Fig. 2From: Exploiting prunability for person re-identificationScenarios for pruning and training a CNNBack to article page