How To Read Research Papers

Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and Devices. (arXiv:2001.08211v1 [cs.CR])
Along with the benefits of Internet of Things (IoT) come potential privacy risks, since billions of the connected devices are...

Active Perception with A Monocular Camera for Multiscopic Vision. (arXiv:2001.08212v1 [cs.CV])
We design a multiscopic vision system that utilizes a low-cost monocular RGB camera to acquire accurate depth estimation for robotic...

Nonlinear Blockchain Scalability: a Game-Theoretic Perspective. (arXiv:2001.08231v1 [cs.CR])
Recent advances in the blockchain research have been made in two important directions. One is refined resilience analysis utilizing game...

Search-Based Software Engineering for Self-Adaptive Systems: One Survey, Five Disappointments and Six Opportunities. (arXiv:2001.08236v1 [cs.SE])
Search-Based Software Engineering (SBSE) is a promising paradigm that exploits computational search to optimize different processes when engineering complex software...

The divergence-conforming immersed boundary method: Application to vesicle and capsule dynamics. (arXiv:2001.08244v1 [physics.flu-dyn])
We extend the recently introduced divergence-conforming immersed boundary (DCIB) method [1] to fluid-structure interaction (FSI) problems involving closed co-dimension one...

Signalling Acts of Punishment Promotes the Emergence of Cooperation and Enhanced Social Welfare in Evolutionary Games. (arXiv:2001.08245v1 [cs.GT])
Social punishment has been suggested as a key approach to ensuring high levels of cooperation and norm compliance in one-shot...

PENet: Object Detection using Points Estimation in Aerial Images. (arXiv:2001.08247v1 [cs.CV])
Aerial imagery has been increasingly adopted in mission-critical tasks, such as traffic surveillance, smart cities, and disaster assistance. However, identifying...

How Much Position Information Do Convolutional Neural Networks Encode?. (arXiv:2001.08248v1 [cs.CV])
In contrast to fully connected networks, Convolutional Neural Networks (CNNs) achieve efficiency by learning weights associated with local filters with...

Talek: Private Group Messaging with Hidden Access Patterns. (arXiv:2001.08250v1 [cs.CR])
Talek is a private group messaging system that sends messages through potentially untrustworthy servers, while hiding both data content and...

To schedule or not to schedule: when no-scheduling can beat the best-known flow scheduling algorithm in datacenter networks. (arXiv:2001.08253v1 [cs.NI])
Conventional wisdom for minimizing the average flow completion time (AFCT) in the datacenter network (DCN), where flow sizes are highly...

Robust block preconditioners for poroelasticity. (arXiv:2001.08254v1 [math.NA])
In this paper we study the linear systems arising from discretized poroelasticity problems. We formulate one block preconditioner for the...

A Probabilistic Framework for Imitating Human Race Driver Behavior. (arXiv:2001.08255v1 [cs.RO])
Understanding and modeling human driver behavior is crucial for advanced vehicle development. However, unique driving styles, inconsistent behavior, and complex...

Energy-Efficient Offloading in Delay-Constrained Massive MIMO Enabled Edge Network Using Data Partitioning. (arXiv:2001.08259v1 [eess.SP])
We study a wireless edge-computing system which allows multiple users to simultaneously offload computation-intensive tasks to multiple massive-MIMO access points,...

An asymptotic preserving semi-implicit multiderivative solver. (arXiv:2001.08268v1 [math.NA])
In this work we construct a multiderivative implicit-explicit (IMEX) scheme for a class of stiff ordinary differential equations. Our solver...

Representation Learning for Medical Data. (arXiv:2001.08269v1 [cs.LG])
We propose a representation learning framework for medical diagnosis domain. It is based on heterogeneous network-based model of diagnostic data...

Intermittent Pulling with Local Compensation for Communication-Efficient Federated Learning. (arXiv:2001.08277v1 [cs.LG])
Federated Learning is a powerful machine learning paradigm to cooperatively train a global model with highly distributed data. A major...

Transition-Based Dependency Parsing using Perceptron Learner. (arXiv:2001.08279v1 [cs.CL])
Syntactic parsing using dependency structures has become a standard technique in natural language processing with many different parsing models, in...

Convolutional Codes. (arXiv:2001.08281v1 [cs.IT])
The article provides a survey on convolutional codes stressing the connections to module theory and systems theory. Constructions of codes...

Dynamics of extended Schelling models. (arXiv:2001.08284v1 [cond-mat.stat-mech])
We explore extensions of Schelling's model of social dynamics, in which two types of agents live on a checkerboard lattice...

A Multi-Scale Tensor Network Architecture for Classification and Regression. (arXiv:2001.08286v1 [stat.ML])
We present an algorithm for supervised learning using tensor networks, employing a step of preprocessing the data by coarse-graining through...


Source: RSS news feeds for arXiv updates