Learn More
Automated music emotion recognition (MER) is a challenging task in Music Information Retrieval (MIR) with wide-ranging applications. Some recent studies pose MER as a continuous regression problem in the ArousalValence (AV) plane. These consist of variations on a common architecture having a universal model of emotional response, a common repertoire of(More)
Systems able to find a song based on a sung, hummed, or whistled melody are called Query-By-Humming (QBH) systems. Tunebot is an online QBH web service and iPhone app that connects users to the desired recording on Amazon.com or iTunes. Tunebot’s searchable database is composed of thousands of usercontributed melodies. Melodies are collected from user(More)
Yannakakis [1991, 1988] showed that the matching problem does not have a small symmetric linear program. Rothvoß [2014] recently proved that any, not necessarily symmetric, linear program also has exponential size. In light of this, it is natural to ask whether the matching problem can be expressed compactly in a framework such as semidefinite programming(More)
Genetically improved farmed tilapia is increasingly getting popular in Bangladesh. It has high production potential. Its dominant production technology ranges from extensive to improved extensive particularly in the rural areas. This study estimates levels and determinants of farm-level technical efficiency of tilapia farmers of Bangladesh using stochastic(More)
to his students, good research, and creative thinking. Our weekly group meetings were as valuable as anything that I have learned in the classroom. I thank Agnieszka Roginska for pointing me in the right direction at NYU. Her early guidance has had more impact on me than any other's at NYU. My peers, Peacock, Mary Farbood, and Panos Mavromatis—you have each(More)
Cat-and-mouse is a two-player game on a finite graph. Chandra and Stockmeyer showed cat-and-mouse is P-complete on directed graphs. We show cat-and-mouse is P-complete on undirected graphs. To our knowledge, no proof of the directed case was ever published. To fill this gap we give a proof for directed graphs and extend it to undirected graphs. The proof is(More)
The <i>XRDS</i> blog highlights a range of topics from conference overviews to privacy and security, from HCI to cryptography. Selected blog posts, edited for print, will be featured in every issue. Please visit xrds.acm.org/blog to read each post in its entirety.
  • 1