Inspired by the intuition of Chandra et al. [8] about the relationship between cover time of random walks and the runtime of randomized broadcast, we devised the first formal results relating both times. As our main result in Section 3, we proved th…
We introduce a new technique for bounding the cover time of random walks by relating it to the runtime of randomized broadcast. In particular, we str…
Recent years have demonstrated that using random feature maps can significantly decrease the training and testing times of kernel-based algorithms wi…
Wearable devices, or "wearables," bring great benefits but also potential risks that could expose users' activities with- out their awareness or cons…
Point clouds provide a flexible geometric representation suitable for countless applications in computer graphics; they also comprise the raw output …
Compared to other organizations, civil society organizations (CSOs) often operate in elevated-risk contexts, and attacks against them carry much grea…
Many species have evolved advanced non-visual perception while artificial systems fall behind. Radar and ultrasound complement camera-based vision bu…
The ability to process large numbers of continuous data streams in a near-real-time fashion has become a crucial prerequisite for many scientific and…
The dominant cost in solving least-square problems using Newton's method is often that of factorizing the Hessian matrix over multiple values of the …
We present a classification-based approach to identify quasi-stellar radio sources (quasars) in the Sloan Digital Sky Survey and evaluate its perform…
One weakness of machine-learned NLP models is that they typically perform poorly on out-of-domain data. In this work, we study the task of identifyin…
Memorization is worst-case generalization. Based on MacKay's information theoretic model of supervised machine learning, this article discusses how t…
Spectral clustering is one of the most important algorithms in data mining and machine intelligence; however, its computational complexity limits its…
In autonomous driving, imitation learning of driving behavior is an active area of research as it enables generalization to many different environmen…
By assuming an ideal neural network with gating functions handling the worst case data, we derive the calculation of two critical numbers predicting …
Graph clustering has many important applications in computing, but due to growing sizes of graphs, even traditionally fast clustering methods such as…
Widespread Chinese social media applications such as Weibo are widely known for monitoring and deleting posts to conform to Chinese government requir…
Point clouds provide a flexible and scalable geometric representation suitable for countless applications in computer graphics; they also comprise th…
Software updates are critical to the performance, compatibility, and security of software systems. However, users do not always install updates, leav…
The proliferation of fake news and its propagation on social media have become a major concern due to its ability to create devastating impacts. Diff…
Today's geo-location estimation approaches are able to infer the location of a target image using its visual content alone. These approaches exploit …
By signing up you accept our content policy
Already have an account? Sign in
No a member yet? Create an account