We thus propose a network-based approach that is capable of rendering realistic monocular bokeh from single image inputs.
Concise overview of benchmark datasets and evaluation metrics used in detection is also provided along with some of the prominent backbone architectures used in recognition tasks.
1 code implementation • 13 Jan 2021 • Brian Lee, Brandi Dupervil, Nicholas P. Deputy, Wil Duck, Stephen Soroka, Lyndsay Bottichio, Benjamin Silk, Jason Price, Patricia Sweeney, Jennifer Fuld, Todd Weber, Dan Pollock
Practice Implications: Enriched understanding of the available public data, the methods used to create these data, and the algorithms used to protect privacy of de-identified individuals allow for improved data use.
Cryptography and Security Computers and Society
Interpretability of machine learning models is critical to scientific understanding, AI safety, as well as debugging.
To reduce trial and error in finding treatments for COVID-19, we propose building a network-based drug repurposing framework to prioritize repurposable drugs.
no code implementations • 23 Dec 2019 • Muhammad Saif-ur-Rehman, Omair Ali, Robin Lienkaemper, Sussane Dyck, Marita Metzler, Yaroslav Parpaley, Joerg Wellmer, Charles Liu, Brian Lee, Spencer Kellis, Richard Andersen, Ioannis Iossifidis, Tobias Glasmachers, Christian Klaes
We proposed a novel spike sorting pipeline, based on a set of supervised and unsupervised learning algorithms.
We feed the predictions of the network back to the input to improve prediction performance and robustness.
1 code implementation • 18 Apr 2019 • Javier Duarte, Philip Harris, Scott Hauck, Burt Holzman, Shih-Chieh Hsu, Sergo Jindariani, Suffian Khan, Benjamin Kreis, Brian Lee, Mia Liu, Vladimir Lončar, Jennifer Ngadiuba, Kevin Pedro, Brandon Perez, Maurizio Pierini, Dylan Rankin, Nhan Tran, Matthew Trahms, Aristeidis Tsaris, Colin Versteeg, Ted W. Way, Dustin Werran, Zhenbin Wu
New heterogeneous computing paradigms on dedicated hardware with increased parallelization, such as Field Programmable Gate Arrays (FPGAs), offer exciting solutions with large potential gains.
Data Analysis, Statistics and Probability High Energy Physics - Experiment Computational Physics Instrumentation and Detectors
As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT), enterprises are moving away from traditional perimeter based security models toward so called zero trust networking (ZTN) models that treat both the intranet and Internet as equally untrustworthy.
Cryptography and Security