
Dimension of Reservoir Computers
A reservoir computer is a complex dynamical system, often created by cou...
read it

An Exact Reformulation of FeatureVectorbased RadialBasisFunction Networks for Graphbased Observations
Radialbasisfunction networks are traditionally defined for sets of vec...
read it

ExternalMemory Networks for LowShot Learning of Targets in ForwardLookingSonar Imagery
We propose a memorybased framework for realtime, dataefficient target...
read it

Radon cumulative distribution transform subspace modeling for image classification
We present a new supervised image classification method for problems whe...
read it

Generative adversarial interpolative autoencoding: adversarial training on latent space interpolations encourage convex latent distributions
We present a neural network architecture based upon the Autoencoder (AE)...
read it

Defending Tor from Network Adversaries: A Case Study of Network Path Prediction
The Tor anonymity network has been shown vulnerable to traffic analysis ...
read it

SuperConvergence: Very Fast Training of Residual Networks Using Large Learning Rates
In this paper, we show a phenomenon, which we named "superconvergence",...
read it

Exploring loss function topology with cyclical learning rates
We present observations and discussion of previously unreported phenomen...
read it

Deep Convolutional Neural Network Design Patterns
Recent research in the deep learning field has produced a plethora of ne...
read it

Gradual DropIn of Layers to Train Very Deep Neural Networks
We introduce the concept of dynamically growing a neural network during ...
read it

Cyclical Learning Rates for Training Neural Networks
It is known that the learning rate is the most important hyperparameter...
read it

Fast Stochastic Hierarchical Bayesian MAP for Tomographic Imaging
Any image recovery algorithm attempts to achieve the highest quality rec...
read it

Generative NeuroEvolution for Deep Learning
An important goal for the machine learning (ML) community is to create a...
read it

CostOptimal Algorithms for Planning with Procedural Control Knowledge
There is an impressive body of work on developing heuristics and other r...
read it

Graph clustering, variational image segmentation methods and Hough transform scale detection for object measurement in images
We consider the problem of scale detection in images where a region of i...
read it

Transforming Graph Representations for Statistical Relational Learning
Relational data representations have become an increasingly important to...
read it

Multiclass Diffuse Interface Models for SemiSupervised Learning on Graphs
We present a graphbased variational algorithm for multiclass classifica...
read it

Improving Image Clustering using Sparse Text and the Wisdom of the Crowds
We propose a method to improve image clustering using sparse text and th...
read it

How to find realworld applications for compressive sensing
The potential of compressive sensing (CS) has spurred great interest in ...
read it

How Better is Distributed SDN? An Analytical Approach
Distributed softwaredefined networks (SDN), consisting of multiple inte...
read it

Codes Correcting Two Deletions
In this work, we investigate the problem of constructing codes capable o...
read it

Web application for size and topology optimization of trusses and gusset plates
With its ever growing popularity, providing Internet based applications ...
read it

ModelBased Stochastic Search for Large Scale Optimization of MultiAgent UAV Swarms
Recent work from the reinforcement learning community has shown that Evo...
read it

A disciplined approach to neural network hyperparameters: Part 1  learning rate, batch size, momentum, and weight decay
Although deep learning has produced dazzling successes for applications ...
read it

Reconciling Similar Sets of Data
In this work, we consider the problem of synchronizing two sets of data ...
read it

A survey of advances in epistemic logic program solvers
Recent research in extensions of Answer Set Programming has included a r...
read it

Understanding Tor Usage with PrivacyPreserving Measurement
The Tor anonymity network is difficult to measure because, if not done c...
read it

SDFW: SDNbased Stateful Distributed Firewall
SDN provides a programmable command and control networking system in a m...
read it

Automatic Thresholding of SIFT Descriptors
We introduce a method to perform automatic thresholding of SIFT descript...
read it

Reduction of Markov Chains using a ValueofInformationBased Approach
In this paper, we propose an approach to obtain reducedorder models of ...
read it

Strand Spaces with Choice via a Process Algebra Semantics
Roles in cryptographic protocols do not always have a linear execution, ...
read it

Ship classification from overhead imagery using synthetic data and domain adaptation
In this paper, we revisit the problem of classifying ships (maritime ves...
read it

Image quality assessment for determining efficacy and limitations of SuperResolution Convolutional Neural Network (SRCNN)
Traditional metrics for evaluating the efficacy of image processing tech...
read it

Mutual Information and the Edge of Chaos in Reservoir Computers
A reservoir computer is a dynamical system that may be used to perform c...
read it

Distributed Streaming Analytics on Largescale Oceanographic Data using Apache Spark
Realworld data from diverse domains require realtime scalable analysis...
read it

RepeatFree Codes
In this paper we consider the problem of encoding data into repeatfree ...
read it

Optimizing the Transition Waste in Coded Elastic Computing
Distributed computing, in which a resourceintensive task is divided int...
read it

Penalized kmeans algorithms for finding the correct number of clusters in a dataset
In many applications we want to find the number of clusters in a dataset...
read it

A Survey of Game Theoretic Approaches for Adversarial Machine Learning in Cybersecurity Tasks
Machine learning techniques are currently used extensively for automatin...
read it

A HamiltonJacobi Formulation for Optimal Coordination of Heterogeneous Multiple Vehicle Systems
We present a method for optimal coordination of multiple vehicle teams w...
read it

Empirical Perspectives on OneShot Semisupervised Learning
One of the greatest obstacles in the adoption of deep neural networks fo...
read it

FlashFlow: A Secure Speed Test for Tor
The Tor network uses a measurement system to estimate its relays' forwar...
read it

Reachability as a Unifying Framework for Computing Helicopter Safe Operating Conditions and Autonomous Emergency Landing
We present a numeric method to compute the safe operating flight conditi...
read it

Consensus Driven Learning
As the complexity of our neural network models grow, so too do the data ...
read it

Optimal assignment of collaborating agents in multibody assetguarding games
We study a multibody assetguarding game in missile defense where teams...
read it

Building OneShot Semisupervised (BOSS) Learning up to Fully Supervised Performance
Reaching the performance of fully supervised learning with unlabeled dat...
read it

Establishing Reliable Robot Behavior using Capability Analysis Tables
Robots are often so complex that one person may not know all the ins and...
read it

Do Reservoir Computers Work Best at the Edge of Chaos?
It has been demonstrated that cellular automata had the highest computat...
read it

Consistency of the Maximal Information Coefficient Estimator
The Maximal Information Coefficient (MIC) of Reshef et al. (Science, 201...
read it
U.S. Navy
The United States Navy is the naval warfare service branch of the United States Armed Forces and one of the seven uniformed services of the United States.