Face authentication systems are becoming increasingly prevalent, especially with the rapid development of Deep Learning technologies. However, human …
Algorithms for persistent homology and zigzag persistent homology are well-studied for persistence modules where homomorphisms are induced by inclusi…
This short note establishes explicit and broadly applicable relationships between persistence-based distances computed locally and globally. In parti…
We present a computational design system that assists users to model, optimize, and fabricate quad-robots with soft skins.Our system addresses the ch…
Detecting and identifying user intent from text, both written and spoken, plays an important role in modelling and understand dialogs. Existing resea…
Reducing traffic accidents is an important public safety challenge. However, the majority of studies on traffic accident analysis and prediction have…
Independent Component Analysis (ICA) is a popular model for blind signal separation. The ICA model assumes that a number of independent source signal…
Graphs and network data are ubiquitous across a wide spectrum of scientific and application domains. Often in practice, an input graph can be conside…
In recent years machine learning methods that nearly interpolate the data have achieved remarkable success. In many settings achieving near-zero trai…
Analogy completion has been a popular task in recent years for evaluating the semantic properties of word embeddings, but the standard methodology ma…
In this paper we present a method for learning the parameters of a mixture of $k$ identical spherical Gaussians in $n$-dimensional space with an arbi…
In this paper we introduce MaSS (Momentum-added Stochastic Solver), an accelerated SGD method for optimizing over-parameterized networks. Our method …
The Gromov-Hausdorff (GH) distance is a natural way to measure distance between two metric spaces. We prove that it is $\mathrm{NP}$-hard to approxim…
Preserving privacy of continuous and/or high-dimensional data such as images, videos and audios, can be challenging with syntactic anonymization meth…
We address talker-independent monaural speaker separation from the perspectives of deep learning and computational auditory scene analysis (CASA). Sp…
In this paper, we study the problem of reducing the delay of downloading data from cloud storage systems by leveraging multiple parallel threads, ass…
Two prevailing theories for explaining social group or community structure are cohesion and identity. The social cohesion approach posits that social…
While most Bayesian nonparametric models in machine learning have focused on the Dirichlet process, the beta process, or their variants, the gamma pr…
An interactive image retrieval system learns which images in the database belong to a user's query concept, by analyzing the example images and feedb…
Technology trends will cause data movement to account for the majority of energy expenditure and execution time on emerging computers. Therefore, com…
By signing up you accept our content policy
Already have an account? Sign in
No a member yet? Create an account