
-
Augmented Replay Memory in Reinforcement Learning With Continuous Control
Online reinforcement learning agents are currently able to process an in...
read it
-
Attention Mechanisms for Object Recognition with Event-Based Cameras
Event-based cameras are neuromorphic sensors capable of efficiently enco...
read it
-
On the bias of H-scores for comparing biclusters, and how to correct it
In the last two decades several biclustering methods have been developed...
read it
-
Deep Learning for Time Series Forecasting: The Electric Load Case
Management and efficient operations in critical infrastructure such as S...
read it
-
Are We Really Making Much Progress? A Worrying Analysis of Recent Neural Recommendation Approaches
Deep learning techniques have become the method of choice for researcher...
read it
-
Dense 3D Visual Mapping via Semantic Simplification
Dense 3D visual mapping estimates as many as possible pixel depths, for ...
read it
-
Scenario optimization with relaxation: a new tool for design and application to machine learning problems
Scenario optimization is by now a well established technique to perform ...
read it
-
Cost-Sensitive Approach to Batch Size Adaptation for Gradient Descent
In this paper, we propose a novel approach to automatically determine th...
read it
-
Computational Results for Extensive-Form Adversarial Team Games
We provide, to the best of our knowledge, the first computational study ...
read it
-
Methods for finding leader--follower equilibria with multiple followers
The concept of leader--follower (or Stackelberg) equilibrium plays a cen...
read it
-
Viral Search algorithm
The article, after a brief introduction on genetic algorithms and their ...
read it
-
A guide to convolution arithmetic for deep learning
We introduce a guide to help deep learning practitioners understand and ...
read it
-
Determination of the edge of criticality in echo state networks through Fisher information maximization
It is a widely accepted fact that the computational capability of recurr...
read it
-
Concept Drift and Anomaly Detection in Graph Streams
Graph representations offer powerful and intuitive ways to describe data...
read it
-
A Solution for Crime Scene Reconstruction using Time-of-Flight Cameras
In this work, we propose a method for three-dimensional (3D) reconstruct...
read it
-
Team-maxmin equilibrium: efficiency bounds and algorithms
The Team-maxmin equilibrium prescribes the optimal strategies for a team...
read it
-
Convergence of the Forward-Backward Algorithm: Beyond the Worst Case with the Help of Geometry
We provide a comprehensive study of the convergence of forward-backward ...
read it
-
Multi-resource defensive strategies for patrolling games with alarm systems
Security Games employ game theoretical tools to derive resource allocati...
read it
-
Unimodal Thompson Sampling for Graph-Structured Arms
We study, to the best of our knowledge, the first Bayesian algorithm for...
read it
-
Multi-objective Reinforcement Learning with Continuous Pareto Frontier Approximation Supplementary Material
This document contains supplementary material for the paper "Multi-objec...
read it
-
Robust Moving Objects Detection in Lidar Data Exploiting Visual Cues
Detecting moving objects in dynamic scenes from sequences of lidar scans...
read it
-
Reduced Memory Region Based Deep Convolutional Neural Network Detection
Accurate pedestrian detection has a primary role in automotive safety: f...
read it
-
Simulated Car Racing Championship: Competition Software Manual
This manual describes the competition software for the Simulated Car Rac...
read it
-
Automatic 3D Reconstruction of Manifold Meshes via Delaunay Triangulation and Mesh Sweeping
In this paper we propose a new approach to incrementally initialize a ma...
read it
-
Incremental Reconstruction of Urban Environments by Edge-Points Delaunay Triangulation
Urban reconstruction from a video captured by a surveying vehicle consti...
read it
-
One-class classifiers based on entropic spanning graphs
One-class classifiers offer valuable tools to assess the presence of out...
read it
-
First Steps Toward Camera Model Identification with Convolutional Neural Networks
Detecting the camera model used to shoot a picture enables to solve a wi...
read it
-
Deep convolutional neural networks for pedestrian detection
Pedestrian detection is a popular research topic due to its paramount im...
read it
-
Transfer from Multiple MDPs
Transfer reinforcement learning (RL) methods leverage on the experience ...
read it
-
Efficient moving point handling for incremental 3D manifold reconstruction
As incremental Structure from Motion algorithms become effective, a good...
read it
-
Semi-Supervised Information-Maximization Clustering
Semi-supervised clustering aims to introduce prior knowledge in the deci...
read it
-
Learning Sets with Separating Kernels
We consider the problem of learning a set from random samples. We show h...
read it
-
V-cycle multigrid algorithms for discontinuous Galerkin methods on non-nested polytopic meshes
In this paper we analyse the convergence properties of V-cycle multigrid...
read it
-
Sum-Rate Analysis for High Altitude Platform (HAP) Drones with Tethered Balloon Relay
High altitude platform (HAP) drones can provide broadband wireless conne...
read it
-
Current Challenges and Visions in Music Recommender Systems Research
Music recommender systems (MRS) have experienced a boom in recent years,...
read it
-
A fully semi-Lagrangian discretization for the 2D Navier--Stokes equations in the vorticity--streamfunction formulation
A numerical method for the two-dimensional, incompressible Navier--Stoke...
read it
-
On the "persistency" of scientific publications: introducing an h-index for journals
What do we really mean by a "good" scientific journal? Do we care more a...
read it
-
Using Mise-En-Scène Visual Features based on MPEG-7 and Deep Learning for Movie Recommendation
Item features play an important role in movie recommender systems, where...
read it
-
Quality Control in Crowdsourcing: A Survey of Quality Attributes, Assessment Techniques and Assurance Actions
Crowdsourcing enables one to leverage on the intelligence and wisdom of ...
read it
-
Real-time CPU-based large-scale 3D mesh reconstruction
In Robotics, especially in this era of autonomous driving, mapping is on...
read it
-
Virtual-Mobile-Core Placement for Metro Network
Traditional highly-centralized mobile core networks (e.g., Evolved Packe...
read it
-
A Next-Best-Smell Approach for Remote Gas Detection with a Mobile Robot
The problem of gas detection is relevant to many real-world applications...
read it
-
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes
This work presents a new code-based key encapsulation mechanism (KEM) ca...
read it
-
High order time integrators for the simulation of charged particle motion in magnetic quadrupoles
Magnetic quadrupoles are essential components of particle accelerators l...
read it
-
Sequence-Aware Recommender Systems
Recommender systems are one of the most successful applications of data ...
read it
-
Limiting gaming opportunities on incentive-based demand response programs
Demand Response (DR) is a program designed to match supply and demand by...
read it
-
Discovering Bayesian Market Views for Intelligent Asset Allocation
Along with the advance of opinion mining techniques, public mood has bee...
read it
-
A Survey on Application of Machine Learning Techniques in Optical Networks
Today, the amount of data that can be retrieved from communications netw...
read it
-
On the Computation of Kantorovich-Wasserstein Distances between 2D-Histograms by Uncapacitated Minimum Cost Flows
In this work, we present a method to compute the Kantorovich distance, t...
read it
-
Analysis and development of a novel algorithm for the in-vehicle hand-usage of a smartphone
Smartphone usage while driving is unanimously considered to be a really ...
read it