CSpace

浏览/检索结果: 共20条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Accurate Robotic Grasp Detection with Angular Label Smoothing 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2023, 卷号: 38, 期号: 5, 页码: 1149-1161
作者:  Shi, Min;  Lu, Hao;  Li, Zhao-Xin;  Zhu, Deng-Ming;  Wang, Zhao-Qi
收藏  |  浏览/下载:2/0  |  提交时间:2024/05/20
robotic grasp detection  attention mechanism  angular label smoothing  anchor box  deep learning  
Accelerating Data Transfer in Dataflow Architectures Through a Look-Ahead Acknowledgment Mechanism 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2022, 卷号: 37, 期号: 4, 页码: 942-959
作者:  Feng, Yu-Jing;  Li, De-Jian;  Tan, Xu;  Ye, Xiao-Chun;  Fan, Dong-Rui;  Li, Wen-Ming;  Wang, Da;  Zhang, Hao;  Tang, Zhi-Min
收藏  |  浏览/下载:25/0  |  提交时间:2022/12/07
dataflow model  control-ow model  high-performance computing application  data transfer  power efficiency  
Exploiting the Community Structure of Fraudulent Keywords for Fraud Detection in Web Search 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2021, 卷号: 36, 期号: 5, 页码: 1167-1183
作者:  Yang, Dong-Hui;  Li, Zhen-Yu;  Wang, Xiao-Hui;  Salamatian, Kave;  Xie, Gao-Gang
收藏  |  浏览/下载:38/0  |  提交时间:2021/12/01
community structure  fraud analysis  fraudulent keyword detection  web search  
Evaluating and Constraining Hardware Assertions with Absent Scenarios 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2020, 卷号: 35, 期号: 5, 页码: 1198-1216
作者:  Chao, Hui-Na;  Li, Hua-Wei;  Song, Xiaoyu;  Wang, Tian-Cheng;  Li, Xiao-Wei
收藏  |  浏览/下载:30/0  |  提交时间:2021/12/01
hardware formal verification  assertion generation  data mining  assertion evaluation  assertion coverage  
A Case for Adaptive Resource Management in Alibaba Datacenter Using Neural Networks 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2020, 卷号: 35, 期号: 1, 页码: 209-220
作者:  Wang, Sa;  Zhu, Yan-Hai;  Chen, Shan-Pei;  Wu, Tian-Ze;  Li, Wen-Jie;  Zhan, Xu-Sheng;  Ding, Hai-Yang;  Shi, Wei-Song;  Bao, Yun-Gang
收藏  |  浏览/下载:46/0  |  提交时间:2020/12/10
resource management  neural network  resource efficiency  tail latency  
A Non-Stop Double Buffering Mechanism for Dataflow Architecture 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 卷号: 33, 期号: 1, 页码: 145-157
作者:  Tan, Xu;  Shen, Xiao-Wei;  Ye, Xiao-Chun;  Wang, Da;  Fan, Dong-Rui;  Zhang, Lunkai;  Li, Wen-Ming;  Zhang, Zhi-Min;  Tang, Zhi-Min
收藏  |  浏览/下载:67/0  |  提交时间:2019/12/10
non-stop  double buffering  dataflow architecture  high-performance computing  
A Pipelining Loop Optimization Method for Dataflow Architecture 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 卷号: 33, 期号: 1, 页码: 116-130
作者:  Tan, Xu;  Ye, Xiao-Chun;  Shen, Xiao-Wei;  Xu, Yuan-Chao;  Wang, Da;  Zhang, Lunkai;  Li, Wen-Ming;  Fan, Dong-Rui;  Tang, Zhi-Min
收藏  |  浏览/下载:74/0  |  提交时间:2019/12/10
dataflow model  control-flow model  loop optimization  exascale computing  scientific application  
A Power and Area Optimization Approach of Mixed Polarity Reed-Muller Expression for Incompletely Specified Boolean Functions 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2017, 卷号: 32, 期号: 2, 页码: 297-311
作者:  He, Zhen-Xue;  Xiao, Li -Min;  Ruan, Li;  Gu, Fei;  Huo, Zhi-Sheng;  Qin, Guang-Jun;  Zhu, Ming-Fa;  Zhang, Long-Bing;  Liu, Rui;  Wang, Xiang
收藏  |  浏览/下载:55/0  |  提交时间:2019/12/12
power and area optimization  Reed-Muller (RM) circuit  Pareto optimal solution  don't care term  chromosome conversion  
An Efficient Network-on-Chip Router for Dataflow Architecture 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2017, 卷号: 32, 期号: 1, 页码: 11-25
作者:  Shen, Xiao-Wei;  Ye, Xiao-Chun;  Tan, Xu;  Wang, Da;  Zhang, Lunkai;  Li, Wen-Ming;  Zhang, Zhi-Min;  Fan, Dong-Rui;  Sun, Ning-Hui
收藏  |  浏览/下载:56/0  |  提交时间:2019/12/12
multi-destination  router  network-on-chip  dataflow architecture  high-performance computing  
Privacy Petri Net and Privacy Leak Software 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2015, 卷号: 30, 期号: 6, 页码: 1318-1343
作者:  Fan, Le-Jun;  Wang, Yuan-Zhuo;  Li, Jing-Yuan;  Cheng, Xue-Qi;  Lin, Chuang
收藏  |  浏览/下载:38/0  |  提交时间:2019/12/13
privacy Petri net  privacy leak software  privacy function  private information  malware analysis