Results 231 to 240 of about 25,093 (292)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
SETA: Semantic-Aware Edge-Guided Token Augmentation for Domain Generalization
IEEE Transactions on Image ProcessingDomain generalization (DG) aims to enhance the model robustness against domain shifts without accessing target domains. A prevalent category of methods for DG is data augmentation, which focuses on generating virtual samples to simulate domain shifts ...
, Lei Qi, Yinghuan Shi
exaly +2 more sources
Legionella effector SetA as a general O-glucosyltransferase for eukaryotic proteins
Nature Chemical Biology, 2019Hao Liang, Yuntao Zhu, Na Dong
exaly +2 more sources
S-SETA: Selective Software-Only Error-Detection Technique Using Assertions
IEEE Transactions on Nuclear Science, 2015Eduardo Chielle +2 more
exaly +2 more sources
SETA++: Real-Time Scalable Encrypted Traffic Analytics in Multi-Gbps Networks
IEEE Transactions on Network and Service Management, 2021The security and privacy of the end-users are a few of the most important components of a communication network. Though end-to-end encryption (e.g., TLS/SSL) fulfils this requirement, it makes inspecting network traffic with legacy solutions such as Deep
C. Kattadige +6 more
semanticscholar +1 more source
Multiscale modelling and simulation of the deformation and adhesion of a single gecko seta
Computer Methods in Biomechanics and Biomedical Engineering, 2009Roger A Sauer
exaly +2 more sources
Study on the structural parameters and adhesive force of gecko seta
The journal of adhesion, 2020It is found from the observation that seta on the adhesive pad of gecko is around several microns in diameter and has a multilevel projective terminal which eventually forms 100 ~ 1000 projections.
Q. Zhang, L. X. Li
semanticscholar +1 more source
SETA: Scalable Encrypted Traffic Analytics in Multi-Gbps Networks
IEEE Conference on Local Computer Networks, 2020While end-to-end encryption brings security and privacy to the end-users, it makes legacy solutions such as Deep Packet Inspection ineffective. Despite the recent work in machine learning-based encrypted traffic classification, these new techniques would
Kwon Nung Choi +5 more
semanticscholar +1 more source

