Showing 101 - 120 results of 15,363 for search '"surveying"', query time: 0.09s Refine Results
  1. 101
  2. 102
  3. 103

    COSMIC’s Large-scale Search for Technosignatures during the VLA Sky Survey: Survey Description and First Results by C. D. Tremblay, J. Sofair, L. Steffes, T. Myburgh, D. Czech, P. B. Demorest, R. A. Donnachie, A. W. Pollak, M. Ruzindana, Siemion A. P. V., S. S. Varghese, S. Z. Sheikh

    Published 2025-01-01
    “…This paper presents the strategy we employ when commensally observing during the VLA Sky Survey and a postprocessing strategy for the data collected during the survey. …”
    Get full text
    Article
  4. 104
  5. 105

    Uganda Demographic and Health Survey 2006 /

    Published 2006
    Subjects: “…Health surveys Uganda. 9000…”
    View in OPAC
    Book
  6. 106

    Survey of virtual network embedding problem by CHENG Xiang, ZHANG Zhong-bao, SU Sen, YANG Fang-chun

    Published 2011-01-01
    “…Related research work of virtual networks(VN) embedding was surveyed,and both of the advantages and dis-advantages in the key technologies of related research work were analyzed.The possible future research directions were also discussed as references for the research of VN embedding problem.…”
    Get full text
    Article
  7. 107

    The Savvy Survey #7: Formatting Questionnaires by Jessica O'Leary, Glenn D. Israel

    Published 2016-02-01
    Subjects: “…Savvy Survey Series…”
    Get full text
    Article
  8. 108

    Survey of Bitcoin de-anonymization technology by CHENG Jie, JIN Wei, XIA Qing, LI Miao, DAI Wei, ZHANG Yafeng, DAI Peng, LI Yucheng

    Published 2024-11-01
    “…Consequently, de-anonymization techniques have been actively researched, yielding a series of research results. Existing surveys primarily focus on privacy protection schemes, lacking a systematic analysis of de-anonymization techniques. …”
    Get full text
    Article
  9. 109
  10. 110
  11. 111

    Anonymous survey system based on NIZK by Lu LIU, Yu-xi LI, Fu-cai ZHOU

    Published 2016-12-01
    Subjects: “…anonymous electronic survey…”
    Get full text
    Article
  12. 112
  13. 113

    A survey of neural architecture search by Mingjie HE, Jie ZHANG, Shiguang SHAN

    Published 2019-05-01
    “…Recently,deep learning has achieved impressive success on various computer vision tasks.The neural architecture is usually a key factor which directly determines the performance of the deep learning algorithm.The automated neural architecture search methods have attracted more and more attentions in recent years.The neural architecture search is the automated process of seeking the optimal neural architecture for specific tasks.Currently,the neural architecture search methods have shown great potential in exploring high-performance and high-efficiency neural architectures.In this paper,a survey in this research field and categorize existing methods based on their performance estimation methods,search spaces and architecture search strategies were presented.Specifically,there were four performance estimation methods for computation cost reduction,two typical neural architecture search spaces and two types of search strategies based on discrete and continuous spaces respectively.Neural architecture search methods based on continuous space are becoming the trend of researches on neural architecture search.…”
    Get full text
    Article
  14. 114
  15. 115
  16. 116

    The Savvy Survey #4: Details in the Design by Glenn D. Israel, Jessica L. Gouldthorpe

    Published 2013-12-01
    “… As part of the Savvy Survey Series, this publication provides an overview of important facets of the survey process. …”
    Get full text
    Article
  17. 117
  18. 118
  19. 119

    Survey of DDoS defense:challenges and directions by Fei CHEN, Xiao-hong BI, Jing-jing WANG, Yuan LIU

    Published 2017-10-01
    “…The distributed denial of server (DDoS) attack is a major threat to the Internet.Numerous works have been proposed to deal with this problem through attack detection and defense mechanism design.A survey was presented to introduce the DDoS defense technologies,from the traditional strategies,through Cloud-based systems,toward SDN-based mechanisms.According to the characteristics of DDoS attack,the features and drawbacks of these systems were discussed,which could provide new insights for the development of the new generation of network security framework in the future.…”
    Get full text
    Article
  20. 120