Nonlinear metamaterials with tailored mechanical properties have applica...
Target pointing selection is a fundamental task. According to Fitts' law...
Modeling contact between deformable solids is a fundamental problem in
c...
Over the past decades, context sensitivity has been considered as one of...
We propose a dense neural simultaneous localization and mapping (SLAM)
a...
Considering a conversation thread, stance classification aims to identif...
Combination therapy with multiple drugs is a potent therapy strategy for...
Learned image compression has exhibited promising compression performanc...
This work is a series of two articles. The main goal is to rigorously de...
This report describes the NPU-HC speaker verification system submitted t...
Spot instances offer a cost-effective solution for applications running ...
Cross-Chain bridges have become the most popular solution to support ass...
Static analysis is a mature field with applications to bug detection,
se...
COVID-19 vaccine hesitancy is widespread, despite governments' informati...
This paper describes the NPU system submitted to Spoofing Aware Speaker
...
The rapid growth of electronic health record (EHR) datasets opens up
pro...
This paper describes the second-placed system on the leaderboard of
SemE...
An evolving line of machine learning works observe empirical evidence th...
Visual cues are essential in computer-mediated communication. It is
espe...
In recent years, as blockchain adoption has been expanding across a wide...
Motivation: Electronic health record (EHR) data provides a new venue to
...
Protecting the Intellectual Property Rights (IPR) associated to Deep Neu...
This work presents transparent checkpointing of OpenGL applications, ref...
Recent advances in implicit neural representations show great promise wh...
Memory security and reliability are two of the major design concerns in ...
DNN watermarking is receiving an increasing attention as a suitable mean...
Recent monocular human performance capture approaches have shown compell...
In recent studies, Generative Adversarial Network (GAN) is one of the po...
In this work, a framework to construct arbitrarily high-order low-dissip...
We investigate the problem of testing the global null in the high-dimens...
In recent years, many decentralized applications based on blockchain (DA...
We propose LETO, a new hybrid Lagrangian-Eulerian method for topology
op...
Some recent studies have suggested using GANs for numeric data generatio...
Use of historical data in clinical trial design and analysis has shown
v...
The past decade has witnessed great success of deep learning technology ...
As the rapid growth of high-speed and deep-tissue imaging in biomedical
...
In Energy Management System (EMS) applications and many other off-line
p...
Coinduction occurs in two guises in Horn clause logic: in proofs of circ...
We establish proof-theoretic, constructive and coalgebraic foundations f...
Electronic health records (EHR) are rich heterogeneous collection of pat...
Coinduction occurs in two guises in Horn clause logic: in proofs of
self...
Java reflection has been increasingly used in a wide range of software. ...
Inspired by the recent advances of image super-resolution using convolut...
With different genomes available, unsupervised learning algorithms are
e...