Warning: file_put_contents(cache/omni_2ad23d49c8f2e8d56d64ca13c152da2f.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Software for Exascale Computing - SPPEXA 2016-2019
...
View Book →Improved Densification of One Permutation Hashing
The existing work on densification of one permutation hashing reduces the query processing cost of the $(K,L)$-parameterized Locality Sensitive Hashing (LSH) algorithm with minwise hashing, from $O(dK...
View Book →
Programming Computer Vision with Python
Tools and algorithms for analyzing images...
View Book →
Ambisonics
A Practical 3D Audio Theory for Recording, Studio Production, Sound Reinforcement, and Virtual Reality...
View Book →
Sensitivity Analysis: Matrix Methods in Demography and Ecology
...
View Book →
Understanding Machine Learning
From Theory to Algorithms...
View Book →
12. Comp Sci IJCSEITR The Effect Of Similarity Measures On Genetic FATIMA MOHY ELDIN AZZAM
Genetic algorithms (GAs) can be used in information retrieval (IR) to optimize the query "solution”. This paper proposes a GA-based IR algorithm that adjusts the weights of keywords of a query in or...
View Book →
Anisotropy Across Fields and Scales
...
View Book →
Spectral and High Order Methods for Partial Differential Equations ICOSAHOM 2018
Selected Papers from the ICOSAHOM Conference, London, UK, July 9-13, 2018...
View Book →
Foundations of Quantum Theory
From Classical Concepts to Operator Algebras...
View Book →
Annotated Algorithms in Python
With applications in Physics, Biology, and Finance...
View Book →
Fundamentals of Biomechanics
Equilibrium, Motion, and Deformation...
View Book →Artificial intelligence system for driver distraction by stacked deep learning classification
Increasing efforts in the transportation system have recently improved driver safety and reduced crash rates. Lack of attention and fatigue directly affect the driver's consciousness. Driver distracti...
View Book →
Intelligent Human Computer Interaction
9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings...
View Book →
Spectral Approaches to Nearest Neighbor Search
We study spectral algorithms for the high-dimensional Nearest Neighbor Search problem (NNS). In particular, we consider a semi-random setting where a dataset $P$ in $\mathbb{R}^d$ is chosen arbitraril...
View Book →
Self-Taught Hashing for Fast Similarity Search
The ability of fast similarity search at large scale is of great importance to many Information Retrieval (IR) applications. A promising way to accelerate similarity search is semantic hashing which d...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
The Definitive Guide to Graph Databases
for the RDBMS Developer...
View Book →
Linear Selection Indices in Modern Plant Breeding
...
View Book →
Intel Xeon Phi Coprocessor Architecture and Tools
The Guide for Application Developers...
View Book →
Variant Construction from Theoretical Foundation to Applications
...
View Book →
An important landmarks construction for a GIS-Map based on indexing of dolly images
In this paper, we describe the construction of important landmarks of roads in the GIS environment. The system uses the corners between more than two roads as an important landmarks. In this corner po...
View Book →DTIC ADA552040: Observation of Query Pulse Length Dependent Ramsey Interference in Rubidium Vapor Us
We report observation of query pulse length dependent Ramsey interference (QPLD-RI), using pulsed Raman excitation in rubidium vapor. This is observed when a long, attenuated query pulse is used durin...
View Book →
Signal Computing
Digital Signals in the Software Domain...
View Book →
Problems in Classical Electromagnetism
157 Exercises with Solutions...
View Book →Approximate Nearest Neighbor Search by Residual Vector Quantization.
This article is from Sensors (Basel, Switzerland) , volume 10 . Abstract A recently proposed product quantization method is efficient for large scale approximate nearest neighbor search, however, its ...
View Book →A method for integrating and ranking the evidence for biochemical pathways by mining reactions from
This article is from Bioinformatics , volume 29 . Abstract Motivation: To create, verify and maintain pathway models, curators must discover and assess knowledge distributed over the vast body of biol...
View Book →
Finite Difference Computing with PDEs
A Modern Software Approach...
View Book →
Representation Learning for Natural Language Processing
...
View Book →
Leveraging Image based Prior for Visual Place Recognition
In this study, we propose a novel scene descriptor for visual place recognition. Unlike popular bag-of-words scene descriptors which rely on a library of vector quantized visual features, our proposed...
View Book →
International Symposium on Mathematics, Quantum Theory, and Cryptography
Proceedings of MQC 2019...
