We gratefully acknowledge support from
the Simons Foundation and member institutions.

Computer Science

Authors and titles for Nov 2018, skipping first 225

[ total of 4185 entries: 1-50 | ... | 76-125 | 126-175 | 176-225 | 226-275 | 276-325 | 326-375 | 376-425 | ... | 4176-4185 ]
[ showing 50 entries per page: fewer | more ]
[226]  arXiv:1811.00785 [pdf, other]
Title: Drawing Clustered Graphs on Disk Arrangements
Comments: Preliminary work appeared in the Proceedings of the 13th International Conference and Workshops on Algorithms and Computation (WALCOM 2019)
Subjects: Computational Geometry (cs.CG); Data Structures and Algorithms (cs.DS)
[227]  arXiv:1811.00787 [pdf, other]
Title: Adversarial Training of End-to-end Speech Recognition Using a Criticizing Language Model
Comments: under review ICASSP 2019
Subjects: Computation and Language (cs.CL)
[228]  arXiv:1811.00793 [pdf, other]
Title: Dealing with Ambiguity in Robotic Grasping via Multiple Predictions
Comments: ACCV 2018
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[229]  arXiv:1811.00796 [pdf, other]
Title: Automated Theorem Proving in Intuitionistic Propositional Logic by Deep Reinforcement Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Logic in Computer Science (cs.LO); Machine Learning (stat.ML)
[230]  arXiv:1811.00797 [pdf, other]
Title: eLIAN: Enhanced Algorithm for Angle-constrained Path Finding
Authors: Anton Andreychuk (1), Natalia Soboleva (2), Konstantin Yakovlev (2, 3, 4) ((1) Peoples' Friendship University of Russia, (2) National Research University Higher School of Economics, (3) Federal Research Center ''Computer Science and Control'' of Russian Academy of Sciences, (4) Moscow Institute of Physics and Technology )
Journal-ref: Kuznetsov S., Osipov G., Stefanuk V. (eds) Artificial Intelligence. RCAI 2018. Communications in Computer and Information Science, vol 934. Springer, Cham
Subjects: Artificial Intelligence (cs.AI)
[231]  arXiv:1811.00804 [pdf, other]
Title: The Evolution of Stack Overflow Posts: Reconstruction and Analysis
Comments: 43 pages, 17 figures (currently under review)
Subjects: Software Engineering (cs.SE)
[232]  arXiv:1811.00815 [pdf, ps, other]
Title: Power Control for D2D Underlay in Multi-cell Massive MIMO Networks
Comments: 6 Pages, 3 Figures, WSA 2018
Subjects: Information Theory (cs.IT)
[233]  arXiv:1811.00816 [pdf, other]
Title: Planar Graphs of Bounded Degree have Constant Queue Number
Subjects: Data Structures and Algorithms (cs.DS)
[234]  arXiv:1811.00817 [pdf, ps, other]
Title: Holant clones and the approximability of conservative holant problems
Comments: 46+9 pages
Subjects: Computational Complexity (cs.CC); Discrete Mathematics (cs.DM)
[235]  arXiv:1811.00818 [pdf, other]
Title: Listen to Dance: Music-driven choreography generation using Autoregressive Encoder-Decoder Network
Comments: 5 pages
Subjects: Multimedia (cs.MM)
[236]  arXiv:1811.00820 [pdf, other]
Title: Too Trivial To Test? An Inverse View on Defect Prediction to Identify Methods with Low Fault Risk
Comments: Submitted to PeerJ CS
Journal-ref: PeerJ Computer Science 5:e187, 2019
Subjects: Software Engineering (cs.SE)
[237]  arXiv:1811.00821 [pdf, other]
Title: OrthoNet: Multilayer Network Data Clustering
Journal-ref: IEEE Transactions on Signal and Information Processing over Networks, 2020
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[238]  arXiv:1811.00830 [pdf, other]
Title: Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks
Journal-ref: ACM Computing Surveys, Vol. 52, No. 4, Article 78, 2019
Subjects: Cryptography and Security (cs.CR)
[239]  arXiv:1811.00833 [pdf, ps, other]
Title: Worst-Case Efficient Sorting with QuickMergesort
Subjects: Data Structures and Algorithms (cs.DS)
[240]  arXiv:1811.00834 [pdf, other]
Title: Arbitrary Pattern Formation on Infinite Grid by Asynchronous Oblivious Robots
Comments: This is the full version of the paper, with the same title and authors, that was accepted in the 13th International Conference and Workshops on Algorithms and Computation (WALCOM 2019), February 27 - March 02, 2019, Guwahati, India
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
[241]  arXiv:1811.00836 [pdf, other]
Title: Multi-Kernel Regression with Sparsity Constraint
