CSpace

浏览/检索结果: 共44条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Change detection with absolute difference of multiscale deep features 期刊论文
NEUROCOMPUTING, 2020, 卷号: 418, 页码: 102-113
作者:  Huang, Rui;  Zhou, Mo;  Zhao, Qiang;  Zou, Yaobin
收藏  |  浏览/下载:32/0  |  提交时间:2021/12/01
Change detection  Absolute difference  Deep learning  Multiscale  
Facility location games with optional preference 期刊论文
THEORETICAL COMPUTER SCIENCE, 2020, 卷号: 847, 页码: 185-197
作者:  Chen, Zhihuai;  Fong, Ken C. K.;  Li, Minming;  Wang, Kai;  Yuan, Hongning;  Zhang, Yong
收藏  |  浏览/下载:33/0  |  提交时间:2021/12/01
Game theory  Facility location game  Algorithmic mechanism design  Approximation  
Scientific research project of Tianjin Education Commission[2019KJ126] 项目
项目编号: 2019KJ126, 资助机构: Scientific research project of Tianjin Education Commission, 2020-
-
收藏  |  浏览/下载:22/0  |  提交时间:2021/12/01
On truthful auction mechanism for cloud resources allocation and consumption shifting with different time slots 期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 页码: 20
作者:  Song, Heng;  Zhu, Junwu;  Jiang, Yi
收藏  |  浏览/下载:31/0  |  提交时间:2021/12/01
cloud computing  mechanism design  price curve  resources allocation  time‐  of‐  use pricing  
The one-round multi-player discrete Voronoi game on grids and trees 期刊论文
THEORETICAL COMPUTER SCIENCE, 2020, 卷号: 838, 页码: 143-159
作者:  Sun, Xiaoming;  Sun, Yuan;  Xia, Zhiyu;  Zhang, Jialin
收藏  |  浏览/下载:50/0  |  提交时间:2020/12/10
Game theory  Nash equilibrium  Location game  Graph theory  
Exploring Implicit and Explicit Geometrical Structure of Data for Deep Embedded Clustering 期刊论文
NEURAL PROCESSING LETTERS, 2020, 页码: 16
作者:  Zhu, Xiaofei;  Do, Khoi Duy;  Guo, Jiafeng;  Xu, Jun;  Dietze, Stefan
收藏  |  浏览/下载:56/0  |  提交时间:2020/12/10
Deep neural networks  Stacked autoencoder  Manifold constraint  Clustering  
Project of Beijing Municipal Education Commission[KM20190028005] 项目
项目编号: KM20190028005, 资助机构: Project of Beijing Municipal Education Commission, 2020-
-
收藏  |  浏览/下载:32/0  |  提交时间:2020/12/10
A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0 期刊论文
COMPUTER NETWORKS, 2020, 卷号: 179, 页码: 18
作者:  Zhang, Qianying;  Zhao, Shijun
收藏  |  浏览/下载:53/0  |  提交时间:2020/12/10
Security analysis  Authenticated key exchange  TPM 2.0  
Information retrieval: a view from the Chinese IR community 期刊论文
FRONTIERS OF COMPUTER SCIENCE, 2020, 卷号: 15, 期号: 1, 页码: 15
作者:  Chen, Zhumin;  Cheng, Xueqi;  Dong, Shoubin;  Dou, Zhicheng;  Guo, Jiafeng;  Huang, Xuanjing;  Lan, Yanyan;  Li, Chenliang;  Li, Ru;  Liu, Tie-Yan;  Liu, Yiqun;  Ma, Jun;  Qin, Bing;  Wang, Mingwen;  Wen, Jirong;  Xu, Jun;  Zhang, Min;  Zhang, Peng;  Zhang, Qi
收藏  |  浏览/下载:65/0  |  提交时间:2020/12/10
information retrieval  redefinition  information  scope of retrieval  retrieval models  users  system architecture  evaluation  
Scientific Research Foundation of Hunan Provincial Education Department of China[19B004] 项目
项目编号: 19B004, 资助机构: Scientific Research Foundation of Hunan Provincial Education Department of China, 2020-
-
收藏  |  浏览/下载:34/0  |  提交时间:2020/12/10