The deep multi-view stereo (MVS) approaches generally construct 3D cost volumes to regularize and regress the depth map. These methods are limited with high-resolution outputs since the memory and time costs grow cubi...
详细信息
Deep learning has become an integral part of various pattern recognition and computer vision systems in recent years due to its outstanding achievements in object recognition, facial recognition, and scene understandi...
详细信息
In recent years, the country has released a large number of standard documents related to prefabricated concrete components. Due to the dispersion and complexity of these standards, it is difficult for industry manage...
详细信息
Semi-supervised learning is comonly trained using a large amount of unlabeled data and a small amount of labeled data. Existing works have achieved excellent results through consistent regularization methods. However,...
详细信息
Recently, Multimodal Learning (MML) has gained significant interest as it compensates for single-modality limitations through comprehensive complementary information within multimodal data. However, traditional MML me...
详细信息
With the rapid development of information technology,IoT devices play a huge role in physiological health data *** exponential growth of medical data requires us to reasonably allocate storage space for cloud servers ...
详细信息
With the rapid development of information technology,IoT devices play a huge role in physiological health data *** exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge *** storage capacity of edge nodes close to users is *** should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging *** paper proposes a redundant data detection method that meets the privacy protection *** scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot *** has the same effect as zero-knowledge proof,and it will not reveal the privacy of *** addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the *** use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is *** feasibility of the scheme is proved through safety analysis and efficiency analysis.
Real-world data consistently exhibits a long-tailed distribution, often spanning multiple categories. This complexity underscores the challenge of content comprehension, particularly in scenarios requiring Long-Tailed...
详细信息
Code search can recommend relevant source code according to the development intention (query statement) of the demander, thereby improving the efficiency of software development. In the research of deep code search mo...
详细信息
In recent years,Approximate Computing Circuits(ACCs)have been widely used in applications with intrinsic tolerance to *** the increased availability of approximate computing circuit approaches,reliability analysis met...
详细信息
In recent years,Approximate Computing Circuits(ACCs)have been widely used in applications with intrinsic tolerance to *** the increased availability of approximate computing circuit approaches,reliability analysis methods for assessing their fault vulnerability have become highly *** this study,two accurate reliability evaluation methods for approximate computing circuits are *** reliability of approximate computing circuits is calculated on the basis of the iterative Probabilistic Transfer Matrix(PTM)*** the calculation,the correlation coefficients are derived and combined to deal with the correlation problem caused by fanout *** accuracy and scalability of the two methods are verified using three sets of approximate computing circuit instances and more circuits in Evo Approx8 b,which is an approximate computing circuit open source *** results show that relative to the Monte Carlo simulation,the two methods achieve average error rates of 0.46%and 1.29%and time overheads of 0.002%and 0.1%.Different from the existing approaches to reliability estimation for approximate computing circuits based on the original PTM model,the proposed methods reduce the space overheads by nearly 50%and achieve time overheads of 1.78%and 2.19%.
暂无评论