In this paper,for a zero-dimensional polynomial ideal I,the authors prove that k[x_(1),x_(2),…,x_(n)]/I is cyclic if and only if the breadth of I is 0 or ***,the authors present a new algorithm to compute polynomial ...
详细信息
In this paper,for a zero-dimensional polynomial ideal I,the authors prove that k[x_(1),x_(2),…,x_(n)]/I is cyclic if and only if the breadth of I is 0 or ***,the authors present a new algorithm to compute polynomial univariate representation(PUR)of such an ideal.
There are a wide variety of intelligence accelerators with promising performance and energy efficiency,deployed in a broad range of applications such as computer vision and speech ***,programming productivity hinders ...
详细信息
There are a wide variety of intelligence accelerators with promising performance and energy efficiency,deployed in a broad range of applications such as computer vision and speech ***,programming productivity hinders the deployment of deep learning *** low-level library invoked in the high-level deep learning framework which supports the end-to-end execution with a given model,is designed to reduce the programming burden on the intelligence ***,it is inflexible for developers to build a network model for every deep learning application,which probably brings unnecessary repetitive *** this paper,a flexible and efficient programming framework for deep learning accelerators,FlexPDA,is proposed,which provides more optimization opportunities than the low-level library and realizes quick transplantation of applications to intelligence accelerators for fast *** evaluate FlexPDA by using 10 representative operators selected from deep learning algorithms and an end-to-end *** experimental results validate the effectiveness of FlexPDA,which achieves an end-to-end performance improvement of 1.620x over the low-level library.
In recent years, with the development of the wireless sensor networks, the localization method receives the attention of many researchers. However, due to the network cost and characteristics of sensor nodes, most of ...
详细信息
Dynamic Bayesian Network (DBN) is a graphical model for representing temporal stochastic processes. Learning the structure of DBN is a fundamental step for parameter learning, inference and application. For large scal...
详细信息
The configuration problem in manufacture is more complicated than most other fields. Therefore, the design of modeling and reasoning module for product configuration manager in manufacture is very important and comple...
详细信息
Untraceability is an important aspect of RFID security. A BRS-based approach for modeling RFID untraceability is provided in this paper. Elements in a RFID protocol can be represented as bigraphs, communications betwe...
详细信息
Untraceability is an important aspect of RFID security. A BRS-based approach for modeling RFID untraceability is provided in this paper. Elements in a RFID protocol can be represented as bigraphs, communications between elements can be represented as reaction rules. RFID untraceability can be represented as behavioral congruences. We take a RFID air interface protocol as a case study and show the usability of this approach.
The workflow model is the abstract expression of the workflow or the business process. Following the WfMC reference model, a PKI-based lightweight workflow model named as PBLW is put forward in this paper. The framewo...
详细信息
Mobile ambients is a process calculus for modeling mobile agents in wide-area networks. It has important theoretical and practical values in studying concurrent and mobile computation as well as the security of intera...
详细信息
Extensive studies have shown that many complex diseases are influenced by interaction of certain genes, while due to the limitations and drawbacks of adopting logistic regression (LR) to detect epistasis in human Geno...
详细信息
Essential graph is a graphical representation for Markov equivalence classes of Bayesian networks. Learning essential graph can avoid some problems in traditional Bayesian networks learning algorithms: (1) the number ...
详细信息
暂无评论