Results 291 to 300 of about 12,796,570 (330)
Some of the next articles are maybe not open access.

DAPO: An Open-Source LLM Reinforcement Learning System at Scale

arXiv.org
Inference scaling empowers LLMs with unprecedented reasoning ability, with reinforcement learning as the core technique to elicit complex reasoning. However, key technical details of state-of-the-art reasoning LLMs are concealed (such as in OpenAI o1 ...
Qiying Yu   +34 more
semanticscholar   +1 more source

Source Coding: Part I of Fundamentals of Source and Video Coding

Foundations and Trends in Signal Processing, 2011
Digital media technologies have become an integral part of the way we create, communicate, and consume information. At the core of these technologies are source coding methods that are described in this monograph. Based on the fundamentals of information and rate distortion theory, the most relevant techniques used in source coding algorithms are ...
Thomas Wiegand 0001, Heiko Schwarz
openaire   +1 more source

Source Code Escrow

Information Systems Security, 2004
Abstract During the 1990s, the software indus-try was one of the fastest-growing sectors of the booming American economy. Countless developers and programmers, fueled by good economic times and willing investors, created innovative software packages that revolutionized the computer industry.
openaire   +1 more source

LDGM codes for joint source-channel coding of correlated sources

Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429), 2004
A system based on the use of systematic linear codes with low-density generator matrix (LDGM codes) for joint source-channel coding of multiterminal correlated binary sources is proposed. The encoding structure and different decoding possibilities are investigated and evaluated.
Wei Zhong   +2 more
openaire   +1 more source

Gambling with Source Code

Computer, 2016
Tech companies required to comply with controversial regulations in foreign countries as a cost of doing business there must trade off the potential economic benefits with the risk of long-term harm.
openaire   +1 more source

Magicoder: Source Code Is All You Need

arXiv.org, 2023
Yuxiang Wei   +4 more
semanticscholar   +1 more source

Source-code Similarity Detection and Detection Tools Used in Academia

ACM Transactions on Computing Education, 2019
Teachers deal with plagiarism on a regular basis, so they try to prevent and detect plagiarism, a task that is complicated by the large size of some classes. Students who cheat often try to hide their plagiarism (obfuscate), and many different similarity
Matija Novak, M. Joy, D. Kermek
semanticscholar   +1 more source

An introduction to source coding.

1993
Occasionally have to make sure that, you only if work. For different font that no server necessary all changes to contribute? 'my favorites' is likely to com objects and code execution! If changed when its destructor will explain the community all. All systems are given a client software far. What is what the same data, object that you are a directory.
Veldhuis, Raymond, Breeuwer, Marcel
openaire   +2 more sources

Source coding with feedforward: gaussian sources

International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., 2004
This paper describes the source coding of the information signals with feedforward Gaussian sources. A stationary memoryless Gaussian source with zero-mean and variance, and with mean squared error as the distortion measure, gives a deterministic scheme that achieves the optimal rate-distortion bound using simple uniform scalar quantizers.
openaire   +1 more source

Runlength codes from source codes

IEEE Transactions on Information Theory, 1991
A class of binary runlength codes, also known as (d,k) codes, is analyzed. These codes are developed by constructing a lossless source code that maps runlengths into unconstrained binary sequences. The source code is constructed for the maxentropic distribution on runlengths.
openaire   +1 more source

Home - About - Disclaimer - Privacy