View Book →
Interface Oral Health Science 2016
Innovative Research on Biosis–Abiosis Intelligent Interface...
View Book →
Error-Correction Coding and Decoding
Bounds, Codes, Decoders, Analysis and Applications...
View Book →
Digital Video Concepts, Methods, and Metrics
Quality, Compression, Performance, and Power Trade-off Analysis...
View Book →
Russia's Turn to the East
Domestic Policymaking and Regional Cooperation...
View Book →
Biodiversity and Health in the Face of Climate Change
...
View Book →
Enhanced Living Environments
Algorithms, Architectures, Platforms, and Systems...
View Book →
Query-based image tagging model using ensemble learning with enhanced artificial bee colony optimiza
Digital images make up most multimedia data and are analysed in computer vision applications. Daily uploads of millions of pictures to Internet archives such as satellite image repositories complicate...
View Book →
Graph Databases For Beginners
The #1 Platform for Connected Data...
View Book →
Analysis for Computer Scientists
Foundations, Methods, and Algorithms...
View Book →
Pro TBB
C++ Parallel Programming with Threading Building Blocks...
View Book →
Introduction to Data Science
Data Analysis and Prediction Algorithms with R...
View Book →
Physical (A)Causality
Determinism, Randomness and Uncaused Events...
View Book →
Bayesian Methods in the Search for MH370
...
View Book →dec :: pdp11 :: rsx11 :: RSX11M V2 :: DEC-11-OMIGIA-B-D SYSGEN 75
From the bitsavers.org collection, a scanned-in computer-related document. dec :: pdp11 :: rsx11 :: RSX11M V2 :: DEC-11-OMIGIA-B-D SYSGEN 75...
View Book →
Solving PDEs in Python
The FEniCS Tutorial I...
View Book →Lexicon Infused Phrase Embeddings for Named Entity Resolution
Most state-of-the-art approaches for named-entity recognition (NER) use semi supervised information in the form of word clusters and lexicons. Recently neural network-based language models have been e...
View Book →
Performance Tuning with SQL Server Dynamic Management Views
...
View Book →
Analysis of Text Classification Algorithms A Review
Classification of data has become an important research area. The process of classifying documents into predefined categories based on their content is Text classification. It is the automated assignm...
View Book →
Statistics with Julia
Fundamentals for Data Science, Machine Learning and Artificial Intelligence...
View Book →
Programming for Computations - Python
A Gentle Introduction to Numerical Simulations with Python 3.6...
View Book →
Foundations of Machine Learning
...
View Book →
Spatial Thinking in Planning Practice
An Introduction to GIS...
View Book →
Ionospheric Multi-Spacecraft Analysis Tools
Approaches for Deriving Ionospheric Parameters...
View Book →
SQL Injection Attack Detection Based on Similarity Matching Between Vectors Extracted From Design Ti
Everyone uses web-based applications to carry out daily business and personal tasks. These programmes are vulnerable to attack by hackers, who may also misuse the data. The most serious attack with th...
View Book →
Efficient Learning Machines
Theories, Concepts, and Applications for Engineers and System Designers...
View Book →
Data Parallel C++
Mastering DPC++ for Programming of Heterogeneous Systems using C++ and SYCL...
View Book →
Language Technologies for the Challenges of the Digital Age
27th International Conference, GSCL 2017, Berlin, Germany, September 13-14, 2017, Proceedings...
View Book →Asymmetrically Weighted CCA And Hierarchical Kernel Sentence Embedding For Image & Text Retrieval
Joint modeling of language and vision has been drawing increasing interest. A multimodal data representation allowing for bidirectional retrieval of images by sentences and vice versa is a key aspect....
View Book →
Algorithmic Graph Theory and Sage
...
View Book →
Clinical Text Mining
Secondary Use of Electronic Patient Records...
View Book →
Fractional Graph Theory
A Rational Approach to the Theory of Graphs...
View Book →
Sieving for closest lattice vectors (with preprocessing)
Lattice-based cryptography has recently emerged as a prime candidate for efficient and secure post-quantum cryptography. The two main hard problems underlying its security are the shortest vector prob...
View Book →
Optimizing HPC Applications with Intel Cluster Tools
Hunting Petaflops...
View Book →
VRFP: On-the-fly Video Retrieval using Web Images and Fast Fisher Vector Products
VRFP is a real-time video retrieval framework based on short text input queries, which obtains weakly labeled training images from the web after the query is known. The retrieved web images representi...
View Book →