1,376 Hits in 9.4 sec

And Still It Moves (E Pur Si Muove)

1999 Cell  
, neurons, or Germany dividing fibroblasts-will reveal the same underlying † Department of Computer Science cause.  ...  Then "With the work of Balbiani and The study of these issues appears to mimic to some extent the recent studies on the molecular basis of cell van Benenden we move away from debate about the mechanism  ...  And by information Loewenstein decidedly does the language of computer science-as integrative (perhaps integrated!)  ... 
doi:10.1016/s0092-8674(00)81494-4 fatcat:dev7zmrojbfqrb63twbxuwdi3u

Migrating Stories: Moving across the Code/Spaces of our Time

Anna Nacher
2019 Hyperrhiz  
The media cannot be physically compressed into the one object.  ...  In her essay on the practice, Zapp explains that she is moving "from solely Web-or browser-based works" to "combining physical installations with online components" (Zapp 2004, 63 ).  ... 
doi:10.20415/hyp/020.mov01 fatcat:difwlf2p4ndz7mdoyybthlnurm

2021 Index IEEE Transactions on Image Processing Vol. 30

2021 IEEE Transactions on Image Processing  
-that appeared in this periodical during 2021, and items from previous years that were commented upon or corrected in 2021.  ...  Note that the item title is found only under the primary entry in the Author Index.  ...  Hou, H., +, TIP 2021 8644-8657 Computer science Depth Privileged Scene Recognition via Dual Attention Hallucination.  ... 
doi:10.1109/tip.2022.3142569 fatcat:z26yhwuecbgrnb2czhwjlf73qu

Communication-Efficient Edge AI: Algorithms and Systems [article]

Yuanming Shi, Kai Yang, Tao Jiang, Jun Zhang, Khaled B. Letaief
2020 arXiv   pre-print
We then introduce communication-efficient techniques, from both algorithmic and system perspectives for training and inference tasks at the network edge.  ...  This is driven by the explosive growth of data, advances in machine learning (especially deep learning), and easy access to vastly powerful computing resources.  ...  Zhi Ding from the University of California at Davis for insightful and constructive comments to improve the presentation of this work.  ... 
arXiv:2002.09668v1 fatcat:nhasdzb7t5dt5brs2r7ocdzrnm

Edge Intelligence: Architectures, Challenges, and Applications [article]

Dianlei Xu, Tong Li, Yong Li, Xiang Su, Sasu Tarkoma, Tao Jiang, Jon Crowcroft, Pan Hui
2020 arXiv   pre-print
We first identify four fundamental components of edge intelligence, namely edge caching, edge training, edge inference, and edge offloading, based on theoretical and practical results pertaining to proposed  ...  Although recently emerged, spanning the period from 2011 to now, this field of research has shown explosive growth over the past five years.  ...  Jeong et al. propose to move the execution state of the task back to the mobile device from the edge server before the mobile device moves away in the context of web apps [324] .  ... 
arXiv:2003.12172v2 fatcat:xbrylsvb7bey5idirunacux6pe

'Silent' Dome Emplacement into a Wet Volcano: Observations from an Effusive Eruption at White Island (Whakaari), New Zealand in Late 2012

Arthur Jolly, Corentin Caudron, Társilo Girona, Bruce Christenson, Roberto Carniel
2020 Geosciences  
Finally, it might represent frothing of the hydrothermal system ahead of the slowly propagating magma.  ...  Detailed assessment of the tremor reveals a very slow evolution of the spectral peaks from low to higher frequencies.  ...  Photos used in this study are from the GNS volcano database (VolcDB) and reflects the effort of the GeoNet team. A. Jolly and B.  ... 
doi:10.3390/geosciences10040142 fatcat:rwpx2rwxpzb2tgit7oevnb3kxy

Journal of Computer Science IJCSIS June 2021 Full Volume

2021 Zenodo  
from computer science, mobile & wireless computing, networking and information security.  ...  The International Journal of Computer Science and Information Security (IJCSIS) is one of the leading open access publisher, with hundreds of papers published each year related to different areas ranging  ...  Compression Lossless compression Lempel-Ziv (LZ) [28, 29] technique is used as original data can be recovered exactly from the compressed data after a compress/expand cycle, applied for the purpose of  ... 
doi:10.5281/zenodo.5556913 fatcat:yineojxcujg4jnvqt6i742dhii

Position Papers of the 2014 Federated Conference on Computer Science and Information Systems

Maria Ganzha, Leszek Maciaszek, Marcin Paprzycki, Maria Ganzha, Leszek Maciaszek, Marcin Paprzycki, Wil Van Der Aalst, Marco Aiello, Barrett Bryant, Ana Fred, Janusz Górski, Mike Hinchey (+13 others)
2014 Polskie Towarzystwo Informatyczne Annals of Computer Science and Information Systems   unpublished
Email: The work was performed under grant "The development of an e-university's ontological knowledge base", state registration number 0213RK00305.  ...  In the model the migration is performed on a regular basis.  ...  Learning Computer Science The literature on learning in Computer Science education is large and much diversified.  ... 

