We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 10,000 results
  1. LOCP: Latency-optimized channel pruning for CNN inference acceleration on GPUs

    Channel pruning has recently become a widely used model compression method. However, most existing channel pruning methods only prune to decrease the...

    Yonghua Zhang, Hongxu Jiang, ... **aobin Li in The Journal of Supercomputing
    Article 06 April 2023
  2. Detection and Localization of Channel-Short Faults in Regular On-Chip Interconnection Networks

    With the rapid developments in VLSI technology, the communication channels in networks-on-chip (NoCs) can place many wires for sustaining...

    Biswajit Bhowmik in SN Computer Science
    Article 30 August 2023
  3. An Anti-jamming Game When None Player Knows Rival’s Channel Gain

    We consider a user’s communication with a receiver in presence of a jammer, in the most competitive situation for user and jammer when they do not...
    Andrey Garnaev, Wade Trappe in Performance Evaluation Methodologies and Tools
    Conference paper 2024
  4. Rethinking group activity recognition under the open set condition

    In real-world scenarios, the recognition of unknown activities poses a significant challenge for group activity recognition. Existing methods...

    Li** Zhu, Silin Wu, ... Xuan Li in The Visual Computer
    Article 13 May 2024
  5. Software Implementation of an Algorithm for Automatic Detection of Lineaments and Their Properties in Open-Pit Dumps

    Abstract

    This paper presents an algorithm and description of its software implementation for detection of lineaments (ground erosions or cracks) in...

    S. E. Popov, V. P. Potapov, R. Y. Zamaraev in Programming and Computer Software
    Article 01 February 2024
  6. Autoencoder-enabled model portability for reducing hyperparameter tuning efforts in side-channel analysis

    Hyperparameter tuning represents one of the main challenges in deep learning-based profiling side-channel analysis. For each different side-channel...

    Marina KrÄŤek, Guilherme Perin in Journal of Cryptographic Engineering
    Article Open access 21 July 2023
  7. Universal Model Adaptation by Style Augmented Open-set Consistency

    Learning to recognize unknown target samples is of great importance for unsupervised domain adaptation (UDA). Open-set domain adaptation (OSDA) and...

    **n Zhao, Shengsheng Wang in Applied Intelligence
    Article 30 June 2023
  8. Experiment Teaching Case Design of Computer I/O Channel Virtual Simulation

    The principle of computer composition is an important basic course for undergraduates majoring in computer science, in which the I/O channel control...
    Dongdong Zhang, **nyuan Cheng, ... Lisheng Wang in Computer Science and Education. Teaching and Curriculum
    Conference paper 2024
  9. Toward finding best linear codes for side-channel protections (extended version)

    Side-channel attacks aim at extracting secret keys from cryptographic devices. Randomly masking the implementation is a provable way to protect the...

    Wei Cheng, Yi Liu, ... Olivier Rioul in Journal of Cryptographic Engineering
    Article 15 November 2022
  10. Underwater image dehazing using a novel color channel based dual transmission map estimation

    Underwater images typically suffer from color distortion and low contrast, owing to the light absorption and scattering. To handle the visual...

    Article 31 July 2023
  11. Information Support for Open Science: Practices of Libraries on the Net

    Abstract

    Data on the development of the infrastructure of open science, an overview of the best practices of libraries and web resources created...

    Article 01 June 2023
  12. Retinal artery/vein classification by multi-channel multi-scale fusion network

    The automatic artery/vein (A/V) classification in retinal fundus images plays a significant role in detecting vascular abnormalities and could speed...

    Junyan Yi, Chouyu Chen, Gang Yang in Applied Intelligence
    Article 23 August 2023
  13. Channel Spatio-Temporal Convolutional Network for Trajectory Prediction

    Accurate and timely prediction of the future path of agents in the vicinity of an agent is the core of avoiding conflict in automated applications....
    Zhonghao Lu, Lina Xu, ... Yonglong Luo in Ubiquitous Security
    Conference paper 2024
  14. Open-Set Adversarial Defense with Clean-Adversarial Mutual Learning

    Open-set recognition and adversarial defense study two key aspects of deep learning that are vital for real-world deployment. The objective of...

    Rui Shao, Pramuditha Perera, ... Vishal M. Patel in International Journal of Computer Vision
    Article 05 March 2022
  15. OAVA: the open audio-visual archives aggregator

    The purpose of the current article is to provide an overview of an open-access audiovisual aggregation and search service platform developed for...

    Polychronis Charitidis, Sotirios Moschos, ... Afrodite Malliari in International Journal on Digital Libraries
    Article Open access 16 December 2023
  16. Packet Level CTC Based on Channel Intervention

    Cross-technology communication (CTC) is a technique that enables direct communication among different wireless technologies. Recent works in this...
    **uzhen Guo, Yuan He, Yunhao Liu in Cross-Technology Communication for Internet of Things
    Chapter 2023
  17. A lightweight convolutional neural network based on dense connection for open-pit coal mine service identification using the edge-cloud architecture

    Remote sensing is an important technical tool for rapid detection of illegal mining behavior. Due to the complex features of open-pit coal mines,...

    Yang Liu, ** Zhang in Journal of Cloud Computing
    Article Open access 07 March 2023
  18. ConsenTrack—Blockchain Based Framework for Open Banking Consent Data Tracking

    Consent management is most critical part of open banking. Customers, banks, third party service providers, regulators are various parties involved...

    Abir Ghosh, Indraneel Mukhopadhyay, Subhalaxmi Chakraborty in Human-Centric Intelligent Systems
    Article Open access 12 April 2023
  19. Open-Vocabulary Animal Keypoint Detection with Semantic-Feature Matching

    Current image-based keypoint detection methods for animal (including human) bodies and faces are generally divided into fully supervised and few-shot...

    Hao Zhang, Lumin Xu, ... Kaipeng Zhang in International Journal of Computer Vision
    Article 25 June 2024
  20. Gaming the system: tetromino-based covert channel and its impact on mobile security

    Trojan droppers consistently emerge as challenging malware threats, particularly within the Android ecosystem. Traditional malware detection...

    Efstratios Vasilellis, Vasileios Botsos, ... Dimitris Gritzalis in International Journal of Information Security
    Article 28 June 2024
Did you find what you were looking for? Share feedback.