While awareness has been recently raised on Ethereum mempool security, t...
Question answering on tabular data (a.k.a TableQA), which aims at genera...
Named Entity Recognition (NER) aims to extract and classify entity menti...
Text segmentation tasks have a very wide range of application values, su...
Position bias, the phenomenon whereby users tend to focus on higher-rank...
Projection-free online learning has drawn increasing interest due to its...
Automatically detecting software failures is an important task and a
lon...
Most current LiDAR simultaneous localization and mapping (SLAM) systems ...
Intel SGX is known to be vulnerable to a class of practical attacks
expl...
The explosion of e-commerce has caused the need for processing and analy...
As transaction fees skyrocket today, blockchains become increasingly
exp...
Variance reduction techniques such as SPIDER/SARAH/STORM have been
exten...
We endeavor on a rarely explored task named Insubstantial Object Detecti...
Deformable medical image registration plays an important role in clinica...
In this paper, we investigate the problem of stochastic multi-level
comp...
The Android platform introduces the runtime permission model in version ...
Ethereum relies on a peer-to-peer overlay network to propagate informati...
Offline Chinese handwriting text recognition is a long-standing research...
Android introduces a new permission model that allows apps to request
pe...
In this paper, we investigate a spectral Petrov-Galerkin method for an
o...
This paper presents iBatch, a middleware system running on top of an
ope...