Search
Search Results
-
Hybrid Information Flow Control for Low-Level Code
Failure to ensure data confidentiality can have a significant financial and reputational impact on companies. To aggravate the issue, frequently used... -
Annotator Consensus Prediction for Medical Image Segmentation with Diffusion Models
A major challenge in the segmentation of medical images is the large inter- and intra-observer variability in annotations provided by multiple... -
Additive Randomized Encodings and Their Applications
Addition of n inputs is often the easiest nontrivial function to compute securely. Motivated by several open questions, we ask what can be computed... -
SGLP-Net: Sparse Graph Label Propagation Network for Weakly-Supervised Temporal Action Localization
The present weakly-supervised methods for Temporal Action Localization are primarily responsible for capturing the temporal context. However, these... -
Privacy Preserving DCOP Solving by Mediation
In this study we propose a new paradigm for solving DCOPs, whereby the agents delegate the computational task to a set of external mediators who... -
Graph Neural Network for Cell Tracking in Microscopy Videos
We present a novel graph neural network (GNN) approach for cell tracking in high-throughput microscopy videos. By modeling the entire time-lapse... -
Structure-adaptive graph neural network with temporal representation and residual connections
Graph learning methods have boosted brain analysis for user healthcare, disease detection, and behavioral modeling. Spatially separated brain regions...
-
Constructing Place Representations from Human-Generated Descriptions in Hebrew
Space is a natural and indispensable part of the human communication form, mostly based on natural-spatial descriptions with varying lexical... -
XSPIR: Efficient Symmetrically Private Information Retrieval from Ring-LWE
Private Information Retrieval (PIR) allows a client to retrieve one entry from a database held by a server, while hiding from the server which entry... -
SPRINT: High-Throughput Robust Distributed Schnorr Signatures
We describe robust high-throughput threshold protocols for generating Schnorr signatures in an asynchronous setting with potentially hundreds of... -
Enhancing Stockfish: A Chess Engine Tailored for Training Human Players
Stockfish is a highly popular open-source chess engine known for its exceptional strength. The recent integration of a neural network called NNUE has... -
Scene Table Structure Recognition with Segmentation and Key Point Collaboration
This paper proposes a Segmentation and Key point Collaboration Network (SKCN) for structure recognition of complex tables with geometric... -
STN-BA: Weakly-Supervised Few-Shot Temporal Action Localization
Existing Weakly-supervised Few-Shot Temporal Action Localization (WFTAL) methods often process feature snippets with limited information, resulting... -
Maximum Flows in Parametric Graph Templates
Execution graphs of parallel loop programs exhibit a nested, repeating structure. We show how such graphs that are the result of nested repetition... -
Task Grou** for Multilingual Text Recognition
Most existing OCR methods focus on alphanumeric characters due to the popularity of English and numbers, as well as their corresponding datasets. On... -
Artificial Intelligence (AI)-enhanced learning analytics (LA) for supporting Career decisions: advantages and challenges from user perspective
Artificial intelligence (AI) and learning analytics (LA) tools are increasingly implemented as decision support for learners and professionals....
-
On Separation Between the Degree of a Boolean Function and the Block Sensitivity
In this paper we study the separation between two complexity measures: the degree of a Boolean function as a polynomial over the reals and the block... -
Mixed reality and sensor real-time feedback to increase muscle engagement during deep core exercising
In lower extremity amputee rehabilitation programs, difficult-to-master targeted activation of deep core muscles and pursed-lip breathing training...
-
Exploiting semantic-level affinities with a mask-guided network for temporal action proposal in videos
Temporal action proposal (TAP) aims to detect the action instances’ starting and ending times in untrimmed videos, which is fundamental and critical...
-
Anomaly Detection Requires Better Representations
Anomaly detection seeks to identify unusual phenomena, a central task in science and industry. The task is inherently unsupervised as anomalies are...