Results 231 to 240 of about 25,093 (292)
Some of the next articles are maybe not open access.

Related searches:

SETA: Semantic-Aware Edge-Guided Token Augmentation for Domain Generalization

IEEE Transactions on Image Processing
Domain generalization (DG) aims to enhance the model robustness against domain shifts without accessing target domains. A prevalent category of methods for DG is data augmentation, which focuses on generating virtual samples to simulate domain shifts ...
, Lei Qi, Yinghuan Shi
exaly   +2 more sources

S-SETA: Selective Software-Only Error-Detection Technique Using Assertions

IEEE Transactions on Nuclear Science, 2015
Eduardo Chielle   +2 more
exaly   +2 more sources

SETA++: Real-Time Scalable Encrypted Traffic Analytics in Multi-Gbps Networks

IEEE Transactions on Network and Service Management, 2021
The security and privacy of the end-users are a few of the most important components of a communication network. Though end-to-end encryption (e.g., TLS/SSL) fulfils this requirement, it makes inspecting network traffic with legacy solutions such as Deep
C. Kattadige   +6 more
semanticscholar   +1 more source

Multiscale modelling and simulation of the deformation and adhesion of a single gecko seta

Computer Methods in Biomechanics and Biomedical Engineering, 2009
Roger A Sauer
exaly   +2 more sources

Study on the structural parameters and adhesive force of gecko seta

The journal of adhesion, 2020
It is found from the observation that seta on the adhesive pad of gecko is around several microns in diameter and has a multilevel projective terminal which eventually forms 100 ~ 1000 projections.
Q. Zhang, L. X. Li
semanticscholar   +1 more source

SETA: Scalable Encrypted Traffic Analytics in Multi-Gbps Networks

IEEE Conference on Local Computer Networks, 2020
While end-to-end encryption brings security and privacy to the end-users, it makes legacy solutions such as Deep Packet Inspection ineffective. Despite the recent work in machine learning-based encrypted traffic classification, these new techniques would
Kwon Nung Choi   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy