Alert button

"Time": models, code, and papers
Alert button

AutoML: Exploration v.s. Exploitation

Add code
Bookmark button
Alert button
Dec 29, 2019
Hassan Eldeeb, Abdelrhman Eldallal

Figure 1 for AutoML: Exploration v.s. Exploitation
Figure 2 for AutoML: Exploration v.s. Exploitation
Figure 3 for AutoML: Exploration v.s. Exploitation
Figure 4 for AutoML: Exploration v.s. Exploitation
Viaarxiv icon

Optimising Stochastic Routing for Taxi Fleets with Model Enhanced Reinforcement Learning

Oct 22, 2020
Shen Ren, Qianxiao Li, Liye Zhang, Zheng Qin, Bo Yang

Figure 1 for Optimising Stochastic Routing for Taxi Fleets with Model Enhanced Reinforcement Learning
Figure 2 for Optimising Stochastic Routing for Taxi Fleets with Model Enhanced Reinforcement Learning
Figure 3 for Optimising Stochastic Routing for Taxi Fleets with Model Enhanced Reinforcement Learning
Figure 4 for Optimising Stochastic Routing for Taxi Fleets with Model Enhanced Reinforcement Learning
Viaarxiv icon

Recalibration of Neural Networks for Point Cloud Analysis

Nov 25, 2020
Ignacio Sarasua, Sebastian Poelsterl, Christian Wachinger

Figure 1 for Recalibration of Neural Networks for Point Cloud Analysis
Figure 2 for Recalibration of Neural Networks for Point Cloud Analysis
Figure 3 for Recalibration of Neural Networks for Point Cloud Analysis
Figure 4 for Recalibration of Neural Networks for Point Cloud Analysis
Viaarxiv icon

Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack

Nov 01, 2020
Haonan Yan, Xiaoguang Li, Hui Li, Jiamin Li, Wenhai Sun, Fenghua Li

Figure 1 for Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack
Figure 2 for Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack
Figure 3 for Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack
Figure 4 for Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack
Viaarxiv icon

Collision Avoidance in Tightly-Constrained Environments without Coordination: a Hierarchical Control Approach

Nov 01, 2020
Xu Shen, Edward L. Zhu, Yvonne R. Stürz, Francesco Borrelli

Figure 1 for Collision Avoidance in Tightly-Constrained Environments without Coordination: a Hierarchical Control Approach
Figure 2 for Collision Avoidance in Tightly-Constrained Environments without Coordination: a Hierarchical Control Approach
Figure 3 for Collision Avoidance in Tightly-Constrained Environments without Coordination: a Hierarchical Control Approach
Figure 4 for Collision Avoidance in Tightly-Constrained Environments without Coordination: a Hierarchical Control Approach
Viaarxiv icon

Convolutional Neural Networks for cytoarchitectonic brain mapping at large scale

Nov 25, 2020
Christian Schiffer, Hannah Spitzer, Kai Kiwitz, Nina Unger, Konrad Wagstyl, Alan C. Evans, Stefan Harmeling, Katrin Amunts, Timo Dickscheid

Figure 1 for Convolutional Neural Networks for cytoarchitectonic brain mapping at large scale
Figure 2 for Convolutional Neural Networks for cytoarchitectonic brain mapping at large scale
Figure 3 for Convolutional Neural Networks for cytoarchitectonic brain mapping at large scale
Figure 4 for Convolutional Neural Networks for cytoarchitectonic brain mapping at large scale
Viaarxiv icon

Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming

Add code
Bookmark button
Alert button
Oct 22, 2020
Sumanth Dathathri, Krishnamurthy Dvijotham, Alexey Kurakin, Aditi Raghunathan, Jonathan Uesato, Rudy Bunel, Shreya Shankar, Jacob Steinhardt, Ian Goodfellow, Percy Liang, Pushmeet Kohli

Figure 1 for Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming
Figure 2 for Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming
Figure 3 for Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming
Figure 4 for Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming
Viaarxiv icon

Real-Time Anomaly Detection and Localization in Crowded Scenes

Nov 21, 2015
Mohammad Sabokrou, Mahmood Fathy, Mojtaba Hosseini, Reinhard Klette

Figure 1 for Real-Time Anomaly Detection and Localization in Crowded Scenes
Figure 2 for Real-Time Anomaly Detection and Localization in Crowded Scenes
Figure 3 for Real-Time Anomaly Detection and Localization in Crowded Scenes
Figure 4 for Real-Time Anomaly Detection and Localization in Crowded Scenes
Viaarxiv icon

Robust navigation with tinyML for autonomous mini-vehicles

Add code
Bookmark button
Alert button
Jul 01, 2020
Miguel de Prado, Romain Donze, Alessandro Capotondi, Manuele Rusci, Serge Monnerat, Luca Benini and, Nuria Pazos

Figure 1 for Robust navigation with tinyML for autonomous mini-vehicles
Figure 2 for Robust navigation with tinyML for autonomous mini-vehicles
Figure 3 for Robust navigation with tinyML for autonomous mini-vehicles
Figure 4 for Robust navigation with tinyML for autonomous mini-vehicles
Viaarxiv icon

Explainable Deep Reinforcement Learning for UAV Autonomous Navigation

Sep 30, 2020
Lei He, Aouf Nabil, Bifeng Song

Figure 1 for Explainable Deep Reinforcement Learning for UAV Autonomous Navigation
Figure 2 for Explainable Deep Reinforcement Learning for UAV Autonomous Navigation
Figure 3 for Explainable Deep Reinforcement Learning for UAV Autonomous Navigation
Figure 4 for Explainable Deep Reinforcement Learning for UAV Autonomous Navigation
Viaarxiv icon