Alert button

"Time": models, code, and papers
Alert button

The Limit Order Book Recreation Model (LOBRM): An Extended Analysis

Jul 01, 2021
Zijian Shi, John Cartlidge

Figure 1 for The Limit Order Book Recreation Model (LOBRM): An Extended Analysis
Figure 2 for The Limit Order Book Recreation Model (LOBRM): An Extended Analysis
Figure 3 for The Limit Order Book Recreation Model (LOBRM): An Extended Analysis
Figure 4 for The Limit Order Book Recreation Model (LOBRM): An Extended Analysis
Viaarxiv icon

PCA Event-Based Otical Flow for Visual Odometry

May 08, 2021
Mahmoud Z. Khairallah, Fabien Bonardi, David Roussel, Samia Bouchafa

Figure 1 for PCA Event-Based Otical Flow for Visual Odometry
Figure 2 for PCA Event-Based Otical Flow for Visual Odometry
Figure 3 for PCA Event-Based Otical Flow for Visual Odometry
Figure 4 for PCA Event-Based Otical Flow for Visual Odometry
Viaarxiv icon

Ergodic Capacity of High Throughput Satellite Systems With Mixed FSO-RF Transmission

May 13, 2021
Kong Huaicong, Lin Min, Wang Zining, Ouyang Jian, Cheng Julian

Figure 1 for Ergodic Capacity of High Throughput Satellite Systems With Mixed FSO-RF Transmission
Figure 2 for Ergodic Capacity of High Throughput Satellite Systems With Mixed FSO-RF Transmission
Viaarxiv icon

How effective are Graph Neural Networks in Fraud Detection for Network Data?

Add code
Bookmark button
Alert button
May 30, 2021
Ronald D. R. Pereira, Fabrício Murai

Viaarxiv icon

Video Instance Segmentation using Inter-Frame Communication Transformers

Jun 07, 2021
Sukjun Hwang, Miran Heo, Seoung Wug Oh, Seon Joo Kim

Figure 1 for Video Instance Segmentation using Inter-Frame Communication Transformers
Figure 2 for Video Instance Segmentation using Inter-Frame Communication Transformers
Figure 3 for Video Instance Segmentation using Inter-Frame Communication Transformers
Figure 4 for Video Instance Segmentation using Inter-Frame Communication Transformers
Viaarxiv icon

A Consistency-Based Loss for Deep Odometry Through Uncertainty Propagation

Jul 01, 2021
Hamed Damirchi, Rooholla Khorrambakht, Hamid D. Taghirad, Behzad Moshiri

Figure 1 for A Consistency-Based Loss for Deep Odometry Through Uncertainty Propagation
Figure 2 for A Consistency-Based Loss for Deep Odometry Through Uncertainty Propagation
Figure 3 for A Consistency-Based Loss for Deep Odometry Through Uncertainty Propagation
Figure 4 for A Consistency-Based Loss for Deep Odometry Through Uncertainty Propagation
Viaarxiv icon

Tails: Chasing Comets with the Zwicky Transient Facility and Deep Learning

Add code
Bookmark button
Alert button
Feb 26, 2021
Dmitry A. Duev, Bryce T. Bolin, Matthew J. Graham, Michael S. P. Kelley, Ashish Mahabal, Eric C. Bellm, Michael W. Coughlin, Richard Dekany, George Helou, Shrinivas R. Kulkarni, Frank J. Masci, Thomas A. Prince, Reed Riddle, Maayane T. Soumagnac, Stéfan J. van der Walt

Figure 1 for Tails: Chasing Comets with the Zwicky Transient Facility and Deep Learning
Figure 2 for Tails: Chasing Comets with the Zwicky Transient Facility and Deep Learning
Viaarxiv icon

Synchronization of Tree Parity Machines using non-binary input vectors

Apr 22, 2021
Miłosz Stypiński, Marcin Niemiec

Figure 1 for Synchronization of Tree Parity Machines using non-binary input vectors
Figure 2 for Synchronization of Tree Parity Machines using non-binary input vectors
Figure 3 for Synchronization of Tree Parity Machines using non-binary input vectors
Figure 4 for Synchronization of Tree Parity Machines using non-binary input vectors
Viaarxiv icon

Preventing Unauthorized Use of Proprietary Data: Poisoning for Secure Dataset Release

Add code
Bookmark button
Alert button
Feb 16, 2021
Liam Fowl, Ping-yeh Chiang, Micah Goldblum, Jonas Geiping, Arpit Bansal, Wojtek Czaja, Tom Goldstein

Figure 1 for Preventing Unauthorized Use of Proprietary Data: Poisoning for Secure Dataset Release
Figure 2 for Preventing Unauthorized Use of Proprietary Data: Poisoning for Secure Dataset Release
Figure 3 for Preventing Unauthorized Use of Proprietary Data: Poisoning for Secure Dataset Release
Figure 4 for Preventing Unauthorized Use of Proprietary Data: Poisoning for Secure Dataset Release
Viaarxiv icon

A Hybrid APM-CPGSO Approach for Constraint Satisfaction Problem Solving: Application to Remote Sensing

Jun 06, 2021
Zouhayra Ayadi, Wadii Boulila, Imed Riadh Farah

Figure 1 for A Hybrid APM-CPGSO Approach for Constraint Satisfaction Problem Solving: Application to Remote Sensing
Figure 2 for A Hybrid APM-CPGSO Approach for Constraint Satisfaction Problem Solving: Application to Remote Sensing
Figure 3 for A Hybrid APM-CPGSO Approach for Constraint Satisfaction Problem Solving: Application to Remote Sensing
Figure 4 for A Hybrid APM-CPGSO Approach for Constraint Satisfaction Problem Solving: Application to Remote Sensing
Viaarxiv icon