Suggested Topics within your search.
Suggested Topics within your search.
- Ethnicity 2
- Group identity 2
- Race awareness 2
- Constitutional law 1
- Digital techniques 1
- Digitale Photographie 1
- Economic conditions 1
- General 1
- Nurse and patient 1
- Nursing 1
- PHOTOGRAPHY 1
- Photography 1
- Phototechnik 1
- Practice 1
- Runyankorekiga 1
- Sex role 1
- Social conditions 1
- Techniques 1
- Teenage girls 1
- library 1
- literature 1
- management 1
- runyankorekiga 1
- strategy development 1
-
201
Uniwersytet katolicki wobec wyzwania marnotrawstwa rozumu
Published 2021-08-01Subjects: “…rozum, racjonalność, wiara, uniwersytet katolicki, prawda…”
Get full text
Article -
202
-
203
Wiara w Kościele, lecz dla świata. Rekonstrukcja interpretacji nauczania Vaticanum II
Published 2013-11-01Subjects: Get full text
Article -
204
Obraz współczesnej młodzieży w Polsce. Studium socjologiczno-pastoralne
Published 2018-11-01Subjects: Get full text
Article -
205
-
206
-
207
-
208
Scene-Aware Deep Networks for Semantic Segmentation of Images
Published 2019-01-01“…To test the property of our methods, the semantic segmentation models we got were selected to treat other pictures, and the results obtained from the performance of scene-aware semantic segmentation were much better than semantic segmentation without considering categories. …”
Get full text
Article -
209
Port Contention Aware Task Scheduling for SIMD Applications
Published 2025-01-01Get full text
Article -
210
-
211
Survey of the context-aware location privacy-preserving techniques
Published 2013-08-01Subjects: Get full text
Article -
212
Method of network slicing deployment based on performance-aware
Published 2019-08-01“…In order to deal with the performance degradation caused by resource contention due to the sharing of physical resources between VNF in the network slicing,a network slicing deployment method based on performance-awareness was proposed.When deploying network slice instances,first two-phase deployment that mapping virtual nodes was adopted,and then virtual links were mapped.In the virtual nodes mapping phase,the VNF performance influences factor was defined from the perspective of resource supply and demand to quantify the degree of VNF performance impact.Then the sum of the performance influence factors of all VNF on the deployable physical server was found in the network slice instance,the physical server with the smallest sum of performance influence factors was used as the mapping location,and the simulated annealing-discrete particle swarm algorithm was used to find the nodes mapping result.In the virtual links mapping phase,the shortest path algorithm was used to obtain the link mapping result.The simulation results show that the proposed method reduces the impact of other network slices on its own service performance.…”
Get full text
Article -
213
Topology-Aware Efficient Path Planning in Dynamic Environments
Published 2024-12-01Subjects: Get full text
Article -
214
Energy-aware scheduling policy for data-intensive workflow
Published 2015-01-01“…With the increasing scale of data centers,high energy consumption has become a critical issue in high-performance computing area.To address the issue of energy consumption optimization for data-intensive workflow applications,a set of virtual data-accessing nodes are introduced into the original workflow for quantitatively evaluating the data-accessing energy consumption,by which a novel heuristic policy called minimal energy consumption path is designed.Based on the proposed heuristic policy,two energy-aware scheduling algorithms are implemented,which are deprived from the classical HEFT and CPOP scheduling algorithms.Extensive experiments are conducted to investigate the performance of the proposed algorithms,and the results show that they can significantly reduce the data-accessing energy consumption.Also,the proposed algorithms show better adaptive when the system is in presence of large-scale workflows.…”
Get full text
Article -
215
Network status aware routing in content-centric network
Published 2016-06-01Subjects: Get full text
Article -
216
Gain-aware caching scheme for information-centric networking
Published 2016-05-01“…The in-network caching system of information-centric networking had to deal with the popularity of huge number of content chunks and make efficient usage of storage resources.A content popularity based caching gain opti-mization model aimed to get maximum reduction of content retrieve cost was established,and a gain-aware caching scheme was proposed.By utilizing filtering effect of cache to request flow is scheme achieves caching cooperation and diversity potentially while maximizing caching gain of every single node.Bloom filter based sliding window strategy captures the content chunks with high caching gain according to request arrival interval and retrieval cost from the source.Analysis shows that the method can drastically reduce memory consumption caused by popularity monitoring.The simu-lation results illuminate that this scheme is well aware of content popularity based caching gain,and gets better band-width saving and cache hit ratio when content popularity is changing dynamically.…”
Get full text
Article -
217
Confidence-Aware Embedding for Knowledge Graph Entity Typing
Published 2021-01-01“…To address this problem, we propose ConfE, a novel confidence-aware embedding approach for modeling the (entity, entity type) tuples, which takes tuple confidence into consideration for learning better embeddings. …”
Get full text
Article -
218
Research on context-aware Android application vulnerability detection
Published 2021-11-01“…The vulnerability detection model of Android application based on learning lacks semantic features.The extracted features contain noise data unrelated to vulnerabilities, which leads to the false positive of vulnerability detection model.A feature extraction method based on code information slice (CIS) was proposed.Compared with the abstract syntax tree (AST) feature method, the proposed method could extract the variable information directly related to vulnerabilities more accurately and avoid containing too much noise data.It contained semantic information of vulnerabilities.Based on CIS and BI-LSTM with attention mechanism, a context-aware Android application vulnerability detection model VulDGArcher was proposed.For the problem that the Android vulnerability data set was not easy to obtain, a data set containing 41 812 code fragments including the implicit Intent security vulnerability and the bypass PendingIntent permission audit vulnerability was built.There were 16 218 code fragments of vulnerability.On this data set, VulDGArcher’s detection accuracy can reach 96%, which is higher than the deep learning vulnerability detection model based on AST features and APP source code features.…”
Get full text
Article -
219
-
220
Manet: motion-aware network for video action recognition
Published 2025-02-01“…To address this problem, we propose a Motion-Aware Network (MANet), which includes three key modules: (1) Local Motion Encoding Module (LMEM) for capturing local motion features, (2) Spatio-Temporal Excitation Module (STEM) for extracting multi-granular motion information, and (3) Multiple Temporal Aggregation Module (MTAM) for modeling multi-scale temporal information. …”
Get full text
Article