How To Read Research Papers

On Fast Computation of a Circulant Matrix-Vector Product. (arXiv:2103.02605v1 [cs.DS])
This paper deals with circulant matrices. It is shown that a circulant matrix can be multiplied by a vector in...

Blockchain in Cyberdefence: A Technology Review from a Swiss Perspective. (arXiv:2103.02606v1 [cs.CR])
Since the advent of bitcoin in 2008, the concept of a blockchain has widely spread. Besides crypto currencies and trading...

Truly multi-dimensional all-speed schemes for the Euler equations on Cartesian grids. (arXiv:2103.02621v1 [math.NA])
Finite volume schemes often have difficulties to resolve the low Mach number (incompressible) limit of the Euler equations. Incompressibility is...

Statistical Hypothesis Testing for Class-Conditional Label Noise. (arXiv:2103.02630v1 [cs.LG])
In this work we aim to provide machine learning practitioners with tools to answer the question: is there class-conditional flipping...

Rotograd: Dynamic Gradient Homogenization for Multi-Task Learning. (arXiv:2103.02631v1 [cs.LG])
While multi-task learning (MTL) has been successfully applied in several domains, it still triggers challenges. As a consequence of negative...

A Novel Context-Aware Multimodal Framework for Persian Sentiment Analysis. (arXiv:2103.02636v1 [cs.CL])
Most recent works on sentiment analysis have exploited the text modality. However, millions of hours of video recordings posted on...

SkillVet: Automated Traceability Analysis of Amazon Alexa Skills. (arXiv:2103.02637v1 [cs.CR])
Third-party software, or skills, are essential components in Smart Personal Assistants (SPA). The number of skills has grown rapidly, dominated...

Compute and memory efficient universal sound source separation. (arXiv:2103.02644v1 [cs.SD])
Recent progress in audio source separation lead by deep learning has enabled many neural network models to provide robust solutions...

Critical Slowing Down Near Topological Transitions in Rate-Distortion Problems I. (arXiv:2103.02646v1 [cs.IT])
In Rate Distortion (RD) problems one seeks reduced representations of a source that meet a target distortion constraint. Such optimal...

Nonlinearly Stable Flux Reconstruction High-Order Methods in Split Form. (arXiv:2103.02647v1 [math.NA])
The flux reconstruction (FR) method has gained popularity in the research community as it recovers promising high-order methods through modally...

Self-play Learning Strategies for Resource Assignment in Open-RAN Networks. (arXiv:2103.02649v1 [cs.NI])
Open Radio Access Network (ORAN) is being developed with an aim to democratise access and lower the cost of future...

Successor Feature Sets: Generalizing Successor Representations Across Policies. (arXiv:2103.02650v1 [cs.LG])
Successor-style representations have many advantages for reinforcement learning: for example, they can help an agent generalize from past experience to...

Experimental Body-input Three-stage DC offset Calibration Scheme for Memristive Crossbar. (arXiv:2103.02651v1 [cs.ET])
Reading several ReRAMs simultaneously in a neuromorphic circuit increases power consumption and limits scalability. Applying small inference read pulses is...

A Robust Adversarial Network-Based End-to-End Communications System With Strong Generalization Ability Against Adversarial Attacks. (arXiv:2103.02654v1 [cs.LG])
We propose a novel defensive mechanism based on a generative adversarial network (GAN) framework to defend against adversarial attacks in...

Numerical investigation of some reductions for the Gatenby-Gawlinski model. (arXiv:2103.02657v1 [math.NA])
The Gatenby-Gawlinski model for cancer invasion is object of analysis in order to investigate the mathematical framework behind the model...

Deep Clustering by Semantic Contrastive Learning. (arXiv:2103.02662v1 [cs.CV])
Whilst contrastive learning has achieved remarkable success in self-supervised representation learning, its potential for deep clustering remains unknown. This is...

Out of Distribution Generalization in Machine Learning. (arXiv:2103.02667v1 [stat.ML])
Machine learning has achieved tremendous success in a variety of domains in recent years. However, a lot of these success...

Revisiting the Concrete Security of Goldreich's Pseudorandom Generator. (arXiv:2103.02668v1 [cs.CR])
Local pseudorandom generators are a class of fundamental cryptographic primitives having very broad applications in theoretical cryptography. Following Couteau et...

An Empirical Analysis of UI-based Flaky Tests. (arXiv:2103.02669v1 [cs.SE])
Flaky tests have gained attention from the research community in recent years and with good reason. These tests lead to...

Efficient UAV Trajectory-Planning using Economic Reinforcement Learning. (arXiv:2103.02676v1 [cs.AI])
Advances in unmanned aerial vehicle (UAV) design have opened up applications as varied as surveillance, firefighting, cellular networks, and delivery...


Source: RSS news feeds for arXiv updates