共 50 条
- [41] Hierarchical Identity Based Cryptography for End-to-End Security in DTNs 2008 IEEE 4TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2008, : 223 - 230
- [42] Separate then Constrain: A Hierarchical Network for End-to-End Triples Extraction ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2022, PT I, 2022, 13280 : 535 - 547
- [43] Deep tracking in the wild: End-to-end tracking using recurrent neural networks INTERNATIONAL JOURNAL OF ROBOTICS RESEARCH, 2018, 37 (4-5): : 492 - 512
- [45] End-to-End Tracking Performance for the Enhanced Polar System (EPS) 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1194 - 1199
- [46] End-to-end Active Object Tracking via Reinforcement Learning INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 80, 2018, 80
- [47] Tracking and Predicting End-to-End Quality in Wireless Community Networks 2015 3RD INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) AND INTERNATIONAL CONFERENCE ON OPEN AND BIG (OBD), 2015, : 794 - 799
- [49] MOTR: End-to-End Multiple-Object Tracking with Transformer COMPUTER VISION - ECCV 2022, PT XXVII, 2022, 13687 : 659 - 675
- [50] End-to-end representation learning for Correlation Filter based tracking 30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, : 5000 - 5008