Alert button

"Time": models, code, and papers
Alert button

On Dynamic Regret and Constraint Violations in Constrained Online Convex Optimization

Jan 24, 2023
Rahul Vaze

Figure 1 for On Dynamic Regret and Constraint Violations in Constrained Online Convex Optimization
Figure 2 for On Dynamic Regret and Constraint Violations in Constrained Online Convex Optimization
Viaarxiv icon

Implementation of the Critical Wave Groups Method with Computational Fluid Dynamics and Neural Networks

Jan 24, 2023
Kevin M. Silva, Kevin J. Maki

Figure 1 for Implementation of the Critical Wave Groups Method with Computational Fluid Dynamics and Neural Networks
Figure 2 for Implementation of the Critical Wave Groups Method with Computational Fluid Dynamics and Neural Networks
Figure 3 for Implementation of the Critical Wave Groups Method with Computational Fluid Dynamics and Neural Networks
Figure 4 for Implementation of the Critical Wave Groups Method with Computational Fluid Dynamics and Neural Networks
Viaarxiv icon

Probabilistic Bilevel Coreset Selection

Jan 24, 2023
Xiao Zhou, Renjie Pi, Weizhong Zhang, Yong Lin, Tong Zhang

Figure 1 for Probabilistic Bilevel Coreset Selection
Figure 2 for Probabilistic Bilevel Coreset Selection
Figure 3 for Probabilistic Bilevel Coreset Selection
Figure 4 for Probabilistic Bilevel Coreset Selection
Viaarxiv icon

Traffic Prediction in Cellular Networks using Graph Neural Networks

Jan 30, 2023
Maryam Khalid

Figure 1 for Traffic Prediction in Cellular Networks using Graph Neural Networks
Figure 2 for Traffic Prediction in Cellular Networks using Graph Neural Networks
Figure 3 for Traffic Prediction in Cellular Networks using Graph Neural Networks
Figure 4 for Traffic Prediction in Cellular Networks using Graph Neural Networks
Viaarxiv icon

Robust Knowledge Adaptation for Federated Unsupervised Person ReID

Jan 18, 2023
Jianfeng Weng, Kun Hu, Tingting Yao, Jingya Wang, Zhiyong Wang

Figure 1 for Robust Knowledge Adaptation for Federated Unsupervised Person ReID
Figure 2 for Robust Knowledge Adaptation for Federated Unsupervised Person ReID
Figure 3 for Robust Knowledge Adaptation for Federated Unsupervised Person ReID
Figure 4 for Robust Knowledge Adaptation for Federated Unsupervised Person ReID
Viaarxiv icon

A Sublinear-Time Quantum Algorithm for Approximating Partition Functions

Jul 18, 2022
Arjan Cornelissen, Yassine Hamoudi

Figure 1 for A Sublinear-Time Quantum Algorithm for Approximating Partition Functions
Figure 2 for A Sublinear-Time Quantum Algorithm for Approximating Partition Functions
Viaarxiv icon

Using the profile of publishers to predict barriers across news articles

Add code
Bookmark button
Alert button
Jan 13, 2023
Abdul Sittar, Dunja Mladenic

Figure 1 for Using the profile of publishers to predict barriers across news articles
Figure 2 for Using the profile of publishers to predict barriers across news articles
Figure 3 for Using the profile of publishers to predict barriers across news articles
Figure 4 for Using the profile of publishers to predict barriers across news articles
Viaarxiv icon

Almost Surely $\sqrt{T}$ Regret Bound for Adaptive LQR

Jan 13, 2023
Yiwen Lu, Yilin Mo

Figure 1 for Almost Surely $\sqrt{T}$ Regret Bound for Adaptive LQR
Figure 2 for Almost Surely $\sqrt{T}$ Regret Bound for Adaptive LQR
Figure 3 for Almost Surely $\sqrt{T}$ Regret Bound for Adaptive LQR
Figure 4 for Almost Surely $\sqrt{T}$ Regret Bound for Adaptive LQR
Viaarxiv icon

Prompting Neural Machine Translation with Translation Memories

Jan 13, 2023
Abudurexiti Reheman, Tao Zhou, Yingfeng Luo, Di Yang, Tong Xiao, Jingbo Zhu

Figure 1 for Prompting Neural Machine Translation with Translation Memories
Figure 2 for Prompting Neural Machine Translation with Translation Memories
Figure 3 for Prompting Neural Machine Translation with Translation Memories
Figure 4 for Prompting Neural Machine Translation with Translation Memories
Viaarxiv icon

Towards Understanding How Self-training Tolerates Data Backdoor Poisoning

Add code
Bookmark button
Alert button
Jan 20, 2023
Soumyadeep Pal, Ren Wang, Yuguang Yao, Sijia Liu

Figure 1 for Towards Understanding How Self-training Tolerates Data Backdoor Poisoning
Figure 2 for Towards Understanding How Self-training Tolerates Data Backdoor Poisoning
Figure 3 for Towards Understanding How Self-training Tolerates Data Backdoor Poisoning
Figure 4 for Towards Understanding How Self-training Tolerates Data Backdoor Poisoning
Viaarxiv icon