
Topics to Avoid: Demoting Latent Confounds in Text Classification
Despite impressive performance on many text classification tasks, deep n...
read it

HoneyFaces: Increasing the Security and Privacy of Authentication Using Synthetic Facial Images
One of the main challenges faced by Biometricbased authentication syste...
read it

Support Vector Machines for Current Status Data
Current status data is a data format where the time to event is restrict...
read it

Feature Elimination in Kernel Machines in moderately high dimensions
We develop an approach for feature elimination in statistical learning w...
read it

A General Preprocessing Method for Improved Performance of Epipolar Geometry Estimation Algorithms
In this paper a deterministic preprocessing algorithm is presented, whos...
read it

Support Vector Regression for Right Censored Data
We develop a unified approach for classification and regression support ...
read it

Performance of HullDetection Algorithms For Proton Computed Tomography Reconstruction
Proton computed tomography (pCT) is a novel imaging modality developed f...
read it

Personalized Machine Translation: Preserving Original Author Traits
The language that we produce reflects our personality, and various perso...
read it

Unsupervised Identification of Translationese
Translated texts are distinctively different from original ones, to the ...
read it

Lower bounds for several online variants of bin packing
We consider several previously studied online variants of bin packing an...
read it

An Improved Method of Total Variation Superiorization Applied to Reconstruction in Proton Computed Tomography
Previous work showed that total variation superiorization (TVS) improves...
read it

Selfreporting and screening: Data with currentstatus and censored observations
We consider survival data that combine three types of observations: unce...
read it

A Guided FPgrowth algorithm for fast mining of frequent itemsets from big data
In this paper we present the GFPgrowth (Guided FPgrowth) algorithm, a ...
read it

Improved decoding of Folded ReedSolomon and Multiplicity Codes
In this work, we show new and improved errorcorrecting properties of fo...
read it

Native Language Cognate Effects on Second Language Lexical Choice
We present a computational analysis of cognate effects on the spontaneou...
read it

Kernel Machines With Missing Responses
Missing responses is a missing data format in which outcomes are not alw...
read it

Coloring DelaunayEdges and their Generalizations
We consider geometric graphs whose vertex set is a finite set of points ...
read it

Fast entropybounded string dictionary lookup with mismatches
We revisit the fundamental problem of dictionary lookup with mismatches...
read it

A Guided FPgrowth algorithm for multitudetargeted mining of big data
In this paper we present the GFPgrowth (Guided FPgrowth) algorithm, a ...
read it

A new lower bound for classic online bin packing
We improve the lower bound on the asymptotic competitive ratio of any on...
read it

Rank and Rate: Multitask Learning for Recommender Systems
The two main tasks in the Recommender Systems domain are the ranking and...
read it

Almost Optimal Distance Oracles for Planar Graphs
We present new tradeoffs between space and querytime for exact distance...
read it

A lower bound for online rectangle packing
We slightly improve the known lower bound on the asymptotic competitive ...
read it

A Unified Approach for Solving Sequential Selection Problems
In this paper we develop a unified approach for solving a wide class of ...
read it

Top Tree Compression of Tries
We present a compressed representation of tries based on top tree compre...
read it

Compressed Range Minimum Queries
Given a string S of n integers in [0,σ), a range minimum query RMQ(i, j)...
read it

Semiparametric correction for endogenous truncation bias with Vox Populi based participation decision
We synthesize the knowledge present in various scientific disciplines fo...
read it

DNSMorph: UDPBased Bootstrapping Protocol For Tor
Tor is one of the most popular systems for anonymous communication and c...
read it

How many groups? A statistical methodology for datadriven partitioning of infectious disease incidence into agegroups
Understanding agegroup dynamics of infectious diseases is a fundamental...
read it

AMAL: Automatic Motion Assessment Learning from Properly Performed Motions in 3D Skeleton Videos
Assessment of motion quality has recently gained high demand in a variet...
read it

Density deconvolution under general assumptions on the distribution of measurement errors
In this paper we study the problem of density deconvolution under genera...
read it

Separable nonlinear leastsquares parameter estimation for complex dynamic systems
Nonlinear dynamic models are widely used for characterizing functional f...
read it

On bin packing with clustering and bin packing with delays
We continue the study of two recently introduced bin packing type proble...
read it

An analysis of the superiorization method via the principle of concentration of measure
The superiorization methodology is intended to work with input data of c...
read it

An Effective Upperbound on Treewidth Using Partial Fillin of Separators
Partitioning a graph using graph separators, and particularly clique sep...
read it

On the Characterization of 1sided error StronglyTestable Graph Properties for boundeddegree graphs, including an appendix
We study property testing of (di)graph properties in boundeddegree grap...
read it

Adaptive Communication Bounds for Distributed Online Learning
We consider distributed online learning protocols that control the excha...
read it

DistributionFree Pointwise Adjusted PValues for Functional Hypotheses
Graphical tests assess whether a function of interest departs from an en...
read it

Improved Multiple Confidence Intervals via Thresholding Informed by Prior Information
Consider a statistical problem where a set of parameters are of interest...
read it

Generalized reliability based on distances
The intraclass correlation coefficient (ICC) is a classical index of mea...
read it

Streaming Submodular Maximization under a kSet System Constraint
In this paper, we propose a novel framework that converts streaming algo...
read it

On the FineGrained Complexity of Parity Problems
We consider the parity variants of basic problems studied in finegraine...
read it

Lineartime Erasure Listdecoding of Expander Codes
We give a lineartime erasure listdecoding algorithm for expander codes...
read it

Locally testable codes via highdimensional expanders
Locally testable codes (LTC) are errorcorrecting codes that have a loca...
read it

Continuous Submodular Maximization: Beyond DRSubmodularity
In this paper, we propose the first continuous optimization algorithms t...
read it

Prediction Regions for Poisson and OverDispersed Poisson Regression Models with Applications to Forecasting Number of Deaths during the COVID19 Pandemic
Motivated by the current Coronavirus Disease (COVID19) pandemic, which ...
read it

A Note on a Recent Algorithm for Minimum Cut
Given an undirected edgeweighted graph G=(V,E) with m edges and n verti...
read it

A 2^O(k)n algorithm for kcycle in minorclosed graph families
Let 𝒞 be a proper minorclosed family of graphs. We present a randomized...
read it

Consistent High Dimensional Rounding with Side Information
In standard rounding, we want to map each value X in a large continuous ...
read it

More on ordered open end bin packing
We consider the Ordered Open End Bin Packing problem. Items of sizes in ...
read it
University of Haifa
The University of Haifa is a public research university on the top of Mount Carmel in Haifa, Israel.