
Four Things Everyone Should Know to Improve Batch Normalization
A key component of most neural network architectures is the use of norma...
read it

Improved Adversarial Robustness via Logit Regularization Methods
While great progress has been made at making neural networks effective a...
read it

Network, Popularity and Social Cohesion: A GameTheoretic Approach
In studies of social dynamics, cohesion refers to a group's tendency to ...
read it

Trainable backpropagated functional transfer matrices
Connections between nodes of fully connected neural networks are usually...
read it

Ceteris paribus logic in counterfactual reasoning
The semantics for counterfactuals due to David Lewis has been challenged...
read it

A RefinementBased Architecture for Knowledge Representation and Reasoning in Robotics
This paper describes an architecture that combines the complementary str...
read it

Mixed Logical and Probabilistic Reasoning for Planning and Explanation Generation in Robotics
Robots assisting humans in complex domains have to represent knowledge a...
read it

Speeding up SOR Solvers for Constraintbased GUIs with a WarmStart Strategy
Many computer programs have graphical user interfaces (GUIs), which need...
read it

Texture Modelling with Nested Highorder MarkovGibbs Random Fields
Currently, MarkovGibbs random field (MGRF) image models which include h...
read it

Look Who's Talking: Bipartite Networks as Representations of a Topic Model of New Zealand Parliamentary Speeches
Quantitative methods to measure the participation to parliamentary debat...
read it

Infinite and Biinfinite Words with Decidable Monadic Theories
We study word structures of the form (D,<,P) where D is either N or Z, <...
read it

Attaching leaves and picking cherries to characterise the hybridisation number for a set of phylogenies
Throughout the last decade, we have seen much progress towards character...
read it

On the existence of a cherrypicking sequence
Recently, the minimum number of reticulation events that is required to ...
read it

Deciding the existence of a cherrypicking sequence is hard on two trees
Here we show that deciding whether two rooted binary phylogenetic trees ...
read it

Closure of resourcebounded randomness notions under polynomial time permutations
An infinite bit sequence is called recursively random if no computable s...
read it

Cognitive Hierarchy and Voting Manipulation
By the GibbardSatterthwaite theorem, every reasonable voting rule for ...
read it

Bayesian nonparametric spectral density estimation using Bspline priors
We present a new Bayesian nonparametric approach to estimating the spect...
read it

Computing Entropies With Nested Sampling
The Shannon entropy, and related quantities such as mutual information, ...
read it

Estimation of the Robin coefficient field in a Poisson problem with uncertain conductivity field
We consider the reconstruction of a heterogeneous coefficient field in a...
read it

Is profile likelihood a true likelihood? An argument in favor
Profile likelihood is the key tool for dealing with nuisance parameters ...
read it

A machine learning approach to reconstruction of heart surface potentials from body surface potentials
Invasive cardiac catheterisation is a common procedure that is carried o...
read it

Committee Scoring Rules: Axiomatic Characterization and Hierarchy
Committee scoring voting rules are multiwinner analogues of positional s...
read it

Probabilistic team semantics
Team semantics is a semantical framework for the study of dependence and...
read it

From the Periphery to the Center: Information Brokerage in an Evolving Network
Interpersonal ties are pivotal to individual efficacy, status and perfor...
read it

AuthStore: Passwordbased Authentication and Encrypted Data Storage in Untrusted Environments
Passwords are widely used for client to server authentication as well as...
read it

A Computational Framework for Modelling and Analyzing Ice Storms
Ice storms are extreme weather events that can have devastating implicat...
read it

On the Subnet Prune and Regraft Distance
Phylogenetic networks are rooted directed acyclic graphs that represent ...
read it

Improved MixedExample Data Augmentation
In order to reduce overfitting, neural networks are typically trained wi...
read it

FPGAbased Acceleration of FT Convolution for Pulsar Search Using OpenCL
The Square Kilometre Array (SKA) project will be the world largest radio...
read it

An Overview of Perception Methods for Horticultural Robots: From Pollination to Harvest
Horticultural enterprises are becoming more sophisticated as the range o...
read it

Probability Calibration Trees
Obtaining accurate and well calibrated probability estimates from classi...
read it

Adaptive Approximation Error Models for Efficient Uncertainty Quantification with Application to Multiphase Subsurface Fluid Flow
Samplebased Bayesian inference provides a route to uncertainty quantifi...
read it

Incorporating Posterior Model Discrepancy into a Hierarchical Framework to Facilitate OutoftheBox MCMC Sampling for Geothermal Inverse Problems and Uncertainty Quantificatio
We consider geothermal inverse problems and uncertainty quantification f...
read it

Finding Answers from the Word of God: Domain Adaptation for Neural Networks in Biblical Question Answering
Question answering (QA) has significantly benefitted from deep learning ...
read it

A tight kernel for computing the tree bisection and reconnection distance between two phylogenetic trees
In 2001 Allen and Steel showed that, if subtree and chain reduction rule...
read it

Bayesian Nonparametric Analysis of Multivariate Time Series: A Matrix Gamma Process Approach
While there is an increasing amount of literature about Bayesian time se...
read it

Target Driven Visual Navigation with Hybrid Asynchronous Universal Successor Representations
Being able to navigate to a target with minimal supervision and prior kn...
read it

Information Extraction Framework to Build Legislation Network
This paper concerns an Information Extraction process for building a dyn...
read it

Quantum Equivalence of the DLP and CDHP for Group Actions
In this short note we give a polynomialtime quantum reduction from the ...
read it

Modelling Career Trajectories of Cricket Players Using Gaussian Processes
In the sport of cricket, variations in a player's batting ability can us...
read it

Source Camera Attribution of MultiFormat Devices
Photo Response NonUniformity (PRNU) based source camera attribution is ...
read it

What can be estimated? Identifiability, estimability, causal inference and illposed inverse problems
Here we consider, in the context of causal inference, the general questi...
read it

Spectral density estimation using Pspline priors
This article proposes a Bayesian approach to estimating the spectral den...
read it

New reduction rules for the tree bisection and reconnection distance
Recently it was shown that, if the subtree and chain reduction rules hav...
read it

Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection
Advanced attack campaigns span across multiple stages and stay stealthy ...
read it

Recurring Concept Metalearning for Evolving Data Streams
When concept drift is detected during classification in a data stream, a...
read it

Edge User Allocation with Dynamic Quality of Service
In edge computing, edge servers are placed in close proximity to enduse...
read it

Large Scale Geometries of Infinite Strings
We introduce geometric consideration into the theory of formal languages...
read it

Revisiting Wedge Sampling for Budgeted Maximum Inner Product Search
Topk maximum inner product search (MIPS) is a central task in many mach...
read it

Finding your feet: a Gaussian process model for estimating the abilities of batsmen in Test cricket
In the sport of cricket, player batting ability is traditionally measure...
read it
The University of Auckland
The University of Auckland is the largest university in New Zealand, located in the country's largest city, Auckland.