-
Chapter and Conference Paper
A Verified Algorithm for the Centrosymmetric Solution of Sylvester Matrix Equations
We study the verification for a centrosymmetric solution of Sylvester matrix equations by the interval theory. Propose an algorithm which outputs an approximate centrosymmetric solution and its error bounds wi...
-
Chapter and Conference Paper
The Study on Dynamic Conditional Correlation-GARCH Model and its Application
This paper studies the Dynamic Conditional Correlation-GARCH model with asymmetries in volatilities and applies the model to estimate the time-varying conditional correlations of stock market returns between G...
-
Chapter and Conference Paper
Fast Algorithms for Verifying Centrosymmetric Solutions of Sylvester Matrix Equations
Based on floating point operations, we study the accuracy of numerically computed centrosymmetric solutions in Sylvester matrix equations. Propose a fast algorithm which outputs the lower bound and upper bound...
-
Chapter and Conference Paper
Verified Error Bounds for Symmetric Solutions of Operator Matrix Equations
Based on the interval theory, the verification for symmetric solutions of operator matrix equations $$AX-XB-C=0, A\in \mathbb {R}^{m\times m},...
-
Chapter and Conference Paper
Surgical Skill Assessment on In-Vivo Clinical Data via the Clearness of Operating Field
Surgical skill assessment is important for surgery training and quality control. Prior works on this task largely focus on basic surgical tasks such as suturing and knot tying performed in simulation settings....
-
Chapter and Conference Paper
A Robust Facial Landmark Detector with Mixed Loss
Facial landmark detection is one of the most important tasks in face image and video analysis. Existing algorithms based on deep convolutional neural networks have achieved good performance in public benchmark...
-
Chapter and Conference Paper
Unsupervised Surgical Instrument Segmentation via Anchor Generation and Semantic Diffusion
Surgical instrument segmentation is a key component in develo** context-aware operating rooms. Existing works on this task heavily rely on the supervision of a large amount of labeled data, which involve lab...
-
Article
Open AccessSusceptible-infected-spreading-based network embedding in static and temporal networks
Link prediction can be used to extract missing information, identify spurious interactions as well as forecast network evolution. Network embedding is a methodology to assign coordinates to nodes in a low-dime...
-
Chapter and Conference Paper
Macaroni: Crawling and Enriching Metadata from Public Model Zoos
Machine learning (ML) researchers and practitioners are building repositories of pre-trained models, called model zoos. These model zoos contain metadata that detail various properties of the ML models and datase...
-
Chapter and Conference Paper
Optimizing ML Inference Queries Under Constraints
The proliferation of pre-trained ML models in public Web-based model zoos facilitates the engineering of ML pipelines to address complex inference queries over datasets and streams of unstructured content. Con...