CSpace

浏览/检索结果: 共7条,第1-7条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Sequence-Level Training for Non-Autoregressive Neural Machine Translation 期刊论文
COMPUTATIONAL LINGUISTICS, 2021, 卷号: 47, 期号: 4, 页码: 891-925
作者:  Shao, Chenze;  Feng, Yang;  Zhang, Jinchao;  Meng, Fandong;  Zhou, Jie
收藏  |  浏览/下载:22/0  |  提交时间:2022/12/07
A Comprehensive Comparison of Period Extraction Algorithms for Asteroids with Long Term Observation 期刊论文
UNIVERSE, 2021, 卷号: 7, 期号: 11, 页码: 20
作者:  Liu, Yang;  Wu, Liming;  Sun, Tianqi;  Zhang, Pengfei;  Fang, Xi;  Cheng, Liyun;  Jiang, Bin
收藏  |  浏览/下载:37/0  |  提交时间:2022/06/21
asteroids  general  methods  data analysis  techniques  photometric  astronomical databases  miscellaneous  
A Quantum Dual-Signature Protocol Based on SNOP States without Trusted Participant 期刊论文
ENTROPY, 2021, 卷号: 23, 期号: 10, 页码: 12
作者:  Zhang, Kejia;  Zhao, Xu;  Zhang, Long;  Tian, Guojing;  Song, Tingting
收藏  |  浏览/下载:30/0  |  提交时间:2022/06/21
quantum dual-signature  strongly nonlocal orthogonal product states  untrusted third party  
PRDP: Person Reidentification With Dirty and Poor Data 期刊论文
IEEE TRANSACTIONS ON CYBERNETICS, 2021, 页码: 13
作者:  Xu, Furong;  Ma, Bingpeng;  Chang, Hong;  Shan, Shiguang
收藏  |  浏览/下载:28/0  |  提交时间:2022/06/21
Training  Noise measurement  Data models  Task analysis  Training data  Predictive models  Heuristic algorithms  Dirty  metric learning  person reidentification (ReID)  poor  
Unified unsupervised and semi-supervised domain adaptation network for cross-scenario face anti-spoofing 期刊论文
PATTERN RECOGNITION, 2021, 卷号: 115, 页码: 13
作者:  Jia, Yunpei;  Zhang, Jie;  Shan, Shiguang;  Chen, Xilin
收藏  |  浏览/下载:45/0  |  提交时间:2021/12/01
Face anti-spoofing  Face presentation attack detection  Domain adaptation  Deep learning  
WPC: Whole-Picture Workload Characterization Across Intermediate Representation, ISA, and Microarchitecture 期刊论文
IEEE COMPUTER ARCHITECTURE LETTERS, 2021, 卷号: 20, 期号: 2, 页码: 86-89
作者:  Wang, Lei;  Xiong, Xingwang;  Zhan, Jianfeng;  Gao, Wanling;  Wen, Xu;  Kang, Guoxin;  Tang, Fei
收藏  |  浏览/下载:40/0  |  提交时间:2021/12/01
Microarchitecture  Tools  Measurement  Pipelines  Java  Entropy  Runtime  Whole-picture workload characterization  intermediate representation  ISA  microarchitecture  
HTDet: A Clustering Method Using Information Entropy for Hardware Trojan Detection 期刊论文
TSINGHUA SCIENCE AND TECHNOLOGY, 2021, 卷号: 26, 期号: 1, 页码: 48-61
作者:  Lu, Renjie;  Shen, Haihua;  Feng, Zhihua;  Li, Huawei;  Zhao, Wei;  Li, Xiaowei
收藏  |  浏览/下载:43/0  |  提交时间:2021/12/01
Hardware Trojan (HT) detection  information entropy  Density-Based Spatial Clustering of Applications with Noise (DBSCAN)  unsupervised learning  clustering  mutual information  test patterns generation