. (arXiv:2006.01849v1 [cs.CR]) arxiv.org/abs/2006.01849

Event Arguments Extraction via Dilate Gated Convolutional Neural Network with Enhanced Local Features. (arXiv:2006.01854v1 [cs.CL]) arxiv.org/abs/2006.01854

Aligning Superhuman AI and Human Behavior: Chess as a Model System. (arXiv:2006.01855v1 [cs.AI]) arxiv.org/abs/2006.01855

Consistent Estimators for Learning to Defer to an Expert. (arXiv:2006.01862v1 [cs.LG]) arxiv.org/abs/2006.01862

ALADIN-$\alpha$ -- An open-source MATLAB toolbox for distributed non-convex optimization. (arXiv:2006.01866v1 [eess.SY]) arxiv.org/abs/2006.01866

Convergence and Stability of Graph Convolutional Networks on Large Random Graphs. (arXiv:2006.01868v1 [stat.ML]) arxiv.org/abs/2006.01868

On the Significance of Consecutive Ballots in Paxos. (arXiv:2006.01885v1 [cs.DC]) arxiv.org/abs/2006.01885

Adversarial Item Promotion: Vulnerabilities at the Core of Top-N Recommenders that Use Images to Address Cold Start. (arXiv:2006.01888v1 [cs.IR]) arxiv.org/abs/2006.01888

Generating Random Logic Programs Using Constraint Programming. (arXiv:2006.01889v1 [cs.LO]) arxiv.org/abs/2006.01889

Show more
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.