Showing 961 - 980 results of 28,739 for search '"computer"', query time: 0.08s Refine Results
  1. 961

    Assessing bias and computational efficiency in vision transformers using early exits by Seth Nixon, Pietro Ruiu, Marinella Cadoni, Andrea Lagorio, Massimo Tistarelli

    Published 2025-01-01
    “…We present an approach using the state of the art Vision Transformer and Early Exits for reducing compute budget without significantly affecting performance. …”
    Get full text
    Article
  2. 962

    A simplified computational liver perfusion model, with applications to organ preservation by Daniel Emerson, Yoed Rabin, Levent Burak Kara

    Published 2025-01-01
    “…Additionally, we introduce the concept of a super lobule which enables a computational abstraction of biological liver lobules. …”
    Get full text
    Article
  3. 963
  4. 964
  5. 965
  6. 966

    Combinatorial and Multinomial Coefficients and its Computing Techniques for Machine Learning and Cybersecurity by Chinnaraji Annamalai

    Published 2022-09-01
    Subjects: “…algorithm, combinatorics, computation, multinomial coefficient…”
    Get full text
    Article
  7. 967

    Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment by Rongrui Yu, Chunqiong Wu, Bingwen Yan, Baoqin Yu, Xiukao Zhou, Yanliang Yu, Na Chen

    Published 2021-01-01
    “…Finally, based on the impact of cloud computing, mobile e-commerce is analyzed, including relevant theories, service mode, architecture, core technology, and the application in e-commerce, which can realize e-commerce precision marketing, find the optimal path of logistics, and take effective security measures to avoid transaction risks. …”
    Get full text
    Article
  8. 968
  9. 969

    Encrypted image retrieval in multi-key settings based on edge computing by Yingying LI, Jianfeng MA, Yinbin MIAO

    Published 2020-04-01
    “…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
    Get full text
    Article
  10. 970

    Similarity Learning and Generalization with Limited Data: A Reservoir Computing Approach by Sanjukta Krishnagopal, Yiannis Aloimonos, Michelle Girvan

    Published 2018-01-01
    “…We present two Reservoir Computing architectures, which loosely resemble neural dynamics, and show that a Reservoir Computer (RC) trained to identify relationships between image pairs drawn from a subset of training classes generalizes the learned relationships to substantially different classes unseen during training. …”
    Get full text
    Article
  11. 971
  12. 972
  13. 973

    Modeling Short-Range Microwave Networks to Scale Superconducting Quantum Computation by Nicholas LaRacuente, Kaitlin N. Smith, Poolad Imany, Kevin L. Silverman, Frederic T. Chong

    Published 2025-01-01
    “…A core challenge for superconducting quantum computers is to scale up the number of qubits in each processor without increasing noise or cross-talk. …”
    Get full text
    Article
  14. 974
  15. 975
  16. 976
  17. 977
  18. 978
  19. 979
  20. 980

    Novel Techniques to Speed Up the Computation of the Automorphism Group of a Graph by José Luis López-Presa, Luis F. Chiroque, Antonio Fernández Anta

    Published 2014-01-01
    “…Graph automorphism (GA) is a classical problem, in which the objective is to compute the automorphism group of an input graph. …”
    Get full text
    Article