Automatic-differentiated Physics-Informed Echo State Network (API-ESN). (arXiv:2101.00002v1 [cs.LG]) http://arxiv.org/abs/2101.00002
Yet another argument in favour of NP=CoNP. (arXiv:2101.00003v1 [cs.CC]) http://arxiv.org/abs/2101.00003
Deep Unsupervised Identification of Selected SNPs between Adapted Populations on Pool-seq Data. (arXiv:2101.00004v1 [q-bio.GN]) http://arxiv.org/abs/2101.00004
A near-optimal policy for single-server scheduling with estimated job sizes. (arXiv:2101.00007v1 [cs.OH]) http://arxiv.org/abs/2101.00007
Explainability Matters: Backdoor Attacks on Medical Imaging. (arXiv:2101.00008v1 [cs.CR]) http://arxiv.org/abs/2101.00008
Adversarial Estimation of Riesz Representers. (arXiv:2101.00009v1 [econ.EM]) http://arxiv.org/abs/2101.00009
Unnatural Language Inference. (arXiv:2101.00010v1 [cs.CL]) http://arxiv.org/abs/2101.00010
Encoding sinusoidal functions in hybrid automata formalism. (arXiv:2101.00012v1 [cs.FL]) http://arxiv.org/abs/2101.00012
Consensus with Bounded Space and Minimal Communication. (arXiv:2101.00025v1 [cs.DC]) http://arxiv.org/abs/2101.00025
Predicting Organizational Cybersecurity Risk: A Deep Learning Approach. (arXiv:2012.14425v1 [cs.CR]) http://arxiv.org/abs/2012.14425
Deep Learning Towards Edge Computing: Neural Networks Straight from Compressed Data. (arXiv:2012.14426v1 [cs.CV]) http://arxiv.org/abs/2012.14426
Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS. (arXiv:2012.14427v1 [cs.CR]) http://arxiv.org/abs/2012.14427
Effective Email Spam Detection System using Extreme Gradient Boosting. (arXiv:2012.14430v1 [cs.CR]) http://arxiv.org/abs/2012.14430
LOCUS: A Multi-Sensor Lidar-Centric Solution for High-Precision Odometry and 3D Mapping in Real-Time. (arXiv:2012.14447v1 [cs.RO]) http://arxiv.org/abs/2012.14447
Straggler-Resilient Federated Learning: Leveraging the Interplay Between Statistical Accuracy and System Heterogeneity. (arXiv:2012.14453v1 [cs.LG]) http://arxiv.org/abs/2012.14453
A Stock Options Metaphor for Content Delivery Networks. (arXiv:2012.14454v1 [cs.NI]) http://arxiv.org/abs/2012.14454
Color Channel Perturbation Attacks for Fooling Convolutional Neural Networks and A Defense Against Such Attacks. (arXiv:2012.14456v1 [cs.CV]) http://arxiv.org/abs/2012.14456
An efficient method for approximating resonance curves of weakly-damped nonlinear mechanical systems. (arXiv:2012.14458v1 [cs.CE]) http://arxiv.org/abs/2012.14458
Enhancing Handwritten Text Recognition with N-gram sequence decomposition and Multitask Learning. (arXiv:2012.14459v1 [cs.CV]) http://arxiv.org/abs/2012.14459
Error estimates for the Scaled Boundary Finite Element Method. (arXiv:2012.13418v1 [math.NA]) http://arxiv.org/abs/2012.13418
I toot the arXiv feed for topics in Computer Science.
#ComputerScience #CS #Programming #SoftwareEngineering #Software #SoftwareDevelopment #Computers #Science #arXiv #News #PeerReview