• DeepTorrent

  • Referenced in 1 article [sw40013]
  • inception module. In addition, the attention mechanism and transfer learning techniques are also employed...
  • IDP-Seq2Seq

  • Referenced in 1 article [sw40045]
  • other sequence-based features. Furthermore, the Attention mechanism was used to capture the global associations...
  • ProphetNet

  • Referenced in 1 article [sw35776]
  • proposed n-stream self-attention mechanism. Instead of optimizing one-step-ahead prediction...
  • DeepAffinity

  • Referenced in 1 article [sw39160]
  • transfer learning. Furthermore, separate and joint attention mechanisms are developed and embedded to our model...
  • MLCVNet

  • Referenced in 1 article [sw32541]
  • level contextual information with the self-attention mechanism and multi-scale feature fusion. Most existing...
  • SQLNet

  • Referenced in 1 article [sw42256]
  • model as well as the column attention mechanism to synthesize the query based...
  • CoCoSUM

  • Referenced in 1 article [sw40142]
  • decoder armed with a two-level attention mechanism to generate high-quality, context-aware code...
  • Pathomic Fusion

  • Referenced in 1 article [sw41413]
  • each representation via a gating-based attention mechanism. Following supervised learning, we are able...
  • MFront

  • Referenced in 5 articles [sw35455]
  • Numerical performances of generated mechanical behaviours were given a particular attention. Various benchmarks show that...
  • SMPSO

  • Referenced in 27 articles [sw23795]
  • Particle Swarm Optimization (PSO) has received increasing attention in the optimization research community since ... SMPSO, characterized by including a velocity constraint mechanism, obtaining promising results where the rest perform...
  • SuperGlue

  • Referenced in 2 articles [sw42666]
  • introduce a flexible context aggregation mechanism based on attention, enabling SuperGlue to reason about...
  • LNgen

  • Referenced in 7 articles [sw10111]
  • mechanical formalization and checking of such metatheory have received much recent attention. In previous work...
  • ABD-NMT

  • Referenced in 0 articles [sw34607]
  • unified encoder-decoder framework with attentional mechanism, neural machine translation (NMT) models have attracted much...
  • ADEPTS

  • Referenced in 4 articles [sw22315]
  • less attention. In this paper, we present the design of automated response mechanisms...
  • ACNe

  • Referenced in 1 article [sw42663]
  • order. In this paper, we propose Attentive Context Normalization (ACN), a simple yet effective technique ... normalization. We use this mechanism to leverage two types of attention: local and global...
  • Transformer-XL

  • Referenced in 7 articles [sw36208]
  • Transformer-XL: Attentive Language Models Beyond a Fixed-Length Context. Transformers have a potential ... consists of a segment-level recurrence mechanism and a novel positional encoding scheme. Our method...
  • parest_dae

  • Referenced in 7 articles [sw09087]
  • products, present in larger concentrations. The chemical mechanism also often contains many rate constants whose ... enzymatic reactions. In this chapter, we focus attention on the QSSA, how it is “taught ... describe algorithms that can test any mechanism for solvability. We also show that an alternative...
  • BATMAN-TCM

  • Referenced in 1 article [sw42760]
  • Bioinformatics Analysis Tool for Molecular mechANism of Traditional Chinese Medicine. Traditional Chinese Medicine (TCM), with ... clinical practice, is gaining more and more attention and application worldwide. And TCM-based ... still quite difficult to uncover its molecular mechanism, which greatly hinders the TCM modernization...
  • ViennaMaterials

  • Referenced in 1 article [sw29050]
  • programming interfaces for accessing material data. Special attention is on handling physical units as well ... material models via a nested code evaluation mechanism. The challenges of supporting different programming languages...
  • Lintent

  • Referenced in 2 articles [sw21576]
  • adoption of Android devices has attracted the attention of a growing computer security audience. Fundamental ... techniques from data-flow analysis, runtime protection mechanisms, or changes to the operating system. This...