Search is not available for this dataset
abstract stringclasses 0
values | embedding sequence |
|---|---|
This paper presents a practical global optimization algorithm for the
K-center clustering problem, which aims to select K samples as the cluster
centers to minimize the maximum within-cluster distance. This algorithm is
based on a reduced-space branch and bound scheme and guarantees convergence to
the global optimum ... | [
0.000402558798668,
0.010741917416453,
0.010650705546140001,
-0.008805425837635,
0.0030362932011480004,
0.037130128592252,
-0.029159639030694004,
0.000289421353954,
-0.023827271535992,
-0.037158194929361,
0.006107667461037001,
0.020277036353945,
-0.020291067659854,
-0.005332369357347,
-0.... |
Visual surveillance aims to perform robust foreground object detection
regardless of the time and place. Object detection shows good results using
only spatial information, but foreground object detection in visual
surveillance requires proper temporal and spatial information processing. In
deep learning-based foregr... | [
-0.004978630691766001,
0.017125925049185,
0.010457236319780001,
-0.006834174040704,
0.004679349251091001,
0.018844151869416,
-0.032082941383123,
-0.000666340754833,
-0.026998683810234,
-0.023421393707394003,
0.034026511013507,
0.031716763973236,
-0.004823708441108,
0.018266715109348002,
... |
Recognizing an event in an image can be enhanced by detecting relevant
objects in two ways: 1) indirectly utilizing object detection information
within the unified architecture or 2) directly making use of the object
detection output results. We introduce a novel approach, referred to as
Doubly-injected Object Detect... | [
-0.03323445469141,
0.017974574118852,
0.007547676097601001,
-0.005244297906756,
-0.003516764612868,
0.012250405736267001,
-0.007136358413845001,
-0.013655740767717,
-0.020949769765138,
-0.0101526863873,
0.018522998318076002,
0.028709961101412003,
-0.005151751451194,
0.012462919577956,
-0... |
This work generalizes graph neural networks (GNNs) beyond those based on the
Weisfeiler-Lehman (WL) algorithm, graph Laplacians, and diffusions. Our
approach, denoted Relational Pooling (RP), draws from the theory of finite
partial exchangeability to provide a framework with maximal representation
power for graphs. R... | [
-0.0033673143479970003,
0.024942545220255,
0.016293341293931,
-0.017567364498972,
-0.01433984003961,
-0.004565250128507,
-0.009194200858473,
-0.0020508235320440002,
-0.022507743909955,
-0.051272358745336005,
0.0027391500771040004,
0.032671619206666,
0.0009422464063390001,
0.018784765154123... |
This paper presents a novel multi-fake evolutionary generative adversarial
network(MFEGAN) for handling imbalance hyperspectral image classification. It
is an end-to-end approach in which different generative objective losses are
considered in the generator network to improve the classification performance
of the dis... | [
-0.018717739731073,
-0.0021929517388340003,
-0.017297867685556002,
0.0023021728266030004,
0.011242930777370002,
0.017803015187382,
-0.015031532384455001,
-0.013645792379975001,
-0.016929246485233,
-0.038227330893278004,
0.025311954319477,
0.022103589028120003,
0.007331456057727,
0.00280390... |
Cultural adaptation, i.e., the matching of a robot's behaviours to the
cultural norms and preferences of its user, is a well known key requirement for
the success of any assistive application. However, culture-dependent robot
behaviours are often implicitly set by designers, thus not allowing for an easy
and automati... | [
-0.010817383415997,
-0.015743156895041,
0.004963716492056,
-0.016874566674232,
0.010072308592498,
0.013245775364339001,
-0.006816055160015001,
0.019220171496272,
-0.005008558742702,
-0.027885116636753002,
-0.012279937975108,
-0.0036977790296070004,
0.0021351913455870002,
-0.000475588894914... |
" Many possible fields of application of robots in real world settings hinge on\nthe ability of rob(...TRUNCATED) | [-0.011579873971641001,-0.004333680029958,0.022429864853620002,-0.018064603209495,-0.005400432273745(...TRUNCATED) |
" Orbital angular momentum of light is regarded as a valuable resource in\nquantum technology, espe(...TRUNCATED) | [-0.017170963808894,-0.006853869184851,-0.013707738369703001,-0.002530021360144,-0.00528815947473000(...TRUNCATED) |
" Mobile keyboard suggestion is typically regarded as a word-level language\nmodeling problem. Cent(...TRUNCATED) | [-0.028727790340781004,0.018533607944846,0.029536630958318003,-0.026078138500452003,0.01195829082280(...TRUNCATED) |
" Deep Neural Networks (DNNs) are known to be vulnerable to the maliciously\ngenerated adversarial (...TRUNCATED) | [0.000783797469921,0.002981959842145,0.01621139422059,-0.025949249044060003,-0.016404222697019,0.015(...TRUNCATED) |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 6