Alert button

"Information": models, code, and papers
Alert button

Embedding and Beamforming: All-neural Causal Beamformer for Multichannel Speech Enhancement

Add code
Bookmark button
Alert button
Sep 02, 2021
Andong Li, Wenzhe Liu, Chengshi Zheng, Xiaodong Li

Figure 1 for Embedding and Beamforming: All-neural Causal Beamformer for Multichannel Speech Enhancement
Figure 2 for Embedding and Beamforming: All-neural Causal Beamformer for Multichannel Speech Enhancement
Viaarxiv icon

Towards Instance-Optimal Offline Reinforcement Learning with Pessimism

Oct 17, 2021
Ming Yin, Yu-Xiang Wang

Figure 1 for Towards Instance-Optimal Offline Reinforcement Learning with Pessimism
Figure 2 for Towards Instance-Optimal Offline Reinforcement Learning with Pessimism
Viaarxiv icon

Knowledge Enhanced Fine-Tuning for Better Handling Unseen Entities in Dialogue Generation

Add code
Bookmark button
Alert button
Sep 12, 2021
Leyang Cui, Yu Wu, Shujie Liu, Yue Zhang

Figure 1 for Knowledge Enhanced Fine-Tuning for Better Handling Unseen Entities in Dialogue Generation
Figure 2 for Knowledge Enhanced Fine-Tuning for Better Handling Unseen Entities in Dialogue Generation
Figure 3 for Knowledge Enhanced Fine-Tuning for Better Handling Unseen Entities in Dialogue Generation
Figure 4 for Knowledge Enhanced Fine-Tuning for Better Handling Unseen Entities in Dialogue Generation
Viaarxiv icon

Ethereum Data Structures

Aug 12, 2021
Kamil Jezek

Figure 1 for Ethereum Data Structures
Figure 2 for Ethereum Data Structures
Figure 3 for Ethereum Data Structures
Figure 4 for Ethereum Data Structures
Viaarxiv icon

In-Vehicle False Information Attack Detection and Mitigation Framework using Machine Learning and Software Defined Networking

Jun 24, 2019
Zadid Khan, Mashrur Chowdhury, Mhafuzul Islam, Chin-Ya Huang, Mizanur Rahman

Figure 1 for In-Vehicle False Information Attack Detection and Mitigation Framework using Machine Learning and Software Defined Networking
Figure 2 for In-Vehicle False Information Attack Detection and Mitigation Framework using Machine Learning and Software Defined Networking
Figure 3 for In-Vehicle False Information Attack Detection and Mitigation Framework using Machine Learning and Software Defined Networking
Figure 4 for In-Vehicle False Information Attack Detection and Mitigation Framework using Machine Learning and Software Defined Networking
Viaarxiv icon

Validation of Information Fusion

Jul 22, 2016
Alexander Kott, Wes Milks

Figure 1 for Validation of Information Fusion
Figure 2 for Validation of Information Fusion
Figure 3 for Validation of Information Fusion
Figure 4 for Validation of Information Fusion
Viaarxiv icon

Optimal Power Allocation for Rate Splitting Communications with Deep Reinforcement Learning

Jul 01, 2021
Nguyen Quang Hieu, Dinh Thai Hoang, Dusit Niyato, Dong In Kim

Figure 1 for Optimal Power Allocation for Rate Splitting Communications with Deep Reinforcement Learning
Figure 2 for Optimal Power Allocation for Rate Splitting Communications with Deep Reinforcement Learning
Figure 3 for Optimal Power Allocation for Rate Splitting Communications with Deep Reinforcement Learning
Figure 4 for Optimal Power Allocation for Rate Splitting Communications with Deep Reinforcement Learning
Viaarxiv icon

Computing an Optimal Pitching Strategy in a Baseball At-Bat

Oct 08, 2021
Connor Douglas, Everett Witt, Mia Bendy, Yevgeniy Vorobeychik

Figure 1 for Computing an Optimal Pitching Strategy in a Baseball At-Bat
Figure 2 for Computing an Optimal Pitching Strategy in a Baseball At-Bat
Figure 3 for Computing an Optimal Pitching Strategy in a Baseball At-Bat
Figure 4 for Computing an Optimal Pitching Strategy in a Baseball At-Bat
Viaarxiv icon

Prioritized Subnet Sampling for Resource-Adaptive Supernet Training

Add code
Bookmark button
Alert button
Sep 12, 2021
Bohong Chen, Mingbao Lin, Liujuan Cao, Jianzhuang Liu, Qixiang Ye, Baochang Zhang, Wei Zeng, Yonghong Tian, Rongrong Ji

Figure 1 for Prioritized Subnet Sampling for Resource-Adaptive Supernet Training
Figure 2 for Prioritized Subnet Sampling for Resource-Adaptive Supernet Training
Figure 3 for Prioritized Subnet Sampling for Resource-Adaptive Supernet Training
Figure 4 for Prioritized Subnet Sampling for Resource-Adaptive Supernet Training
Viaarxiv icon

The 2nd Anti-UAV Workshop & Challenge: Methods and Results

Add code
Bookmark button
Alert button
Aug 25, 2021
Jian Zhao, Gang Wang, Jianan Li, Lei Jin, Nana Fan, Min Wang, Xiaojuan Wang, Ting Yong, Yafeng Deng, Yandong Guo, Shiming Ge, Guodong Guo

Figure 1 for The 2nd Anti-UAV Workshop & Challenge: Methods and Results
Figure 2 for The 2nd Anti-UAV Workshop & Challenge: Methods and Results
Viaarxiv icon