How To Read Research Papers

Methods and Techniques for Dynamic Deployability of Software-Defined Security Services. (arXiv:2004.02876v1 [cs.NI])
With the recent trend of "network softwarisation", enabled by emerging technologies such as Software-Defined Networking (SDN) and Network Function Virtualisation...

Empirical Upper Bound, Error Diagnosis and Invariance Analysis of Modern Object Detectors. (arXiv:2004.02877v1 [cs.CV])
Object detection remains as one of the most notorious open problems in computer vision. Despite large strides in accuracy in...

Parametrization of Neural Networks with Connected Abelian Lie Groups as Data Manifold. (arXiv:2004.02881v1 [stat.ML])
Neural nets have been used in an elusive number of scientific disciplines. Nevertheless, their parameterization is largely unexplored. Dense nets...

Data-Driven Distributed Stochastic Model Predictive Control with Closed-Loop Chance Constraint Satisfaction. (arXiv:2004.02907v1 [eess.SY])
Distributed model predictive control methods for uncertain systems often suffer from considerable conservatism and can tolerate only small uncertainties, due...

Speaker-change Aware CRF for Dialogue Act Classification. (arXiv:2004.02913v1 [cs.CL])
Recent work in Dialogue Act (DA) classification approaches the task as a sequence labeling problem, using neural network models coupled...

Uniform State Abstraction For Reinforcement Learning. (arXiv:2004.02919v1 [cs.LG])
Potential Based Reward Shaping combined with a potential function based on appropriately defined abstract knowledge has been shown to significantly...

A Comprehensive Study of Reconfigurable Intelligent Surfaces in Generalized Fading. (arXiv:2004.02922v1 [eess.SP])
Leveraging on the reconfigurable intelligent surface (RIS) paradigm for enabling the next Internet of Things (IoT) and 6G era, this...

An Annotated Corpus of Emerging Anglicisms in Spanish Newspaper Headlines. (arXiv:2004.02929v1 [cs.CL])
The extraction of anglicisms (lexical borrowings from English) is relevant both for lexicographic purposes and for NLP downstream tasks. We...

Feedforward control for wave disturbance rejection on floating offshore wind turbines. (arXiv:2004.02931v1 [eess.SY])
Floating offshore wind turbines allow wind energy to be harvested in deep waters. However, additional dynamics and structural loads may...

Beyond Background-Aware Correlation Filters: Adaptive Context Modeling by Hand-Crafted and Deep RGB Features for Visual Tracking. (arXiv:2004.02932v1 [cs.CV])
In recent years, the background-aware correlation filters have achie-ved a lot of research interest in the visual target tracking. However,...

Efficient Scale Estimation Methods using Lightweight Deep Convolutional Neural Networks for Visual Tracking. (arXiv:2004.02933v1 [cs.CV])
In recent years, visual tracking methods that are based on discriminative correlation filters (DCF) have been very promising. However, most...

Robust Wavelet-Based Watermarking Using Dynamic Strength Factor. (arXiv:2004.02940v1 [cs.MM])
In unsecured network environments, ownership protection of digital contents, such as images, is becoming a growing concern. Different watermarking methods...

Fingerprint Presentation Attack Detection: A Sensor and Material Agnostic Approach. (arXiv:2004.02941v1 [cs.CV])
The vulnerability of automated fingerprint recognition systems to presentation attacks (PA), i.e., spoof or altered fingers, has been a growing...

Embedding Java Classes with code2vec: Improvements from Variable Obfuscation. (arXiv:2004.02942v1 [cs.LG])
Automatic source code analysis in key areas of software engineering, such as code security, can benefit from Machine Learning (ML)....

Objectness-Aware One-Shot Semantic Segmentation. (arXiv:2004.02945v1 [cs.CV])
While deep convolutional neural networks have led to great progress in image semantic segmentation, they typically require collecting a large...

Power systems with high renewable energy sources: A review of inertia and frequency control strategies over time. (arXiv:2004.02951v1 [eess.SY])
Traditionally, inertia in power systems has been determined by considering all the rotating masses directly connected to the grid. During...

Deblurring using Analysis-Synthesis Networks Pair. (arXiv:2004.02956v1 [cs.CV])
Blind image deblurring remains a challenging problem for modern artificial neural networks. Unlike other image restoration problems, deblurring networks fail...

Gender-specific behavior change following terror attacks. (arXiv:2004.02957v1 [cs.SI])
Terrorists use violence in pursuit of political goals. While terror often has severe consequences for victims, it remains an open...

TSInsight: A local-global attribution framework for interpretability in time-series data. (arXiv:2004.02958v1 [cs.LG])
With the rise in the employment of deep learning methods in safety-critical scenarios, interpretability is more essential than ever before....

TSception: A Deep Learning Framework for Emotion Detection Using EEG. (arXiv:2004.02965v1 [eess.SP])
In this paper, we propose a deep learning framework, TSception, for emotion detection from electroencephalogram (EEG). TSception consists of temporal...


Source: RSS news feeds for arXiv updates