CSpace

浏览/检索结果: 共226条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Trajectory-User Linking via Multi-Scale Graph Attention Network 期刊论文
PATTERN RECOGNITION, 2025, 卷号: 158, 页码: 16
作者:  Li, Yujie;  Sun, Tao;  Shao, Zezhi;  Zhen, Yiqiang;  Xu, Yongjun;  Wang, Fei
收藏  |  浏览/下载:3/0  |  提交时间:2024/12/06
Trajectory-user linking  Graph neural network  Trajectory classification  Spatio-temporal data mining  Check-in data  
MGSFformer: A Multi-Granularity Spatiotemporal Fusion Transformer for air quality prediction 期刊论文
INFORMATION FUSION, 2025, 卷号: 113, 页码: 15
作者:  Yu, Chengqing;  Wang, Fei;  Wang, Yilun;  Shao, Zezhi;  Sun, Tao;  Yao, Di;  Xu, Yongjun
收藏  |  浏览/下载:3/0  |  提交时间:2024/12/06
Air quality prediction  Multi-Granularity Spatiotemporal Fusion  Transformer  Spatiotemporal correlation  Multi-source information fusion  
A fast test compaction method using dedicated Pure MaxSAT solver embedded in DFT flow 期刊论文
INTEGRATION-THE VLSI JOURNAL, 2025, 卷号: 100, 页码: 11
作者:  Chao, Zhiteng;  Zhang, Xindi;  Huang, Junying;  Liu, Zizhen;  Zhao, Yixuan;  Ye, Jing;  Cai, Shaowei;  Li, Huawei;  Li, Xiaowei
收藏  |  浏览/下载:3/0  |  提交时间:2024/12/06
Static test compaction  Pure MaxSAT  DFT  ATPG  
Learning Critically: Selective Self-Distillation in Federated Learning on Non-IID Data 期刊论文
IEEE TRANSACTIONS ON BIG DATA, 2024, 卷号: 10, 期号: 6, 页码: 789-800
作者:  He, Yuting;  Chen, Yiqiang;  Yang, XiaoDong;  Yu, Hanchao;  Huang, Yi-Hua;  Gu, Yang
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Data models  Training  Servers  Collaborative work  Adaptation models  Convergence  Feature extraction  Federated learning  knowledge distillation  non-identically distributed  deep learning  catastrophic forgetting  
Attention-Guided Residual U-Net with SE Connection and ASPP for Watershed-Based Cell Segmentation in Microscopy Images 期刊论文
JOURNAL OF COMPUTATIONAL BIOLOGY, 2024, 页码: 13
作者:  Niyogisubizo, Jovial;  Zhao, Keliang;  Meng, Jintao;  Pan, Yi;  Didi, Rosiy Adi;  Wei, Yanjie
收藏  |  浏览/下载:2/0  |  提交时间:2024/12/06
cell segmentation  deep learning  watershed segmentation  bright-field microscopy  iPS cell reprogramming  attention mechanism  
Crypto-DSEDA: A Domain-Specific EDA Flow for CiM-Based Cryptographic Accelerators 期刊论文
IEEE DESIGN & TEST, 2024, 卷号: 41, 期号: 5, 页码: 46-54
作者:  Liu, Rui;  Li, Zerun;  Zhang, Xiaoyu;  Li, Wanqian;  Shen, Libo;  Tang, Rui;  Luo, Zhejian;  Chen, Xiaoming;  Han, Yinhe;  Tang, Minghua
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Computer architecture  Cryptography  Optimization  Table lookup  Hardware acceleration  Resource management  Space exploration  Computing-in-memory  electronic design automation  cryptographic algorithm  automatic generation  
Cross-Model Comparative Loss for Enhancing Neuronal Utility in Language Understanding 期刊论文
ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2024, 卷号: 42, 期号: 5, 页码: 29
作者:  Zhu, Yunchang;  Pang, Liang;  Wu, Kangxi;  Lan, Yanyan;  Shen, Huawei;  Cheng, Xueqi
收藏  |  浏览/下载:2/0  |  提交时间:2024/12/06
Natural language understanding  question answering  pseudo-relevance feedback  loss function  
Progressive Decision Boundary Shifting for Unsupervised Domain Adaptation 期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 页码: 12
作者:  Li, Liang;  Lu, Tongyu;  Sun, Yaoqi;  Gao, Yuhan;  Yan, Chenggang;  Hu, Zhenghui;  Huang, Qingming
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Uncertainty  Feature extraction  Semantics  Task analysis  Training  Adversarial machine learning  Symbols  Domain shifting  progressive decision boundary  self-learning  unsupervised domain adaptation (UDA)  
DPU-Direct: Unleashing Remote Accelerators via Enhanced RDMA for Disaggregated Datacenters 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2024, 卷号: 73, 期号: 8, 页码: 2081-2095
作者:  Liao, Yunkun;  Wu, Jingya;  Lu, Wenyan;  Li, Xiaowei;  Yan, Guihai
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Central Processing Unit  Engines  Jitter  Computers  Pipelines  Programming  Encryption  Disaggregated datacenter  SmartNIC  RDMA  hardware accelerator  
Adaptive Perturbation for Adversarial Attack 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 卷号: 46, 期号: 8, 页码: 5663-5676
作者:  Yuan, Zheng;  Zhang, Jie;  Jiang, Zhaoyan;  Li, Liangliang;  Shan, Shiguang
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Perturbation methods  Iterative methods  Adaptation models  Generators  Closed box  Security  Training  Adversarial attack  transfer-based attack  adversarial example  adaptive perturbation