Skip to main content
The cleft lip and palate (CLP) speech intelligibility is distorted due to the deformation in their articulatory system. For addressing the same, a few previous works perform phoneme specific modification in CLP speech. In CLP speech, both... more
    • by 
    •   4  
      EngineeringComputer ScienceBiologyarXiv
Instance segmentation has gained recently huge attention in various computer vision applications. It aims at providing different IDs to different objects of the scene, even if they belong to the same class. Instance segmentation is... more
    • by 
    •   2  
      Computer SciencearXiv
OpenMP parallelization of multiple precision Taylor series method is proposed. A very good parallel performance scalability and parallel efficiency inside one computation node of a CPU-cluster is observed. We explain the details of the... more
    • by 
    •   4  
      MathematicsComputer ScienceParallel ComputingarXiv
Considerable research effort has been devoted to the study of Policy in the domain of Information Security Management (ISM). However, our review of ISM literature identified four key deficiencies that reduce the utility of the guidance to... more
    • by 
    •   3  
      BusinessComputer SciencearXiv
We discuss the Ramsey property, the existence of a stationary independence relation and the coherent extension property for partial isometries (coherent EPPA) for all classes of metrically homogeneous graphs from Cherlin's catalogue,... more
    • by  and +3
    •   3  
      MathematicsComputer SciencearXiv
Explaining the predictions of complex deep learning models, often referred to as ”black boxes” is critical in high-stakes domains like healthcare. However, post-hoc model explanations often are not understandable by clinicians and are... more
    • by  and +2
    •   2  
      Computer SciencearXiv
ROHIT VERMA, University of Cambridge, UK SUGANDH PARGAL, Indian Institute of Technology Kharagpur, India DEBASREE DAS, Indian Institute of Technology Kharagpur, India TANUSREE PARBAT, Indian Institute of Technology Kharagpur, India SAI... more
    • by  and +2
    •   2  
      Computer SciencearXiv
One of the emerging trends for sports analytics is the growing use of player and ball tracking data. A parallel development is deep learning predictive approaches that use vast quantities of data with less reliance on feature engineering.... more
    • by 
    •   3  
      Computer ScienceBasketballarXiv
We examine Dropout through the perspective of interactions: learned effects that combine multiple input variables. Given $N$ variables, there are $O(N^2)$ possible pairwise interactions, $O(N^3)$ possible 3-way interactions, etc. We show... more
    • by  and +1
    •   6  
      Computer ScienceArtificial IntelligenceDeep LearningDeep Neural Networks
Aerial robots can enhance their safe and agile navigation in complex and cluttered environments by efficiently exploiting the information collected during a given task. In this paper, we address the learning model predictive control... more
    • by 
    •   2  
      Computer SciencearXiv
    • by  and +1
    •   3  
      Computer SciencePhysicsarXiv
What is the role of unlabeled data in an inference problem, when the presumed underlying distribution is adversarially perturbed? To provide a concrete answer to this question, this paper unifies two major learning frameworks:... more
    • by 
    •   6  
      MathematicsComputer ScienceArtificial IntelligenceRobustness (evolution)
    • by 
    •   3  
      EngineeringComputer SciencearXiv
    • by  and +1
    •   7  
      EngineeringMechanical EngineeringCivil EngineeringComputer Science
We introduce DeepABM, a framework for agent-based modeling that leverages geometric message passing of graph neural networks for simulating action and interactions over large agent populations. Using DeepABM allows scaling simulations to... more
    • by 
    •   2  
      Computer SciencearXiv
Recently Kubica et al. (Inf. Process. Let., 2013) and Kim et al. (submitted to Theor. Comp. Sci.) introduced order-preserving pattern matching. In this problem we are looking for consecutive substrings of the text that have the same... more
    • by 
    •   3  
      MathematicsComputer SciencearXiv
In a number of question answering (QA) benchmarks, pretrained models have reached human parity through fine-tuning on an order of 100,000 annotated questions and answers. We explore the more realistic few-shot setting, where only a few... more
    • by 
    •   2  
      Computer SciencearXiv
In classical causal inference, inferring cause-effect relations from data relies on the assumption that units are independent and identically distributed. This assumption is violated in settings where units are related through a network... more
    • by 
    •   2  
      Computer SciencearXiv
    • by 
    •   6  
      MathematicsMathematical PhysicsComputer SciencePhysics
Deep neural networks (DNNs) are powerful black-box predictors that have achieved impressive performance on a wide variety of tasks. However, their accuracy comes at the cost of intelligibility: it is usually unclear how they make their... more
    • by  and +1
    •   6  
      MathematicsComputer ScienceArtificial IntelligenceMachine Learning
    • by 
    •   13  
      Cognitive ScienceComputer ScienceData Fusion (Engineering)Matlab
    • by 
    •   4  
      MathematicsComputer ScienceCluster AnalysisarXiv
Dynamic Adaptive Streaming over HTTP (DASH) is a recently proposed standard that offers different versions of the same media content to adapt the delivery process over the Internet to dynamic bandwidth fluctuations and different user... more
    • by 
    •   5  
      Information SystemsComputer ScienceDistributed ComputingComputer Software
We present a method to create universal, robust, targeted adversarial image patches in the real world. The patches are universal because they can be used to attack any scene, robust because they work under a wide variety of... more
