
-
Document Layout Analysis via Dynamic Residual Feature Fusion
The document layout analysis (DLA) aims to split the document image into...
read it
-
Pre-training strategies and datasets for facial representation learning
What is the best way to learn a universal face representation? Recent wo...
read it
-
A fusion learning method to subgroup analysis for longitudinal trajectories
Uncovering the heterogeneity in the disease progression of Alzheimer's i...
read it
-
Some results about double cyclic codes over 𝔽_q+v𝔽_q+v^2𝔽_q
Let 𝔽_q be the finite field with q elements. This paper mainly researche...
read it
-
Revisiting the Concrete Security of Goldreich's Pseudorandom Generator
Local pseudorandom generators are a class of fundamental cryptographic p...
read it
-
Federated Multi-armed Bandits with Personalization
A general framework of personalized federated multi-armed bandits (PF-MA...
read it
-
Seasonal association between viral etiologies of hospitalized acute lower respiratory infections and meteorological factors in China
Background: Acute lower respiratory infections present pronounced season...
read it
-
OrgMining 2.0: A Novel Framework for Organizational Model Mining from Event Logs
Providing appropriate structures around human resources can streamline o...
read it
-
New (k,l,m)-verifiable multi-secret sharing schemes based on XTR public key system
Secret sharing was proposed primarily in 1979 to solve the problem of ke...
read it
-
DARE: AI-based Diver Action Recognition System using Multi-Channel CNNs for AUV Supervision
With the growth of sensing, control and robotic technologies, autonomous...
read it
-
Precoding and Scheduling for AoI Minimization in MIMO Broadcast Channels
In this paper, we consider a status updating system where updates are ge...
read it
-
Adaptive 3D Face Reconstruction from a Single Image
3D face reconstruction from a single image is a challenging problem, esp...
read it
-
Training Binary Neural Networks with Real-to-Binary Convolutions
This paper shows how to train binary networks to within a few percent po...
read it
-
Knowledge distillation via adaptive instance normalization
This paper addresses the problem of model compression via knowledge dist...
read it
-
Stochastic Linear Contextual Bandits with Diverse Contexts
In this paper, we investigate the impact of context diversity on stochas...
read it
-
Timely Synchronization with Sporadic Status Changes
In this paper, we consider a status updating system where the transmitte...
read it
-
Decentralized Multi-player Multi-armed Bandits with No Collision Information
The decentralized stochastic multi-player multi-armed bandit (MP-MAB) pr...
read it
-
A Real-Time Deep Network for Crowd Counting
Automatic analysis of highly crowded people has attracted extensive atte...
read it
-
Information Freshness for Timely Detection of Status Changes
In this paper, we aim to establish the connection between Age of Informa...
read it
-
On mu-Symmetric Polynomials
In this paper, we study functions of the roots of a univariate polynomia...
read it
-
A Condition for Multiplicity Structure of Univariate Polynomials
We consider the problem of finding a condition for a univariate polynomi...
read it
-
Cascaded Detail-Preserving Networks for Super-Resolution of Document Images
The accuracy of OCR is usually affected by the quality of the input docu...
read it
-
Meta-neural-network for Realtime and Passive Deep-learning-based Object Recognition
Deep-learning recently show great success across disciplines yet convent...
read it
-
Complex-BP-Neural-Network-based Hybrid Precoding for Millimeter Wave Multiuser Massive MIMO Systems
The high energy consumption of massive multi-input multi-out (MIMO) syst...
read it
-
Power-Consumption Outage Challenge in Next-Generation Cellular Networks
The conventional outage in wireless communication systems is caused by t...
read it
-
Edge-Aware Deep Image Deblurring
Image deblurring is a fundamental and challenging low-level vision probl...
read it
-
Video Crowd Counting via Dynamic Temporal Modeling
Crowd counting aims to count the number of instantaneous people in a cro...
read it
-
New dynamic and verifiable multi-secret sharing schemes based on LFSR public key cryptosystem
A verifiable multi-secret sharing (VMSS) scheme enables the dealer to sh...
read it
-
Adaptive Coding for Information Freshness in a Two-user Broadcast Erasure Channel
In this paper, we investigate the impact of coding on the Age of Informa...
read it
-
Age-Optimal Transmission of Rateless Codes in an Erasure Channel
In this paper, we examine a status updating system where updates generat...
read it
-
Neural Networks in Hybrid Precoding for Millimeter Wave Massive MIMO Systems
Neural networks have been applied to the physical layer of wireless comm...
read it
-
Energy Efficiency of Generalized Spatial Modulation Aided Massive MIMO Systems
One of focuses in green communication studies is the energy efficiency (...
read it
-
Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor
A real-time status updating system is considered, in which an energy har...
read it
-
Online Learning with Diverse User Preferences
In this paper, we investigate the impact of diverse user preference on l...
read it
-
Energy Efficiency Optimization of Generalized Spatial Modulation with Sub-Connected Hybrid Precoding
Energy efficiency (EE) optimization of millimeter wave (mm-Wave) massive...
read it
-
When to Preempt? Age of Information Minimization under Link Capacity Constraint
In this paper, we consider a scenario where a source continuously monito...
read it
-
Adaptive Scenario Discovery for Crowd Counting
Crowd counting, i.e., estimation number of pedestrian in crowd images, i...
read it
-
Runtime Analysis for Self-adaptive Mutation Rates
We propose and analyze a self-adaptive version of the (1,λ) evolutionary...
read it
-
Online Timely Status Updates with Erasures for Energy Harvesting Sensors
An energy harvesting sensor that is sending status updates to a destinat...
read it
-
How Much of Wireless Rate Can Smartphones Support in 5G Networks?
Due to the higher wireless transmission rates in the fifth generation (5...
read it
-
Age of Information Minimization for an Energy Harvesting Source with Updating Erasures: With and Without Feedback
Consider an energy harvesting (EH) sensor that continuously monitors a s...
read it
-
To learn image super-resolution, use a GAN to learn how to do image degradation first
This paper is on image and face super-resolution. The vast majority of p...
read it
-
Otem&Utem: Over- and Under-Translation Evaluation Metric for NMT
Although neural machine translation(NMT) yields promising translation pe...
read it
-
Optimal Parameter Choices via Precise Black-Box Analysis
It has been observed that some working principles of evolutionary algori...
read it
-
To Skip or to Switch? Minimizing Age of Information under Link Capacity Constraint
Consider a scenario where a source continuously monitors an object and s...
read it
-
Age-Minimal Transmission for Energy Harvesting Sensors with Finite Batteries: Online Policies
An energy-harvesting sensor node that is sending status updates to a des...
read it
-
Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit
An additive white Gaussian noise (AWGN) energy-harvesting (EH) channel i...
read it
-
Cost-Aware Learning and Optimization for Opportunistic Spectrum Access
In this paper, we investigate cost-aware joint learning and optimization...
read it
-
Integrating UML with Service Refinement for Requirements Modeling and Analysis
Unified Modeling Language (UML) is the de facto standard for requirement...
read it
-
Optimal Status Updating for an Energy Harvesting Sensor with a Noisy Channel
Consider an energy harvesting sensor continuously monitors a system and ...
read it