搜索结果: 1-15 共查到“计算机科学技术 method”相关记录86条 . 查询时间(0.187 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Distributed sparse identification theory and method
分布式 稀疏识别 理论方法
font style='font-size:12px;'>
2023/11/29
New tool helps people choose the right method for evaluating AI models(图)
AI模型 行为方式 机器学习模型 人工智能
font style='font-size:12px;'>
2023/6/20
A method for designing neural networks optimally suited for certain tasks(图)
神经网络 机器学习模型 计算机网络
font style='font-size:12px;'>
2023/6/20
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A LASSO-based Detection and Identification Method on Actuator Integrity Attacks in Remote Control Systems
LASSO 远程控制系统 执行器 完整性 攻击检测 识别方法
font style='font-size:12px;'>
2023/4/28
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A two-stage physics-informed neural network method based on conserved quantities and applications in localized wave solutions
守恒量 两阶段物理信息 神经网络方法 局部波解
font style='font-size:12px;'>
2023/5/5
Busy GPUs: Sampling and pipelining method speeds up deep learning on large graphs(图)
GPU 流水线 大型图形 深度学习
font style='font-size:12px;'>
2023/6/20
华南理工大学数据结构与算法课件Chapter15 Branch and Bound Method
华南理工大学 数据结构 算法 课件 Chapter15 Branch Bound Method
font style='font-size:12px;'>
2019/4/11
华南理工大学数据结构与算法课件Chapter15 Branch and Bound Method。
FEATURE VECTOR CONSTRUCTION METHOD FOR IRIS RECOGNITION
Iris recognition Iris feature extraction Biometrics Mobile biometrics Quantization Encoding
font style='font-size:12px;'>
2017/6/19
One of the basic stages of iris recognition pipeline is iris feature vector construction procedure. The procedure represents the extraction of iris texture information relevant to its subsequent compa...
PERCEPTUALLY GUIDED GEOMETRICAL PRIMITIVE LOCATION METHOD FOR 3D COMPLEX BUILDING SIMPLIFICATION
3D complex building Geometrical primitive location Human vision system
font style='font-size:12px;'>
2016/2/29
Because of detailed geometrical components based description, 3D complex building contains the most elaborated perceptual and
comprehensive semantic information. However, since the lack of optimal si...
Carnegie Mellon,Stanford researchers devise method to safely share password data(图)
Carnegie Mellon Stanford researchers share password data
font style='font-size:12px;'>
2016/3/2
An unfortunate reality for cybersecurity researchers is that real-world data for their research too often comes via a security breach. Now computer scientists have devised a way to let organizations s...
3D Digital Modelling as a Method for the Reconstruction of the Historical Image of the City: The Case of Piazza Bodoni In Turin at the End of Nineteenth Century
Architecture Digital Modelling Reconstruction Research CAD Representation
font style='font-size:12px;'>
2015/11/13
The experience that I want to present consists of the case of piazza Bodoni in Turin, characterized, between 1866 and 1924 by the presence of an original pavilion dedicated to market.
New Internet Routing Method Allows Users to Avoid Sending Data Through Undesired Geographic Regions
New Internet Routing Method Users to Avoid Sending Data Undesired Geographic Regions
font style='font-size:12px;'>
2015/9/9
Censorship is one of the greatest threats to open communication on the Internet. Information may be censored by a user’s country of residence or the information’s desired destination. But recent studi...
Compressed sensing based cone-beam computed tomography reconstruction with a first-order method
Department of Radiation Oncology Stanford University Stanford California 94305
font style='font-size:12px;'>
2015/8/7
This article considers the problem of reconstructing cone-beam computed tomography (CBCT) images from a set of undersampled and potentially noisy projection measurements. The authors cast the reconstr...
Distributed optimization and statistical learning via the alternating direction method of multipliers
Statistics machine learning convex optimization framework modern data set data set
font style='font-size:12px;'>
2015/8/7
Many problems of recent interest in statistics and machine learning can be posed in the framework of convex optimization. Due to the explosion in size and complexity of modern datasets, it is increasi...
A Simple Method for Extracting Models from Protocol Code
Extracting Models Protocol Code
font style='font-size:12px;'>
2015/8/7
The use of model checking for validation requires that models of the underlying system be created. Creating such models is both difficult and error prone and as a result, verification is rarely used d...