Results 61 to 70 of about 169,904 (225)
Documentation for the machine-readable version of the ANS Ultraviolet Photometry Catalogue of Point Sources (Wesselius et al 1982) [PDF]
The machine-readable version of the Astronomical Netherlands Satellite ultraviolet photometry catalog is described in detail, with a byte-by-byte format description and characteristics of the data file given.
Warren, W. H., Jr.
core +1 more source
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch +4 more
wiley +1 more source
Android malware detection method based on byte-code image and deep learning
A new Android malware detection method based on byte-code image and deep learning was proposed. Firstly, Android malware byte-code files were mapped to RGB colorful images which had three channels.
Tieming CHEN +4 more
doaj +2 more sources
Byte-based Language Identification with Deep Convolutional Networks
We report on our system for the shared task on discriminating between similar languages (DSL 2016). The system uses only byte representations in a deep residual network (ResNet).
Bjerva, Johannes
core +1 more source
Generating Compressed Counterfactual Hard Negative Samples for Graph Contrastive Learning
ABSTRACT Graph contrastive learning (GCL) relies on acquiring high‐quality positive and negative samples to learn the structural semantics of the input graph. Previous approaches typically sampled negative samples from the same training batch or an irrelevant external graph.
Haoran Yang +7 more
wiley +1 more source
Error control for reliable digital data transmission and storage systems [PDF]
A problem in designing semiconductor memories is to provide some measure of error control without requiring excessive coding overhead or decoding time.
Costello, D. J., Jr., Deng, R. H.
core +1 more source
The Implications of Diverse Applications and Scalable Data Sets in Benchmarking Big Data Systems [PDF]
Now we live in an era of big data, and big data applications are becoming more and more pervasive. How to benchmark data center computer systems running big data applications (in short big data systems) is a hot topic.
Gao, Wanling +7 more
core
ABSTRACT Large language models (LLMs) have made remarkable advances in natural language processing, demonstrating great potential in modelling structured sequences. However, adapting these capabilities to machine gaming tasks such as Go remains challenging due to limitations in strategy generalisation and optimisation efficiency.
Xiali Li +5 more
wiley +1 more source
A Quantised Push‐Sum Distributed Adaptive Momentum Algorithm for Optimisation Over Directed Networks
ABSTRACT In this paper, we investigate a distributed constrained optimisation problem over directed networks. The agents in the networks conduct local computations and communications, endeavouring to collaboratively minimise the aggregation of all locally known convex cost functions subject to a global constraint set.
Qingguo Lü +6 more
wiley +1 more source
Inheritance powder is the name that was given to poisons, especially arsenic, that were commonly used in the 17th and early 18th centuries to hasten the death of the elderly.
Simson Garfinkel
doaj

