Alert button

"Time": models, code, and papers
Alert button

Unsupervised Prediction of Negative Health Events Ahead of Time

Jan 31, 2019
Anahita Hosseini, Majid Sarrafzadeh

Figure 1 for Unsupervised Prediction of Negative Health Events Ahead of Time
Figure 2 for Unsupervised Prediction of Negative Health Events Ahead of Time
Figure 3 for Unsupervised Prediction of Negative Health Events Ahead of Time
Figure 4 for Unsupervised Prediction of Negative Health Events Ahead of Time
Viaarxiv icon

Machine learning moment closure models for the radiative transfer equation II: enforcing global hyperbolicity in gradient based closures

May 30, 2021
Juntao Huang, Yingda Cheng, Andrew J. Christlieb, Luke F. Roberts, Wen-An Yong

Figure 1 for Machine learning moment closure models for the radiative transfer equation II: enforcing global hyperbolicity in gradient based closures
Figure 2 for Machine learning moment closure models for the radiative transfer equation II: enforcing global hyperbolicity in gradient based closures
Figure 3 for Machine learning moment closure models for the radiative transfer equation II: enforcing global hyperbolicity in gradient based closures
Figure 4 for Machine learning moment closure models for the radiative transfer equation II: enforcing global hyperbolicity in gradient based closures
Viaarxiv icon

Organization and Understanding of a Tactile Information Dataset TacAct For Physical Human-Robot Interaction

Aug 09, 2021
Peng Wang, Jixiao Liu, Funing Hou, Dicai Chen, Zihou Xia, Shijie Guo

Figure 1 for Organization and Understanding of a Tactile Information Dataset TacAct For Physical Human-Robot Interaction
Figure 2 for Organization and Understanding of a Tactile Information Dataset TacAct For Physical Human-Robot Interaction
Figure 3 for Organization and Understanding of a Tactile Information Dataset TacAct For Physical Human-Robot Interaction
Figure 4 for Organization and Understanding of a Tactile Information Dataset TacAct For Physical Human-Robot Interaction
Viaarxiv icon

Robust Congestion Control for Demand-Based Optimization in Precoded Multi-Beam High Throughput Satellite Communications

Sep 06, 2021
Van-Phuc Bui, Trinh Van Chien, Eva Lagunas, Joël Grotz, Symeon Chatzinotas, Björn Ottersten

Figure 1 for Robust Congestion Control for Demand-Based Optimization in Precoded Multi-Beam High Throughput Satellite Communications
Figure 2 for Robust Congestion Control for Demand-Based Optimization in Precoded Multi-Beam High Throughput Satellite Communications
Figure 3 for Robust Congestion Control for Demand-Based Optimization in Precoded Multi-Beam High Throughput Satellite Communications
Figure 4 for Robust Congestion Control for Demand-Based Optimization in Precoded Multi-Beam High Throughput Satellite Communications
Viaarxiv icon

Automatic Segmentation of the Optic Nerve Head Region in Optical Coherence Tomography: A Methodological Review

Sep 06, 2021
Rita Marques, Danilo Andrade De Jesus, João Barbosa Breda, Jan Van Eijgen, Ingeborg Stalmans, Theo van Walsum, Stefan Klein, Pedro G. Vaz, Luisa Sánchez Brea

Figure 1 for Automatic Segmentation of the Optic Nerve Head Region in Optical Coherence Tomography: A Methodological Review
Figure 2 for Automatic Segmentation of the Optic Nerve Head Region in Optical Coherence Tomography: A Methodological Review
Figure 3 for Automatic Segmentation of the Optic Nerve Head Region in Optical Coherence Tomography: A Methodological Review
Figure 4 for Automatic Segmentation of the Optic Nerve Head Region in Optical Coherence Tomography: A Methodological Review
Viaarxiv icon

Impact of Data Normalization on Deep Neural Network for Time Series Forecasting

Dec 13, 2018
Samit Bhanja, Abhishek Das

Figure 1 for Impact of Data Normalization on Deep Neural Network for Time Series Forecasting
Figure 2 for Impact of Data Normalization on Deep Neural Network for Time Series Forecasting
Figure 3 for Impact of Data Normalization on Deep Neural Network for Time Series Forecasting
Figure 4 for Impact of Data Normalization on Deep Neural Network for Time Series Forecasting
Viaarxiv icon

A Matching Algorithm based on Image Attribute Transfer and Local Features for Underwater Acoustic and Optical Images

Aug 27, 2021
Xiaoteng Zhou, Changli Yu, Xin Yuan, Citong Luo

Figure 1 for A Matching Algorithm based on Image Attribute Transfer and Local Features for Underwater Acoustic and Optical Images
Figure 2 for A Matching Algorithm based on Image Attribute Transfer and Local Features for Underwater Acoustic and Optical Images
Figure 3 for A Matching Algorithm based on Image Attribute Transfer and Local Features for Underwater Acoustic and Optical Images
Figure 4 for A Matching Algorithm based on Image Attribute Transfer and Local Features for Underwater Acoustic and Optical Images
Viaarxiv icon

Self-Referential Quality Diversity Through Differential Map-Elites

Jul 11, 2021
Tae Jong Choi, Julian Togelius

Figure 1 for Self-Referential Quality Diversity Through Differential Map-Elites
Figure 2 for Self-Referential Quality Diversity Through Differential Map-Elites
Figure 3 for Self-Referential Quality Diversity Through Differential Map-Elites
Figure 4 for Self-Referential Quality Diversity Through Differential Map-Elites
Viaarxiv icon

Waiting Tables as a Robot Planning Problem

May 21, 2021
Anahita Mohseni-Kabir, Manuela Veloso, Maxim Likhachev

Figure 1 for Waiting Tables as a Robot Planning Problem
Figure 2 for Waiting Tables as a Robot Planning Problem
Viaarxiv icon

Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access

Jul 20, 2021
Hiroki Ito, MaungMaung AprilPyone, Hitoshi Kiya

Figure 1 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Figure 2 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Figure 3 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Figure 4 for Protecting Semantic Segmentation Models by Using Block-wise Image Encryption with Secret Key from Unauthorized Access
Viaarxiv icon