The high efficiency of quantum algorithms is caused by the quantum parallelism of the superposition principle and the quantum entangled, but traditional quantum genetic algorithms only use the quantum superposition pr...
详细信息
Scene text retrieval aims to find all images containing the query text from an image gallery. Current efforts tend to adopt an Optical Character Recognition (OCR) pipeline, which requires complicated text detection an...
详细信息
In the past two decades, the field of quantum computing has developed rapidly, is gradually able to solve some difficult classical problems. With the development of the facilities for Noisy Intermediate-Scale Quantum(...
详细信息
Person entity alignment is to distinguish whether the person entity information extracted from different data sources refer to the same entity. Existing methods mainly use attribute and relation information of entity ...
详细信息
Due to the inherent flaws of BGP protocol, the security of inter domain routing system has been regularly threatened. Since it is difficult to achieve collaborative defense against existing resources and strategies of...
详细信息
Quantum algorithms of factoring problem have been paid more and more attention since Shor's algorithm was proposed. Combining the current quantum computer hardware level and integer factorization quantum algorithm...
详细信息
Sieve algorithm plays an important role in solving the shortest vector problem, which is one of the most representative hard lattice problems. In this paper, we propose an efficient sieve algorithm with evolutionary t...
详细信息
Recursive relation mainly describes the unique law satisfied by a sequence, so it plays an important role in almost all branches of mathematics. It is also one of the main algorithms commonly used in computer programm...
详细信息
Event extraction is an important branch of information extraction. It involves two challenging issues: event identification and argument identification. Most approaches of event identification are trigger-based, which...
详细信息
The popularity of computers and networks brings many conveniences to our daily life but also brings a variety of security threats. The proliferation of attacks and the rapid spread of viruses make security researchers...
详细信息
暂无评论