Computer Science authors titles recent submissions
Teks penuh
Gambar
Dokumen terkait
arXiv:1711.06608v1 [cs.DB] 17 Nov 2017.. The simple goals of Loom are threefold: a) to discover patterns of edge traversals which are common when answering queries from our
By analyzing the discussion threads in IETF and interviewing email administrators, we provide a deeper understanding of the perceived value and limitations of anti-spoofing
Our method uses external knowledge in the form of symbols and predicted objects in two ways, as constraints for a joint image-text embedding space, and as an additive component for
To demonstrate the functionality of the toolchain, we implemented a neural network model with actor-critic architecture in NEST and trained it on two different environments simulated
The main contribution of this paper is a novel hierarchical framework for optimizing energy trading between prosumers and a grid power company, while explicitly taking into account
In this paper, we make the following contributions: (i) we show that given a parameter budjet, splitting a large network into an ensemble of smaller parallel branches of the same
We also present another dataset based on the DESCRIPT corpus—a crowdsourced corpus of event sequence de- scriptions ( Wanzare et al. While the WIKIHOW-based dataset helps to
size {} measure diameter of the circles color {} color fillcolor of vertices opacity {} number opacity of the fill color style {} string additional Ti k Z styles layer {}