Computer Science
epub |eng | | Author:Michael M. Resch, Xin Wang, Wolfgang Bez, Erich Focht & Hiroaki Kobayashi

1 Introduction On March 11, 2011, a massive magnitude 9.0 earthquake, called the 2011 off the Pacific coast of Tohoku earthquake, occurred off the coast of the Tohoku region of ...
( Category: Computer Science March 14,2020 )
epub |eng | | Author:Sushil Jajodia & George Cybenko & Peng Liu & Cliff Wang & Michael Wellman

Phillips, C., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Workshop on New Security Paradigms, pp. 71–79 (1998) Prakash, A., Wellman, M.P.: Empirical game-theoretic analysis for moving target defense. ...
( Category: Hacking March 14,2020 )
epub |eng | 2019-12-05 | Author:Yan HE [HE, Yan]

Epilogue A light node can be viewed as SERVERLESS. That is, itself does not have business logic and is only a computing resource that is determined by the selected part ...
( Category: Cybernetics March 14,2020 )
epub |eng | | Author:Alena V. Favorskaya & Igor B. Petrov

14. Dong W, Zhang L, Lukac R, Shi G (2013) Sparse representation based image interpolation with nonlocal autoregressive modeling. IEEE Trans Image Process 22(4):1382–1394MathSciNetCrossrefMATH 15. Greco L, Cuomo M (2014) ...
( Category: Processes & Infrastructure March 14,2020 )
epub |eng | | Author:Lorenzo Mucchi & Matti Hämäläinen & Sara Jayousi & Simone Morosi

(2)Univ. Lille, CNRS, Centrale Lille, ISEN, Univ. Valenciennes, UMR 8520 - IEMN, 59000 Lille, France (3)University of California Berkeley, Berkeley, CA 94704, USA (4)Ghent University, imec, Department of Information Technology, ...
( Category: Computer Science March 14,2020 )
epub |eng | | Author:Carlos Martín-Vide & Alexander Okhotin & Dana Shapira

Proposition 10 For , let A be a DFA defined over an alphabet with n states and let be an antimorphism. Then there exists a DFA that recognizes with at ...
( Category: Computer Science March 14,2020 )
epub |eng | | Author:Animesh Mukherjee, Monojit Choudhury, Fernando Peruani, Niloy Ganguly & Bivas Mitra

where C i t is the cluster membership for at time t and A ij t represents the group interaction. The group interaction is computed by A ij t = ...
( Category: Computer Science March 14,2020 )
epub |eng | 2020-01-06 | Author:David J. Gunkel

Despite initial appearances, chess – and this match in particular – was no mere game. A lot had been riding on it, mainly because many had, following Hofstadter and Dreyfus, ...
( Category: Electronics March 14,2020 )
epub |eng | | Author:Patrick Hammer & Pulin Agrawal & Ben Goertzel & Matthew Iklé

5 Cognition and Intelligence from an RFT Perspective From an RFT perspective, cognition is not a mental event that mediates between environment and behavior. It is rather a behavioral event ...
( Category: Computer Science March 14,2020 )
epub |eng | | Author:Simon Foucart & Holger Rauhut

9.10. D-RIP Let (the dictionary) with M ≥ N and let (the measurement matrix). The restricted isometry constants δ s adapted to are defined as the smallest constants such that ...
( Category: Electronics March 14,2020 )
epub |eng | 2018-09-28 | Author:Giuseppe Ciaburro [Giuseppe Ciaburro]

( Category: Computer Science March 14,2020 )
epub, pdf |eng | 2018-10-03 | Author:Aurélien Géron

( Category: Intelligence & Semantics March 14,2020 )
epub |eng | | Author:S. A. MirHassani & F. Hooshmand

2.a j ≤ b, ∀j = 1, …, n. 3.The variables are arranged such that the following non-increasing order is satisfied: Let , and .(a)Show that the solution to the ...
( Category: Computer Science March 14,2020 )
epub |eng | | Author:Akram Aldroubi & Carlos Cabrelli & Stéphane Jaffard & Ursula Molter

( Category: Computer Science March 14,2020 )
epub |eng | | Author:Rik Das,Sourav De,Siddhartha Bhattacharyya

The initial segmentation may simply be all pixels, i.e., each pixel is a segment by itself. The heart of the merging approach is the similarity criterion used to decide whether ...
( Category: Computer Science March 14,2020 )