
-
Visualizing Deep Similarity Networks
For convolutional neural network models that optimize an image embedding...
read it
-
COVID-19 CT Image Synthesis with a Conditional Generative Adversarial Network
Coronavirus disease 2019 (COVID-19) is an ongoing global pandemic that h...
read it
-
Learning Geo-Temporal Image Features
We propose to implicitly learn to extract geo-temporal image features, w...
read it
-
Detecting Emergent Intersectional Biases: Contextualized Word Embeddings Contain a Distribution of Human-like Biases
With the starting point that implicit human biases are reflected in the ...
read it
-
Dim the Lights! – Low-Rank Prior Temporal Data for Specular-Free Video Recovery
The appearance of an object is significantly affected by the illuminatio...
read it
-
Prudence When Assuming Normality: an advice for machine learning practitioners
In a binary classification problem the feature vector (predictor) is the...
read it
-
Meaningful Models: Utilizing Conceptual Structure to Improve Machine Learning Interpretability
The last decade has seen huge progress in the development of advanced ma...
read it
-
An Experiment with Hierarchical Bayesian Record Linkage
In record linkage (RL), or exact file matching, the goal is to identify ...
read it
-
Linear Time Recognition Algorithms for Topological Invariants in 3D
In this paper, we design linear time algorithms to recognize and determi...
read it
-
D3NOC: Dynamic Data-Driven Network On Chip in Photonic Electronic Hybrids
In this paper, we present a reconfigurable hybrid Photonic-Plasmonic Net...
read it
-
On partitions into squares of distinct integers whose reciprocals sum to 1
In 1963, Graham proved that all integers greater than 77 (but not 77 its...
read it
-
Chronos: A Unifying Optimization Framework for Speculative Execution of Deadline-critical MapReduce Jobs
Meeting desired application deadlines in cloud processing systems such a...
read it
-
Evaluation of Unsupervised Compositional Representations
We evaluated various compositional models, from bag-of-words representat...
read it
-
PCNNA: A Photonic Convolutional Neural Network Accelerator
Convolutional Neural Networks (CNN) have been the centerpiece of many ap...
read it
-
Statistical Inference of Covariate-Adjusted Randomized Experiments
Covariate-adjusted randomization procedure is frequently used in compara...
read it
-
Deep Randomized Ensembles for Metric Learning
Learning embedding functions, which map semantically related inputs to n...
read it
-
Annotation Scaffolds for Object Modeling and Manipulation
We present and evaluate an approach for human-in-the-loop specification ...
read it
-
End to End Video Segmentation for Driving : Lane Detection For Autonomous Car
Safety and decline of road traffic accidents remain important issues of ...
read it
-
Efficient, Dynamic Multi-tenant Edge Computation in EdgeOS
In the future, computing will be immersed in the world around us – from ...
read it
-
On the Benefits of Waiting in Status Update Systems
This paper explores the potential of waiting before packet transmission ...
read it
-
Relative Age of Information: A New Metric for Status Update Systems
In this paper, we introduce a new data freshness metric, relative Age of...
read it
-
A Reconfigurable High-Performance Optical Data Center Architecture
Optical data center network architectures are becoming attractive becaus...
read it
-
A Hierarchical WDM-based Scalable Data Center Network Architecture
Massive data centers are at the heart of the Internet. The rapid growth ...
read it
-
Quantum Terrorism: Collective Vulnerability of Global Quantum Systems
The major imminent investments in quantum technologies will bring concep...
read it
-
Hotels-50K: A Global Hotel Recognition Dataset
Recognizing a hotel from an image of a hotel room is important for human...
read it
-
Improved Embeddings with Easy Positive Triplet Mining
Deep metric learning seeks to define an embedding where semantically sim...
read it
-
Reproducible Workflow on a Public Cloud for Computational Fluid Dynamics
In a new effort to make our research transparent and reproducible by oth...
read it
-
SvTPM: A Secure and Efficient vTPM in the Cloud
Virtual Trusted Platform Modules (vTPMs) have been widely used in commer...
read it
-
Trading Off Computation with Transmission in Status Update Systems
This paper is motivated by emerging edge computing applications in which...
read it
-
AUC: Nonparametric Estimators and Their Smoothness
Nonparametric estimation of a statistic, in general, and of the error ra...
read it
-
A Leisurely Look at Versions and Variants of the Cross Validation Estimator
Many versions of cross-validation (CV) exist in the literature; and each...
read it
-
Efficient Sentence Embedding using Discrete Cosine Transform
Vector averaging remains one of the most popular sentence embedding meth...
read it
-
Visualizing How Embeddings Generalize
Deep metric learning is often used to learn an embedding function that c...
read it
-
SoK: Blockchain Technology and Its Potential Use Cases
Bitcoin's success has led to significant interest in its underlying comp...
read it
-
Overview for the Second Shared Task on Language Identification in Code-Switched Data
We present an overview of the second shared task on language identificat...
read it
-
WASA: A Web Application for Sequence Annotation
Data annotation is an important and necessary task for all NLP applicati...
read it
-
Part of speech tagging for code switched data
We address the problem of Part of Speech tagging (POS) in the context of...
read it
-
Identifying Nuances in Fake News vs. Satire: Using Semantic and Linguistic Cues
The blurry line between nefarious fake news and protected-speech satire ...
read it
-
TraffickCam: Explainable Image Matching For Sex Trafficking Investigations
Investigations of sex trafficking sometimes have access to photographs o...
read it
-
Orienting Ordered Scaffolds: Complexity and Algorithms
Despite the recent progress in genome sequencing and assembly, many of t...
read it
-
Hopping-Proof and Fee-Free Pooled Mining in Blockchain
The pool-hopping attack casts down the expected profits of both the mini...
read it
-
Engineers Code: reusable open learning modules for engineering computations
Undergraduate programs in science and engineering include at least one c...
read it
-
Timely Status Updating through Intermittent Sensing and Transmission
We consider a novel intermittent status updating model where an energy h...
read it
-
Egoistic Incentives Based on Zero-Determinant Alliances for Large-Scale Systems
Social dilemmas exist in various fields and give rise to the so-called f...
read it
-
A Distributionally Robust Area Under Curve Maximization Model
Area under ROC curve (AUC) is a widely used performance measure for clas...
read it
-
A Bilinear Partially Penalized Immersed Finite Element Method for Elliptic Interface Problems with Multi-Domains and Triple-Junction Points
In this article, we introduce a new partially penalized immersed finite ...
read it
-
Diversity, Density, and Homogeneity: Quantitative Characteristic Metrics for Text Collections
Summarizing data samples by quantitative measures has a long history, wi...
read it
-
On Age and Value of Information in Status Update Systems
Motivated by the inherent value of packets arising in many cyber-physica...
read it
-
Building a Shared Resource HPC Center Across University Schools and Institutes: A Case Study
Over the past several years, The George Washington University has recrui...
read it
-
Learning to Classify Intents and Slot Labels Given a Handful of Examples
Intent classification (IC) and slot filling (SF) are core components in ...
read it