Augmented reality applications are bitrate intensive, delay-sensitive, and computationally demanding. To support them, mobile edge computing systems need to carefully manage both their networking and computing resourc...
详细信息
The experimental studies presented in this paper reveal that existing thermal management systems (TMS) and temperature-informed charging algorithms exhibit a response time lag of at least 5.3 minutes due to their reli...
详细信息
In the contemporary era, Global Positioning System (GPS) technology has reached a high maturity, and its unparalleled convenience has led to the relegation of other technologies to secondary roles in navigation. Howev...
详细信息
With the advent of autonomous vehicles on public roads imminent in the near future, special emphasis needs to be placed on addressing scenarios pertaining to mixed-traffic settings, comprised of human-driven and auton...
详细信息
In our study, we investigate how the brain maps environmental spaces into understandable maps through hippocampal place cells and entorhinal cortex grid cells. We uncover that the hippocampus and entorhinal cortex are...
详细信息
Many applications such as datacenters and electric vehicles require well-regulated isolated DC-DC power converters. However, these often require high voltage gains for a wide input voltage range or when the input supp...
详细信息
Software is a crucial component in the communication systems,and its security is of paramount ***,it is susceptible to different types of attacks due to potential ***,significant time and effort is required to fix suc...
详细信息
Software is a crucial component in the communication systems,and its security is of paramount ***,it is susceptible to different types of attacks due to potential ***,significant time and effort is required to fix such *** propose an automated program repair method based on controlled text generation ***,we utilize a fine-tuned language model for patch generation and introduce a discriminator to evaluate the generation process,selecting results that contribute most to vulnerability ***,we perform static syntax analysis to expedite the patch verification *** effectiveness of the proposed approach is validated using QuixBugs and Defects4J datasets,demonstrating significant improvements in generating correct patches compared to other existing methods.
Despite ambitious offshore wind targets in the U.S. and globally, offshore grid planning guidance remains notably scarce, contrasting with well-established frameworks for onshore grids. This gap, alongside the increas...
详细信息
Prior work has shown that the order in which different components of the face are learned using a sequential learner can play an important role in the performance of facial expression recognition systems. We propose F...
详细信息
Hand pose estimation (HPE) can be used for a variety of human-computer interaction applications, such as gesture-based control for physical or virtual/augmented reality devices. Recent works have shown that videos or ...
详细信息
暂无评论