How To Read Research Papers

Adversarial Examples for Models of Code. (arXiv:1910.07517v1 [cs.LG])
We introduce a novel approach for attacking trained models of code with adversarial examples. The main idea is to force...

Right-wing German Hate Speech on Twitter: Analysis and Automatic Detection. (arXiv:1910.07518v1 [cs.CL])
Discussion about the social network Twitter often concerns its role in political discourse, involving the question of when an expression...

On foundational aspects of RDF and SPARQL. (arXiv:1910.07519v1 [cs.DB])
We consider the recommendations of the World Wide Web Consortium (W3C) about the Resource Description Framework (RDF) and the associated...

End-to-End Cascaded U-Nets with a Localization Network for Kidney Tumor Segmentation. (arXiv:1910.07521v1 [eess.IV])
Kidney tumor segmentation emerges as a new frontier of computer vision in medical imaging. This is partly due to its...

Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols. (arXiv:1910.07557v1 [cs.CR])
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be rendered insecure by Shor's algorithm when large-scale...

A Double Residual Compression Algorithm for Efficient Distributed Learning. (arXiv:1910.07561v1 [cs.LG])
Large-scale machine learning models are often trained by parallel stochastic gradient descent algorithms. However, the communication cost of gradient aggregation...

Explainable AI for Intelligence Augmentation in Multi-Domain Operations. (arXiv:1910.07563v1 [cs.AI])
Central to the concept of multi-domain operations (MDO) is the utilization of an intelligence, surveillance, and reconnaissance (ISR) network consisting...

UMap: Enabling Application-driven Optimizations for Page Management. (arXiv:1910.07566v1 [cs.DC])
Leadership supercomputers feature a diversity of storage, from node-local persistent memory and NVMe SSDs to network-interconnected flash memory and HDD....

Active Learning for Graph Neural Networks via Node Feature Propagation. (arXiv:1910.07567v1 [cs.LG])
Graph Neural Networks (GNNs) for prediction tasks like node classification or edge prediction have received increasing attention in recent machine...

On the Computational Complexity of Finding a Sparse Wasserstein Barycenter. (arXiv:1910.07568v1 [math.OC])
The discrete Wasserstein barycenter problem is a minimum-cost mass transport problem for a set of probability measures with finite support....

Assessing the viability of Battery Energy Storage Systems coupled with Photovoltaics under a pure self-consumption scheme. (arXiv:1910.07576v1 [eess.SY])
Over the last few decades, there is a constantly increasing deployment of solar photovoltaic (PV) systems both at the commercial...

Deep Coregionalization for the Emulation of Spatial-Temporal Fields. (arXiv:1910.07577v1 [physics.comp-ph])
Data-driven surrogate models are widely used for applications such as design optimization and uncertainty quantification, where repeated evaluations of an...

Blockchain Tree as Solution for Distributed Storage of Personal ID Data and Document Access Control. (arXiv:1910.07579v1 [cs.CR])
This paper introduces a new method of Blockchain formation for reliable storage of personal data of ID-card holders. In particular,...

Scaling up Psychology via Scientific Regret Minimization: A Case Study in Moral Decision-Making. (arXiv:1910.07581v1 [cs.CY])
Do large datasets provide value to psychologists? Without a systematic methodology for working with such datasets, there is a valid...

Abstract Transducers. (arXiv:1910.07583v1 [cs.FL])
Several abstract machines that operate on symbolic input alphabets have been proposed in the last decade, for example, symbolic automata...

Some Geometric Applications of Anti-Chains. (arXiv:1910.07586v1 [cs.CG])
We present an algorithmic framework for computing anti-chains of maximum size in geometric posets. Specifically, posets in which the entities...

Joint Optimization of Waveform Covariance Matrix and Antenna Selection for MIMO Radar. (arXiv:1910.07591v1 [eess.SP])
In this paper, we investigate the problem of jointly optimizing the waveform covariance matrix and the antenna position vector for...

Learning chordal extensions. (arXiv:1910.07600v1 [cs.LG])
A highly influential ingredient of many techniques designed to exploit sparsity in numerical optimization is the so-called chordal extension of...

Contextual Joint Factor Acoustic Embeddings. (arXiv:1910.07601v1 [cs.CL])
Embedding acoustic information into fixed length representations is of interest for a whole range of applications in speech and audio...

Meet the Family of Statistical Disclosure Attacks. (arXiv:1910.07603v1 [cs.CR])
Disclosure attacks aim at revealing communication patterns in anonymous communication systems, such as conversation partners or frequency. In this paper,...


Source: RSS news feeds for arXiv updates