Conventional therapy approaches limit surgeons' dexterity control due to limited field-of-view. With the advent of robot-assisted surgery, there has …
Timely prediction of clinically critical events in Intensive Care Unit (ICU) is important for improving care and survival rate. Most of the existing …
Most counting questions in visual question answering (VQA) datasets are simple and require no more than object detection. Here, we study algorithms f…
We present Herschel Space Observatory PACS spectra of T Tauri stars, in which we detect amorphous and crystalline water ice features. Using irradiate…
Deep learning networks have shown state-of-the-art performance in many image reconstruction problems. However, it is not well understood what propert…
Handwritten text recognition is challenging because of the virtually infinite ways a human can write the same message. Our fully convolutional handwr…
We measure the black hole mass in the nearby active galaxy Centaurus A (NGC 5128) using a new method based on spectroastrometry of a rotating gas dis…
We study rank-1 {L1-norm-based TUCKER2} (L1-TUCKER2) decomposition of 3-way tensors, treated as a collection of $N$ $D \times M$ matrices that are to…
Computer vision technologies are very attractive for practical applications running on embedded systems. For such an application, it is desirable for…
In supervised machine learning, an agent is typically trained once and then deployed. While this works well for static settings, robots often operate…
Hand-crafting effective and efficient structures for recurrent neural networks (RNNs) is a difficult, expensive, and time-consuming process. To addre…
We propose a new efficient architecture for semantic segmentation, based on a "Waterfall" Atrous Spatial Pooling architecture, that achieves a consid…
Convolutional neural network has recently achieved great success for image restoration (IR) and also offered hierarchical features. However, most dee…
Homomorphic encryption (HE) is a promising cryptographic technique for enabling secure collaborative machine learning in the cloud. However, support …
Video-based eye trackers estimate gaze based on eye images/videos. As security and privacy concerns loom over technological advancements, tackling su…
The main source of various religious teachings is their sacred texts which vary from religion to religion based on different factors like the geograp…
Several scalable methods to compute the Kullback Leibler (KL) divergence between two distributions using their samples have been proposed and applied…
One-sided matching mechanisms are fundamental for assigning a set of indivisible objects to a set of self-interested agents when monetary transfers a…
Visually similar characters, or homoglyphs, can be used to perform social engineering attacks or to evade spam and plagiarism detectors. It is thus i…
With the ever-increasing quantity and variety of data worldwide, the Web has become a rich repository of mathematical formulae. This necessitates the…
By signing up you accept our content policy
Already have an account? Sign in
No a member yet? Create an account