CSpace

浏览/检索结果: 共40条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
SolarZip: An efficient and adaptive compression framework for Solar EUV imaging data: Application to Solar Orbiter/EUI data 期刊论文
ASTRONOMY & ASTROPHYSICS, 2025, 卷号: 702, 页码: 17
作者:  Liu, Zedong;  Tan, Song;  Warmuth, Alexander;  Schuller, Frederic;  Hong, Yun;  Huang, Wenjing;  Gu, Yida;  Zhu, Bojing;  Tan, Guangming;  Tao, Dingwen
收藏  |  浏览/下载:4/0  |  提交时间:2025/12/03
methods: data analysis  space vehicles: instruments  techniques: image processing  Sun: corona  
A Heuristic Big Data Processing Multi Task Efficient Deployment Method Based on QoS Aware Clustering and Bayesian Classification in Cloud Environment 期刊论文
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2025, 卷号: 18, 期号: 5, 页码: 2517-2530
作者:  Yu, ZiYuan;  Yang, Peng;  Wu, WanJing;  Tan, Liang;  Ye, DanLian;  She, Kun
收藏  |  浏览/下载:4/0  |  提交时间:2025/12/03
Load management  Cloud computing  Big Data  Quality of service  Multitasking  Heuristic algorithms  Bayes methods  Virtual machines  Resource management  Real-time systems  big data  Bayesian classification  QoS-aware  multi-task deployment  
A Generic Layer Pruning Method for Signal Modulation Recognition Deep Learning Models 期刊论文
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2025, 卷号: 11, 期号: 4, 页码: 2123-2134
作者:  Lu, Yao;  Zhu, Yutao;  Li, Yuqi;  Xu, Dongwei;  Lin, Yun;  Xuan, Qi;  Yang, Xiaoniu
收藏  |  浏览/下载:4/0  |  提交时间:2025/12/03
Computational modeling  Deep learning  Modulation  Training  Pattern classification  Computational complexity  Vectors  Semantics  Perturbation methods  Indexes  Automatic modulation recognition  layer pruning  deep learning  edge devices  
Revisiting Edge Perturbation for Graph Neural Network in Graph Data Augmentation and Attack 期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2025, 卷号: 37, 期号: 7, 页码: 4225-4238
作者:  Liu, Xin;  Zhang, Yuxiang;  Wu, Meng;  Yan, Mingyu;  He, Kun;  Yan, Wei;  Pan, Shirui;  Ye, Xiaochun;  Fan, Dongrui
收藏  |  浏览/下载:4/0  |  提交时间:2025/12/03
Perturbation methods  Graph neural networks  Image edge detection  Data augmentation  Accuracy  Training  Measurement  Optimization  Detectors  World Wide Web  Edge perturbation  graph neural network  graph data augmentation  graph data attack  
AUCPro: AUC-Oriented Provable Robustness Learning 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2025, 卷号: 47, 期号: 6, 页码: 4579-4596
作者:  Bao, Shilong;  Xu, Qianqian;  Yang, Zhiyong;  He, Yuan;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:4/0  |  提交时间:2025/12/03
Robustness  Training  Perturbation methods  Machine learning  Heavily-tailed distribution  Smoothing methods  Gaussian noise  Data mining  Standards  Protocols  AUC-oriented learning  adversarial robustness  machine learning  
Monte Carlo Neural PDE Solver for Learning PDEs via Probabilistic Representation 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2025, 卷号: 47, 期号: 6, 页码: 5059-5075
作者:  Zhang, Rui;  Meng, Qi;  Zhu, Rongchan;  Wang, Yue;  Shi, Wenlei;  Zhang, Shihua;  Ma, Zhi-Ming;  Liu, Tie-Yan
收藏  |  浏览/下载:4/0  |  提交时间:2025/12/03
Training  Monte Carlo methods  Spatiotemporal phenomena  Accuracy  Probabilistic logic  Neural networks  Numerical models  Mathematical models  Finite difference methods  Diffusion processes  Neural PDE solver  Monte Carlo method  Feynman-Kac formula  AI for PDE  
From Limited Resources to Powerful Insights: Empowering Low-Cost Cameras for Efficient Retrospective Querying 期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2025, 卷号: 12, 期号: 3, 页码: 2825-2837
作者:  Wen, Qiaodi;  Zhou, Jianer;  Chen, Ruitao;  Luo, Ziqi;  Tyson, Gareth;  Li, Weichao;  Wang, Jinfan;  Pan, Heng;  Xu, Zhiwei
收藏  |  浏览/下载:40/0  |  提交时间:2025/06/25
Cameras  Videos  Cloud computing  Accuracy  Nearest neighbor methods  Costs  Indexing  Training  Electronic mail  Collaboration  k-nearest neighbors (KNN)  low-cost cameras  retrospective queries  video analytics  
TidyBlock: A Novel Consensus Mechanism for DAG-based Blockchain in IoT 期刊论文
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 卷号: 24, 期号: 2, 页码: 722-735
作者:  Qu, Xidi;  Wang, Shengling;  Li, Kun;  Huang, Jianhui;  Cheng, Xiuzhen
收藏  |  浏览/下载:14/0  |  提交时间:2025/06/25
Blockchains  Internet of Things  Consensus protocol  Throughput  Memory  Clustering algorithms  Sorting  Blockchain  Internet of Things  consensus mechanism  formal methods  
Enhancing Federated Learning Robustness Using Locally Benignity-Assessable Bayesian Dropout 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 卷号: 20, 页码: 2464-2479
作者:  Xue, Jingjing;  Sun, Sheng;  Liu, Min;  Li, Qi;  Xu, Ke
收藏  |  浏览/下载:39/0  |  提交时间:2025/06/25
Bayes methods  Training  Servers  Data models  Robustness  Distributed databases  Uplink  Convergence  Computational modeling  Recurrent neural networks  Federated learning  Byzantine attack  dropout defense  robust aggregation  
In-Memory Computing Accelerator for Iterative Linear Algebra Solvers 期刊论文
IEEE COMPUTER ARCHITECTURE LETTERS, 2025, 卷号: 24, 期号: 1, 页码: 161-164
作者:  Liu, Rui;  Li, Zerun;  Zhang, Xiaoyu;  Chen, Xiaoming;  Han, Yinhe;  Tang, Minghua
收藏  |  浏览/下载:4/0  |  提交时间:2025/12/03
System-on-chip  Iterative methods  Computer architecture  Registers  Delays  Vectors  In-memory computing  Linear systems  Data transfer  Technological innovation  Computing-in-memory  iterative linear solver