Alert button

"Time": models, code, and papers
Alert button

Generating Images with Multimodal Language Models

Add code
Bookmark button
Alert button
May 26, 2023
Jing Yu Koh, Daniel Fried, Ruslan Salakhutdinov

Figure 1 for Generating Images with Multimodal Language Models
Figure 2 for Generating Images with Multimodal Language Models
Figure 3 for Generating Images with Multimodal Language Models
Figure 4 for Generating Images with Multimodal Language Models
Viaarxiv icon

Bandit Submodular Maximization for Multi-Robot Coordination in Unpredictable and Partially Observable Environments

Add code
Bookmark button
Alert button
May 26, 2023
Zirui Xu, Xiaofeng Lin, Vasileios Tzoumas

Figure 1 for Bandit Submodular Maximization for Multi-Robot Coordination in Unpredictable and Partially Observable Environments
Figure 2 for Bandit Submodular Maximization for Multi-Robot Coordination in Unpredictable and Partially Observable Environments
Figure 3 for Bandit Submodular Maximization for Multi-Robot Coordination in Unpredictable and Partially Observable Environments
Figure 4 for Bandit Submodular Maximization for Multi-Robot Coordination in Unpredictable and Partially Observable Environments
Viaarxiv icon

CVB: A Video Dataset of Cattle Visual Behaviors

May 26, 2023
Ali Zia, Renuka Sharma, Reza Arablouei, Greg Bishop-Hurley, Jody McNally, Neil Bagnall, Vivien Rolland, Brano Kusy, Lars Petersson, Aaron Ingham

Figure 1 for CVB: A Video Dataset of Cattle Visual Behaviors
Figure 2 for CVB: A Video Dataset of Cattle Visual Behaviors
Viaarxiv icon

Fast refacing of MR images with a generative neural network lowers re-identification risk and preserves volumetric consistency

Add code
Bookmark button
Alert button
May 26, 2023
Nataliia Molchanova, Bénédicte Maréchal, Jean-Philippe Thiran, Tobias Kober, Till Huelnhagen, Jonas Richiardi

Figure 1 for Fast refacing of MR images with a generative neural network lowers re-identification risk and preserves volumetric consistency
Figure 2 for Fast refacing of MR images with a generative neural network lowers re-identification risk and preserves volumetric consistency
Figure 3 for Fast refacing of MR images with a generative neural network lowers re-identification risk and preserves volumetric consistency
Figure 4 for Fast refacing of MR images with a generative neural network lowers re-identification risk and preserves volumetric consistency
Viaarxiv icon

A FPGA-based architecture for real-time cluster finding in the LHCb silicon pixel detector

Feb 08, 2023
G. Bassi, L. Giambastiani, K. Hennessy, F. Lazzari, M. J. Morello, T. Pajero, A. Fernandez Prieto, G. Punzi

Figure 1 for A FPGA-based architecture for real-time cluster finding in the LHCb silicon pixel detector
Figure 2 for A FPGA-based architecture for real-time cluster finding in the LHCb silicon pixel detector
Figure 3 for A FPGA-based architecture for real-time cluster finding in the LHCb silicon pixel detector
Figure 4 for A FPGA-based architecture for real-time cluster finding in the LHCb silicon pixel detector
Viaarxiv icon

Moral Machine or Tyranny of the Majority?

May 27, 2023
Michael Feffer, Hoda Heidari, Zachary C. Lipton

Figure 1 for Moral Machine or Tyranny of the Majority?
Figure 2 for Moral Machine or Tyranny of the Majority?
Figure 3 for Moral Machine or Tyranny of the Majority?
Figure 4 for Moral Machine or Tyranny of the Majority?
Viaarxiv icon

Reinforcement Learning With Reward Machines in Stochastic Games

May 27, 2023
Jueming Hu, Jean-Raphaël Gaglione, Yanze Wang, Zhe Xu, Ufuk Topcu, Yongming Liu

Figure 1 for Reinforcement Learning With Reward Machines in Stochastic Games
Figure 2 for Reinforcement Learning With Reward Machines in Stochastic Games
Figure 3 for Reinforcement Learning With Reward Machines in Stochastic Games
Figure 4 for Reinforcement Learning With Reward Machines in Stochastic Games
Viaarxiv icon

Rethinking Adversarial Policies: A Generalized Attack Formulation and Provable Defense in Multi-Agent RL

May 27, 2023
Xiangyu Liu, Souradip Chakraborty, Yanchao Sun, Furong Huang

Figure 1 for Rethinking Adversarial Policies: A Generalized Attack Formulation and Provable Defense in Multi-Agent RL
Figure 2 for Rethinking Adversarial Policies: A Generalized Attack Formulation and Provable Defense in Multi-Agent RL
Figure 3 for Rethinking Adversarial Policies: A Generalized Attack Formulation and Provable Defense in Multi-Agent RL
Figure 4 for Rethinking Adversarial Policies: A Generalized Attack Formulation and Provable Defense in Multi-Agent RL
Viaarxiv icon

An Investigation of Evaluation Metrics for Automated Medical Note Generation

Add code
Bookmark button
Alert button
May 27, 2023
Asma Ben Abacha, Wen-wai Yim, George Michalopoulos, Thomas Lin

Figure 1 for An Investigation of Evaluation Metrics for Automated Medical Note Generation
Figure 2 for An Investigation of Evaluation Metrics for Automated Medical Note Generation
Figure 3 for An Investigation of Evaluation Metrics for Automated Medical Note Generation
Figure 4 for An Investigation of Evaluation Metrics for Automated Medical Note Generation
Viaarxiv icon

DotHash: Estimating Set Similarity Metrics for Link Prediction and Document Deduplication

Add code
Bookmark button
Alert button
May 27, 2023
Igor Nunes, Mike Heddes, Pere Vergés, Danny Abraham, Alexander Veidenbaum, Alexandru Nicolau, Tony Givargis

Figure 1 for DotHash: Estimating Set Similarity Metrics for Link Prediction and Document Deduplication
Figure 2 for DotHash: Estimating Set Similarity Metrics for Link Prediction and Document Deduplication
Figure 3 for DotHash: Estimating Set Similarity Metrics for Link Prediction and Document Deduplication
Figure 4 for DotHash: Estimating Set Similarity Metrics for Link Prediction and Document Deduplication
Viaarxiv icon