Alert button

"Time": models, code, and papers
Alert button

Reduction of Subjective Listening Effort for TV Broadcast Signals with Recurrent Neural Networks

Nov 02, 2021
Nils L. Westhausen, Rainer Huber, Hannah Baumgartner, Ragini Sinha, Jan Rennies, Bernd T. Meyer

Figure 1 for Reduction of Subjective Listening Effort for TV Broadcast Signals with Recurrent Neural Networks
Figure 2 for Reduction of Subjective Listening Effort for TV Broadcast Signals with Recurrent Neural Networks
Figure 3 for Reduction of Subjective Listening Effort for TV Broadcast Signals with Recurrent Neural Networks
Figure 4 for Reduction of Subjective Listening Effort for TV Broadcast Signals with Recurrent Neural Networks
Viaarxiv icon

Swarm intelligence algorithms applied to Virtual Reference Feedback Tuning to increase controller robustness -- a one-shot technique

Nov 08, 2021
L. V. Fiorio, C. L. Remes, Y. R. de Novaes

Figure 1 for Swarm intelligence algorithms applied to Virtual Reference Feedback Tuning to increase controller robustness -- a one-shot technique
Figure 2 for Swarm intelligence algorithms applied to Virtual Reference Feedback Tuning to increase controller robustness -- a one-shot technique
Figure 3 for Swarm intelligence algorithms applied to Virtual Reference Feedback Tuning to increase controller robustness -- a one-shot technique
Figure 4 for Swarm intelligence algorithms applied to Virtual Reference Feedback Tuning to increase controller robustness -- a one-shot technique
Viaarxiv icon

Roadside-assisted Cooperative Planning using Future Path Sharing for Autonomous Driving

Aug 10, 2021
Mai Hirata, Manabu Tsukada, Keisuke Okumura, Yasumasa Tamura, Hideya Ochiai, Xavier Défago

Figure 1 for Roadside-assisted Cooperative Planning using Future Path Sharing for Autonomous Driving
Figure 2 for Roadside-assisted Cooperative Planning using Future Path Sharing for Autonomous Driving
Figure 3 for Roadside-assisted Cooperative Planning using Future Path Sharing for Autonomous Driving
Figure 4 for Roadside-assisted Cooperative Planning using Future Path Sharing for Autonomous Driving
Viaarxiv icon

Using neural networks to solve the 2D Poisson equation for electric field computation in plasma fluid simulations

Add code
Bookmark button
Alert button
Oct 04, 2021
Lionel Cheng, Ekhi Ajuria Illarramendi, Guillaume Bogopolsky, Michael Bauerheim, Benedicte Cuenot

Figure 1 for Using neural networks to solve the 2D Poisson equation for electric field computation in plasma fluid simulations
Figure 2 for Using neural networks to solve the 2D Poisson equation for electric field computation in plasma fluid simulations
Figure 3 for Using neural networks to solve the 2D Poisson equation for electric field computation in plasma fluid simulations
Figure 4 for Using neural networks to solve the 2D Poisson equation for electric field computation in plasma fluid simulations
Viaarxiv icon

Adversarial Neuron Pruning Purifies Backdoored Deep Models

Add code
Bookmark button
Alert button
Oct 27, 2021
Dongxian Wu, Yisen Wang

Figure 1 for Adversarial Neuron Pruning Purifies Backdoored Deep Models
Figure 2 for Adversarial Neuron Pruning Purifies Backdoored Deep Models
Figure 3 for Adversarial Neuron Pruning Purifies Backdoored Deep Models
Figure 4 for Adversarial Neuron Pruning Purifies Backdoored Deep Models
Viaarxiv icon

Acceleration in Distributed Optimization Under Similarity

Oct 24, 2021
Ye Tian, Gesualdo Scutari, Tianyu Cao, Alexander Gasnikov

Figure 1 for Acceleration in Distributed Optimization Under Similarity
Figure 2 for Acceleration in Distributed Optimization Under Similarity
Figure 3 for Acceleration in Distributed Optimization Under Similarity
Figure 4 for Acceleration in Distributed Optimization Under Similarity
Viaarxiv icon

threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning

Add code
Bookmark button
Alert button
Nov 08, 2021
Su Wang, Zhiliang Wang, Tao Zhou, Xia Yin, Dongqi Han, Han Zhang, Hongbin Sun, Xingang Shi, Jiahai Yang

Figure 1 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Figure 2 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Figure 3 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Figure 4 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Viaarxiv icon

Logic Shrinkage: Learned FPGA Netlist Sparsity for Efficient Neural Network Inference

Add code
Bookmark button
Alert button
Dec 04, 2021
Erwei Wang, James J. Davis, Georgios-Ilias Stavrou, Peter Y. K. Cheung, George A. Constantinides, Mohamed Abdelfattah

Figure 1 for Logic Shrinkage: Learned FPGA Netlist Sparsity for Efficient Neural Network Inference
Figure 2 for Logic Shrinkage: Learned FPGA Netlist Sparsity for Efficient Neural Network Inference
Figure 3 for Logic Shrinkage: Learned FPGA Netlist Sparsity for Efficient Neural Network Inference
Figure 4 for Logic Shrinkage: Learned FPGA Netlist Sparsity for Efficient Neural Network Inference
Viaarxiv icon

High-Sensitivity Electric Potential Sensors for Non-Contact Monitoring of Physiological Signals

Oct 23, 2021
Xinyao Tang, Wangbo Chen, Soumyajit Mandal, Kevin Bi, Tayfun Ozdemir

Figure 1 for High-Sensitivity Electric Potential Sensors for Non-Contact Monitoring of Physiological Signals
Figure 2 for High-Sensitivity Electric Potential Sensors for Non-Contact Monitoring of Physiological Signals
Figure 3 for High-Sensitivity Electric Potential Sensors for Non-Contact Monitoring of Physiological Signals
Figure 4 for High-Sensitivity Electric Potential Sensors for Non-Contact Monitoring of Physiological Signals
Viaarxiv icon

Robust Person Re-identification with Multi-Modal Joint Defence

Add code
Bookmark button
Alert button
Nov 18, 2021
Yunpeng Gong, Lifei Chen

Figure 1 for Robust Person Re-identification with Multi-Modal Joint Defence
Figure 2 for Robust Person Re-identification with Multi-Modal Joint Defence
Figure 3 for Robust Person Re-identification with Multi-Modal Joint Defence
Figure 4 for Robust Person Re-identification with Multi-Modal Joint Defence
Viaarxiv icon