搜索结果: 1-15 共查到“计算机科学技术 method”相关记录86条 . 查询时间(0.125 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Distributed sparse identification theory and method
分布式 稀疏识别 理论方法
2023/11/29
New tool helps people choose the right method for evaluating AI models(图)
AI模型 行为方式 机器学习模型 人工智能
2023/6/20
A method for designing neural networks optimally suited for certain tasks(图)
神经网络 机器学习模型 计算机网络
2023/6/20
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A LASSO-based Detection and Identification Method on Actuator Integrity Attacks in Remote Control Systems
LASSO 远程控制系统 执行器 完整性 攻击检测 识别方法
2023/4/28
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A two-stage physics-informed neural network method based on conserved quantities and applications in localized wave solutions
守恒量 两阶段物理信息 神经网络方法 局部波解
2023/5/5
Busy GPUs: Sampling and pipelining method speeds up deep learning on large graphs(图)
GPU 流水线 大型图形 深度学习
2023/6/20
华南理工大学数据结构与算法课件Chapter15 Branch and Bound Method
华南理工大学 数据结构 算法 课件 Chapter15 Branch Bound Method
2019/4/11
华南理工大学数据结构与算法课件Chapter15 Branch and Bound Method。
FEATURE VECTOR CONSTRUCTION METHOD FOR IRIS RECOGNITION
Iris recognition Iris feature extraction Biometrics Mobile biometrics Quantization Encoding
2017/6/19
One of the basic stages of iris recognition pipeline is iris feature vector construction procedure. The procedure represents the extraction of iris texture information relevant to its subsequent compa...
PERCEPTUALLY GUIDED GEOMETRICAL PRIMITIVE LOCATION METHOD FOR 3D COMPLEX BUILDING SIMPLIFICATION
3D complex building Geometrical primitive location Human vision system
2016/2/29
Because of detailed geometrical components based description, 3D complex building contains the most elaborated perceptual and
comprehensive semantic information. However, since the lack of optimal si...
Carnegie Mellon,Stanford researchers devise method to safely share password data(图)
Carnegie Mellon Stanford researchers share password data
2016/3/2
An unfortunate reality for cybersecurity researchers is that real-world data for their research too often comes via a security breach. Now computer scientists have devised a way to let organizations s...
3D Digital Modelling as a Method for the Reconstruction of the Historical Image of the City: The Case of Piazza Bodoni In Turin at the End of Nineteenth Century
Architecture Digital Modelling Reconstruction Research CAD Representation
2015/11/13
The experience that I want to present consists of the case of piazza Bodoni in Turin, characterized, between 1866 and 1924 by the presence of an original pavilion dedicated to market.
New Internet Routing Method Allows Users to Avoid Sending Data Through Undesired Geographic Regions
New Internet Routing Method Users to Avoid Sending Data Undesired Geographic Regions
2015/9/9
Censorship is one of the greatest threats to open communication on the Internet. Information may be censored by a user’s country of residence or the information’s desired destination. But recent studi...
Compressed sensing based cone-beam computed tomography reconstruction with a first-order method
Department of Radiation Oncology Stanford University Stanford California 94305
2015/8/7
This article considers the problem of reconstructing cone-beam computed tomography (CBCT) images from a set of undersampled and potentially noisy projection measurements. The authors cast the reconstr...
Distributed optimization and statistical learning via the alternating direction method of multipliers
Statistics machine learning convex optimization framework modern data set data set
2015/8/7
Many problems of recent interest in statistics and machine learning can be posed in the framework of convex optimization. Due to the explosion in size and complexity of modern datasets, it is increasi...
The use of model checking for validation requires that models of the underlying system be created. Creating such models is both difficult and error prone and as a result, verification is rarely used d...