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[242]  arXiv:1811.00839 [pdf, other]
Title: ATP: Directed Graph Embedding with Asymmetric Transitivity Preservation
Comments: has been accepted to the Thirty-Third AAAI Conference on Artificial Intelligence (AAAI 2019), acceptance rate: 1150/7095 = 16.2%
Subjects: Artificial Intelligence (cs.AI); Information Retrieval (cs.IR); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[243]  arXiv:1811.00845 [pdf, other]
Title: Combining Long Short Term Memory and Convolutional Neural Network for Cross-Sentence n-ary Relation Extraction
Subjects: Information Retrieval (cs.IR); Computation and Language (cs.CL)
[244]  arXiv:1811.00846 [pdf, other]
Title: Heterogeneity Aware Deep Embedding for Mobile Periocular Recognition
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[245]  arXiv:1811.00849 [pdf]
Title: Algorithms for screening of Cervical Cancer: A chronological review
Comments: This critical review of various machine learning algorithms for Cervical Cancer Screening was completed at National Institute of Biologicals(NIB), India by B.Tech final year Computer Science students at JSSATE, Noida, India under the supervision of Director at NIB Dr. Surinder Singh and Jr. Scientist Sh. P.S. Chandranand
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[246]  arXiv:1811.00852 [pdf, other]
Title: Understanding Deep Neural Networks Using Topological Data Analysis
Authors: Daniel Goldfarb
Comments: 13 pages, 14 figures
Subjects: Machine Learning (cs.LG)
[247]  arXiv:1811.00854 [pdf, other]
Title: Improving Information Retrieval Results for Persian Documents using FarsNet
Comments: 4 pages
Subjects: Information Retrieval (cs.IR); Computation and Language (cs.CL)
[248]  arXiv:1811.00855 [pdf, other]
Title: Session-based Recommendation with Graph Neural Networks
Comments: 9 pages, 4 figures, accepted by AAAI Conference on Artificial Intelligence (AAAI-19)
Subjects: Information Retrieval (cs.IR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[249]  arXiv:1811.00866 [pdf, other]
Title: Efficient Neural Network Robustness Certification with General Activation Functions
Comments: Accepted by NIPS 2018. Huan Zhang and Tsui-Wei Weng contributed equally
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Machine Learning (stat.ML)
[250]  arXiv:1811.00869 [pdf]
Title: Comparison of Classification Algorithms Used Medical Documents Categorization
Comments: International Conference on Computer Science and Engineering 2016
Subjects: Information Retrieval (cs.IR); Computation and Language (cs.CL); Machine Learning (cs.LG)
[251]  arXiv:1811.00871 [pdf, other]
Title: Classification of Findings with Localized Lesions in Fundoscopic Images using a Regionally Guided CNN
Comments: 8 pages, Computational Pathology and Ophthalmic Medical Image Analysis, pp.176-184
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[252]  arXiv:1811.00875 [pdf, other]
Title: Quantum Structures in Human Decision-making: Towards Quantum Expected Utility
Authors: Sandro Sozzo
Comments: 13 pages, 1 figure, standard LateX
Subjects: Artificial Intelligence (cs.AI); General Economics (econ.GN); Neurons and Cognition (q-bio.NC); Quantum Physics (quant-ph)
[253]  arXiv:1811.00876 [pdf, other]
Title: Mind in the Machine: Perceived Minds Induce Decision Change
Subjects: Robotics (cs.RO); Human-Computer Interaction (cs.HC)
[254]  arXiv:1811.00884 [pdf, other]
Title: Passive Whole-body Control for Quadruped Robots: Experimental Validation over Challenging Terrain
Comments: 9 pages, 9 figures
Subjects: Robotics (cs.RO)
[255]  arXiv:1811.00887 [pdf, ps, other]
Title: Competitively Chasing Convex Bodies
Comments: 14 pages
Subjects: Data Structures and Algorithms (cs.DS); Metric Geometry (math.MG)
[256]  arXiv:1811.00890 [pdf, other]
Title: Probabilistic Programming with Densities in SlicStan: Efficient, Flexible and Deterministic
Journal-ref: Proc. ACM Program. Lang. 3, POPL, Article 35 (January 2019)
Subjects: Programming Languages (cs.PL); Computation (stat.CO); Machine Learning (stat.ML)
[257]  arXiv:1811.00894 [pdf, other]
Title: Can automated smoothing significantly improve benchmark time series classification algorithms?
