With the development of information technology, people can share their health records (PHRs) through the Internet and obtain rapid medical services, which makes mobile health become a promising field. PHRs are collect...
详细信息
We introduce and study a family of online metric problems with long-term constraints. In these problems, an online player makes decisions xt in a metric space (X, d) to simultaneously minimize their hitting cost ft(xt...
详细信息
We introduce and study a family of online metric problems with long-term constraints. In these problems, an online player makes decisions xt in a metric space (X, d) to simultaneously minimize their hitting cost ft(xt) and switching cost as determined by the metric. Over the time horizon T, the player must satisfy a long-term demand constraint -t c(xt) ≥ 1, where c(xt) denotes the fraction of demand satisfied at time t. Such problems can find a wide array of applications to online resource allocation in sustainable energy/computing systems. We devise optimal competitive and learning-augmented algorithms for the case of bounded hitting cost gradients and weighted 1 metrics, and further show that our proposed algorithms perform well in numerical experiments. Copyright 2024 by the author(s)
Domain generalization methods aim to learn transferable knowledge from source domains that can generalize well to unseen target domains. Recent studies show that neural networks frequently suffer from a simplicity-bia...
In response to the challenge that traditional camouflage design methods struggle to evade detection by modern unmanned aerial reconnaissance, we propose a camouflage pattern generation adversarial network model using ...
详细信息
computer-supported collaborative learning (CSCL) has been widely adopted as an instructional method that utilizes computer technology to support and facilitate cooperation and collaboration in the learning process. In...
详细信息
This article presents a case study of our process in Smart Education. This is a case of detecting driver smoking behavior, in which intelligent image processing technology was used. Let students know how to conduct ac...
详细信息
The paper explores mathematical methods that differentiate regular and chaotic time series, specifically for identifying pathological fistulas. It proposes a noise-resistant method for classifying responding rows of n...
详细信息
In the past few years, most high-performance semantic segmentation models have focused on learning semantic information in high-level semantic features, and in order to obtain more features, they will use high-resolut...
详细信息
The release of OpenAI's ChatGPT chatbot has sparked widespread concern around the world about the threats and legal issues of generative AI. Although this technological innovation has opened a new chapter in the f...
详细信息
Traditional traffic anomaly-based attack detection methods in Zero-trust Networks (ZTN) suffer from inherent security vulnerabilities, as they neglect considerations regarding their security defenses. Compromising the...
详细信息
暂无评论