>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到paradigm相关记录154条 . 查询时间(0.074 秒)
图神经网络(Graph Neural Network,GNN)是指使用神经网络来学习图结构数据,提取和发掘图结构数据中的特征和模式,满足聚类、分类、预测、分割、生成等图学习任务需求的算法总称。如何从图数据(网络数据)中学习有效的数据表征是大数据与人工智能时代的一大挑战。为此,本次汇报将从一种特殊的谱图神经网络(图卷积神经网络)出发,介绍相应的消息传递范式,揭示传统机器学习和图神经网络的内在关联,并...
Small modular reactors (SMRs) are likely to be an important part of the next generation in nuclear, but a paradigm shift is needed to enable their safe deployment with the speed and magnitude required...
In this article, we analyze two of the NIST Round 1 Candidates for the Lightweight Cryptography Standardization Process: COMET and mixFeed. We show how AEAD modes that are based on rekeying can be mod...
We present CellTree, a new architecture for distributed data repositories. The repository allows data to be stored in largely independent, and highly programmable cells, which are “assimilated” into a...
SUM-ECBC (Yasuda, CT-RSA 2010) is the first beyond birthday bound (BBB) secure block cipher based deterministic MAC. After this work, some more BBB secure deterministic MACs have been proposed, namely...
We study a simulation paradigm, referred to as local simulation, in garbling schemes. This paradigm captures simulation proof strategies in which the simulator consists of many local simulators that g...
We study multi-collision-resistant hash functions --- a natural relaxation of collision-resistant hashing that only guarantees the intractability of finding many (rather than two) inputs that map to t...
The Naor-Yung paradigm (Naor and Yung, STOC '90) allows to generically boost security under chosen-plaintext attacks (CPA) to security against chosen-ciphertext attacks (CCA) for public-key encryption...
We introduce a new mobile, simultaneous terrestrial and aerial, geodata collection and post-processing method: mapKITE. By combining two mapping technologies such as terrestrial mobile mapping and unm...
There is a widespread delusion that in theoretical nuclear physics protons and neutrons are the real thing, and nucleons are not more than a mathematically equivalent formality. It is shown that, on t...
This article introduces the method of protective measurement and discusses its deep implications for the foundations of quantum mechanics. It is argued that protective measurement implies that the wav...
On the first of the two occasions I met Thomas Kuhn, we immediately plunged into a ferocious but very friendly argument about incommensurability. He was for it, I was against. Believing in incommensur...
Local Action Groups (LAG) as actors in the EU rural development policy reflect the endogenous paradigm. They utilize the cooperation of their members and social networks to achieve the goals defined i...
Interactive segmentation, in which a user provides a bounding box to an object of interest for image segmenta-tion, has been applied to a variety of applications in im-age editing, crowdsourcing, comp...
Secure elements, such as smartcards or trusted platform modules (TPMs), must be protected against implementation-level attacks. Those include side-channel and fault injection attacks. We introduce ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...