Showing 201 - 220 results of 4,111 for search 'Awaara~', query time: 3.74s Refine Results
  1. 201

    Uniwersytet katolicki wobec wyzwania marnotrawstwa rozumu by Dominique Vermersch

    Published 2021-08-01
    Subjects: “…rozum, racjonalność, wiara, uniwersytet katolicki, prawda…”
    Get full text
    Article
  2. 202

    Cóż po Teologii w domu Akademii? by Jerzy Szymik

    Published 2017-12-01
    Subjects: “…wiara…”
    Get full text
    Article
  3. 203
  4. 204
  5. 205
  6. 206
  7. 207
  8. 208

    Scene-Aware Deep Networks for Semantic Segmentation of Images by Zhike Yi, Tao Chang, Shuai Li, Ruijun Liu, Jing Zhang, Aimin Hao

    Published 2019-01-01
    “…To test the property of our methods, the semantic segmentation models we got were selected to treat other pictures, and the results obtained from the performance of scene-aware semantic segmentation were much better than semantic segmentation without considering categories. …”
    Get full text
    Article
  9. 209
  10. 210
  11. 211
  12. 212

    Method of network slicing deployment based on performance-aware by Kaizhi HUANG, Qirun PAN, Quan YUAN, Wei YOU, Hongbo TANG

    Published 2019-08-01
    “…In order to deal with the performance degradation caused by resource contention due to the sharing of physical resources between VNF in the network slicing,a network slicing deployment method based on performance-awareness was proposed.When deploying network slice instances,first two-phase deployment that mapping virtual nodes was adopted,and then virtual links were mapped.In the virtual nodes mapping phase,the VNF performance influences factor was defined from the perspective of resource supply and demand to quantify the degree of VNF performance impact.Then the sum of the performance influence factors of all VNF on the deployable physical server was found in the network slice instance,the physical server with the smallest sum of performance influence factors was used as the mapping location,and the simulated annealing-discrete particle swarm algorithm was used to find the nodes mapping result.In the virtual links mapping phase,the shortest path algorithm was used to obtain the link mapping result.The simulation results show that the proposed method reduces the impact of other network slices on its own service performance.…”
    Get full text
    Article
  13. 213
  14. 214

    Energy-aware scheduling policy for data-intensive workflow by Peng XIAO, Zhi-gang HU, Xi-long QU

    Published 2015-01-01
    “…With the increasing scale of data centers,high energy consumption has become a critical issue in high-performance computing area.To address the issue of energy consumption optimization for data-intensive workflow applications,a set of virtual data-accessing nodes are introduced into the original workflow for quantitatively evaluating the data-accessing energy consumption,by which a novel heuristic policy called minimal energy consumption path is designed.Based on the proposed heuristic policy,two energy-aware scheduling algorithms are implemented,which are deprived from the classical HEFT and CPOP scheduling algorithms.Extensive experiments are conducted to investigate the performance of the proposed algorithms,and the results show that they can significantly reduce the data-accessing energy consumption.Also,the proposed algorithms show better adaptive when the system is in presence of large-scale workflows.…”
    Get full text
    Article
  15. 215
  16. 216

    Gain-aware caching scheme for information-centric networking by Long CHEN, Hong-bo TANG, Xing-guo LUO, Yi BAI, Zhen ZHANG

    Published 2016-05-01
    “…The in-network caching system of information-centric networking had to deal with the popularity of huge number of content chunks and make efficient usage of storage resources.A content popularity based caching gain opti-mization model aimed to get maximum reduction of content retrieve cost was established,and a gain-aware caching scheme was proposed.By utilizing filtering effect of cache to request flow is scheme achieves caching cooperation and diversity potentially while maximizing caching gain of every single node.Bloom filter based sliding window strategy captures the content chunks with high caching gain according to request arrival interval and retrieval cost from the source.Analysis shows that the method can drastically reduce memory consumption caused by popularity monitoring.The simu-lation results illuminate that this scheme is well aware of content popularity based caching gain,and gets better band-width saving and cache hit ratio when content popularity is changing dynamically.…”
    Get full text
    Article
  17. 217

    Confidence-Aware Embedding for Knowledge Graph Entity Typing by Yu Zhao, Jiayue Hou, Zongjian Yu, Yun Zhang, Qing Li

    Published 2021-01-01
    “…To address this problem, we propose ConfE, a novel confidence-aware embedding approach for modeling the (entity, entity type) tuples, which takes tuple confidence into consideration for learning better embeddings. …”
    Get full text
    Article
  18. 218

    Research on context-aware Android application vulnerability detection by Jiawei QIN, Hua ZHANG, Hanbing YAN, Nengqiang HE, Tengfei TU

    Published 2021-11-01
    “…The vulnerability detection model of Android application based on learning lacks semantic features.The extracted features contain noise data unrelated to vulnerabilities, which leads to the false positive of vulnerability detection model.A feature extraction method based on code information slice (CIS) was proposed.Compared with the abstract syntax tree (AST) feature method, the proposed method could extract the variable information directly related to vulnerabilities more accurately and avoid containing too much noise data.It contained semantic information of vulnerabilities.Based on CIS and BI-LSTM with attention mechanism, a context-aware Android application vulnerability detection model VulDGArcher was proposed.For the problem that the Android vulnerability data set was not easy to obtain, a data set containing 41 812 code fragments including the implicit Intent security vulnerability and the bypass PendingIntent permission audit vulnerability was built.There were 16 218 code fragments of vulnerability.On this data set, VulDGArcher’s detection accuracy can reach 96%, which is higher than the deep learning vulnerability detection model based on AST features and APP source code features.…”
    Get full text
    Article
  19. 219
  20. 220

    Manet: motion-aware network for video action recognition by Xiaoyang Li, Wenzhu Yang, Kanglin Wang, Tiebiao Wang, Chen Zhang

    Published 2025-02-01
    “…To address this problem, we propose a Motion-Aware Network (MANet), which includes three key modules: (1) Local Motion Encoding Module (LMEM) for capturing local motion features, (2) Spatio-Temporal Excitation Module (STEM) for extracting multi-granular motion information, and (3) Multiple Temporal Aggregation Module (MTAM) for modeling multi-scale temporal information. …”
    Get full text
    Article