With the rapid development of computer technology and the iteration of malware, numerous computer malware detection methods have been proposed, among which malware detection based on machine learning has become an imp...
详细信息
This paper proposes an unsupervised deep-learning (DL) approach by integrating Transformer and Kolmogorov-Arnold networks (KAN) termed KANsformer to realize scalable beamforming for mobile communication systems. Speci...
详细信息
In 2017, Tian, Yang and Mu presented a new three-party key exchange protocol YPKE in radio frequency identification environment, which is based on the HMQV protocol. They claimed that the proposed YPKE protocol in the...
详细信息
The cryo-electron microscopy(cryo-EM)is one of the most powerful technologies available today for structural *** RELION(Regularized Likelihood Optimization)implements a Bayesian algorithm for cryo-EM structure determi...
详细信息
The cryo-electron microscopy(cryo-EM)is one of the most powerful technologies available today for structural *** RELION(Regularized Likelihood Optimization)implements a Bayesian algorithm for cryo-EM structure determination,which is one of the most widely used software in this *** researchers have devoted effort to improve the performance of RELION to satisfy the analysis for the ever-increasing volume of *** this paper,we focus on performance analysis of the most time-consuming computation steps in RELION and identify their performance bottlenecks for specific *** propose several performance optimization strategies to improve the overall performance of RELION,including optimization of expectation step,parallelization of maximization step,accelerating the computation of symmetries,and memory affinity *** experiment results show that our proposed optimizations achieve significant speedups of RELION across representative *** addition,we perform roofline model analysis to understand the effectiveness of our optimizations.
In order to get better performance, lots of optimization methods are used in code transformation. When migrating SPMD to multi-core platform, vectorization is one key optimization to improve performance. Control flow ...
详细信息
Person entity alignment is to distinguish whether the person entity information extracted from different data sources refer to the same entity. Existing methods mainly use attribute and relation information of entity ...
详细信息
Redundant execution technology is one of the effective ways to improve the safety and reliability of computer systems. By rationally configuring redundant resources, adding components with the same function, using the...
详细信息
Dynamic taint analysis is a widely used information flow analysis method. The software structure supporting dynamic taint analysis needs running program to monitor the spread of taint, which will bring a large running...
详细信息
Software vulnerability detection is crucial for maintaining the security and stability of software systems. In this paper, we propose a novel neural network model called TS-GGNN to address the problem of vulnerability...
详细信息
With the advent of the network era, network security has attracted more and more attention. As the key node in the network, network key devices play an important role in protecting the internal network and ensuring th...
详细信息
暂无评论