This paper proposes a stochastic proximal point method to solve a stochastic convex composite optimization problem. High probability results in stochastic optimization typically hinge on restrictive assumptions on the...
详细信息
In today's world, health is very important, and among the many aspects of well-being, oral wellness is one of the crucial components. Diagnostic investigation in everyday clinical procedures primarily consists of ...
详细信息
This paper delves into enhancing the classification performance on the GoEmotions dataset, a large, manually annotated dataset for emotion detection in text. The primary goal of this paper is to address the challenges...
详细信息
The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised *** Internet of Vehicles has meaningful applicat...
详细信息
The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised *** Internet of Vehicles has meaningful applications,enabling connected and autonomous vehicles to interact with infrastructure,sensors,computing nodes,humans,and fellow *** hoc networks play an essential role in enhancing driving efficiency and safety by reducing traffic congestion while adhering to cryptographic security *** paper introduces a privacy-preserving Vehicle-to-Infrastructure authentication,utilizing encryption and the Moore *** proposed approach enables a vehicle to deduce the planned itinerary of Roadside Units(RSUs)before embarking on a ***,the Certification Authority remains unaware of the specific route design,ensuring *** method involves transforming all Roadside Units(RSUs)in a region into a vector,allowing for instant authentication of a vehicle’s route using RSU ***-world performance evaluations affirm the effectiveness of the proposed model.
In this paper, we proposed the privacy-preserving diploma management system (P 2 DMS) based on blockchain. Since the learning curve and cost are too high to operate a blockchain network, most schools outsource blockch...
详细信息
ISBN:
(数字)9798350386844
ISBN:
(纸本)9798350386851
In this paper, we proposed the privacy-preserving diploma management system (P
2
DMS) based on blockchain. Since the learning curve and cost are too high to operate a blockchain network, most schools outsource blockchain-based DMS. However, the challenges of outsourcing blockchain-based DMS include a lack of data privacy and man-in-the-middle attacks. P
2
DMS utilizes data encryption and digital signature algorithms to ensure data privacy and to prevent man-in-the- middle attacks while outsourcing blockchain-based DMS.
Importance: Human social networks are naturally signed, including both positive and negative ties. However, the instruments for appraising negative ties are less established than those focusing on positive, friendly c...
详细信息
Importance: Human social networks are naturally signed, including both positive and negative ties. However, the instruments for appraising negative ties are less established than those focusing on positive, friendly connections. An improved consensus on useable instruments could support the comparability, reliability, and validity of measures used to map social networks involving negative ties. Objective: This methodological systematic review summarizes and classifies “name generators” (NGs) used to identify negative ties, focusing on applications involving the ascertainment of face-to-face relationships in community settings, especially concerning health or wellbeing. Method: Following the PRISMA guideline, we searched seven databases with no restrictions. Two blinded reviewers participated in screening, appraisal, and evaluation, and two different reviewers resolved conflicts. Quality assessment was assessed with the Newcastle-Ottawa Scale. We summarized study characteristics and the NGs by structure, properties, and methods. Findings: We screened 31,350 titles and abstracts. Between 1986 and 2021, 18 studies were identified. Ten publications investigated negative ties regarding well-being outcomes, and eight analyzed the association of negative relationships with physical/mental health. Most studies were rated at least “Good” quality (n = 17), and the majority used a single NG for negative ties (n = 11). We reviewed 33 negative NGs, of which the majority (n = 22) focused on the ego's experience of an alter (e.g., dislike), eight on describing an alter's trait (e.g., an “annoying person”), and three on a dyadic interaction as the tie (e.g., fighting). Most NGs were used to evaluate already nominated positive ties (n = 10). Conclusions: We observe little convergence in negative tie NG questions in community settings. Our results indicate eclectic instruments in the literature, making it difficult to evaluate what a negative tie means across diverse studies. Based o
Digital Twin (DT) has been proposed as a key enabling technology to produce a digital clone of the physical world and facilitate the convergence of the physical and virtual worlds for building a real-world Metaverse. ...
详细信息
Transformers are the dominant architecture for sequence modeling, but there is growing interest in models that use a fixed-size latent state that does not depend on the sequence length, which we refer to as "gene...
详细信息
Transformers are the dominant architecture for sequence modeling, but there is growing interest in models that use a fixed-size latent state that does not depend on the sequence length, which we refer to as "generalized state space models" (GSSMs). In this paper we show that while GSSMs are promising in terms of inference-time efficiency, they are limited compared to transformer models on tasks that require copying from the input context. We start with a theoretical analysis of the simple task of string copying and prove that a two layer transformer can copy strings of exponential length while GSSMs are fundamentally limited by their fixed-size latent state. Empirically, we find that transformers outperform GSSMs in terms of efficiency and generalization on synthetic tasks that require copying the context. Finally, we evaluate pretrained large language models and find that transformer models dramatically outperform state space models at copying and retrieving information from context. Taken together, these results suggest a fundamental gap between transformers and GSSMs on tasks of practical interest. Copyright 2024 by the author(s)
Recent works often assume that Vision-Language Model (VLM) representations are based on visual attributes like shape. However, it is unclear to what extent VLMs prioritize this information to represent concepts. We pr...
详细信息
In a traditional supply chain system, the process of producing raw materials so that a product may be delivered to a customer is a manual operation with insufficient data and transaction security. The entire process i...
详细信息
暂无评论