CSpace

浏览/检索结果: 共5条,第1-5条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Deadline and Reliability Aware Multiserver Configuration Optimization for Maximizing Profit 期刊论文
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2022, 卷号: 33, 期号: 12, 页码: 3772-3786
作者:  Wang, Tian;  Zhou, Junlong;  Li, Liying;  Zhang, Gongxuan;  Li, Keqin;  Hu, Xiaobo Sharon
收藏  |  浏览/下载:38/0  |  提交时间:2022/12/07
Cloud computing  Servers  Reliability  Business  Computer architecture  Real-time systems  Processor scheduling  Cloud service  deadline miss rate  multiserver configuration  profit maximization  soft error reliability  
Deep images enhancement for turbid underwater images based on unsupervised learning 期刊论文
COMPUTERS AND ELECTRONICS IN AGRICULTURE, 2022, 卷号: 202, 页码: 10
作者:  Zhou, Wen-Hui;  Zhu, Deng-Ming;  Shi, Min;  Li, Zhao-Xin;  Duan, Ming;  Wang, Zhao-Qi;  Zhao, Guo-Liang;  Zheng, Cheng-Dong
收藏  |  浏览/下载:17/0  |  提交时间:2023/07/12
Image enhancement  Visual perception  Underwater dataset  Deep learning  
Disagreement-based class incremental random forest for sensor-based activity recognition 期刊论文
KNOWLEDGE-BASED SYSTEMS, 2022, 卷号: 239, 页码: 15
作者:  Hu, Chunyu;  Chen, Yiqiang;  Hu, Lisha;  Yu, Han;  Lu, Dianjie
收藏  |  浏览/下载:24/0  |  提交时间:2022/12/07
Class incremental learning  Activity recognition  Random forest  Semi-supervised learning  
Efficient and adaptive lidar-visual-inertial odometry for agricultural unmanned ground vehicle 期刊论文
INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2022, 卷号: 19, 期号: 2, 页码: 15
作者:  Zhao, Zixu;  Zhang, Yucheng;  Long, Long;  Lu, Zaiwang;  Shi, Jinglin
收藏  |  浏览/下载:25/0  |  提交时间:2022/12/07
Sensor-fusion  SLAM  localization  agricultural UGV  
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:20/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack