Toward Hybrid COTS-based LiFi/WiFi Networks with QoS Requirements in Mobile Environments
arxiv.org·5d
📡Network Protocols
Flag this post
Towards Gaussian processes modelling to study the late effects of radiotherapy in children and young adults with brain tumours
arxiv.org·6d
🤖AI
Flag this post
A Multi-tiered Human-in-the-loop Approach for Interactive School Mapping Using Earth Observation and Machine Learning
arxiv.org·6d
🧮Linear Algebra
Flag this post
Dataset Creation and Baseline Models for Sexism Detection in Hausa
arxiv.org·6d
🦾Rust ML
Flag this post
Integrating ConvNeXt and Vision Transformers for Enhancing Facial Age Estimation
arxiv.org·5d
🦾Rust ML
Flag this post
Knowledge Elicitation with Large Language Models for Interpretable Cancer Stage Identification from Pathology Reports
arxiv.org·5d
🦾Rust ML
Flag this post
SCOUT: Semi-Lagrangian COnservative and Unconditionally sTable schemes for nonlinear advection-diffusion problems
arxiv.org·5d
🎮Game Engines
Flag this post
A Hybrid Deep Learning and Forensic Approach for Robust Deepfake Detection
arxiv.org·6d
🕯️Candle
Flag this post
Thought Branches: Interpreting LLM Reasoning Requires Resampling
arxiv.org·6d
🏗️LLVM
Flag this post
AURA: A Reinforcement Learning Framework for AI-Driven Adaptive Conversational Surveys
arxiv.org·6d
🤖AI
Flag this post
A prayer for engaging in conflict
lesswrong.com·5d
📦Binary Formats
Flag this post
UNILocPro: Unified Localization Integrating Model-Based Geometry and Channel Charting
arxiv.org·6d
📡Network Protocols
Flag this post
US Govt Whistleblower Guide
lesswrong.com·5d
🔐Cryptography
Flag this post
A Retrospect to Multi-prompt Learning across Vision and Language
arxiv.org·5d
🕯️Candle
Flag this post
Story and essential meaning dynamics in Bangladesh's July 2024 Student-People's Uprising
arxiv.org·4d
🧮Linear Algebra
Flag this post
Debunking “When Prophecy Fails”
lesswrong.com·3d
🦾Rust ML
Flag this post
The Demon Hidden Behind Life's Ultra-Energy-Efficient Information Processing -- Demonstrated by Biological Molecular Motors
arxiv.org·6d
🔐Cryptography
Flag this post
Understanding, Demystifying and Challenging Perceptions of Gig Worker Vulnerabilities
arxiv.org·5d
🔒Hardware Security
Flag this post
Loading...Loading more...