In the field of evolutionary computation, it is common to compare different algorithms using a large test set, especially when the test involves function optimization [GW93]. However, the ...
Alice was beginning to get very tired of sitting by her sister on the bank, and of having nothing to do: once or twice she had peeped into the book her sister was reading, but it had no pictures or ...
The world tried to kill Andy off but he had to stay alive to to talk about what happened with databases in 2025.
A commonly observed failure mode of Neural Radiance Field (NeRF) is fitting incorrect geometries when given an insufficient number of input views. One potential reason is that standard volumetric ...
There will be weekly written assignments, starting in the first week of classes. Each written assignment consists of 1-3 questions that require students to write single paragraph answers. They are ...
GiRaF is a computational tool for identification of reassortments in influenza viruses from sequence databases of isolates. Reassortments in influenza - a process where strains exchange genetic ...
The area of approximation algorithms is aimed at giving provable guarantees on the performance of heuristics for hard problems. The course will present general techniques (such as convex ...
SCS faculty members Andrea Bajcsy, Fernando De La Torre and Maarten Sap have received Amazon Research Awards to advance reliability, safety and performance in emerging AI systems. Amazon has named ...
Software Engineering for Information Systems (SEIS) is a two-semester course sequence offered by the Language Technologies Institute at Carnegie Mellon. The first course, 11-791 (SEIS I), is offered ...
We introduce the heat method for solving the single- or multiple-source shortest path problem on both flat and curved domains. A key insight is that distance computation can be split into two stages: ...
Consider the words "man", "woman", "boy", and "girl". Two of them refer to males, and two to females. Also, two of them refer to adults, and two to children. We can ...
This webpage is a benchmark data set for keystroke dynamics. It is a supplement to the paper "Comparing Anomaly-Detection Algorithms for Keystroke Dynamics," by Kevin Killourhy and Roy Maxion, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results