Results 61 to 70 of about 169,904 (225)

Documentation for the machine-readable version of the ANS Ultraviolet Photometry Catalogue of Point Sources (Wesselius et al 1982) [PDF]

open access: yes
The machine-readable version of the Astronomical Netherlands Satellite ultraviolet photometry catalog is described in detail, with a byte-by-byte format description and characteristics of the data file given.
Warren, W. H., Jr.
core   +1 more source

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

Android malware detection method based on byte-code image and deep learning

open access: yesDianxin kexue, 2019
A new Android malware detection method based on byte-code image and deep learning was proposed. Firstly, Android malware byte-code files were mapped to RGB colorful images which had three channels.
Tieming CHEN   +4 more
doaj   +2 more sources

Byte-based Language Identification with Deep Convolutional Networks

open access: yes, 2016
We report on our system for the shared task on discriminating between similar languages (DSL 2016). The system uses only byte representations in a deep residual network (ResNet).
Bjerva, Johannes
core   +1 more source

Generating Compressed Counterfactual Hard Negative Samples for Graph Contrastive Learning

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Graph contrastive learning (GCL) relies on acquiring high‐quality positive and negative samples to learn the structural semantics of the input graph. Previous approaches typically sampled negative samples from the same training batch or an irrelevant external graph.
Haoran Yang   +7 more
wiley   +1 more source

Error control for reliable digital data transmission and storage systems [PDF]

open access: yes
A problem in designing semiconductor memories is to provide some measure of error control without requiring excessive coding overhead or decoding time.
Costello, D. J., Jr., Deng, R. H.
core   +1 more source

The Implications of Diverse Applications and Scalable Data Sets in Benchmarking Big Data Systems [PDF]

open access: yes, 2013
Now we live in an era of big data, and big data applications are becoming more and more pervasive. How to benchmark data center computer systems running big data applications (in short big data systems) is a hot topic.
Gao, Wanling   +7 more
core  

Multitype Game Optimisation: A Two‐Stage Fine‐Tuning Framework for Multi‑Game Optimisation With Large Language Models

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Large language models (LLMs) have made remarkable advances in natural language processing, demonstrating great potential in modelling structured sequences. However, adapting these capabilities to machine gaming tasks such as Go remains challenging due to limitations in strategy generalisation and optimisation efficiency.
Xiali Li   +5 more
wiley   +1 more source

A Quantised Push‐Sum Distributed Adaptive Momentum Algorithm for Optimisation Over Directed Networks

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT In this paper, we investigate a distributed constrained optimisation problem over directed networks. The agents in the networks conduct local computations and communications, endeavouring to collaboratively minimise the aggregation of all locally known convex cost functions subject to a global constraint set.
Qingguo Lü   +6 more
wiley   +1 more source

Column: Every Last Byte

open access: yesJournal of Digital Forensics, Security and Law, 2011
Inheritance powder is the name that was given to poisons, especially arsenic, that were commonly used in the 17th and early 18th centuries to hasten the death of the elderly.
Simson Garfinkel
doaj  

Home - About - Disclaimer - Privacy