Search Results
2. A New Framework and Novel Techniques to Multimodal Concept Representation and Fusion
3. Differentiable Simulation for Photonic Design: from Semi-Analytical Methods to Ray Tracing
4. Generating Faithful and Complete Hospital-Course Summaries from the Electronic Health Record
5. Methods and Tools for Practical Software Testing and Maintenance
6. Simulation Based Testing for Autonomous Driving Systems
7. Towards Self-Managing Networked Cyber-Physical Systems
8. Abstractions for Probabilistic Programming to Support Model Development
9. Adaptive and Effective Fuzzing: a Data-Driven Approach
10. AI and the Writer: How Language Models Support Creative Writers
11. Analyzing and Securing Software via Robust and Generalizable Learning
12. A Sparse Learning Approach for Linux Kernel Data Race Prediction
13. Bayesian Auction Design and Approximation
14. Complaint Driven Training Data Debugging for Machine Learning Workflows
15. Computational Models of Argument Structure and Argument Quality for Understanding Misinformation
16. Computer Vision-Powered Applications for Interpreting and Interacting with Movement
17. Designing Exploratory Search Systems that Stimulate Memory and Reduce Cognitive Load
18. Designing, Implementing and Programming a Massively Multithreaded Spatial Accelerator Architecture
19. Design Opportunities for Assistive and Social Technologies Situated in Space
20. Dialogue Systems Specialized in Social Influence: Systems, Methods, and Ethics
21. Faithfulness in Abstractive Summarization: Progress and Challenges
22. Grounded and Consistent Question Answering
23. Interfaces for Personalized Language Learning with Generative Language Models
24. Interpretable Machine Learning for the Social Sciences: Applications in Political Science and Labor Economics
25. Koopman Constrained Policy Optimization: A Koopman operator theoretic method for differentiable optimal control in robotics
26. Learning Video Representation from Self-supervision
27. Leveraging network structures in understanding node predictions and fairness
28. New Container Architectures for Mobile, Drone, and Cloud Computing
29. Robust Machine Learning by Integrating Context
30. "Seeing Red" or "Tickled Pink"? Investigating the Power of Language and Vision Models through Color, Emotion, and Metaphor
31. Social Addictive Gameful Engineering (SAGE): A Game-based Learning and Assessment System for Computational Thinking
32. Some Aspects of Noncommutativity in Polynomial Optimization
33. Toward Annotation Efficiency in Biased Learning Settings for Natural Language Processing
34. Toward A Secure Account Recovery: Machine Learning Based User Modeling for protection of Account Recovery in a Managed Environment
35. Towards Causal Reinforcement Learning
36. Using Linguistic Features to Improve Prosody for Text-to-Speech
37. Utilizing Runtime Information for Accurate Root Cause Identification in Performance Diagnosis
38. Algorithmic Design for Social Networks: Inequality, Bias, and Diversity
39. Beyond Worst-Case Analysis of Optimization in the Era of Machine Learning
40. Deep Self-Modeling for Robotic Systems
41. Detection, Triage, and Attribution of PII Phishing Sites
42. Efficient Machine Teaching Frameworks for Natural Language Processing
43. Efficient Neural Network Verification Using Branch and Bound
44. Efficient recovery algorithms with restricted access to strings
45. Enabling Structured Navigation of Longform Spoken Dialog with Automatic Summarization
46. Hardware-Software Co-design for Practical Memory Safety
47. Harnessing Simulated Data with Graphs
48. Internet Subscription Plans: Thresholding, Throttling, and Zero-Rating
49. Learning Mobile Manipulation
50. Learning to Edit Code : Towards Building General Purpose Models for Source Code Editing
51. Machine Learning for AI-Augmented Design Space Exploration of Computer Systems
52. Machine Learning for Gravitational-Wave Astronomy: Methods and Applications for High-Dimensional Laser Interferometry Data
53. Multi-Functional Interfaces for Accelerators
54. Multiscaling and Machine Learning Approaches to Physics Simulation
55. PRIVUS: Census Privacy System
56. Resource-Efficient Methods in Machine Learning
57. Ring-LWE: Enhanced Foundations and Applications
58. Towards Generalist Robots through Visual World Modeling
59. Understanding Motivations Behind Co-Located Stranger Interactions
60. A Computational Perspective of Causal Inference and the Data Fusion Problem
61. A Secure and Formally Verified Commodity Multiprocessor Hypervisor
62. Autogenerative Networks
63. Bespoke Security for Resource Constrained Cyber-Physical Systems
64. Beyond summary statistics: extracting etiological insights from genome-wide association cohorts
65. Bridging the Gap Between People, Mobile Devices, and the Physical World
66. Detect and Repair Errors for DNN-based Software
67. Easy Encryption for Email, Photo, and Other Cloud Services
68. Identifying Speaker State from Multimodal Cues
69. Improving Robotic Manipulation via Reachability, Tactile, and Spatial Awareness
70. Improving Security Through Egalitarian Binary Recompilation
71. Learning Structured Representations for Understanding Visual and Multimedia Data
72. Methods for modeling the dynamics of microbial communities
73. New Primitives for Tackling Graph Problems and Their Applications in Parallel Computing
74. Next Generation Cloud Computing Architectures: Performance and Pricing
75. On Resilience to Computable Tampering
76. Predictive Privacy: Modeling Privacy Harms
77. Salience Estimation and Faithful Generation: Modeling Methods for Text Summarization and Generation
78. Structure and Feedback in Cloud Service API Fuzzing
79. Text Classification: Exploiting the Social Network
80. The Design, Implementation, and Evaluation of Software and Architectural Support for Nested Virtualization on Modern Architectures
81. Unsupervised Morphological Segmentation and Part-of-Speech Tagging for Low-Resource Scenarios
82. Variational Bayesian Methods for Inferring Spatial Statistics and Nonlinear Dynamics
83. XR Development with the Relay and Responder Pattern
84. A Geometric Approach to Dynamical System: Global Analysis for Non-Convex Optimization
85. Content Selection for Effective Counter-Argument Generation
86. Cryptographic approaches to security and optimization in machine learning
87. Effective Randomized Concurrency Testing with Partial Order Methods
88. Identifying and Modeling Code-Switched Language
89. Interactive, Computation Assisted Design Tools
90. Location Data: Perils, Profits, Promise
91. Making Data Storage Efficient in the Era of Cloud Computing
92. Multi-Mobile Computing
93. New Data Protection Abstractions for Emerging Mobile and Big Data Workloads
94. New Methods in Sublinear Computation for High Dimensional Problems
95. Optimizing Query Processing Under Skew
96. Preventing Code Reuse Attacks On Modern Operating Systems
97. Probabilistic Programming for Deep Learning
98. Statistical Machine Learning & Deep Neural Networks Applied to Neural Data Analysis
99. Unsupervised Representation Learning with Correlations
100. Adapting Automatic Summarization to New Sources of Information
- « Previous
- Next »
- 1
- 2
- 3