
-
Rethinking Assumptions in Deep Anomaly Detection
Though anomaly detection (AD) can be viewed as a classification problem ...
read it
-
Deep Semi-Supervised Anomaly Detection
Deep approaches to anomaly detection have recently shown promising resul...
read it
-
Linkage between Piecewise Constant Mumford-Shah model and ROF model and its virtue in image segmentation
The piecewise constant Mumford-Shah (PCMS) model and the Rudin-Osher-Fat...
read it
-
FINN-L: Library Extensions and Design Trade-off Analysis for Variable Precision LSTM Networks on FPGAs
It is well known that many types of artificial neural networks, includin...
read it
-
Copula & Marginal Flows: Disentangling the Marginal from its Joint
Deep generative networks such as GANs and normalizing flows flourish in ...
read it
-
Survey of reasoning using Neural networks
Reason and inference require process as well as memory skills by humans....
read it
-
TensorQuant - A Simulation Toolbox for Deep Neural Network Quantization
Recent research implies that training and inference of deep neural netwo...
read it
-
Symbol Grounding Association in Multimodal Sequences with Missing Elements
In this paper, we extend a symbolic association framework for being able...
read it
-
Most central or least central? How much modeling decisions influence a node's centrality ranking in multiplex networks
To understand a node's centrality in a multiplex network, its centrality...
read it
-
Relating Strong Spatial Cognition to Symbolic Problem Solving --- An Example
In this note, we discuss and analyse a shortest path finding approach us...
read it
-
Active Canny: Edge Detection and Recovery with Open Active Contour Models
We introduce an edge detection and recovery framework based on open acti...
read it
-
Variational Image Segmentation Model Coupled with Image Restoration Achievements
Image segmentation and image restoration are two important topics in ima...
read it
-
Nemo/Hecke: Computer Algebra and Number Theory Packages for the Julia Programming Language
We introduce two new packages, Nemo and Hecke, written in the Julia prog...
read it
-
Modular Techniques For Noncommutative Gröbner Bases
In this note, we extend modular techniques for computing Gröbner bases f...
read it
-
On Using Network Science in Mining Developers Collaboration in Software Engineering: A Systematic Literature Review
The goal of this study is to identify, review, and analyze the published...
read it
-
An introduction to approximate computing
Approximate computing is a research area where we investigate a wide spe...
read it
-
Space-Efficient Algorithms for Longest Increasing Subsequence
Given a sequence of integers, we want to find a longest increasing subse...
read it
-
Learning Interesting Categorical Attributes for Refined Data Exploration
This work proposes and evaluates a novel approach to determine interesti...
read it
-
Bad Primes in Computational Algebraic Geometry
Computations over the rational numbers often suffer from intermediate co...
read it
-
On the computation of the HNF of a module over the ring of integers of a number field
We present a variation of the modular algorithm for computing the Hermit...
read it
-
Computing in quotients of rings of integers
We develop algorithms to turn quotients of rings of rings of integers in...
read it
-
E3Solver: decision tree unification by enumeration
We introduce E3Solver, a unification-based solver for programming-by-exa...
read it
-
Reliable Distributed Authentication in Multi-Access Mobile Edge Computing
The fifth generation (5G) mobile telecommunication network is expected t...
read it
-
Physical Layer Authentication for Mission Critical Machine Type Communication using Gaussian Mixture Model based Clustering
The application of Mission Critical Machine Type Communication (MC-MTC) ...
read it
-
Application of Machine Learning for Channel based Message Authentication in Mission Critical Machine Type Communication
The design of robust wireless communication systems for industrial appli...
read it
-
Providing Physical Layer Security for Mission Critical Machine Type Communication
The design of wireless systems for Mission Critical Machine Type Communi...
read it
-
Munchausen Iteration
We present a method for solving polynomial equations over idempotent ome...
read it
-
Device-centric Energy Optimization for Edge Cloud Offloading
A wireless system is considered, where, computationally complex algorith...
read it
-
ACGreGate: A Framework for Practical Access Control for Applications using Weakly Consistent Databases
Scalable and highly available systems often require data stores that off...
read it
-
Efficient Gaussian Process Classification Using Polya-Gamma Data Augmentation
We propose an efficient stochastic variational approach to GP classifica...
read it
-
Algorithmic Differentiation for Domain Specific Languages
Algorithmic Differentiation (AD) can be used to automate the generation ...
read it
-
An improved isomorphism test for bounded-tree-width graphs
We give a new fpt algorithm testing isomorphism of n-vertex graphs of tr...
read it
-
Recognizing Challenging Handwritten Annotations with Fully Convolutional Networks
This paper introduces a very challenging dataset of historic German docu...
read it
-
Approximating multiobjective combinatorial optimization problems with the OWA criterion
The paper deals with a multiobjective combinatorial optimization problem...
read it
-
Demystifying Deception Technology:A Survey
Deception boosts security for systems and components by denial, deceit, ...
read it
-
Wireless Communication for Modular Production Facilities
The growing demand for individualized products leads to need for a more ...
read it
-
5G Island for Network Resilience and Autonomous Failsafe Operations
The resilience of 5G networks can be strongly challenged by central clou...
read it
-
Bayesian Convolutional Neural Networks
We propose a Bayesian convolutional neural network built upon Bayes by B...
read it
-
Implementation of a Near-Optimal Complex Root Clustering Algorithm
We describe Ccluster, a software for computing natural ϵ-clusters of com...
read it
-
The Structure of Service Level Agreement of Slice-based 5G Network
Network slicing is considered to be one of the key enablers to Fifth Gen...
read it
-
Security Solutions for Local Wireless Networks in Control Applications based on Physical Layer Security
The Design of new wireless communication systems for industrial applicat...
read it
-
How do Convolutional Neural Networks Learn Design?
In this paper, we aim to understand the design principles in book cover ...
read it
-
Analysis of Dynamic Memory Bandwidth Regulation in Multi-core Real-Time Systems
One of the primary sources of unpredictability in modern multi-core embe...
read it
-
Rational Impatience Strategy of 5G Network Tenants in Queue-Based Slice Admission Control: Shall I Wait Further for My Network Slice?
The fifth generation (5G) technologies enable an emerge type of public c...
read it
-
A 5G Architecture for The Factory of the Future
Factory automation and production are currently undergoing massive chang...
read it
-
Rational Impatience Admission Control in 5G-sliced Networks: Shall I Bide my Slice Opportunity?
Recently, the specifications of the fifth generation (5G) of mobile netw...
read it
-
Advanced Memory Buoyancy for Forgetful Information Systems
Knowledge workers face an ever increasing flood of information in their ...
read it
-
Inflection-Tolerant Ontology-Based Named Entity Recognition for Real-Time Applications
A growing number of applications users daily interact with have to opera...
read it
-
How practical is it? Machine Learning for Identifying Conceptual Interoperability Constraints in API Documents
Building meaningful interoperation with external software units requires...
read it
-
Layer-Parallel Training of Deep Residual Neural Networks
Residual neural networks (ResNets) are a promising class of deep neural ...
read it