Cognitively-inspired Agent-based Service Composition for Mobile & Pervasive Computing

29 May 20191 code implementation

Automatic service composition in mobile and pervasive computing faces many challenges due to the complex and highly dynamic nature of the environment.

Dynamic Service Composition Orchestrated by Cognitive Agents in Mobile & Pervasive Computing

31 May 20191 code implementation

Automatic service composition in mobile and pervasive computing faces many challenges due to the complex nature of the environment.

Learning To Follow Directions in Street View

1 Mar 20191 code implementation

Navigating and understanding the real world remains a key challenge in machine learning and inspires a great variety of research in areas such as language grounding, planning, navigation and computer vision.

Practical Bayesian Optimization for Model Fitting with Bayesian Adaptive Direct Search

NeurIPS 2017 2 code implementations

Computational models in fields such as computational neuroscience are often evaluated via stochastic simulation or numerical approximation.

Visual Feature Attribution using Wasserstein GANs

CVPR 2018 2 code implementations

Attributing the pixels of an input image to a certain category is an important and well-studied problem in computer vision, with applications ranging from weakly supervised localisation to understanding hidden effects in the data.

Multi-Layered Gradient Boosting Decision Trees

NeurIPS 2018 1 code implementation

Multi-layered representation is believed to be the key ingredient of deep neural networks especially in cognitive tasks like computer vision.


Is This a Joke? Detecting Humor in Spanish Tweets

28 Mar 20171 code implementation

While humor has been historically studied from a psychological, cognitive and linguistic standpoint, its study from a computational perspective is an area yet to be explored in Computational Linguistics.


Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams

2 Oct 20171 code implementation

As a prospective filter for the human analyst, we present an online unsupervised deep learning approach to detect anomalous network activity from system logs in real time.


Crowdsourcing Ground Truth for Medical Relation Extraction

9 Jan 20171 code implementation

Cognitive computing systems require human labeled data for evaluation, and often for training.


Evolution of swarming behavior is shaped by how predators attack

22 Oct 20133 code implementations

Using an evolutionary model of a predator-prey system, we show that how predators attack is critical to the evolution of the selfish herd.