Search Results
2. A New Framework and Novel Techniques to Multimodal Concept Representation and Fusion
3. Differentiable Simulation for Photonic Design: from Semi-Analytical Methods to Ray Tracing
4. Methods and Tools for Practical Software Testing and Maintenance
5. Simulation Based Testing for Autonomous Driving Systems
6. Towards Self-Managing Networked Cyber-Physical Systems
7. Abstractions for Probabilistic Programming to Support Model Development
8. Adaptive and Effective Fuzzing: a Data-Driven Approach
9. AI and the Writer: How Language Models Support Creative Writers
10. Analyzing and Securing Software via Robust and Generalizable Learning
11. A Sparse Learning Approach for Linux Kernel Data Race Prediction
12. Bayesian Auction Design and Approximation
13. Complaint Driven Training Data Debugging for Machine Learning Workflows
14. Computer Vision-Powered Applications for Interpreting and Interacting with Movement
15. Designing Exploratory Search Systems that Stimulate Memory and Reduce Cognitive Load
16. Designing, Implementing and Programming a Massively Multithreaded Spatial Accelerator Architecture
17. Dialogue Systems Specialized in Social Influence: Systems, Methods, and Ethics
18. Faithfulness in Abstractive Summarization: Progress and Challenges
19. Grounded and Consistent Question Answering
20. Interfaces for Personalized Language Learning with Generative Language Models
21. Learning Video Representation from Self-supervision
22. Leveraging network structures in understanding node predictions and fairness
23. New Container Architectures for Mobile, Drone, and Cloud Computing
24. Robust Machine Learning by Integrating Context
25. Social Addictive Gameful Engineering (SAGE): A Game-based Learning and Assessment System for Computational Thinking
26. Some Aspects of Noncommutativity in Polynomial Optimization
27. Toward Annotation Efficiency in Biased Learning Settings for Natural Language Processing
28. Toward A Secure Account Recovery: Machine Learning Based User Modeling for protection of Account Recovery in a Managed Environment
29. Using Linguistic Features to Improve Prosody for Text-to-Speech
30. Utilizing Runtime Information for Accurate Root Cause Identification in Performance Diagnosis
31. Algorithmic Design for Social Networks: Inequality, Bias, and Diversity
32. Beyond Worst-Case Analysis of Optimization in the Era of Machine Learning
33. Deep Self-Modeling for Robotic Systems
34. Detection, Triage, and Attribution of PII Phishing Sites
35. Efficient Neural Network Verification Using Branch and Bound
36. Efficient recovery algorithms with restricted access to strings
37. Enabling Structured Navigation of Longform Spoken Dialog with Automatic Summarization
38. Hardware-Software Co-design for Practical Memory Safety
39. Harnessing Simulated Data with Graphs
40. Internet Subscription Plans: Thresholding, Throttling, and Zero-Rating
41. Learning Mobile Manipulation
42. Learning to Edit Code : Towards Building General Purpose Models for Source Code Editing
43. Machine Learning for AI-Augmented Design Space Exploration of Computer Systems
44. Machine Learning for Gravitational-Wave Astronomy: Methods and Applications for High-Dimensional Laser Interferometry Data
45. Multi-Functional Interfaces for Accelerators
46. Multiscaling and Machine Learning Approaches to Physics Simulation
47. PRIVUS: Census Privacy System
48. Resource-Efficient Methods in Machine Learning
49. Ring-LWE: Enhanced Foundations and Applications
50. Understanding Motivations Behind Co-Located Stranger Interactions
51. A Computational Perspective of Causal Inference and the Data Fusion Problem
52. A Secure and Formally Verified Commodity Multiprocessor Hypervisor
53. Autogenerative Networks
54. Bespoke Security for Resource Constrained Cyber-Physical Systems
55. Beyond summary statistics: extracting etiological insights from genome-wide association cohorts
56. Bridging the Gap Between People, Mobile Devices, and the Physical World
57. Detect and Repair Errors for DNN-based Software
58. Identifying Speaker State from Multimodal Cues
59. Improving Robotic Manipulation via Reachability, Tactile, and Spatial Awareness
60. Improving Security Through Egalitarian Binary Recompilation
61. New Primitives for Tackling Graph Problems and Their Applications in Parallel Computing
62. Next Generation Cloud Computing Architectures: Performance and Pricing
63. On Resilience to Computable Tampering
64. Salience Estimation and Faithful Generation: Modeling Methods for Text Summarization and Generation
65. Structure and Feedback in Cloud Service API Fuzzing
66. Text Classification: Exploiting the Social Network
67. The Design, Implementation, and Evaluation of Software and Architectural Support for Nested Virtualization on Modern Architectures
68. Unsupervised Morphological Segmentation and Part-of-Speech Tagging for Low-Resource Scenarios
69. Variational Bayesian Methods for Inferring Spatial Statistics and Nonlinear Dynamics
70. XR Development with the Relay and Responder Pattern
71. A Geometric Approach to Dynamical System: Global Analysis for Non-Convex Optimization
72. Cryptographic approaches to security and optimization in machine learning
73. Effective Randomized Concurrency Testing with Partial Order Methods
74. Identifying and Modeling Code-Switched Language
75. Interactive, Computation Assisted Design Tools
76. Location Data: Perils, Profits, Promise
77. Making Data Storage Efficient in the Era of Cloud Computing
78. Multi-Mobile Computing
79. New Data Protection Abstractions for Emerging Mobile and Big Data Workloads
80. New Methods in Sublinear Computation for High Dimensional Problems
81. Optimizing Query Processing Under Skew
82. Preventing Code Reuse Attacks On Modern Operating Systems
83. Statistical Machine Learning & Deep Neural Networks Applied to Neural Data Analysis
84. Unsupervised Representation Learning with Correlations
85. Adapting Automatic Summarization to New Sources of Information
86. Attribute-Based Encryption for Boolean Formulas
87. CacheCash: A Cryptocurrency-based Decentralized Content Delivery Network
88. Compiling Irregular Software to Specialized Hardware
89. Cross-Lingual and Low-Resource Sentiment Analysis
90. Cross-Lingual Transfer of Natural Language Processing Systems
91. Deception in Spoken Dialogue: Classification and Individual Differences
92. Design Space Exploration of Accelerators for Warehouse Scale Computing
93. Human Motion Anticipation and Recognition from RGB-D
94. Leveraging Text-to-Scene Generation for Language Elicitation and Documentation
95. Machine Learning Based User Modeling for Enterprise Security and Privacy Risk Mitigation
96. Multi-Scale Models to Simulate Interactions between Liquid and Thin Structures
97. Physical Plan Instrumentation in Databases: Mechanisms and Applications
98. Repurposing Software Defenses with Specialized Hardware
99. Scalable Emulation of Heterogeneous Systems
100. Security, Privacy, and Transparency Guarantees for Machine Learning Systems
- « Previous
- Next »
- 1
- 2
- 3