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[258]  arXiv:1811.00901 [pdf, other]
Title: Efficient Generation of Parallel Spin-images Using Dynamic Loop Scheduling
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
[259]  arXiv:1811.00907 [pdf, other]
Title: Importance of Search and Evaluation Strategies in Neural Dialogue Modeling
Comments: iNLG 2019 camera ready version
Subjects: Computation and Language (cs.CL); Machine Learning (cs.LG)
[260]  arXiv:1811.00911 [pdf, other]
Title: Online Diverse Learning to Rank from Partial-Click Feedback
Comments: The first three authors contributed equally to this work. 24 pages, 4 figures, 1 table
Subjects: Information Retrieval (cs.IR); Machine Learning (cs.LG); Machine Learning (stat.ML)
[261]  arXiv:1811.00912 [pdf]
Title: Two-Layered Superposition of Broadcast/Multicast and Unicast Signals in Multiuser OFDMA Systems
Subjects: Information Theory (cs.IT)
[262]  arXiv:1811.00915 [pdf, ps, other]
Title: Convolutional Neural Networks for Epileptic Seizure Prediction
Comments: accepted for MLESP 2018
Journal-ref: 2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
Subjects: Machine Learning (cs.LG); Neurons and Cognition (q-bio.NC); Machine Learning (stat.ML)
[263]  arXiv:1811.00917 [pdf, other]
Title: Large-Scale Analysis of Style Injection by Relative Path Overwrite
Comments: The Web Conference (WWW), Lyon, France, April 2018
Subjects: Cryptography and Security (cs.CR)
[264]  arXiv:1811.00918 [pdf, other]
Title: Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web
Comments: Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 2017
Subjects: Cryptography and Security (cs.CR)
[265]  arXiv:1811.00919 [pdf, other]
Title: Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance
Comments: International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Paris, France, September 2016
Subjects: Cryptography and Security (cs.CR)
[266]  arXiv:1811.00920 [pdf, other]
Title: Tracing Information Flows Between Ad Exchanges Using Retargeted Ads
Comments: USENIX Security Symposium, Austin, TX, USA, August 2016
Subjects: Cryptography and Security (cs.CR)
[267]  arXiv:1811.00921 [pdf]
Title: Alert Correlation Algorithms: A Survey and Taxonomy
Comments: Symposium on Cyberspace Safety and Security (CSS), Lecture Notes in Computer Science, Springer International Publishing, vol 8300, pp 183-197, Zhangjiajie, China, November 2013
Subjects: Cryptography and Security (cs.CR)
[268]  arXiv:1811.00922 [pdf]
Title: A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers
Comments: IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, Australia, July 2013
Subjects: Cryptography and Security (cs.CR)
[269]  arXiv:1811.00923 [pdf]
Title: Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers
Comments: IEEE Conference for Internet Technology and Secured Transactions (ICITST), London, UK, December 2012
Subjects: Cryptography and Security (cs.CR)
[270]  arXiv:1811.00924 [pdf]
Title: Performance Evaluation of Shared Hosting Security Methods
Comments: IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, UK, June 2012
Subjects: Cryptography and Security (cs.CR)
[271]  arXiv:1811.00925 [pdf]
Title: An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets
Comments: IEEE Conference on Computer Applications and Industrial Electronics (ICCAIE), Penang, Malaysia, December 2011
Subjects: Cryptography and Security (cs.CR)
[272]  arXiv:1811.00926 [pdf, other]
Title: Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions
Comments: International Conference on Financial Cryptography and Data Security (FC), Barbados, February 2016
Subjects: Cryptography and Security (cs.CR)
[273]  arXiv:1811.00936 [pdf, other]
Title: Acoustic Features Fusion using Attentive Multi-channel Deep Architecture
Comments: Accepted in CHiME'18 (Interspeech Workshop)
Subjects: Sound (cs.SD); Audio and Speech Processing (eess.AS)
[274]  arXiv:1811.00937 [pdf, other]
Title: CommonsenseQA: A Question Answering Challenge Targeting Commonsense Knowledge
Comments: accepted as a long paper at NAACL 2019
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
[275]  arXiv:1811.00942 [pdf, other]
Title: Progress and Tradeoffs in Neural Language Models
Comments: 5 pages, 4 figures
Subjects: Computation and Language (cs.CL)
[ total of 4185 entries: 1-50 | ... | 76-125 | 126-175 | 176-225 | 226-275 | 276-325 | 326-375 | 376-425 | ... | 4176-4185 ]
[ showing 50 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, 2208, contact, help  (Access key information)