State space methods have proven indispensable in neural data analysis. However, common methods for performing inference in state-space models with non-Gaussian observations rely o...
Liam Paninski, Yashar Ahmadian, Daniel Gil Ferreir...
We propose in this paper to unify two different ap-
proaches to image restoration: On the one hand, learning a
basis set (dictionary) adapted to sparse signal descriptions
has p...
Julien Mairal, Francis Bach, Jean Ponce, Guillermo...
The seemingly simple choice of whether to use call variance or call subsumption in a tabled evaluation deeply affects an evaluation’s properties. Most tabling implementations hav...
Abstract. It is still the case that language descriptions have lots of semantic information captured using plain (English) text. These imprecise descriptions are hardly usable for ...
Andreas Prinz, Markus Scheidgen, Merete Skjelten T...
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...