
U2++: Unified Twopass Bidirectional Endtoend Model for Speech Recognition
The unified streaming and nonstreaming twopass (U2) endtoend model f...
read it

Rapid mixing of Glauber dynamics via spectral independence for all degrees
We prove an optimal Ω(n^1) lower bound on the spectral gap of Glauber d...
read it

Nearoptimal Representation Learning for Linear Bandits and Linear RL
This paper studies representation learning for multitask linear bandits...
read it

WeNet: Production First and Production Ready EndtoEnd Speech Recognition Toolkit
In this paper, we present a new open source, production first and produc...
read it

Compositional Prototype Network with Multiview Comparision for FewShot Point Cloud Semantic Segmentation
Point cloud segmentation is a fundamental visual understanding task in 3...
read it

Relation Extraction with Contextualized Relation Embedding (CRE)
Relation extraction is the task of identifying relation instance between...
read it

Efficient Reinforcement Learning in Factored MDPs with Application to Constrained RL
Reinforcement learning (RL) in episodic, factored Markov decision proces...
read it

Noisy Agents: Selfsupervised Exploration by Predicting Auditory Events
Humans integrate multiple sensory modalities (e.g. visual and audio) to ...
read it

(Locally) Differentially Private Combinatorial SemiBandits
In this paper, we study Combinatorial SemiBandits (CSB) that is an exte...
read it

Multivariate Regression of Mixed Responses for Evaluation of Visualization Designs
Information visualization significantly enhances human perception by gra...
read it

Nondestructive threedimensional measurement of hand vein based on selfsupervised network
At present, supervised stereo methods based on deep neural network have ...
read it

High Sensitivity Snapshot Spectrometer Based on Deep Network Unmixing
In this paper, we present a convolution neural network based method to r...
read it

Distributed Bandit Learning: How Much Communication is Needed to Achieve (Near) Optimal Regret
We study the communication complexity of distributed multiarmed bandits...
read it

Passive TCP Identification for Wired and WirelessNetworks: A LongShort Term Memory Approach
Transmission control protocol (TCP) congestion control is one of the key...
read it

Residual Pyramid Learning for SingleShot Semantic Segmentation
Pixellevel semantic segmentation is a challenging task with a huge amou...
read it

Qlearning with UCB Exploration is Sample Efficient for InfiniteHorizon MDP
A fundamental question in reinforcement learning is whether modelfree a...
read it

Discrete Potts Model for Generating Superpixels on Noisy Images
Many computer vision applications, such as object recognition and segmen...
read it

The Spaces of Data, Information, and Knowledge
We study the data space D of any given data set X and explain how functi...
read it

Automated Generation of Geometric Theorems from Images of Diagrams
We propose an approach to generate geometric theorems from electronic im...
read it

Electronic Geometry Textbook: A Geometric Textbook Knowledge Management System
Electronic Geometry Textbook is a knowledge management system that manag...
read it
Xiaoyu Chen
is this you? claim profile