Show newer

On the number of contingency tables and the independence heuristic. (arXiv:2009.10810v1 [math.CO]) arxiv.org/abs/2009.10810

Finite mixture modeling of censored and missing data using the multivariate skew-normal distribution. (arXiv:2009.10826v1 [stat.ME]) arxiv.org/abs/2009.10826

Bayesian Update with Importance Sampling: Required Sample Size. (arXiv:2009.10831v1 [stat.CO]) arxiv.org/abs/2009.10831

Model-Centric and Data-Centric Aspects of Active Learning for Neural Network Models. (arXiv:2009.10835v1 [cs.LG]) arxiv.org/abs/2009.10835

Hierarchical Bayesian Bootstrap for Heterogeneous Treatment Effect Estimation. (arXiv:2009.10839v1 [stat.ME]) arxiv.org/abs/2009.10839

Message Passing for Hyper-Relational Knowledge Graphs. (arXiv:2009.10847v1 [cs.LG]) arxiv.org/abs/2009.10847

QR and LQ Decomposition Matrix Backpropagation Algorithms for Square, Wide, and Deep Matrices and Their Software Implementation. (arXiv:2009.10071v1 [math.NA]) arxiv.org/abs/2009.10071

Recent Developments on Factor Models and its Applications in Econometric Learning. (arXiv:2009.10103v1 [econ.EM]) arxiv.org/abs/2009.10103

Sample Size Calculation for Cluster Randomized Trials with Zero-inflated Count Outcomes. (arXiv:2009.10117v1 [stat.AP]) arxiv.org/abs/2009.10117

Evaluating phase synchronization methods in fMRI: a comparison study and new approaches. (arXiv:2009.10126v1 [eess.SP]) arxiv.org/abs/2009.10126

Bandits Under The Influence (Extended Version). (arXiv:2009.10135v1 [cs.LG]) arxiv.org/abs/2009.10135

Crafting Adversarial Examples for Deep Learning Based Prognostics (Extended Version). (arXiv:2009.10149v1 [cs.LG]) arxiv.org/abs/2009.10149

SSMBA: Self-Supervised Manifold Based Data Augmentation for Improving Out-of-Domain Robustness. (arXiv:2009.10195v1 [cs.CL]) arxiv.org/abs/2009.10195

Scalable Adversarial Attack on Graph Neural Networks with Alternating Direction Method of Multipliers. (arXiv:2009.10233v1 [cs.LG]) arxiv.org/abs/2009.10233

Uncertainty-aware Attention Graph Neural Network for Defending Adversarial Attacks. (arXiv:2009.10235v1 [cs.LG]) arxiv.org/abs/2009.10235

casebase: An Alternative Framework For Survival Analysis and Comparison of Event Rates. (arXiv:2009.10264v1 [stat.ME]) arxiv.org/abs/2009.10264

Modeling Online Behavior in Recommender Systems: The Importance of Temporal Context. (arXiv:2009.08978v1 [cs.IR]) arxiv.org/abs/2009.08978

Multiple-trait Adaptive Fisher's Method for Genome-wide Association Studies. (arXiv:2009.09002v1 [stat.ME]) arxiv.org/abs/2009.09002

Robust Decentralized Learning for Neural Networks. (arXiv:2009.09026v1 [cs.LG]) arxiv.org/abs/2009.09026

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.