Showing 2,661 - 2,680 results of 6,432 for search '"memory"', query time: 0.08s Refine Results
  1. 2661

    Folquet de Marseille ou Foulques de Toulouse ? La mémoire d’un troubadour devenu évêque à travers ses représentations by Léa David

    Published 2023-07-01
    “…Nearly fifty years after his death, they show the central importance of this character, whose memory is blurred by his atypical path, which led him in turn to be a troubadour, a monk, and a bishop.…”
    Get full text
    Article
  2. 2662

    Research on the programming language for proxy re-encryption by Mang SU, Yan YU, Bin WU, Anmin FU

    Published 2018-06-01
    “…The programming language for proxy re-encryption(PLPRE) based on domain specific language(DSL) was proposed,which was similar to the matical description and was adopt to describe the proxy re-encryption directly.The algorithm designer could describe the algorithm conveniently and quickly by PLPRE,and obtain the programming code for computer.Firstly,the grammar of PLPRE was presented,including the definitions of the keyword and programming logic,then the ACC-PRE algorithm was described by PLPRE as an example.Secondly,the PLPRE parser was realized by ANTLR.Finally,the comparisons between the PLPRE and the related work were made.By using the PLPRE,user does not need to pay attentions to data structure or memory allocation.It is suitable for the cryptography experts who is not familiar with the programming.Thus,PLPRE will decrease the deviation between the design and implement for PRE.…”
    Get full text
    Article
  3. 2663

    A flexible pruning on deep convolutional neural networks by Liang CHEN, Yaguan QIAN, Zhiqiang HE, Xiaohui GUAN, Bin WANG, Xing WANG

    Published 2022-01-01
    “…Despite the successful application of deep convolutional neural networks, due to the redundancy of its structure, the large memory requirements and the high computing cost lead it hard to be well deployed to the edge devices with limited resources.Network pruning is an effective way to eliminate network redundancy.An efficient flexible pruning strategy was proposed in the purpose of the best architecture under the limited resources.The contribution of channels was calculated considering the distribution of channel scaling factors.Estimating the pruning result and simulating in advance increase efficiency.Experimental results based on VGG16 and ResNet56 on CIFAR-10 show that the flexible pruning reduces FLOPs by 71.3% and 54.3%, respectively, while accuracy by only 0.15 percentage points and 0.20 percentage points compared to the benchmark model.…”
    Get full text
    Article
  4. 2664

    Une géopoétique : du récit de voyage à Canaima, de Rómulo Gallegos by François Delprat

    Published 2009-12-01
    “…The reflection about links which join the travel story with the novel as life story, memory with project, discovery and its part of dream with knowledge, and art with real experience has lead Kenneth White to elaborate his concept of « geopoetics ». …”
    Get full text
    Article
  5. 2665

    Robert Owen, James Buchanan et l’Infant School de New Lanark by Marie Vergnon

    Published 2013-10-01
    “…Those texts constitute our memory of the genesis of the Infant School and provide us with a few pieces of information about the pedagogy that was used there. …”
    Get full text
    Article
  6. 2666

    Screening Drone Warfare by Delphine Letort

    Published 2022-06-01
    “…While war films contribute to the construction of collective memory, few of them address the changes implied by drone warfare. …”
    Get full text
    Article
  7. 2667

    The March to Prussia: The Informative Value of a Peripheral Phenomenon by Werner Paravicini

    Published 2023-12-01
    “…The story tells how from the westernmost corner of Europe they travelled to the East and, on their return, tried to make sense of their journeys (despite the enormous expense) through places of memory. In addition, this study explores how the Teutonic Order faced the new challenge of seeking new legitimacy after the baptism of Lithuania and Samogitia. …”
    Get full text
    Article
  8. 2668

    L’archive comme enjeu de présentation de soi : la mémoire du syndicat des ouvriers des savonneries à Naplouse, Cisjordanie by Véronique Bontemps

    Published 2012-05-01
    “…Next I examine how written documents were used by two former soap factory workers to construct the memory of the union. I show that these workers used two parallel systems to legitimise their words—systems that, far from clashing, reinforced each other: the possession of “authentic documents” should not so much make the discourse they contain more believable, but rather lend authority to their words. …”
    Get full text
    Article
  9. 2669

    « Nous qui sommes sans passé, les femmes ». À la recherche d’une généalogie féministe dans les pages de Vindicación Feminista by Claudia Jareño Gila

    Published 2021-02-01
    “…In the Transition context filled with strong socio-political transformations, issues related to memory and to past struggles for social transformation gained importance through the pages of Vindicación Feminista allowing to a rich present-past dialogue being established not without contradictions.…”
    Get full text
    Article
  10. 2670

    Art et histoire : l’excès dans Demos de George Gissing by Christine Huguet

    Published 2006-12-01
    “…But he cannot overlook the fact that addressing a specific past and calling upon collective memory also render his task as an illusionist far more complicated. …”
    Get full text
    Article
  11. 2671

    Option Pricing under the Subordinated Market Models by Longjin Lv, Changjuan Zheng, Luna Wang

