-
-
腾讯人脸识别论文
... .
In our approach, we adopt the fully convolutional Residual Network (ResNet) as
the backbone network. Particularly, we exploit several new techniques including
position-sensitive average pooling, multi-scale training and testing and on-line
hard example ...
-
CP tensor-based compression of hyperspectral
... CANDECOMP/PARAFAC tensor decomposition to decompose the original HSI data into the sum of R rank-1 tensors, which can simultaneously exploit both the spatial and spectral information of HSIs. Specifically, compared with the original HSI data, the R rank-1 ...
-
comsol螺旋线圈建模
Models of such spiral inductors can become quite large as the number of turns increases. This example demonstrates how to exploit the near-symmetry of the structure to greatly reduce the model size. A ten-turn octagonal spiral coil is modeled via the ...
-
Attacking Network Protocols
... an attacker’s perspective to help you discover, exploit, and ultimately protect vulnerabilities.
Introduction
Chapter 1: The ... 9: Implementing the Protocol
Chapter 10: Root Causes of Vulnerabilities
Chapter 11: Fuzzing, Debugging, and Exploit Development ...
-
(eWiley) Optimum Array Processing
... are widely used for oil explo-
ration and detection of underground nuclear tests. Various medical diagnosis
and treatment techniques exploit arrays. Radio astronomy utilizes very large
antenna arrays to achieve resolution goals. It appears that the third ...
-
Deep Learning for Medical Image Analysis
... of geometrical, biophysical, and biochemical properties of their
living tissues. These images are acquired with algorithms that exploit complex med-
ical imaging processes whose principles must be well understood as well as those
governing the complex ...
-
-
-
ELECTRONIC WARFARE IN INFORMATION AGE
... platform-centric to network-centric forces. When all military tools are physically
limited in order to achieve military superiority we should exploit the new domain the information domain. Without this transformation it is not possible to achieve victory。
-
Nginx HTTP Server, 3nd Edition
About This Book
Discover possible interactions between Nginx and Apache to get the best of both worlds
Learn to exploit the features offered by NGinx for your web applications
Get the newest techniques available, designed with the latest version in mind
...
-