
Multilevel Knowledge Distillation
Knowledge distillation has become an important technique for model compr...
read it

Unsupervised Hierarchical Graph Representation Learning by Mutual Information Maximization
Graph representation learning based on graph neural networks (GNNs) can ...
read it

ClassOriented Poisoning Attack
Poisoning attacks on machine learning systems compromise the model perfo...
read it

AGATHA: Automatic Graphmining And Transformer based Hypothesis generation Approach
Medical research is risky and expensive. Drug discovery, as an example, ...
read it

CBAG: Conditional Biomedical Abstract Generation
Biomedical research papers use significantly different language and jarg...
read it

EnergyAware DNN Graph Optimization
Unlike existing work in deep neural network (DNN) graphs optimization fo...
read it

CrescendoNet: A Simple Deep Convolutional Neural Network with Ensemble Behavior
We introduce a new deep convolutional neural network, CrescendoNet, by s...
read it

Database of Parliamentary Speeches in Ireland, 19192013
We present a database of parliamentary debates that contains the complet...
read it

Engineering multilevel support vector machines
The computational complexity of solving nonlinear support vector machine...
read it

Scalable Dynamic Topic Modeling with Clustered Latent Dirichlet Allocation (CLDA)
Topic modeling, a method for extracting the underlying themes from a col...
read it

FoldingNet: Interpretable Unsupervised Learning on 3D Point Clouds
Recent deep networks that directly handle points in a point set, e.g., P...
read it

Neighbors Do Help: Deeply Exploiting Local Structures of Point Clouds
Unlike on images, semantic learning on 3D point clouds using a deep netw...
read it

Multilevel Weighted Support Vector Machine for Classification on Healthcare Data with Missing Values
This work is motivated by the needs of predictive analytics on healthcar...
read it

Fast Multilevel Support Vector Machines
Solving different types of optimization models (including parameters fit...
read it

Counting Roots of Polynomials Over Prime Power Rings
Suppose p is a prime, t is a positive integer, and f∈Z[x] is a univariat...
read it

RelaxationBased Coarsening for Multilevel Hypergraph Partitioning
Multilevel partitioning methods that are inspired by principles of multi...
read it

Bayesian Spatial Binary Regression for Label Fusion in Structural Neuroimaging
Most analyses of neuroimaging data involve studying one or more regions ...
read it

High Accuracy Mantle Convection Simulation through Modern Numerical Methods. II: Realistic Models and Problems
Computations have helped elucidate the dynamics of Earth's mantle for se...
read it

The Complexity of Subdivision for DiameterDistance Tests
We present a general framework for analyzing the complexity of subdivisi...
read it

Validation and Topicdriven Ranking for Biomedical Hypothesis Generation Systems
Literature underpins research, providing the foundation for new ideas. B...
read it

Multiscale Planar Graph Generation
The study of network representations of physical, biological, and social...
read it

Aggregative Coarsening for Multilevel Hypergraph Partitioning
Algorithms for many hypergraph problems, including partitioning, utilize...
read it

Evaluating How Developers Use GeneralPurpose WebSearch for Code Retrieval
Search is an integral part of a software development process. Developers...
read it

A Large Scale Spatiotemporal Binomial Regression Model for Estimating Seroprevalence Trends
This paper develops a largescale Bayesian spatiotemporal binomial regr...
read it

A proportional hazards model for intervalcensored subject to instantaneous failures
The proportional hazards (PH) model is arguably one of the most popular ...
read it

A proportional hazards model for intervalcensored data subject to instantaneous failures
The proportional hazards (PH) model is arguably one of the most popular ...
read it

CoCo: Compact and Optimized Consolidation of Modularized Service Function Chains in NFV
The modularization of Service Function Chains (SFCs) in Network Function...
read it

Are Abstracts Enough for Hypothesis Generation?
The potential for automatic hypothesis generation (HG) systems to improv...
read it

PAM: When Overloaded, Push Your Neighbor Aside!
Recently SmartNICs are widely used to accelerate service chains in NFV. ...
read it

Transfer Topic Labeling with DomainSpecific Knowledge Base: An Analysis of UK House of Commons Speeches 19352014
Topic models are among the most widely used methods in natural language ...
read it

Detecting Speech Act Types in Developer Question/Answer Conversations During Bug Repair
This paper targets the problem of speech act detection in conversations ...
read it

Spatiotemproal prediction of crimes using network analytic approach
It is quite evident that majority of the population lives in urban area ...
read it

A HumanComputer Interface Design for Quantitative Measure of Regret Theory
Regret theory is a theory that describes human decisionmaking under ris...
read it

Community Detection Across Emerging Quantum Architectures
One of the roadmap plans for quantum computers is an integration within ...
read it

HumanRobot Trust Integrated Task Allocation and Symbolic Motion planning for Heterogeneous Multirobot Systems
This paper presents a humanrobot trust integrated task allocation and m...
read it

Spatiotemporal prediction of crimes using network analytic approach
It is quite evident that majority of the population lives in urban area ...
read it

Efficient Marginalizationbased MCMC Methods for Hierarchical Bayesian Inverse Problems
Hierarchical models in Bayesian inverse problems are characterized by an...
read it

Computing discrete Morse complexes from simplicial complexes
We consider the problem of efficiently computing a discrete Morse comple...
read it

Automatic Face Aging in Videos via Deep Reinforcement Learning
This paper presents a novel approach for synthesizing automatically age...
read it

Change Point Models for Realtime V2I Cyber Attack Detection in a Connected Vehicle Environment
Connected vehicle (CV) systems are cognizant of potential cyber attacks ...
read it

The Impact of Quantity of Training Data on Recognition of Eating Gestures
This paper considers the problem of recognizing eating gestures by track...
read it

Service Rate Region of Content Access from Erasure Coded Storage
We consider storage systems in which K files are stored over N nodes. A ...
read it

Making Quantum Computing Open: Lessons from OpenSource Projects
Quantum computing (QC) is an emerging computing paradigm with potential ...
read it

PrivacyPreserving Average Consensus via State Decomposition
Average consensus underpins key functionalities of distributed systems r...
read it

A Review of Sensing and Communication, Human Factors, and Controller Aspects for InformationAware Connected and Automated Vehicles
Informationaware connected and automated vehicles (CAVs) have drawn gre...
read it

Rallying Adversarial Techniques against Deep Learning for Network Security
Recent advances in artificial intelligence and the increasing need for p...
read it

A Flexible, Parallel, Adaptive Geometric Multigrid method for FEM
We present data structures and implementation details of a geometric mul...
read it

Differential Privacy for EyeTracking Data
As large eyetracking datasets are created, data privacy is a pressing c...
read it

Remarks on the Rényi Entropy of a sum of IID random variables
In this note we study a conjecture of Madiman and Wang which predicted t...
read it

Behavior Identification and Prediction for a Probabilistic Risk Framework
Operation in a real world traffic requires autonomous vehicles to be abl...
read it
Clemson University
Clemson University is a vibrant, studentcentered community in South Carolina that thrives on leadership, collaboration, public service, relevant research and a winning spirit â in academics, athletics and life. A major science and technologyoriented research university, Clemson challenges students to excellence every day.