    • by 
    •   2  
      Computer SciencearXiv
    • by 
    •   2  
      Computer SciencearXiv
A graph $G$ with a list of colors $L(v)$ and weight $w(v)$ for each vertex $v$ is $(L,w)$-colorable if one can choose a subset of $w(v)$ colors from $L(v)$ for each vertex $v$, such that adjacent vertices receive disjoint color sets. In... more
    • by 
    •   4  
      MathematicsComputer ScienceDiscrete MathematicsarXiv
Deep convolutional networks based super-resolution is a fast-growing field with numerous practical applications. In this exposition, we extensively compare 30+ state-of-the-art super-resolution Convolutional Neural Networks (CNNs) over... more
    • by 
    •   2  
      Computer SciencearXiv
Leveraging temporal information has been regarded as essential for developing video understanding models. However, how to properly incorporate temporal information into the recent successful instance discrimination based contrastive... more
    • by 
    •   2  
      Computer SciencearXiv
In software-intensive organizations, an organizational management system will not guarantee organizational success unless the business strategy can be translated into a set of operational software goals. The Goal Question Metric (GQM) ap-... more
    • by 
    •   2  
      Computer SciencearXiv
In this paper we introduce a case study describing the combination of manual survey-based and e-mail-based social network analysis. The goal of the project was to increase collaboration efficiency in a team of consultants of a major high... more
    • by 
    •   3  
      Computer SciencePhysicsarXiv
We consider an environment where sellers compete over buyers. All sellers are a-priori identical and strategically signal buyers about the product they sell. In a setting motivated by on-line advertising in display ad exchanges, where... more
    • by 
    •   4  
      MathematicsComputer ScienceEconomicsarXiv
One of the more prominent trends within Industry 4.0 is the drive to employ Robotic Process Automation (RPA), especially as one of the elements of the Lean approach. The full implementation of RPA is riddled with challenges relating both... more
    • by 
    •   2  
      Computer SciencearXiv
Each year there are nearly 57 million deaths around the world, with over 2.7 million in the United States. Timely, accurate and complete death reporting is critical in public health, as institutions and government agencies rely on death... more
    • by 
    •   3  
      MathematicsComputer SciencearXiv
The tritium breeding ratio (TBR) is an essential quantity for the design of modern and next-generation D-T fueled nuclear fusion reactors. Representing the ratio between tritium fuel generated in breeding blankets and fuel consumed during... more
    • by 
    •   3  
      Computer SciencePhysicsarXiv
Complex nonlinear dynamics are ubiquitous in many fields. Moreover, we rarely have access to all of the relevant state variables governing the dynamics. Delay embedding allows us, in principle, to account for unobserved state variables.... more
    • by 
    •   3  
      Computer SciencePhysicsarXiv
Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure. Different cryptographic... more
    • by 
    •   12  
      Computer ScienceAESDesRc
The spread of socially-learnt behaviours occurs in many animal species, and understanding how behaviours spread can provide novel insights into the causes and consequences of sociality. Within wild populations, behaviour spread is often... more
    • by 
    •   3  
      Computer ScienceBiologyarXiv
Epileptic seizures are a type of neurological disorder that affect many people worldwide. Specialist physicians and neurologists take advantage of structural and functional neuroimaging modalities to diagnose various types of epileptic... more
    • by  and +2
    •   3  
      EngineeringComputer SciencearXiv
Recent studies in multi-agent communicative reinforcement learning (MACRL) demonstrate that multi-agent coordination can be significantly improved when communication between agents is allowed. Meanwhile, advances in adversarial machine... more
    • by 
    •   2  
      Computer SciencearXiv
    • by 
    •   8  
      Cognitive ScienceComputer ScienceArtificial IntelligenceComputer Vision
Nowadays, manufacturing sectors harness the power of machine learning and data science algorithms to make predictions for the optimization of mechanical and microstructure properties of fabricated mechanical components. The application of... more
    • by 
    •   7  
      EngineeringComputer ScienceAnimal ProductionClinical Sciences
    • by 
    •   2  
      Computer SciencearXiv
    • by 
    •   2  
      Computer SciencearXiv
This paper is an exploratory study of two epidemiological questions on a worldwide basis. How fast is the disease spreading? Are the restrictions for people (especially mobility restrictions) bring the expected effect? To answer the first... more
    • by 
    •   4  
      Computer SciencePhysicsBiologyarXiv
A graph is well-covered if every maximal independent set has the same cardinality. The recognition problem of well-covered graphs is known to be co-NP-complete. Let w be a weight function defined on the vertices of G. Then G is... more
    • by 
    •   6  
      MathematicsComputer ScienceDiscrete MathematicsVector Space
There is great significance in evaluating a node's Influence ranking in complex networks. Over the years, many researchers have presented different measures for quantifying node interconnectedness within networks. Therefore, this paper... more
    • by 
    • Computer Science
The selection of the optimal feature subset and the classification has become an important issue in the field of iris recognition. In this paper we propose several methods for iris feature subset selection and vector creation. The... more
    • by 
    •   9  
      Computer SciencePattern RecognitionFeature ExtractionSupport vector machine