[图书][B] 电子信息科学专业英语导读教程

郝红尉 - 2005 - books.google.com
… Some ASICS are designed to handle only one kind of encryption algorithm, such … optimized
to perform more efficiently than multiplier circuits constructed from configurable logic blocks

[PDF][PDF] 关联规则经典算法的一种改进

王翠茹, 王少华 - 中国通信学会第五届学术年会论文集, 2008 - meeting.edu.cn
… Abstract:This paper gave an algorithm of the constructing a … Abstract:This paper presents
a new training algorithm for the … Abstract:Analyzing some typical identity-based encryption

[PDF][PDF] 主编李明树, 中国科学院软件研究所副主编Yao, Andrew C., 清华大学金芝(执行副主编), 北京大学

戴国忠, 董韫美, 冯玉琳, 何新贵, 李德毅, 李未… - jos.org.cn
资深编委戴国忠, 中国科学院软件研究所董韫美, 中国科学院软件研究所冯玉琳, 中国科学院软件
研究所何新贵, 北京大学李德毅, 电子系统工程研究所李未, 北京航空航天大学林惠民, 中国…

[PDF][PDF] Ⅲ. 大学院学位論文DISSERTATIONS

電気工学専攻 - ee.tu-tokyo.ac.jp
… is to perform training by using images with … optimization methods for standard cell layouts.
Standard cells are the most fundamental components of VLSI, and provide the building blocks

代DAI Digital Art Index: A robust price index for heterogeneous digital assets

MB Lin, B Wang, F Bocart, CM Hafner… - Available at SSRN …, 2022 - papers.ssrn.com
… the regression model and the construction of art index. We … statistics from the corpus, the
training result shows a linear … DCS-t filtering given optimized parameters and infinite degree …

[HTML][HTML] 逸夫教育大楼B823 室作者中心

陈永杰, 编辑, 张祥合, 曹敏, 程仲基… - 吉林大学学报(工学 …, 2011 - xuebao.jlu.edu.cn
… By the construction of a LyapunovKrasovskii functional, the … formation algorithms based on
the ant colony optimization(… The neural network training of multi-velocity frontal crashing into …

快速准确的Exploit 自动捕获与分类方法和系统

Y Ding, T Wei, H Xue, Y Zhang, C Zhang… - Science China Information …, 2017 - Springer
… We build a prototype of SeismoMeter, and evaluate it using … font instructions contained in
blocks connected with solid lines) … and does not require a training process. Compared to Meta…

卷积神经网络表征可视化研究综述

司念文, 张文林, 屈丹, 罗向阳, 常禾雨, 牛铜 - 自动化学报, 2022 - aas.net.cn
… These tasks mostly build recognition models based on the convolutional … methods for
understanding and interpreting CNN, including post-hoc interpretation methods and building

[PDF][PDF] 神经网络与密码学的交叉研究

葛钊成, 胡汉平 - Journal of Cryptologic Research, 2021 - jcr.cacrnet.org.cn
… Design and realization of a new neural block cipher[C]. In: … A construction of cryptography
system based on quantum … Hybrid optimization with cryptography encryption for medical image …

[PDF][PDF] 基于张量填补和用户偏好的联合推荐算法

熊智, 徐恺, 蔡玲如, 蔡伟鸿 - 通信学报, 2019 - infocomm-journal.com
algorithms have little regard for user preference, and the recommendation result is not
satisfactory, a joint recommendation algorithm based … -dimensional tensor was built based on user-…