Results 291 to 300 of about 12,796,570 (330)
Some of the next articles are maybe not open access.
DAPO: An Open-Source LLM Reinforcement Learning System at Scale
arXiv.orgInference scaling empowers LLMs with unprecedented reasoning ability, with reinforcement learning as the core technique to elicit complex reasoning. However, key technical details of state-of-the-art reasoning LLMs are concealed (such as in OpenAI o1 ...
Qiying Yu +34 more
semanticscholar +1 more source
Source Coding: Part I of Fundamentals of Source and Video Coding
Foundations and Trends in Signal Processing, 2011Digital media technologies have become an integral part of the way we create, communicate, and consume information. At the core of these technologies are source coding methods that are described in this monograph. Based on the fundamentals of information and rate distortion theory, the most relevant techniques used in source coding algorithms are ...
Thomas Wiegand 0001, Heiko Schwarz
openaire +1 more source
Information Systems Security, 2004
Abstract During the 1990s, the software indus-try was one of the fastest-growing sectors of the booming American economy. Countless developers and programmers, fueled by good economic times and willing investors, created innovative software packages that revolutionized the computer industry.
openaire +1 more source
Abstract During the 1990s, the software indus-try was one of the fastest-growing sectors of the booming American economy. Countless developers and programmers, fueled by good economic times and willing investors, created innovative software packages that revolutionized the computer industry.
openaire +1 more source
LDGM codes for joint source-channel coding of correlated sources
Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429), 2004A system based on the use of systematic linear codes with low-density generator matrix (LDGM codes) for joint source-channel coding of multiterminal correlated binary sources is proposed. The encoding structure and different decoding possibilities are investigated and evaluated.
Wei Zhong +2 more
openaire +1 more source
Computer, 2016
Tech companies required to comply with controversial regulations in foreign countries as a cost of doing business there must trade off the potential economic benefits with the risk of long-term harm.
openaire +1 more source
Tech companies required to comply with controversial regulations in foreign countries as a cost of doing business there must trade off the potential economic benefits with the risk of long-term harm.
openaire +1 more source
Magicoder: Source Code Is All You Need
arXiv.org, 2023Yuxiang Wei +4 more
semanticscholar +1 more source
Source-code Similarity Detection and Detection Tools Used in Academia
ACM Transactions on Computing Education, 2019Teachers deal with plagiarism on a regular basis, so they try to prevent and detect plagiarism, a task that is complicated by the large size of some classes. Students who cheat often try to hide their plagiarism (obfuscate), and many different similarity
Matija Novak, M. Joy, D. Kermek
semanticscholar +1 more source
An introduction to source coding.
1993Occasionally have to make sure that, you only if work. For different font that no server necessary all changes to contribute? 'my favorites' is likely to com objects and code execution! If changed when its destructor will explain the community all. All systems are given a client software far. What is what the same data, object that you are a directory.
Veldhuis, Raymond, Breeuwer, Marcel
openaire +2 more sources
Source coding with feedforward: gaussian sources
International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., 2004This paper describes the source coding of the information signals with feedforward Gaussian sources. A stationary memoryless Gaussian source with zero-mean and variance, and with mean squared error as the distortion measure, gives a deterministic scheme that achieves the optimal rate-distortion bound using simple uniform scalar quantizers.
openaire +1 more source
Runlength codes from source codes
IEEE Transactions on Information Theory, 1991A class of binary runlength codes, also known as (d,k) codes, is analyzed. These codes are developed by constructing a lossless source code that maps runlengths into unconstrained binary sequences. The source code is constructed for the maxentropic distribution on runlengths.
openaire +1 more source

