Picture for Ji Xin

Ji Xin

MultiResFormer: Transformer with Adaptive Multi-Resolution Modeling for General Time Series Forecasting

Add code
Nov 30, 2023
Figure 1 for MultiResFormer: Transformer with Adaptive Multi-Resolution Modeling for General Time Series Forecasting
Figure 2 for MultiResFormer: Transformer with Adaptive Multi-Resolution Modeling for General Time Series Forecasting
Figure 3 for MultiResFormer: Transformer with Adaptive Multi-Resolution Modeling for General Time Series Forecasting
Figure 4 for MultiResFormer: Transformer with Adaptive Multi-Resolution Modeling for General Time Series Forecasting
Viaarxiv icon

Building an Efficiency Pipeline: Commutativity and Cumulativeness of Efficiency Operators for Transformers

Add code
Jul 31, 2022
Figure 1 for Building an Efficiency Pipeline: Commutativity and Cumulativeness of Efficiency Operators for Transformers
Figure 2 for Building an Efficiency Pipeline: Commutativity and Cumulativeness of Efficiency Operators for Transformers
Figure 3 for Building an Efficiency Pipeline: Commutativity and Cumulativeness of Efficiency Operators for Transformers
Figure 4 for Building an Efficiency Pipeline: Commutativity and Cumulativeness of Efficiency Operators for Transformers
Viaarxiv icon

Few-Shot Non-Parametric Learning with Deep Latent Variable Model

Add code
Jun 23, 2022
Figure 1 for Few-Shot Non-Parametric Learning with Deep Latent Variable Model
Figure 2 for Few-Shot Non-Parametric Learning with Deep Latent Variable Model
Figure 3 for Few-Shot Non-Parametric Learning with Deep Latent Variable Model
Figure 4 for Few-Shot Non-Parametric Learning with Deep Latent Variable Model
Viaarxiv icon

Certified Error Control of Candidate Set Pruning for Two-Stage Relevance Ranking

Add code
May 19, 2022
Figure 1 for Certified Error Control of Candidate Set Pruning for Two-Stage Relevance Ranking
Figure 2 for Certified Error Control of Candidate Set Pruning for Two-Stage Relevance Ranking
Figure 3 for Certified Error Control of Candidate Set Pruning for Two-Stage Relevance Ranking
Figure 4 for Certified Error Control of Candidate Set Pruning for Two-Stage Relevance Ranking
Viaarxiv icon

Zero-Shot Dense Retrieval with Momentum Adversarial Domain Invariant Representations

Add code
Oct 14, 2021
Figure 1 for Zero-Shot Dense Retrieval with Momentum Adversarial Domain Invariant Representations
Figure 2 for Zero-Shot Dense Retrieval with Momentum Adversarial Domain Invariant Representations
Figure 3 for Zero-Shot Dense Retrieval with Momentum Adversarial Domain Invariant Representations
Figure 4 for Zero-Shot Dense Retrieval with Momentum Adversarial Domain Invariant Representations
Viaarxiv icon

Inserting Information Bottlenecks for Attribution in Transformers

Add code
Dec 27, 2020
Figure 1 for Inserting Information Bottlenecks for Attribution in Transformers
Figure 2 for Inserting Information Bottlenecks for Attribution in Transformers
Figure 3 for Inserting Information Bottlenecks for Attribution in Transformers
Figure 4 for Inserting Information Bottlenecks for Attribution in Transformers
Viaarxiv icon

Showing Your Work Doesn't Always Work

Add code
Apr 28, 2020
Figure 1 for Showing Your Work Doesn't Always Work
Figure 2 for Showing Your Work Doesn't Always Work
Figure 3 for Showing Your Work Doesn't Always Work
Figure 4 for Showing Your Work Doesn't Always Work
Viaarxiv icon

DeeBERT: Dynamic Early Exiting for Accelerating BERT Inference

Add code
Apr 27, 2020
Figure 1 for DeeBERT: Dynamic Early Exiting for Accelerating BERT Inference
Figure 2 for DeeBERT: Dynamic Early Exiting for Accelerating BERT Inference
Figure 3 for DeeBERT: Dynamic Early Exiting for Accelerating BERT Inference
Figure 4 for DeeBERT: Dynamic Early Exiting for Accelerating BERT Inference
Viaarxiv icon

Exploiting Token and Path-based Representations of Code for Identifying Security-Relevant Commits

Add code
Nov 15, 2019
Figure 1 for Exploiting Token and Path-based Representations of Code for Identifying Security-Relevant Commits
Figure 2 for Exploiting Token and Path-based Representations of Code for Identifying Security-Relevant Commits
Figure 3 for Exploiting Token and Path-based Representations of Code for Identifying Security-Relevant Commits
Viaarxiv icon