High-Resolution Image Synthesis with Latent Diffusion Models
By decomposing the image formation process into a sequential application of denoising autoencoders, diffusion models (DMs) achieve state-of-the-art synthesis results on image da...
Explore 1,054 academic publications
By decomposing the image formation process into a sequential application of denoising autoencoders, diffusion models (DMs) achieve state-of-the-art synthesis results on image da...
Microarrays can measure the expression of thousands of genes to identify changes in expression between different biological states. Methods are needed to determine the significa...
Recent extensions of the DMol3 local orbital density functional method for band structure calculations of insulating and metallic solids are described. Furthermore the method fo...
Time underlies many interesting human behaviors. Thus, the question of how to represent time in connectionist models is very important. One approach is to represent time implici...
The behaviour of Rogers's η parameter for enantiomorph-polarity estimation is examined theoretically and experimentally on simulated intensity data for seven well-assorted compo...
Perovskite Photovoltaics For many types of low-cost solar cells, including those using dye-sensitized titania, performance is limited by low open-circuit voltages. Lee et al. (p...
ABSTRACT The last decade has seen a sharp increase in the number of scientific publications describing physiological and pathological functions of extracellular vesicles (EVs), ...
The main purpose of this project is to develop mathematical competences through interactive educational environments of multi-device access in the ninth grade students of the In...
An ad-hoc network is the cooperative engagement of acollection of mobile nodes without the required intervention of any centralizedaccess point or existing infrastructure. In th...
Breast cancer is the most common malignancy in United States women, accounting for >40,000 deaths each year. These breast tumors are comprised of phenotypically diverse popul...
Practical application of the generalized Bell's theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohm's version...