Alert button

"Time": models, code, and papers
Alert button

Multi View Spatial-Temporal Model for Travel Time Estimation

Sep 24, 2021
ZiChuan Liu, Zhaoyang Wu, Meng Wang, Rui Zhang

Figure 1 for Multi View Spatial-Temporal Model for Travel Time Estimation
Figure 2 for Multi View Spatial-Temporal Model for Travel Time Estimation
Figure 3 for Multi View Spatial-Temporal Model for Travel Time Estimation
Viaarxiv icon

Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone

Aug 19, 2022
Aghiles Ait Messaoud, Sonia Ben Mokhtar, Vlad Nitu, Valerio Schiavoni

Figure 1 for Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone
Figure 2 for Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone
Figure 3 for Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone
Figure 4 for Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone
Viaarxiv icon

Blind-Spot Collision Detection System for Commercial Vehicles Using Multi Deep CNN Architecture

Aug 19, 2022
Muhammad Muzammel, Mohd Zuki Yusoff, Mohamad Naufal Mohamad Saad, Faryal Sheikh, Muhammad Ahsan Awais

Figure 1 for Blind-Spot Collision Detection System for Commercial Vehicles Using Multi Deep CNN Architecture
Figure 2 for Blind-Spot Collision Detection System for Commercial Vehicles Using Multi Deep CNN Architecture
Figure 3 for Blind-Spot Collision Detection System for Commercial Vehicles Using Multi Deep CNN Architecture
Figure 4 for Blind-Spot Collision Detection System for Commercial Vehicles Using Multi Deep CNN Architecture
Viaarxiv icon

Influence Maximization (IM) in Complex Networks with Limited Visibility Using Statistical Methods

Aug 28, 2022
aeid Ghafouri, Seyed Hossein Khasteh, Seyed Omid Azarkasb

Figure 1 for Influence Maximization (IM) in Complex Networks with Limited Visibility Using Statistical Methods
Figure 2 for Influence Maximization (IM) in Complex Networks with Limited Visibility Using Statistical Methods
Figure 3 for Influence Maximization (IM) in Complex Networks with Limited Visibility Using Statistical Methods
Figure 4 for Influence Maximization (IM) in Complex Networks with Limited Visibility Using Statistical Methods
Viaarxiv icon

Collaborative Remote Control of Unmanned Ground Vehicles in Virtual Reality

Aug 24, 2022
Ziming Li, Yiming Luo, Jialin Wang, Yushan Pan, Lingyun Yu, Hai-Ning Liang

Figure 1 for Collaborative Remote Control of Unmanned Ground Vehicles in Virtual Reality
Figure 2 for Collaborative Remote Control of Unmanned Ground Vehicles in Virtual Reality
Figure 3 for Collaborative Remote Control of Unmanned Ground Vehicles in Virtual Reality
Viaarxiv icon

Simulating Personal Food Consumption Patterns using a Modified Markov Chain

Aug 13, 2022
Xinyue Pan, Jiangpeng He, Andrew Peng, Fengqing Zhu

Figure 1 for Simulating Personal Food Consumption Patterns using a Modified Markov Chain
Figure 2 for Simulating Personal Food Consumption Patterns using a Modified Markov Chain
Figure 3 for Simulating Personal Food Consumption Patterns using a Modified Markov Chain
Figure 4 for Simulating Personal Food Consumption Patterns using a Modified Markov Chain
Viaarxiv icon

Deep Reinforcement Learning for RIS-aided Multiuser Full-Duplex Secure Communications with Hardware Impairments

Aug 16, 2022
Zhangjie Peng, Zhibo Zhang, Lei Kong, Cunhua Pan, Li Li, Jiangzhou Wang

Figure 1 for Deep Reinforcement Learning for RIS-aided Multiuser Full-Duplex Secure Communications with Hardware Impairments
Figure 2 for Deep Reinforcement Learning for RIS-aided Multiuser Full-Duplex Secure Communications with Hardware Impairments
Figure 3 for Deep Reinforcement Learning for RIS-aided Multiuser Full-Duplex Secure Communications with Hardware Impairments
Figure 4 for Deep Reinforcement Learning for RIS-aided Multiuser Full-Duplex Secure Communications with Hardware Impairments
Viaarxiv icon

How Asynchronous Events Encode Video

Jun 09, 2022
Karen Adam, Adam Scholefield, Martin Vetterli

Figure 1 for How Asynchronous Events Encode Video
Figure 2 for How Asynchronous Events Encode Video
Figure 3 for How Asynchronous Events Encode Video
Figure 4 for How Asynchronous Events Encode Video
Viaarxiv icon

A User-Centered Investigation of Personal Music Tours

Aug 16, 2022
Giovanni Gabbolini, Derek Bridge

Figure 1 for A User-Centered Investigation of Personal Music Tours
Figure 2 for A User-Centered Investigation of Personal Music Tours
Viaarxiv icon

T-RECX: Tiny-Resource Efficient Convolutional Neural Networks with Early-Exit

Jul 14, 2022
Nikhil P Ghanathe, Steve Wilton

Figure 1 for T-RECX: Tiny-Resource Efficient Convolutional Neural Networks with Early-Exit
Figure 2 for T-RECX: Tiny-Resource Efficient Convolutional Neural Networks with Early-Exit
Figure 3 for T-RECX: Tiny-Resource Efficient Convolutional Neural Networks with Early-Exit
Figure 4 for T-RECX: Tiny-Resource Efficient Convolutional Neural Networks with Early-Exit
Viaarxiv icon