Show newer

A Formally Verified HOL4 Algebra for Event Trees. (arXiv:2004.14384v1 [eess.SY]) arxiv.org/abs/2004.14384

UAV and Machine Learning Based Refinement of a Satellite-Driven Vegetation Index for Precision Agriculture. (arXiv:2004.14421v1 [eess.IV]) arxiv.org/abs/2004.14421

Manual segmentation versus semi-automated segmentation for quantifying vestibular schwannoma volume on MRI. (arXiv:2004.14462v1 [eess.IV]) arxiv.org/abs/2004.14462

Detecting Production Phases Based on Sensor Values using 1D-CNNs. (arXiv:2004.14475v1 [cs.LG]) arxiv.org/abs/2004.14475

Teaching Cameras to Feel: Estimating Tactile Physical Properties of Surfaces From Images. (arXiv:2004.14487v1 [cs.CV]) arxiv.org/abs/2004.14487

Identification of Self-Excited Systems Using Discrete-Time, Time-Delayed Lur'e Models. (arXiv:2004.14488v1 [eess.SP]) arxiv.org/abs/2004.14488

Detecting Deep-Fake Videos from Appearance and Behavior. (arXiv:2004.14491v1 [cs.CV]) arxiv.org/abs/2004.14491

Coordination and Communication of Autonomous Subsystems in Cyber Physical Systems: A Mechanism Learning Approach. (arXiv:2004.14494v1 [eess.SY]) arxiv.org/abs/2004.14494

Reduced-Dimensional Reinforcement Learning Control using Singular Perturbation Approximations. (arXiv:2004.14501v1 [eess.SY]) arxiv.org/abs/2004.14501

Bias-corrected estimator for intrinsic dimension and differential entropy--a visual multiscale approach. (arXiv:2004.14528v1 [stat.ML]) arxiv.org/abs/2004.14528

A Low-Power Dual-Factor Authentication Unit for Secure Implantable Devices. (arXiv:2004.13709v1 [cs.CR]) arxiv.org/abs/2004.13709

A Method for Vehicle Collision Risk Assessment through Inferring Driver's Braking Actions in Near-Crash Situations. (arXiv:2004.13761v1 [eess.SP]) arxiv.org/abs/2004.13761

Conditional Spoken Digit Generation with StyleGAN. (arXiv:2004.13764v1 [eess.AS]) arxiv.org/abs/2004.13764

Convolutional Neural Networks vs. Deformable Image Registration For Medical Slice Interpolation. (arXiv:2004.13784v1 [eess.IV]) arxiv.org/abs/2004.13784

Dynamic Quantized Consensus of General Linear Multi-agent Systems under Denial-of-Service Attacks. (arXiv:2004.13815v1 [eess.SY]) arxiv.org/abs/2004.13815

Pyramid Attention Networks for Image Restoration. (arXiv:2004.13824v1 [cs.CV]) arxiv.org/abs/2004.13824

Deflating Dataset Bias Using Synthetic Data Augmentation. (arXiv:2004.13866v1 [cs.CV]) arxiv.org/abs/2004.13866

Automated Physics-Derived Code Generation for Sensor Fusion and State Estimation. (arXiv:2004.13873v1 [eess.SY]) arxiv.org/abs/2004.13873

Histogram-based Auto Segmentation: A Novel Approach to Segmenting Integrated Circuit Structures from SEM Images. (arXiv:2004.13874v1 [eess.IV]) arxiv.org/abs/2004.13874

6G White Paper on Machine Learning in Wireless Communication Networks. (arXiv:2004.13875v1 [cs.IT]) arxiv.org/abs/2004.13875

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.