Results 131 to 140 of about 335,663 (179)
Enhancing quantum audio watermarking security through joint verification and certification. [PDF]
Xing Z, Lam CT, Yuan X.
europepmc +1 more source
REPEL - Random Embedding Perturbation for Enhanced Learning of Protein Function. [PDF]
Zhou D, Cowen LJ, Wu K, Hu X, Slonim DK.
europepmc +1 more source
An algorithmic system for arabic fake news detection using neural networks and transformer embeddings with class weighting. [PDF]
Saad M, Abdelrazek S, Abdelmaksoud IR.
europepmc +1 more source
Enhancing adversarial resilience in semantic caching for secure retrieval augmented generation systems. [PDF]
Afiffy M, Fakhr MW, Maghraby FA.
europepmc +1 more source
A unified framework for robust 3D watermarking based on feature integration. [PDF]
Hu J, Dai M, Liang T, Xie Q, Wang X.
europepmc +1 more source
Capacity-Limited Failure in Approximate Nearest Neighbor Search on Image Embedding Spaces. [PDF]
Cooper MR, Busch M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2012 IEEE Conference on Prognostics and Health Management, 2012
Widespread adoption of Prognostics Health Management (PHM) systems can be hampered by hardware cost. One way to reduce cost, and expand the applications of PHM into industry, is to use embedded microprocessors to perform PHM analysis. Embedded PHM is challenging in that micro-controllers have limited processing power and memory.
Eric Bechhoefer, Austin Fang
openaire +1 more source
Widespread adoption of Prognostics Health Management (PHM) systems can be hampered by hardware cost. One way to reduce cost, and expand the applications of PHM into industry, is to use embedded microprocessors to perform PHM analysis. Embedded PHM is challenging in that micro-controllers have limited processing power and memory.
Eric Bechhoefer, Austin Fang
openaire +1 more source
A Suboptimal Embedding Algorithm for Binary Matrix Embedding
2012 International Symposium on Computer, Consumer and Control, 2012A novel sub optimal hiding algorithm for binary data based on iterative searching embedding, ISE, is proposed. In most cases, an ML algorithm is criticized for being extremely sensitive to the dimension (n-m), due to the fact that the operation complexity varies exponentially with (n-m).
Jyun-Jie Wang +3 more
openaire +1 more source
Improved algorithms for optimal embeddings
ACM Transactions on Algorithms, 2008In the last decade, the notion of metric embeddings with small distortion has received wide attention in the literature, with applications in combinatorial optimization, discrete mathematics, and bio-informatics. The notion of embedding is, given two metric spaces on the same number of points, to find a bijection that minimizes maximum Lipschitz and bi-
Nishanth Chandran +5 more
openaire +1 more source

