Alert button

"Time": models, code, and papers
Alert button

Point-NeuS: Point-Guided Neural Implicit Surface Reconstruction by Volume Rendering

Oct 12, 2023
Chen Zhang, Wanjuan Su, Wenbing Tao

Figure 1 for Point-NeuS: Point-Guided Neural Implicit Surface Reconstruction by Volume Rendering
Figure 2 for Point-NeuS: Point-Guided Neural Implicit Surface Reconstruction by Volume Rendering
Figure 3 for Point-NeuS: Point-Guided Neural Implicit Surface Reconstruction by Volume Rendering
Figure 4 for Point-NeuS: Point-Guided Neural Implicit Surface Reconstruction by Volume Rendering
Viaarxiv icon

Exploring the Relationship Between Model Architecture and In-Context Learning Ability

Add code
Bookmark button
Alert button
Oct 12, 2023
Ivan Lee, Nan Jiang, Taylor Berg-Kirkpatrick

Figure 1 for Exploring the Relationship Between Model Architecture and In-Context Learning Ability
Figure 2 for Exploring the Relationship Between Model Architecture and In-Context Learning Ability
Figure 3 for Exploring the Relationship Between Model Architecture and In-Context Learning Ability
Figure 4 for Exploring the Relationship Between Model Architecture and In-Context Learning Ability
Viaarxiv icon

Rethinking Large-scale Pre-ranking System: Entire-chain Cross-domain Models

Add code
Bookmark button
Alert button
Oct 12, 2023
Jinbo Song, Ruoran Huang, Xinyang Wang, Wei Huang, Qian Yu, Mingming Chen, Yafei Yao, Chaosheng Fan, Changping Peng, Zhangang Lin, Jinghe Hu, Jingping Shao

Viaarxiv icon

SEE-OoD: Supervised Exploration For Enhanced Out-of-Distribution Detection

Oct 12, 2023
Xiaoyang Song, Wenbo Sun, Maher Nouiehed, Raed Al Kontar, Judy Jin

Viaarxiv icon

Memorization with neural nets: going beyond the worst case

Add code
Bookmark button
Alert button
Oct 12, 2023
Sjoerd Dirksen, Patrick Finke, Martin Genzel

Viaarxiv icon

Beyond Sharing: Conflict-Aware Multivariate Time Series Anomaly Detection

Add code
Bookmark button
Alert button
Aug 25, 2023
Haotian Si, Changhua Pei, Zhihan Li, Yadong Zhao, Jingjing Li, Haiming Zhang, Zulong Diao, Jianhui Li, Gaogang Xie, Dan Pei

Figure 1 for Beyond Sharing: Conflict-Aware Multivariate Time Series Anomaly Detection
Figure 2 for Beyond Sharing: Conflict-Aware Multivariate Time Series Anomaly Detection
Figure 3 for Beyond Sharing: Conflict-Aware Multivariate Time Series Anomaly Detection
Figure 4 for Beyond Sharing: Conflict-Aware Multivariate Time Series Anomaly Detection
Viaarxiv icon

Generalized Benders Decomposition with Continual Learning for Hybrid Model Predictive Control in Dynamic Environment

Oct 10, 2023
Xuan Lin

Figure 1 for Generalized Benders Decomposition with Continual Learning for Hybrid Model Predictive Control in Dynamic Environment
Figure 2 for Generalized Benders Decomposition with Continual Learning for Hybrid Model Predictive Control in Dynamic Environment
Figure 3 for Generalized Benders Decomposition with Continual Learning for Hybrid Model Predictive Control in Dynamic Environment
Viaarxiv icon

Precise Payload Delivery via Unmanned Aerial Vehicles: An Approach Using Object Detection Algorithms

Oct 10, 2023
Aditya Vadduri, Anagh Benjwal, Abhishek Pai, Elkan Quadros, Aniruddh Kammar, Prajwal Uday

Viaarxiv icon

Suppressing Overestimation in Q-Learning through Adversarial Behaviors

Oct 10, 2023
HyeAnn Lee, Donghwan Lee

Figure 1 for Suppressing Overestimation in Q-Learning through Adversarial Behaviors
Figure 2 for Suppressing Overestimation in Q-Learning through Adversarial Behaviors
Figure 3 for Suppressing Overestimation in Q-Learning through Adversarial Behaviors
Figure 4 for Suppressing Overestimation in Q-Learning through Adversarial Behaviors
Viaarxiv icon

Comparing the robustness of modern no-reference image- and video-quality metrics to adversarial attacks

Add code
Bookmark button
Alert button
Oct 10, 2023
Anastasia Antsiferova, Khaled Abud, Aleksandr Gushchin, Sergey Lavrushkin, Ekaterina Shumitskaya, Maksim Velikanov, Dmitriy Vatolin

Figure 1 for Comparing the robustness of modern no-reference image- and video-quality metrics to adversarial attacks
Figure 2 for Comparing the robustness of modern no-reference image- and video-quality metrics to adversarial attacks
Figure 3 for Comparing the robustness of modern no-reference image- and video-quality metrics to adversarial attacks
Figure 4 for Comparing the robustness of modern no-reference image- and video-quality metrics to adversarial attacks
Viaarxiv icon