
-
How Do Neural Networks Estimate Optical Flow? A Neuropsychology-Inspired Study
End-to-end trained convolutional neural networks have led to a breakthro...
read it
-
Measuring the Quality of Explanations: The System Causability Scale (SCS). Comparing Human and Machine Explanations
Recent success in Artificial Intelligence (AI) and Machine Learning (ML)...
read it
-
Brains and pseudorandom generators
In a pioneering classic, Warren McCulloch and Walter Pitts proposed a mo...
read it
-
Data Augmentation of Wearable Sensor Data for Parkinson's Disease Monitoring using Convolutional Neural Networks
While convolutional neural networks (CNNs) have been successfully applie...
read it
-
Duality in Graphical Models
Graphical models have proven to be powerful tools for representing high-...
read it
-
Pair-Wise Cluster Analysis
This paper studies the problem of learning clusters which are consistent...
read it
-
A New Computational Framework For 2D Shape-Enclosing Contours
In this paper, a new framework for one-dimensional contour extraction fr...
read it
-
STEVE - Space-Time-Enclosing Volume Extraction
The novel STEVE (i.e., Space-Time-Enclosing Volume Extraction) algorithm...
read it
-
Volume-Enclosing Surface Extraction
In this paper we present a new method, which allows for the construction...
read it
-
Selfishness need not be bad
This article studies the user selfish behavior in non-atomic congestion ...
read it
-
The Strategy of Experts for Repeated Predictions
We investigate the behavior of experts who seek to make predictions with...
read it
-
Overlay Secondary Spectrum Sharing with Independent Re-attempts in Cognitive Radios
Opportunistic spectrum access (OSA) is a promising reform paradigm envis...
read it
-
Web2Text: Deep Structured Boilerplate Removal
Web pages are a valuable source of information for many natural language...
read it
-
qrypt0 - encrypted short messages exchanged between offline computers
A system is described for exchanging encrypted short messages between co...
read it
-
Using Machine Learning to Improve Cylindrical Algebraic Decomposition
Cylindrical Algebraic Decomposition (CAD) is a key tool in computational...
read it
-
Assessing Security and Performances of Consensus algorithms for Permissioned Blockchains
Blockchain is a novel technology that is rising a lot of interest in the...
read it
-
Selfishness need not be bad: a general proof
This article studies the user behavior in non-atomic congestion games. W...
read it
-
SABRE: Protecting Bitcoin against Routing Attacks
Routing attacks remain practically effective in the Internet today as ex...
read it
-
Enabling FAIR Research in Earth Science through Research Objects
Data-intensive science communities are progressively adopting FAIR pract...
read it
-
Lifelong Testing of Smart Autonomous Systems by Shepherding a Swarm of Watchdog Artificial Intelligence Agents
Artificial Intelligence (AI) technologies could be broadly categorised i...
read it
-
Rerandomization in 2^K Factorial Experiments
With many pretreatment covariates and treatment factors, the classical f...
read it
-
Public decision support for low population density areas: An imbalance-aware hyper-ensemble for spatio-temporal crime prediction
Crime events are known to reveal spatio-temporal patterns, which can be ...
read it
-
Mean and variance of first passage time in Markov chains with unknown parameters
There are known expressions to calculate the moments of the first passag...
read it
-
Semantic query-by-example speech search using visual grounding
A number of recent studies have started to investigate how speech system...
read it
-
Nets and Reverse Mathematics, a pilot study
Nets are generalisations of sequences involving possibly uncountable ind...
read it
-
A Bayesian approach for the analysis of error rate studies in forensic science
Over the past decade, the field of forensic science has received recomme...
read it
-
Extending de Bruijn sequences to larger alphabets
A circular de Bruijn sequence of order n in an alphabet of k symbols is ...
read it
-
Seeker based Adaptive Guidance via Reinforcement Meta-Learning Applied to Asteroid Close Proximity Operations
Current practice for asteroid close proximity maneuvers requires extreme...
read it
-
Lifting recursive counterexamples to higher-order arithmetic
In classical computability theory, a recursive counterexample to a theor...
read it
-
Lifting countable to uncountable mathematics
Ordinary, i.e.non-set theoretic mathematics is generally formalised in s...
read it
-
Defence Against the Modern Arts: the Curse of Statistics "Score-based likelihood ratios"
For several decades, legal and scientific scholars have argued that conc...
read it
-
Six Degree-of-Freedom Hovering using LIDAR Altimetry via Reinforcement Meta-Learning
We optimize a six degrees of freedom hovering policy using reinforcement...
read it
-
JANOS: An Integrated Predictive and Prescriptive Modeling Framework
Business research practice is witnessing a surge in the integration of p...
read it
-
Detecting and Characterizing Bots that Commit Code
Background: Some developer activity traditionally performed manually, su...
read it
-
A Dataset and an Approach for Identity Resolution of 38 Million Author IDs extracted from 2B Git Commits
The data collected from open source projects provide means to model larg...
read it
-
Reinforcement Meta-Learning for Interception of Maneuvering Exoatmospheric Targets with Parasitic Attitude Loop
We use Reinforcement Meta-Learning to optimize an adaptive integrated gu...
read it
-
Line Artefact Quantification in Lung Ultrasound Images of COVID-19 Patients via Non-Convex Regularisation
In this paper, we present a novel method for line artefacts quantificati...
read it
-
User Attention and Behaviour in Virtual Reality Art Encounter
With the proliferation of consumer virtual reality (VR) headsets and cre...
read it
-
Sequential Fundraising and Social Insurance
Seed fundraising for ventures often takes place by sequentially approach...
read it
-
Wide-scale assessment of cultural ecosystem services in coastal areas using graph theory on social media data
Cultural Ecosystem Services (CES) assessment at large scales is crucial ...
read it