The widespread popularity of unmanned aerial vehicles enables an immense...
Decision-making in dense traffic scenarios is challenging for automated
...
Social Media has seen a tremendous growth in the last decade and is
cont...
We present a large-scale dataset for the task of rewriting an ill-formed...
Crowdsourcing can be applied to the Internet-of-Things (IoT) systems to
...
The Algorand blockchain is a secure and decentralized public ledger base...
Planning safe trajectories for autonomous vehicles in complex urban
envi...
Project planners should consider the monetary value of ecosystem service...
Ecosystem services refer to the ones human beings often obtain from the
...
In the era of information explosion, facing complex information, it is
d...
We study envy-free allocations of indivisible goods to agents in setting...
We study how to maximize the broker's (expected) profit in a two-sided
m...
Distributed denial of service (DDoS) attacks have caused huge economic l...
With the emergence of heterogeneous hardware paving the way for the
post...
The growing availability of commodity RGB-D cameras has boosted the
appl...
The accuracy of predicting the Producer Price Index (PPI) plays an
indis...
Distributed denial of service (DDoS) attack becomes a rapidly growing pr...
Anticipating possible behaviors of traffic participants is an essential
...
Neural networks based vocoders, typically the WaveNet, have achieved
spe...
Geometric matching is a key step in computer vision tasks. Previous
lear...
Fuzzing is an automated application vulnerability detection method. For
...
As modern computing moves towards smaller devices and powerful cloud
pla...
Seam-cutting and seam-driven techniques have been proven effective for
h...
The seam-driven approach has been proven fairly effective for
parallax-t...
Generating good revenue is one of the most important problems in Bayesia...
A novel warp for natural image stitching is proposed that utilizes the
p...
We compare and contrast the statistical physics and quantum physics insp...
Interactive-proof-based approaches are widely used in verifiable computa...
Restricted Boltzmann machine (RBM) is one of the fundamental building bl...
This paper introduces a new method to solve the cross-domain recognition...