In embedded software, reactive synthesis can automatically generate control automata from Generalized Reactivity of rank 1 (GR(1)) specifications. However, this approach requires handcrafted specifications, and r...
详细信息
Data prefetchers play a crucial role in alleviating the memory wall by predicting future memory accesses. First-level cache prefetchers can observe all memory instructions but often rely on simpler strategies due to l...
详细信息
Recently, substantial progress has been achieved in leveraging deep learning models for tabular data learning. However, despite significant advancements, the predominant focus of these endeavors has been on augmenting...
详细信息
Multivariate time series data often demonstrate sparse and irregular characteristics in real-world signal processing applications, making anomaly detection challenging. This paper introduces STMG-AD, a spatio-temporal...
详细信息
Commonsense question answering (CQA) task is an effective way to measure the ability of language models to understand commonsense knowledge. The previous research focus on combining pre-trained language models (PLMs) ...
详细信息
Urban tree detection is crucial for effective city tree management. Recently, deep learning methods have become mainstream for urban tree detection. However, these methods lack sufficient training samples for the dive...
详细信息
Prompt Tuning (PT) efficiently adapts pre-trained models to downstream tasks. Recent studies have suggested incorporating prompt tuning into the framework of federated learning. This paper aims to answer "whether...
详细信息
This paper addresses the significant challenge of executing inference tasks involving General Matrix Multiplication (GEMM) in deep neural networks(DNN) on resource-constrained edge systems. While previous research has...
详细信息
Indoor Navigation System (INS) supports seamless movement of objects within confined spaces in smart environments. In this paper, a novel INS that relies on ESP32-based Received Signal Strength Indication (RSSI) measu...
详细信息
Encoder stealing attacks pose a new challenge for ensuring the protection of security and safety of those models. Malicious users aim to replicate the target encoder’s functionality by training a stolen encoder with ...
详细信息
暂无评论