
-
Search Engine Similarity Analysis: A Combined Content and Rankings Approach
How different are search engines? The search engine wars are a favorite ...
read it
-
Learning with Wasserstein barycenters and applications
In this work, learning schemes for measure-valued data are proposed, i.e...
read it
-
Classifying Graphs as Images with Convolutional Neural Networks
The task of graph classification is currently dominated by graph kernels...
read it
-
Rejection-free Ensemble MCMC with applications to Factorial Hidden Markov Models
Bayesian inference for complex models is challenging due to the need to ...
read it
-
Bayesian Boolean Matrix Factorisation
Boolean matrix factorisation aims to decompose a binary data matrix into...
read it
-
One-vs-Each Approximation to Softmax for Scalable Estimation of Probabilities
The softmax representation of probabilities for categorical variables pl...
read it
-
Variational Inference for Uncertainty on the Inputs of Gaussian Process Models
The Gaussian process latent variable model (GP-LVM) provides a flexible ...
read it
-
Scalable inference for a full multivariate stochastic volatility model
We introduce a multivariate stochastic volatility model for asset return...
read it
-
Evaluation Measures for Hierarchical Classification: a unified view and novel approaches
Hierarchical classification addresses the problem of classifying items i...
read it
-
Inference for determinantal point processes without spectral knowledge
Determinantal point processes (DPPs) are point process models that natur...
read it
-
A Survey of Paraphrasing and Textual Entailment Methods
Paraphrasing methods recognize, generate, or extract phrases, sentences,...
read it
-
Quality Classifiers for Open Source Software Repositories
Open Source Software (OSS) often relies on large repositories, like Sour...
read it
-
Improved Abusive Comment Moderation with User Embeddings
Experimenting with a dataset of approximately 1.6M user comments from a ...
read it
-
Deep Learning for User Comment Moderation
Experimenting with a new dataset of 1.6M user comments from a Greek news...
read it
-
Analysis of Geographic/Delay-Tolerant Routing in Mobile Wireless Networks
A mobile wireless delay-tolerant network (DTN) model is proposed and ana...
read it
-
Social Event Scheduling
A major challenge for social event organizers (e.g., event planning comp...
read it
-
Bayesian analysis of predictive Non-Homogeneous hidden Markov models using Polya-Gamma data augmentation
We consider Non-Homogeneous Hidden Markov Models (NHHMMs) for forecastin...
read it
-
ICN enabling CoAP Extensions for IP based IoT devices
The Constrained Application Protocol (CoAP) and its extensions, such as ...
read it
-
MaskLink: Efficient Link Discovery for Spatial Relations via Masking Areas
In this paper, we study the problem of spatial link discovery (LD), focu...
read it
-
Code Review Comments: Language Matters
Recent research provides evidence that effective communication in collab...
read it
-
Upstream Demand Uncertainty in a Two-Echelon Supply Chain: Comparative Statics via Stochastic Orderings
We revisit the classic Cournot model and extend it to a two-echelon supp...
read it
-
The Greek Parliament of 2012: Coalition Formations & Power Indices in Context
The twin elections of 2012 in Greece had a manifest impact on the politi...
read it
-
The Greek Parliament of 2012: Coalitions, Incentives & Power Indices in Context
In this retrospective study, we revisit the twin Greek Parliamentary ele...
read it
-
Fully Scalable Gaussian Processes using Subspace Inducing Inputs
We introduce fully scalable Gaussian processes, an implementation scheme...
read it
-
Astraea: A Decentralized Blockchain Oracle
The public blockchain was originally conceived to process monetary trans...
read it
-
A Simple Network of Nodes Moving on the Circle
Two simple Markov processes are examined, one in discrete and one in con...
read it
-
Measuring Market Performance with Stochastic Demand: Price of Anarchy and Price of Uncertainty
Globally operating suppliers face the rising challenge of wholesale pric...
read it
-
Relative Age of Information: Maintaining Freshness while Considering the Most Recently Generated Information
A queueing system handling a sequence of message arrivals is considered ...
read it
-
Generating Texts with Integer Linear Programming
Concept-to-text generation typically employs a pipeline architecture, wh...
read it
-
Interacting with the Internet of Things using Smart Contracts and Blockchain Technologies
Despite technological advances, most smart objects in the Internet of Th...
read it
-
Smart contracts for the Internet of Things: opportunities and challenges
With the Internet of Things (IoT), Things are expected to live in differ...
read it
-
Declarative Data Analytics: a Survey
The area of declarative data analytics explores the application of the d...
read it
-
Does Unit-Tested Code Crash? A Case Study of Eclipse
Context: Software development projects increasingly adopt unit testing a...
read it
-
On the Feasibility of Transfer-learning Code Smells using Deep Learning
Context: A substantial amount of work has been done to detect smells in ...
read it
-
The distribution of age-of-information performance measures for message processing systems
The idea behind the recently introduced "age of information" performance...
read it
-
Semantic Source Code Models Using Identifier Embeddings
The emergence of online open source repositories in the recent years has...
read it
-
High-dimensional variable selection via low-dimensional adaptive learning
A stochastic search method, the so-called Adaptive Subspace (AdaSub) met...
read it
-
Interledger Smart Contracts for Decentralized Authorization to Constrained Things
We present models that utilize smart contracts and interledger mechanism...
read it
-
OAuth 2.0 meets Blockchain for Authorization in Constrained IoT Environments
We present models for utilizing blockchain and smart contract technology...
read it
-
A Survey on Biomedical Image Captioning
Image captioning applied to biomedical images can assist and accelerate ...
read it
-
Clustering Multivariate Data using Factor Analytic Bayesian Mixtures with an Unknown Number of Components
Recent work on overfitting Bayesian mixtures of distributions offers a p...
read it
-
Embedding Biomedical Ontologies by Jointly Encoding Network Structure and Textual Node Descriptors
Network Embedding (NE) methods, which map network nodes to low-dimension...
read it
-
Transfer Learning for Causal Sentence Detection
We consider the task of detecting sentences that express causality, as a...
read it
-
Secure IoT access at scale using blockchains and smart contracts
Blockchains and smart contracts are an emerging, promising technology, t...
read it
-
sql4ml A declarative end-to-end workflow for machine learning
We present sql4ml, a system for expressing supervised machine learning (...
read it
-
Revisiting the Graph Isomorphism Problem with Semidefinite Programming
We present a new algorithm for the graph isomorphism problem which solve...
read it
-
SumQE: a BERT-based Summary Quality Estimation Model
We propose SumQE, a novel Quality Estimation model for summarization bas...
read it
-
Bayesian Prediction of Volleyball Sets Using the Truncated Skellam and the Ordered Multinomial Models
In this work, we focus on building Bayesian models to analyze the outcom...
read it
-
Enabling Opportunistic Users in Multi-Tenant IoT Systems using Decentralized Identifiers and Permissioned Blockchains
In this work, we leverage advances in decentralized identifiers and perm...
read it
-
Exploiting Satellite Broadcast despite HTTPS
HTTPS enhances end-user privacy and is often preferred or enforced by ov...
read it