
Optimizing Wireless Systems Using Unsupervised and ReinforcedUnsupervised Deep Learning
Resource allocation and transceivers in wireless networks are usually de...
read it

Deep Set Prediction Networks
We study the problem of predicting a set from a feature vector with a de...
read it

Methods for finding leaderfollower equilibria with multiple followers
The concept of leaderfollower (or Stackelberg) equilibrium plays a cen...
read it

Fault Tolerance in Distributed Neural Computing
With the increasing complexity of computing systems, complete hardware r...
read it

Parameter Estimation in Computational Biology by Approximate Bayesian Computation coupled with Sensitivity Analysis
We address the problem of parameter estimation in models of systems biol...
read it

A hybrid artificial immune system and Self Organising Map for network intrusion detection
Network intrusion detection is the problem of detecting unauthorised use...
read it

Efficient Task Collaboration with Execution Uncertainty
We study a general task allocation problem, involving multiple agents th...
read it

Fitting a Simplicial Complex using a Variation of kmeans
We give a simple and effective two stage algorithm for approximating a p...
read it

Hybrid Metaheuristics for the Clustered Vehicle Routing Problem
The Clustered Vehicle Routing Problem (CluVRP) is a variant of the Capac...
read it

RegretBased MultiAgent Coordination with Uncertain Task Rewards
Many multiagent coordination problems can be represented as DCOPs. Moti...
read it

New Results on Equilibria in Strategic Candidacy
We consider a voting setting where candidates have preferences about the...
read it

Possible and Necessary Winner Problem in Social Polls
Social networks are increasingly being used to conduct polls. We introdu...
read it

(Non) asymptotic properties of Stochastic Gradient Langevin Dynamics
Applying standard Markov chain Monte Carlo (MCMC) algorithms to large da...
read it

Convex Optimization Learning of Faithful Euclidean Distance Representations in Nonlinear Dimensionality Reduction
Classical multidimensional scaling only works well when the noisy distan...
read it

A Person ReIdentification System For Mobile Devices
Person reidentification is a critical security task for recognizing a p...
read it

Functional Bandits
We introduce the functional bandit problem, where the objective is to fi...
read it

Knapsack based Optimal Policies for BudgetLimited MultiArmed Bandits
In budgetlimited multiarmed bandit (MAB) problems, the learner's actio...
read it

Neural Wikipedian: Generating Textual Summaries from Knowledge Base Triples
Most people do not interact with Semantic Web data directly. Unless they...
read it

Crowdsourcing for Beyond Polarity Sentiment Analysis A Pure Emotion Lexicon
Sentiment analysis aims to uncover emotions conveyed through information...
read it

Analysing Temporal Evolution of Interlingual Wikipedia Article Pairs
Wikipedia articles representing an entity or a topic in different langua...
read it

The Anatomy of a Search and Mining System for Digital Archives
Samtla (Search And Mining Tools with Linguistic Analysis) is a digital h...
read it

Robust toll pricing: A novel approach
We study a robust toll pricing problem where toll setters and users have...
read it

Averagecase Approximation Ratio of Scheduling without Payments
Apart from the principles and methodologies inherited from Economics and...
read it

A control mechanism for intramural periarterial drainage via astrocytes: How neuronal activity could improve waste clearance from the brain
The mechanisms behind waste clearance from deep within the parenchyma of...
read it

Solving Hard Stable Matching Problems Involving Groups of Similar Agents
Many important stable matching problems are known to be NPhard, even wh...
read it

CounterexampleGuided kInduction Verification for Fast Bug Detection
Recently, the kinduction algorithm has proven to be a successful approa...
read it

Adaptive Coding and Modulation for LargeScale Antenna Array Based Aeronautical Communications in the Presence of Cochannel Interference
In order to meet the demands of `Internet above the clouds', we propose ...
read it

Analyzing Web Archives Through Topic and Event Focused Subcollections
Web archives capture the history of the Web and are therefore an importa...
read it

Decentralized BaseGraph Routing for the Quantum Internet
Quantum repeater networks are a fundamental of any future quantum Intern...
read it

A Survey on Quantum Channel Capacities
Quantum information processing exploits the quantum nature of informatio...
read it

PRESTO: Probabilistic Cardinality Estimation for RDF Queries Based on Subgraph Overlapping
In query optimisation accurate cardinality estimation is essential for f...
read it

Multiple Antenna Assisted NonOrthogonal Multiple Access
Nonorthogonal multiple access (NOMA) is potentially capable of circumve...
read it

On the Preliminary Investigation of Selfish Mining Strategy with Multiple Selfish Miners
Eyal and Sirer's selfish mining strategy has demonstrated that Bitcoin s...
read it

Learning to Count Objects in Natural Images for Visual Question Answering
Visual Question Answering (VQA) models have struggled with counting obje...
read it

A QuantumSearchAided Dynamic Programming Framework for Pareto Optimal Routing in Wireless Multihop Networks
Wireless Multihop Networks (WMHNs) have to strike a tradeoff among dive...
read it

Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISONOMA Using SWIPT
Cognitive radio (CR) and nonorthogonal multiple access (NOMA) have been...
read it

A graphtheoretic framework for algorithmic design of experiments
In this paper, we demonstrate that considering experiments in a graphth...
read it

A Poisson Model for Entanglement Optimization in the Quantum Internet
A Poisson model for entanglement optimization in quantum repeater networ...
read it

Quantum Circuit Designs for GateModel Quantum Computer Architectures
The power of quantum computers makes it possible to solve difficult prob...
read it

Secure SWIPT for Directional Modulation Aided AF Relaying Networks
Secure wireless information and power transfer based on directional modu...
read it

Bayesian design of experiments for intractable likelihood models using coupled auxiliary models and multivariate emulation
A Bayesian design is given by maximising the expected utility over the d...
read it

Learning to Generate Wikipedia Summaries for Underserved Languages from Wikidata
While Wikipedia exists in 287 languages, its content is unevenly distrib...
read it

Quantumaided MultiObjective Routing Optimization Using BackTracingAided Dynamic Programming
Pareto optimality is capable of striking the optimal tradeoff amongst t...
read it

Mater certa est, pater numquam: What can Facebook Advertising Data Tell Us about Male Fertility Rates?
In many developing countries, timely and accurate information about birt...
read it

Designing the Game to Play: Optimizing Payoff Structure in Security Games
Effective gametheoretic modeling of defenderattacker behavior is becom...
read it

Incremental Database Design using UMLB and EventB
Correct operation of many critical systems is dependent on the data cons...
read it

Preference Elicitation and Robust Optimization with MultiAttribute QuasiConcave Choice Functions
Decision maker's preferences are often captured by some choice functions...
read it

An Optimal Rewiring Strategy for Reinforcement Social Learning in Cooperative Multiagent Systems
Multiagent coordination in cooperative multiagent systems (MASs) has bee...
read it

DATA:SEARCH'18 – Searching Data on the Web
This half day workshop explores challenges in data search, with a partic...
read it

Bayesian forecasting of mortality rates using latent Gaussian models
We provide forecasts for mortality rates by using two different approach...
read it
University of Southampton
Study at the University of Southampton, ranked among the top 1% of universities worldwide. A researchled founding member of the prestigious Russell Group.