Alert button
Picture for Pascal Bouvry

Pascal Bouvry

Alert button

Training Green AI Models Using Elite Samples

Add code
Bookmark button
Alert button
Feb 19, 2024
Mohammed Alswaitti, Roberto Verdecchia, Grégoire Danoy, Pascal Bouvry, Johnatan Pecero

Viaarxiv icon

Transformer Multivariate Forecasting: Less is More?

Add code
Bookmark button
Alert button
Dec 30, 2023
Jingjing Xu, Caesar Wu, Yuan-Fang Li, Pascal Bouvry

Viaarxiv icon

Constraint Model for the Satellite Image Mosaic Selection Problem

Add code
Bookmark button
Alert button
Dec 07, 2023
Manuel Combarro Simón, Pierre Talbot, Grégoire Danoy, Jedrzej Musial, Mohammed Alswaitti, Pascal Bouvry

Viaarxiv icon

Survey of Trustworthy AI: A Meta Decision of AI

Add code
Bookmark button
Alert button
Jun 12, 2023
Caesar Wu, Yuan-Fang Lib, Pascal Bouvry

Figure 1 for Survey of Trustworthy AI: A Meta Decision of AI
Figure 2 for Survey of Trustworthy AI: A Meta Decision of AI
Figure 3 for Survey of Trustworthy AI: A Meta Decision of AI
Figure 4 for Survey of Trustworthy AI: A Meta Decision of AI
Viaarxiv icon

The Emerging Artificial Intelligence Protocol for Hierarchical Information Network

Add code
Bookmark button
Alert button
Feb 22, 2023
Caesar Wu, Pascal Bouvry

Figure 1 for The Emerging Artificial Intelligence Protocol for Hierarchical Information Network
Figure 2 for The Emerging Artificial Intelligence Protocol for Hierarchical Information Network
Figure 3 for The Emerging Artificial Intelligence Protocol for Hierarchical Information Network
Figure 4 for The Emerging Artificial Intelligence Protocol for Hierarchical Information Network
Viaarxiv icon

The Emerged Artificial Intelligence Protocol for Hierarchical Information Network

Add code
Bookmark button
Alert button
Feb 19, 2023
Caesar Wu, Pascal Bouvry

Figure 1 for The Emerged Artificial Intelligence Protocol for Hierarchical Information Network
Figure 2 for The Emerged Artificial Intelligence Protocol for Hierarchical Information Network
Figure 3 for The Emerged Artificial Intelligence Protocol for Hierarchical Information Network
Figure 4 for The Emerged Artificial Intelligence Protocol for Hierarchical Information Network
Viaarxiv icon

A Data-Driven Reconstruction Technique based on Newton's Method for Emission Tomography

Add code
Bookmark button
Alert button
Oct 19, 2021
Loizos Koutsantonis, Tiago Carneiro, Emmanuel Kieffer, Frederic Pinel, Pascal Bouvry

Figure 1 for A Data-Driven Reconstruction Technique based on Newton's Method for Emission Tomography
Figure 2 for A Data-Driven Reconstruction Technique based on Newton's Method for Emission Tomography
Figure 3 for A Data-Driven Reconstruction Technique based on Newton's Method for Emission Tomography
Figure 4 for A Data-Driven Reconstruction Technique based on Newton's Method for Emission Tomography
Viaarxiv icon

A Bayesian Optimization Approach for Attenuation Correction in SPECT Brain Imaging

Add code
Bookmark button
Alert button
Sep 24, 2021
Loizos Koutsantonis, Ayman Makki, Tiago Carneiro, Emmanuel Kieffer, Pascal Bouvry

Figure 1 for A Bayesian Optimization Approach for Attenuation Correction in SPECT Brain Imaging
Figure 2 for A Bayesian Optimization Approach for Attenuation Correction in SPECT Brain Imaging
Figure 3 for A Bayesian Optimization Approach for Attenuation Correction in SPECT Brain Imaging
Figure 4 for A Bayesian Optimization Approach for Attenuation Correction in SPECT Brain Imaging
Viaarxiv icon

Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning

Add code
Bookmark button
Alert button
Mar 01, 2019
Mostafa Rezazad, Matthias R. Brust, Mohammad Akbari, Pascal Bouvry, Ngai-Man Cheung

Figure 1 for Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning
Figure 2 for Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning
Figure 3 for Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning
Figure 4 for Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning
Viaarxiv icon

Defending against Intrusion of Malicious UAVs with Networked UAV Defense Swarms

Add code
Bookmark button
Alert button
Sep 02, 2018
Matthias R. Brust, Grégoire Danoy, Pascal Bouvry, Dren Gashi, Himadri Pathak, Mike P. Gonçalves

Figure 1 for Defending against Intrusion of Malicious UAVs with Networked UAV Defense Swarms
Figure 2 for Defending against Intrusion of Malicious UAVs with Networked UAV Defense Swarms
Figure 3 for Defending against Intrusion of Malicious UAVs with Networked UAV Defense Swarms
Figure 4 for Defending against Intrusion of Malicious UAVs with Networked UAV Defense Swarms
Viaarxiv icon