
Unsupervised Medical Image Segmentation with Adversarial Networks: From Edge Diagrams to Segmentation Maps
We develop and approach to unsupervised semantic medical image segmentat...
read it

Adaptive Loss Function for Super Resolution Neural Networks Using Convex Optimization Techniques
Single Image SuperResolution (SISR) task refers to learn a mapping from...
read it

Lossless Compression of Mosaic Images with Convolutional Neural Network Prediction
We present a CNNbased predictive lossless compression scheme for raw co...
read it

GridDehazeNet: AttentionBased MultiScale Network for Image Dehazing
We propose an endtoend trainable Convolutional Neural Network (CNN), n...
read it

Filter Bank Regularization of Convolutional Neural Networks
Regularization techniques are widely used to improve the generality, rob...
read it

The MathScheme Library: Some Preliminary Experiments
We present some of the experiments we have performed to best test our de...
read it

OCRAPOSE II: An OCRbased indoor positioning system using mobile phone images
In this paper, we propose an OCR (optical character recognition)based l...
read it

Ontological Multidimensional Data Models and Contextual Data Qality
Data quality assessment and data cleaning are contextdependent activiti...
read it

Fast Screening Algorithm for Rotation and Scale Invariant Template Matching
This paper presents a generic preprocessor for expediting conventional ...
read it

An Approximation Approach for Solving the Subpath Planning Problem
The subpath planning problem is a branch of the path planning problem, w...
read it

A Mixture of Generalized Hyperbolic Factor Analyzers
Modelbased clustering imposes a finite mixture modelling structure on d...
read it

Clustering, Classification, Discriminant Analysis, and Dimension Reduction via Generalized Hyperbolic Mixtures
A method for dimension reduction with clustering, classification, or dis...
read it

Mixture Model Averaging for Clustering
In mixture modelbased clustering applications, it is common to fit seve...
read it

More properties of the Fibonacci word on an infinite alphabet
Recently the Fibonacci word W on an infinite alphabet was introduced by ...
read it

Lyndon Array Construction during BurrowsWheeler Inversion
In this paper we present an algorithm to compute the Lyndon array of a s...
read it

Analysis and Code Design for the Binary CEO Problem under Logarithmic Loss
In this paper, we propose an efficient coding scheme for the binary Chie...
read it

Binary CEO Problem under LogLoss with BSC TestChannel Model
In this paper, we propose an efficient coding scheme for the twolink bi...
read it

Single Image Reflection Removal Using Deep EncoderDecoder Network
Image of a scene captured through a piece of transparent and reflective ...
read it

Statistical Software for Psychology: Comparing Development Practices Between CRAN and Other Communities
Different communities rely heavily on software, but use quite different ...
read it

Demoiréing of CameraCaptured Screen Images Using Deep Convolutional Neural Network
Taking photos of optoelectronic displays is a direct and spontaneous way...
read it

Bayesian nonparametric analysis of Kingman's coalescent
Kingman's coalescent is one of the most popular models in population gen...
read it

Formal Verification of Platoon Control Strategies
Recent developments in autonomous driving, vehicletovehicle communicat...
read it

Using Elm to Introduce Algebraic Thinking to K8 Students
In recent years, there has been increasing interest in developing a Comp...
read it

Palindromes in starlike trees
In this note, we obtain an upper bound on the maximum number of distinct...
read it

Stackelberg Game Approaches for Antijamming Defence in Wireless Networks
This article investigates the antijamming communications problem in wir...
read it

A New Style of Mathematical Proof
Mathematical proofs will play a crucial role in building a universal dig...
read it

Decentralized MultiUAV Routing in the Presence of Disturbances
We introduce a decentralized and online path planning technique for a ne...
read it

Contextaware Group Buying in Ultradense Small Cell Networks: Unity is Strength
The ultradense small cell networks (SCNs) have been regarded as a promi...
read it

The Complexity of Leader Election: A Chasm at Diameter Two
This paper focuses on studying the message complexity of implicit leader...
read it

Logographic Subword Model for Neural Machine Translation
A novel logographic subword model is proposed to reinterpret logograms a...
read it

On the Hardness of the Strongly Dependent Decision Problem
We present necessary and sufficient conditions for solving the strongly ...
read it

Latticebased Robust Distributed Source Coding
In this paper, we propose a latticebased robust distributed source codi...
read it

Generic ModelAgnostic Convolutional Neural Network for Single Image Dehazing
Haze and smog are among the most common environmental factors impacting ...
read it

FaultTolerant Consensus with an Abstract MAC Layer
In this paper, we study faulttolerant distributed consensus in wireless...
read it

Refining Santa: An Exercise in Efficient Synchronization
The Santa Claus Problem is an intricate exercise for concurrent programm...
read it

Deep Learning with Inaccurate Training Data for Image Restoration
In many applications of deep learning, particularly those in image resto...
read it

Optimal Estimation with Complete Subsets of Instruments
In this paper we propose a twostage least squares (2SLS) estimator whos...
read it

A Notebook Format for the Holistic Design of Embedded Systems (Tool Paper)
This paper proposes the use of notebooks for the design documentation an...
read it

Theory Presentation Combinators
To build a scalable library of mathematics, we need a method which takes...
read it

Successive WynerZiv Coding for the Binary CEO Problem under Logarithmic Loss
The Llink binary Chief Executive Officer (CEO) problem under logarithmi...
read it

Leader Election in WellConnected Graphs
In this paper, we look at the problem of randomized leader election in s...
read it

Average SEPOptimal Precoding for Correlated Massive MIMO with ZF Detection: An Asymptotic Analysis
This paper investigates the symbol error probability (SEP) of pointtop...
read it

Deciding the existence of minority terms
This paper investigates the computational complexity of deciding if a gi...
read it

Latency, Capacity, and Distributed MST
Consider the problem of building a minimumweight spanning tree for a gi...
read it

Noncoherent Multiuser Massive SIMO for LowLatency Industrial IoT Communications
In this paper, we consider a multiuser massive singleinput multipleout...
read it

A Closed Form Approximation of Moments of New Generalization of Negative Binomial Distribution
In this paper, we propose a closed form approximation to the mean and va...
read it

The Optimal Power Control Policy for an Energy Harvesting System with LookAhead: Bernoulli Energy Arrivals
We study power control for an energy harvesting communication system wit...
read it

Mixed Strategy Game Model Against Data Poisoning Attacks
In this paper we use game theory to model poisoning attack scenarios. We...
read it

Debunking the Myth that Upfront Requirements are Infeasible for Scientific Computing Software
Many in the Scientific Computing Software community believe that upfront...
read it

Fuzzy CMeans Clustering and Sonification of HRV Features
Linear and nonlinear measures of heart rate variability (HRV) are widel...
read it
McMaster University
The Campus Store is a onestop shop for Students, Staff, and Faculty with a selection of McMaster crested merchandise, stationary, giftware, custom products, and computer products.