Welcome Message from the General Chair

2006 International Conference on Dependable Systems and Networks (DSN'06)  
The international conference series on Very Large Data Bases (VLDB) was launched in 1975 in Framingham MA, about 20 miles from Boston.  ...  VLDB conference regulars are familiar with Canada. This is the third time the conference is visiting, after Montreal (1980) and Vancouver (1992.)  ...  Acknowledgements The contents presented in this document would not have been available to the attendees of the VLDB conference without the contributions of Mike Godfrey (MG) and Dave Wortman (DW), who  ... 
doi:10.1109/dsn.2006.75 dblp:conf/dsn/X06 fatcat:k4duddvbk5glboxkqxkkfsh4p4

AI Enabling Technologies: A Survey [article]

Vijay Gadepally, Justin Goodwin, Jeremy Kepner, Albert Reuther, Hayley Reynolds, Siddharth Samsi, Jonathan Su, David Martinez
2019 arXiv   pre-print
The goal of this article is to provide readers with an overview of terminology, technical details and recent highlights from academia, industry and government.  ...  While much of the popular press today surrounds advances in algorithms and computing, most modern AI systems leverage advances across numerous different fields.  ...  ACKNOWLEDGEMENTS The authors wish to thank the following individuals for their contributions, thoughts, and comments toward the development of this section: Charlie Dagli, Arjun Majumdar, Lauren Milechin  ... 
arXiv:1905.03592v1 fatcat:dui76274qvb5bie7pok2gpek6u

Tailoring Bioengineered Scaffolds for Regenerative Medicine [chapter]

Sandra Amado, Pedro Morouço, Paula Pascoal-Faria, Nuno Alves
2018 Biomaterials in Regenerative Medicine  
However, we are far from having patient-speciic tissue engineering scafolds that mimic the native tissue regarding both structure and function.  ...  Computer modeling and simulation to tailor bioengineering scafolds. Biomaterials in Regenerative Medicine 344  ...  Acknowledgements This publication is supported by the Portuguese Foundation for Science and Technology (FCT) through the following projects: UID/Multi/04044/2013 and PTDC/EMS-SIS/7032/2014.  ... 
doi:10.5772/intechopen.69857 fatcat:sxdweli5dfhstpccgbvlabw2ji

Big data and extreme-scale computing

M Asch, T Moore, R Badia, M Beck, P Beckman, T Bidot, F Bodin, F Cappello, A Choudhary, B de Supinski, E Deelman, J Dongarra (+27 others)
2018 The international journal of high performance computing applications  
The most critical problems involve the logistics of wide-area, multistage workflows that will move back and forth across the computing continuum, between the multitude of distributed sensors, instruments  ...  Based on those meetings, we argue that the rapid proliferation of digital data generators, the unprecedented growth in the volume and diversity of the data they generate, and the intense evolution of the  ...  They would also gratefully acknowledge all the following sponsors who supported the big data and exascale computing workshop series: Government Sponsors: US Department of Energy, the National Science Foundation  ... 
doi:10.1177/1094342018778123 fatcat:vwrrxmad4rhtppq6ioaz4h5q7a

Proactive defense for evolving cyber threats

Richard Colbaugh, Kristin Glass
2011 Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics  
This research was supported by the U.S. Department of Defense, the U.S.  ...  Department of Homeland Security, The Boeing Company, and the Laboratory Directed Research and Development program at Sandia National Laboratories.  ...  are fully-mixed; • inter-community interactions involve the (possibly temporary) migration of individuals from one community to another.  ... 
doi:10.1109/isi.2011.5984062 dblp:conf/isi/ColbaughG11 fatcat:o3jnwuqicjd2hosgjn5ygwy6hq

How can big data and machine learning benefit environment and water management: A survey of methods, applications, and future directions

Alexander Y. Sun, Bridget R Scanlon
2019 Environmental Research Letters  
Acknowledgments The authors were partially supported by funding from Jackson School of Geosciences, the University of Texas at Austin.  ...  The authors are grateful to Dr Michael Fienen and an anonymous reviewer for their constructive comments on the original manuscript.  ...  The top originating categories are Earth and Planetary Sciences, Engineering, Environmental Science, and Computer Science (figure 2(b)).  ... 
doi:10.1088/1748-9326/ab1b7d fatcat:vx4thuy45vhlnmhu7bk2hwh2g4

Variational Bayes Inference in Digital Receivers [article]

Viet Hung Tran
2018 arXiv   pre-print
However, the computational load of the Bayesian estimator is often prohibitive and, hence, efficient computational schemes are required.  ...  The digital telecommunications receiver is an important context for inference methodology, the key objective being to minimize the expected loss function in recovering the transmitted information.  ...  In computer science, the GDL has recently been applied to computation on graphical models of arbitrary order and, also, a similar trade-off was expressed using a graphical language.  ... 
arXiv:1811.02506v1 fatcat:qqdtg7bj3jdclhjhhmp2os3xku
« Previous Showing results 1 — 15 out of 1,376 results