Triple data Encryption Standard (also known as 3DES) is a symmetric encryption algorithm. European Traffic Management System popularly uses 3DES for authentication and encryption. However, as per a draft published by ...
详细信息
This paper is devoted to the investigation of the evaluation and query algorithm problem for the influence of spatial location based on RkNN(reverse k nearest neighbor).On the one hand,an object can make contribution ...
详细信息
This paper is devoted to the investigation of the evaluation and query algorithm problem for the influence of spatial location based on RkNN(reverse k nearest neighbor).On the one hand,an object can make contribution to multiple ***,for the existing measures for evaluating the influence of spatial location,an object only makes contribution to one location,and its influence is usually measured by the number of spatial objects in the *** this case,a new measure for evaluating the influence of spatial location based on the RkNN is *** the weight of the contribution is determined by the distance between the object and the location,the influence weight definition is given,which meets the actual *** the other hand,a query algorithm for the influence of spatial location is introduced based on the proposed ***,an algorithm named INCH(INtersection’s Convex Hull)is applied to get candidate regions,where all objects are ***,kNN and Range-k are used to refine ***,according to the proposed measure,the weights of objects in RkNN results are computed,and the influence of the location is *** experimental results on the real data show that the optimized algorithms outperform the basic algorithm on *** addition,in order to provide the best customer service in the location problem and make the best use of all infrastructures,a location algorithm with the query is presented based on *** influence of each facility is calculated in the location program and the equilibrium coefficient is used to evaluate the reasonability of the location in the *** smaller the equilibrium coefficient is,the more reasonability the program *** actual application shows that the location based on influence makes the location algorithm more reasonable and available.
Due to convenience, open-source software is widely used. For beneficial reasons, open-source maintainers often fix the vulnerabilities silently, exposing their users unaware of the updates to threats. Previous works a...
详细信息
Image splicing can easily be used in illegal activities, which may have negative impact on society. Therefore, detecting splicing images and precisely localizing tampered regions are challenging tasks. In this work, w...
详细信息
Pre-trained models of source code have gained widespread popularity in many code intelligence tasks. Recently, with the scaling of the model and corpus size, large language models have shown the ability of in-context ...
Pre-trained models of source code have gained widespread popularity in many code intelligence tasks. Recently, with the scaling of the model and corpus size, large language models have shown the ability of in-context learning (ICL). ICL employs task instructions and a few examples as demonstrations, and then inputs the demonstrations to the language models for making predictions. This new learning paradigm is training-free and has shown impressive performance in various natural language processing and code intelligence tasks. However, the performance of ICL heavily relies on the quality of demonstrations, e.g., the selected examples. It is important to systematically investigate how to construct a good demonstration for code-related tasks. In this paper, we empirically explore the impact of three key factors on the performance of ICL in code intelligence tasks: the selection, order, and number of demonstration examples. We conduct extensive experiments on three code intelligence tasks including code summarization, bug fixing, and program synthesis. Our experimental results demonstrate that all the above three factors dramatically impact the performance of ICL in code intelligence tasks. Additionally, we summarize our findings and provide takeaway suggestions on how to construct effective demonstrations, taking into account these three perspectives. We also show that a carefully-designed demonstration based on our findings can lead to substantial improvements over widely-used demonstration construction methods, e.g., improving BLEU-4, EM, and EM by at least 9.90%, 175.96%, and 50.81% on code summarization, bug fixing, and program synthesis, respectively.
In modern circuits, mixed-cell-height standard cells have been prevailing to meet various requirements and achieve better trade-offs among timing, power, and routability. Besides, the constraints of the minimum-implan...
In modern circuits, mixed-cell-height standard cells have been prevailing to meet various requirements and achieve better trade-offs among timing, power, and routability. Besides, the constraints of the minimum-implant-area (MIA) and drain-to-drain-abutment (DDA) arise as emerging challenges at advanced technology nodes. In this paper, we present an algorithm to address the mixed-cell-height placement problem with MIA and DDA constraints in three major stages: (1) post-global placement, (2) legalization, and (3) detailed placement. In the post-global stage, we first align mixed-cell-height standard cells to the desired rows by conjugate gradient method with dynamic step size and then reorder them by the shortest path algorithm to distribute the source nodes evenly. In the legalization stage, we propose a two-step combination algorithm to cluster cells and repack the clusters to minimize the wirelength, after which we presented a queue based method to address the inter-row MIA violations. In the detailed placement, an MIA-aware DDA reduction algorithm is adopted after multi-region partitioning to eliminate DDA violations without introducing MIA violations. Experimental results show that our algorithm can resolve all MIA and almost all DDA violations with a 13% reduction in displacement, a 4% reduction in HPWL, and 25% less runtime compared with the state-of-the-art work.
This research is ongoing research into the student learning process which aims to develop artificial intelligence-based technology to calculate essay exam scores automatically, based on the textual proximity of studen...
详细信息
Internet of Things (IoT) industrial applications have increased in internet-connected devices. As a result, accessibility, scalability, connectivity, and adaptability have become major challenges. It is possible to cr...
详细信息
This paper considers the parallel stochastic composite optimization for general asynchronous cases where both the objective function and the regularizer are non-convex. In particular, based on the randomized stochasti...
详细信息
The rapid development of artificial intelligence technology promotes the gradual evolution of the 'three integration' of mechanization, informatization and intelligence. The mass data characteristics of airbor...
详细信息
暂无评论