    Published 2022-01-01
    “…Firstly, we prove that the subordinated Brownian motion controlled by the fractional diffusion equation has many financial properties, such as self-similarity, leptokurtic, and long memory, which indicate that the fractional calculus can describe the financial data well. …”
    Get full text
    Article
  12. 2672

    Security-enhanced live migration based on SGX for virtual machine by Yuan SHI, Huan-guo ZHANG, Bo ZHAO, Zhao YU

    Published 2017-09-01
    “…The virtual machine may face the problem of information leakage in live migration.Therefore,a dynamic memory protection technique SGX was introduced and a security enhancement live migration method based on KVM environment was proposed.Firstly,on both sides of migration,a hardware-isolated secure execution environment centered SGX was built.It guaranteed the security of operations like encryption and integrity measurement and also ensured the security of private data.An encrypted channel to transfer migration data based on the remote attestation between the secure execution environments of both migration sides was constructed.And the mutual authentication of both sides’ platform integrity was realized.Finally,the security enhancement effect and did the experiment was analyzed.The results shows that the introduction of SGX won’t cause much negative effect to the migration performance.…”
    Get full text
    Article
  13. 2673

    Neurological Impairment and Literary Empowerment in Nicole Krauss’s Man Walks into a Room by Pascale Antolin

    Published 2021-12-01
    “…In Man Walks into a Room, a neuronovel staging an amnesiac, Nicole Krauss challenges the memory-identity equation. While she draws on neuroscience, she also writes against it, as she emphasizes the explanatory gap and the problem of qualia. …”
    Get full text
    Article
  14. 2674

    Du témoignage : à propos de quelques portraits d’Abd el-Kader en Oriental by François Pouillon

    Published 2012-12-01
    “…How can the requirement of historical criticism stand against the ideological pressure caused by the making of a national memory? This issue, analyzed in several articles on the construction of the image of Abd el-Kader in contemporary Algeria, ends here with sources dealing with the Emir’s period of exile to the East. …”
    Get full text
    Article
  15. 2675

    Cloud resource prediction model based on triple exponential smoothing method and temporal convolutional network by Xiaolan XIE, Zhengzheng ZHANG, Jianwei WANG, Xiaochun GHENG

    Published 2019-08-01
    “…The container cloud represented by Docker and Kubernetes has the advantages of less additional resource overhead and shorter start-up and destruction time.However there are still resource management issues such as over-supply and under-supply.In order to allow the Kubernetes cluster to respond “in advance” to the resource usage of the applications deployed on it,and then to schedule and allocate resources in a timely,accurate and dynamic manner based on the predicted value,a cloud resource prediction model based on triple exponential smoothing method and temporal convolutional network was proposed,based on historical data to predict future demand for resources.To find the optimal combination of parameters,the parameters were optimized using TPOT thought.Experiments on the CPU and memory of the Google dataset show that the model has better prediction performance than other models.…”
    Get full text
    Article
  16. 2676

    Analytical Solutions of Fractional Differential Equations Using the Convenient Adomian Series by Xiang-Chao Shi, Lan-Lan Huang, Zhen-Guo Deng, Dan Liu

    Published 2014-01-01
    “…Due to the memory trait of the fractional calculus, numerical or analytical solution of higher order becomes very difficult even impossible to obtain in real engineering problems. …”
    Get full text
    Article
  17. 2677

    That Unforgettable Day--The Great Tokyo Air Raid through Drawings あの日を忘れない・描かれた東京大空襲 by Sumida Local Culture Resource Center (墨田郷土文化資料館), Bret Fisk

    Published 2011-01-01
    “…The Center staff originally settled on the idea of collecting amateur and professional artwork as a unique way of contributing to the preservation of the public memory regarding the March 10 incendiary air raid. …”
    Get full text
    Article
  18. 2678

    Music Recommendation Algorithm Based on Multidimensional Time-Series Model Analysis by Juanjuan Shi

    Published 2021-01-01
    “…Then, a music recommendation method is proposed, which integrates the long-term, medium-term, and real-time behaviors of users and considers the dynamic adjustment of the influence weight of the three behaviors so as to further improve the effect of music recommendation by adopting the advanced long short time memory (LSTM) technology. Through the implementation of the prototype system, the feasibility of the proposed method is preliminarily verified.…”
    Get full text
    Article
  19. 2679

    Dynamics of Fuzzy BAM Neural Networks with Distributed Delays and Diffusion by Qianhong Zhang, Lihui Yang, Jingzhong Liu

    Published 2012-01-01
    “…Constructing a new Lyapunov functional and employing inequality technique, the existence, uniqueness, and global exponential stability of the periodic oscillatory solution are investigated for a class of fuzzy bidirectional associative memory (BAM) neural networks with distributed delays and diffusion. …”
    Get full text
    Article
  20. 2680

    Dynamic Server Cluster Load Balancing in Virtualization Environment with OpenFlow by Wenbo Chen, Zhihao Shang, Xinning Tian, Hui Li

    Published 2015-07-01
    “…Thus, we propose a load balancing algorithm based on server running state, which can calculate comprehensive loading according to the CPU utilization, memory utilization, and network traffic of the servers. …”
    Get full text
    Article