نتایج جستجو برای: sam algorithm
تعداد نتایج: 761855 فیلتر نتایج به سال:
The Security Architecture for Microprocessors (SAM ) is a lightweight and high-performance combined hardand software security extension for microprocessors. SAM has been designed to provide a secure remote code execution environment. It can be used to implement effective copy-protection schemes and provides mechanisms to prevent data and algorithm disclosure. SAM provides protection even if an ...
Prefix sums are an important parallel primitive, especially in massively-parallel programs. This paper discusses two orthogonal generalizations thereof, which we call higher-order and tuple-based prefix sums. Moreover, it describes and evaluates SAM, a GPU-friendly algorithm for computing prefix sums and other scans that directly supports higher orders and tuple values. Its templated CUDA imple...
In this paper we present a novelty multiple objects tracking (MOT) algorithm that relies on Snake and selective attention mechanism (SAM) for aerial image sequences. Snake model with five energy functions is used to segment contours of targets precisely. At the same time, in order to decrease the computational complexity, a SAM model is designed. In our method we view attention selection as a p...
To understand and model the energetics of the Sun-Earth connection, measurements of specific atmospheric molecules are beneficial. Our objective is to formulate an algorithm to derive temporally varying atmospheric water vapor concentrations as a function of altitude, latitude, and longitude from solar irradiance absorption measurements. The Visidyne SAM instrument is used to study the size dis...
Currently, protocol stacks operate in various contexts and it is therefore not possible to know the required properties of a stack (both functional and non-functional) in advance. The stack has to be dynamically built up from components, based on the requirements and the momentary situation. The first step in building the stack is to determine the component types to be used and the stack archit...
Currently, protocol stacks operate in various contexts and it is therefore not possible to know the required properties of a stack (both functional and non-functional) in advance. The stack has to be dynamically built up from components, based on the requirements and the momentary situation. The first step in building the stack is to determine the component types to be used and the stack archit...
Large Unmanned Aerial Vehicle (UAV) clusters, containing hundreds of UAVs, have widely been used in the modern world. Therein, mission planning is core large UAV cluster collaborative systems. In this paper, we propose a method by introducing Simple Attention Model (SAM) into Dynamic Information Reinforcement Learning (DIRL), named DIRL-SAM. To reduce computational complexity original attention...
صمغ زانتان یک اگزوپلی ساکارید میکروبی و بیوپلیمری با کاربرد های گسترده در صنایع مختلف است. بیشتر مطالعات، وابستگی آشکاری میان سویه مورد استفاده و بازده و ویژگی های صمغ زانتان را گزارش می دهند و جداسازی سویه های xanthomonas spp. از زیستگاه های طبیعی هنوز کاراترین روش غربالگری سویه هایی با توانایی تولید زانتان و کیفیت رئولوژیکی بالا می باشد. در این مطالعه 71 نمونه از خاک زمین های زراعی حومه شهره...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید