Let $\displaystyle \{x_{k,n-1}\} _{k=1}^{n-1}$ and $\displaystyle \{x_{k,n}\} _{k=1}^{n},$ $n \in \mathbb{N}$, be two sets of real, distinct points s…

Recent papers in neural machine translation have proposed the strict use of attention mechanisms over previous standards such as recurrent and convol…

In a world of proliferating data, the ability to rapidly summarize text is growing in importance. Automatic summarization of text can be thought of a…

We describe a special case of structure from motion where the camera rotates on a sphere. The camera's optical axis lies perpendicular to the sphere'…

Physical-layer group secret-key (GSK) generation is an effective way of generating secret keys in wireless networks, wherein the nodes exploit inhere…

Many challenges in natural language processing require generating text, including language translation, dialogue generation, and speech recognition. …

In this paper we provide secrecy metrics applicable to physical-layer coding techniques with finite blocklengths over Gaussian and fading wiretap cha…

Convolutional Neural Network (CNNs) are typically associated with Computer Vision. CNNs are responsible for major breakthroughs in Image Classificati…

Novel classes of dynamical systems are introduced, including many-body problems characterized by nonlinear equations of motion of Newtonian type ("ac…

Over the last several years, the field of natural language processing has been propelled forward by an explosion in the use of deep learning models. …

Given vector representations for individual words, it is necessary to compute vector representations of sentences for many applications in a compositional manner, often using artificial neural networks. Relatively little work has explored the inte…

Given vector representations for individual words, it is necessary to compute vector representations of sentences for many applications in a composit…

We propose the use of dilated filters to construct an aggregation module in a multicolumn convolutional neural network for perspective-free counting.…

We study the impact of signal jamming attacks against the communication based train control (CBTC) systems and develop the countermeasures to limit t…

Facial attributes, emerging soft biometrics, must be automatically and reliably extracted from images in order to be usable in stand-alone systems. W…

A technique is introduced which allows to generate -- starting from any solvable discrete-time dynamical system involving N time-dependent variables …

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account