Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] A linear-time heuristic for improving network partitions
CM Fiduccia, RM Mattheyses - Papers on Twenty-five years of electronic …, 1988 - dl.acm.org
An iterative mincut heuristic for partitioning networks is presented whose worst case
computation time, per pass, grows linearly with the size of the network. In practice, only a …
computation time, per pass, grows linearly with the size of the network. In practice, only a …
Linking scientific instruments and computation: Patterns, technologies, and experiences
Powerful detectors at modern experimental facilities routinely collect data at multiple GB/s.
Online analysis methods are needed to enable the collection of only interesting subsets of …
Online analysis methods are needed to enable the collection of only interesting subsets of …
Software as a service for data scientists
B Allen, J Bresnahan, L Childers, I Foster… - Communications of the …, 2012 - dl.acm.org
Software as a service for data scientists Page 1 FeBRuARY 2012 | VoL. 55 | No. 2 |
coMMunicaTions of The acM 81 in performing them for terabyte or larger datasets (increasingly …
coMMunicaTions of The acM 81 in performing them for terabyte or larger datasets (increasingly …
A Survey and Analysis of TLS Interception Mechanisms and Motivations: Exploring how end-to-end TLS is made “end-to-me” for web traffic
TLS is an end-to-end protocol designed to provide confidentiality and integrity guarantees
that improve end-user security and privacy. While TLS helps defend against pervasive …
that improve end-user security and privacy. While TLS helps defend against pervasive …
Cross-domain data sharing in distributed electronic health record systems
Cross-organization or cross-domain cooperation takes place from time to time in Electronic
Health Record (EHR) system for necessary and high-quality patient treatment. Cautious …
Health Record (EHR) system for necessary and high-quality patient treatment. Cautious …
The MyProxy online credential repository
The MyProxy online credential repository has been used by the Grid computing community
for over four years for managing security credentials in the Grid public key infrastructure …
for over four years for managing security credentials in the Grid public key infrastructure …
Security and trust issues in semantic grids
Grid computing allows sharing of services and resources accross institutions. However,
current Grid security mechanisms for authentication and authorization are too rigid and they …
current Grid security mechanisms for authentication and authorization are too rigid and they …
[PDF][PDF] Identity federation and attribute-based authorization through the globus toolkit, shibboleth, gridshib, and myproxy
T Barton, J Basney, T Freeman, T Scavo… - 5th Annual PKI R&D …, 2006 - academia.edu
This paper describes the recent results of the GridShib and MyProxy projects to integrate the
public key infrastructure (PKI) deployed for Grids with different site authentication …
public key infrastructure (PKI) deployed for Grids with different site authentication …
TeraGrid GIScience gateway: bridging cyberinfrastructure and GIScience
Cyberinfrastructure (CI) represents the integrated information and communication
technologies for distributed information processing and coordinated knowledge discovery …
technologies for distributed information processing and coordinated knowledge discovery …
Ordinal measures for visual correspondence
DN Bhat, SK Nayar - Proceedings CVPR IEEE Computer …, 1996 - ieeexplore.ieee.org
We present ordinal measures for establishing image correspondence. Linear
correspondence measures like correlation and the sum of squared differences are known to …
correspondence measures like correlation and the sum of squared differences are known to …