With the remarkable empirical success of neural networks across diverse scientific disciplines, rigorous error and convergence analysis are also being developed and enriched. However, there has been little theoretical...
详细信息
Spatiotemporal data is very common in many applications, such as manufacturing systems and transportation systems. It is typically difficult to be accurately predicted given intrinsic complex spatial and temporal corr...
详细信息
Wireless Sensor Network (WSN) is used in Emergency Management System (EMS). If emergency situation happens, real-timely transmitting emergency information in dynamically changing environment should be assured. But thi...
详细信息
Owing to the increase in 'certified' phishing websites, there is a steady increase in the number of phishing cases and general susceptibility to phishing. Trust mechanisms (e.g., HTTPS Lock Indicators, SSL Cer...
详细信息
The massive upsurge in cloud resource demand and inefficient load management stave off the sustainability of Cloud Data Centres (CDCs) resulting in high energy consumption, resource contention, excessive carbon emissi...
作者:
Bofinger, EveHayter, Anthony J.Wei LiuHonorary Fellow
Department of Mathematics Statistics and Computing Science University of New England Armidate New South Wales 2351 Australia Professor
School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta GA 30332-0205 Lecturer
Department of Mathematics University of Southampton 509 5NH United Kingdom
This article considers the construction of an upper confidence bound on the range of a set of k location parameters, such as the k treatment effects in a one-way layout. This confidence bound will be useful to the exp...
详细信息
This article considers the construction of an upper confidence bound on the range of a set of k location parameters, such as the k treatment effects in a one-way layout. This confidence bound will be useful to the experimenter in assessing the 'equivalence' of the location parameters. Some general theoretical results are presented and the case of normally distributed data is considered in detail, with accompanying tables of confidence bounds. Some examples of the application of this new inference method are given. [ABSTRACT FROM AUTHOR]
In this document, we as representatives of the SIGCHI Accessibility Community lay out a request and plan for a SIG Meeting at CHI, in conjunction with Accesscomputing, addressing the accessibility of participation in ...
详细信息
Coronavirus disease (COVID-19) is an infectious disease caused by a newly discovered coronavirus. It is similar to influenza viruses and raises concerns through alarming levels of spread and severity resulting in an o...
详细信息
Due to the simulation time of the reference input set, architects often use alternative simulation techniques. Although these alternatives reduce the simulation time, what has not been evaluated is their accuracy rela...
详细信息
Due to the simulation time of the reference input set, architects often use alternative simulation techniques. Although these alternatives reduce the simulation time, what has not been evaluated is their accuracy relative to the reference input set, and with respect to each other. To rectify this deficiency, this paper uses three methods to characterize the reduced input set, truncated execution, and sampling simulation techniques while also examining their speed versus accuracy trade-off and configuration dependence. Finally, to illustrate the effect that a technique could have on the apparent speedup results, we quantify the speedups obtained with two processor enhancements. The results show that: 1) the accuracy of the truncated execution techniques was poor for all three characterization methods and for both enhancements, 2) the characteristics of the reduced input sets are not reference-like, and 3) SimPoint and SMARTS, the two sampling techniques, are extremely accurate and have the best speed versus accuracy trade-offs. Finally, this paper presents a decision tree which can help architects choose the most appropriate technique for their simulations.
Typically, the deployment of face recognition models in the wild needs to identify low-resolution faces with extremely low computational cost. To address this problem, a feasible solution is compressing a complex face...
详细信息
暂无评论