Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Post-quantum lattice-based cryptography implementations: A survey
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …
schemes, leading to innovations in public key cryptography that focus on post-quantum …
High-dimensional Gaussian sampling: a review and a unifying approach based on a stochastic proximal point algorithm
Efficient sampling from a high-dimensional Gaussian distribution is an old but high-stakes
issue. Vanilla Cholesky samplers imply a computational cost and memory requirements that …
issue. Vanilla Cholesky samplers imply a computational cost and memory requirements that …
[КНИГА][B] Computer vision: algorithms and applications
R Szeliski - 2022 - books.google.com
Humans perceive the three-dimensional structure of the world with apparent ease. However,
despite all of the recent advances in computer vision research, the dream of having a …
despite all of the recent advances in computer vision research, the dream of having a …
[КНИГА][B] Scientific computing: an introductory survey, revised second edition
MT Heath - 2018 - SIAM
This book presents a broad overview of numerical methods for students and professionals in
computationally oriented disciplines who need to solve mathematical problems. It differs …
computationally oriented disciplines who need to solve mathematical problems. It differs …
Using machine learning to detect events in eye-tracking data
Event detection is a challenging stage in eye movement data analysis. A major drawback of
current event detection methods is that parameters have to be adjusted based on eye …
current event detection methods is that parameters have to be adjusted based on eye …
Uncertainty quantification via a memristor Bayesian deep neural network for risk-sensitive reinforcement learning
Many advanced artificial intelligence tasks, such as policy optimization, decision making and
autonomous navigation, demand high-bandwidth data transfer and probabilistic computing …
autonomous navigation, demand high-bandwidth data transfer and probabilistic computing …
[HTML][HTML] 3D multi-layer grain structure simulation of powder bed fusion additive manufacturing
In powder bed fusion (PBF) additive manufacturing, powder layers are locally melted with a
laser or an electron beam to build a component. Hatching strategies and beam parameters …
laser or an electron beam to build a component. Hatching strategies and beam parameters …
[КНИГА][B] Tools for computational finance
R Seydel, R Seydel - 2006 - Springer
Universitext is a series of textbooks that presents material from a wide variety of
mathematical disciplines at master's level and beyond. The books, often well class-tested by …
mathematical disciplines at master's level and beyond. The books, often well class-tested by …
Subspace iteration randomization and singular value problems
M Gu - SIAM Journal on Scientific Computing, 2015 - SIAM
A classical problem in matrix computations is the efficient and reliable approximation of a
given matrix by a matrix of lower rank. The truncated singular value decomposition (SVD) is …
given matrix by a matrix of lower rank. The truncated singular value decomposition (SVD) is …
Towards practical lattice-based public-key encryption on reconfigurable hardware
T Pöppelmann, T Güneysu - International Conference on Selected Areas …, 2013 - Springer
With this work we provide further evidence that lattice-based cryptography is a promising
and efficient alternative to secure embedded applications. So far it is known for solid security …
and efficient alternative to secure embedded applications. So far it is known for solid security …