Sciweavers

AAAI
2015
8 years 6 months ago
Learning Relational Sum-Product Networks
Sum-product networks (SPNs) are a recently-proposed deep architecture that guarantees tractable inference, even on certain high-treewidth models. SPNs are a propositional architec...
Aniruddh Nath, Pedro M. Domingos
AAAI
2015
8 years 6 months ago
Sharing Rides with Friends: A Coalition Formation Algorithm for Ridesharing
We consider the Social Ridesharing (SR) problem, where a set of commuters, connected through a social network, arrange one-time rides at short notice. In particular, we focus on t...
Filippo Bistaffa, Alessandro Farinelli, Sarvapali ...
AAAI
2015
8 years 6 months ago
On Vectorization of Deep Convolutional Neural Networks for Vision Tasks
We recently have witnessed many ground-breaking results in machine learning and computer vision, generated by using deep convolutional neural networks (CNN). While the success mai...
Jimmy S. J. Ren, Li Xu
AAAI
2015
8 years 6 months ago
Learning to Describe Video with Weak Supervision by Exploiting Negative Sentential Information
Most previous work on video description trains individual parts of speech independently. It is more appealing from a linguistic point of view, for word models for all parts of spe...
Haonan Yu, Jeffrey Mark Siskind
AAAI
2015
8 years 6 months ago
Preventing HIV Spread in Homeless Populations Using PSINET
Homeless youth are prone to HIV due to their engagement in high risk behavior. Many agencies conduct interventions to educate/train a select group of homeless youth about HIV prev...
Amulya Yadav, Leandro Soriano Marcolino, Eric Rice...
AAAI
2015
8 years 6 months ago
Optimal Personalized Filtering Against Spear-Phishing Attacks
To penetrate sensitive computer networks, attackers can use spear phishing to sidestep technical security mechanisms by exploiting the privileges of careless users. In order to ma...
Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Kout...
AAAI
2015
8 years 6 months ago
Security Games with Protection Externalities
Stackelberg security games have been widely deployed in recent years to schedule security resources. An assumption in most existing security game models is that one security resou...
Jiarui Gan, Bo An, Yevgeniy Vorobeychik
AAAI
2015
8 years 6 months ago
Maestoso: An Intelligent Educational Sketching Tool for Learning Music Theory
Learning music theory not only has practical benefits for musicians to write, perform, understand, and express music better, but also for both non-musicians to improve critical t...
Paul Taele, Laura Barreto, Tracy Anne Hammond
AAAI
2015
8 years 6 months ago
Identifying At-Risk Students in Massive Open Online Courses
Massive Open Online Courses (MOOCs) have received widespread attention for their potential to scale higher education, with multiple platforms such as Coursera, edX and Udacity rec...
Jiazhen He, James Bailey, Benjamin I. P. Rubinstei...