找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Science and Convergence; CSA 2011 & WCC 2011 James J. (Jong Hyuk) Park,Han-Chieh Chao,Jongsung Conference proceedings 2012 Sprin

[復制鏈接]
樓主: eternal
41#
發(fā)表于 2025-3-28 14:36:53 | 只看該作者
42#
發(fā)表于 2025-3-28 22:05:43 | 只看該作者
Extended NIST Prime Family for Efficient Modular Reductionenough. In this paper, we further extend the idea of NIST primes. Then we find more primes can provide fast modular reduction computation that NIST prime family does not support. Our method provides more efficient modular arithmetic than Montgomery algorithm in prime fields that NIST primes does not support.
43#
發(fā)表于 2025-3-29 02:08:21 | 只看該作者
Self-Healing in Smart Distribution Networks Using Data Exchange Model and Reliable Multicast Protocorevent network operators from making a mistake. The approach described in this paper shows that, by enabling data exchange between different substations, and by exploiting substations unused resources, it is possible to obtain a self-healing distribution network in which risks of manual interventions are reduced to minimum.
44#
發(fā)表于 2025-3-29 06:16:04 | 只看該作者
https://doi.org/10.1057/9781137027665ation within acceptable risk. Adherence to a DeSPoT policy should ensure that the target fulfills the organizational level requirements to the trust behavior, and that the target is not exposed to unacceptable risk. The paper gives an example-driven presentation of the method.
45#
發(fā)表于 2025-3-29 08:30:02 | 只看該作者
International Political Economy Serieshing the vehicles. In this paper, the combination of edges (initial candidate) and bag-of-features (final verification) has improved detection rate significantly as compared to other well known methods. Our method has 96% detection rate on roads inside a city and 98% detection on highways.
46#
發(fā)表于 2025-3-29 11:51:11 | 只看該作者
DeSPoT: A Method for the Development and Specification of Policies for Trust Negotiationation within acceptable risk. Adherence to a DeSPoT policy should ensure that the target fulfills the organizational level requirements to the trust behavior, and that the target is not exposed to unacceptable risk. The paper gives an example-driven presentation of the method.
47#
發(fā)表于 2025-3-29 17:56:39 | 只看該作者
Single Camera Vehicle Detection Using Edges and Bag-of-Featureshing the vehicles. In this paper, the combination of edges (initial candidate) and bag-of-features (final verification) has improved detection rate significantly as compared to other well known methods. Our method has 96% detection rate on roads inside a city and 98% detection on highways.
48#
發(fā)表于 2025-3-29 20:07:07 | 只看該作者
49#
發(fā)表于 2025-3-30 03:48:20 | 只看該作者
https://doi.org/10.1057/9780230595736 from real life images, while generating well localized edges. We have compared our method using images form Berkely’s segmentation data set. Experimental results show the robustness of our method to noise in real life images.
50#
發(fā)表于 2025-3-30 06:10:01 | 只看該作者
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 07:27
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
子洲县| 湛江市| 连南| 翁源县| 舞阳县| 沛县| 云林县| 年辖:市辖区| 巫山县| 无为县| 沧源| 凯里市| 乌海市| 宜川县| 滦南县| 肥东县| 文山县| 肥乡县| 衡水市| 永城市| 成武县| 许昌县| 宜昌市| 商河县| 巫山县| 安化县| 连平县| 临洮县| 化州市| 顺昌县| 太仆寺旗| 沙湾县| 若羌县| 盐池县| 吉首市| 福州市| 高雄市| 监利县| 明星| 梁平县| 十堰市|