نتایج جستجو برای: adaptively

تعداد نتایج: 11097  

2015
Khanh-Phuong Thai Sally Krasne Philip J. Kellman

Recent research has shown that learning technology combining adaptive and perceptual learning (PL) methods can improve pattern recognition, transfer, and fluency in complex learning domains (e.g., Mettler & Kellman, 2014). Both classic research and recent work suggest the benefit of paired comparisons in PL, but no previous work has used adaptive techniques to trigger comparisons. We asked whet...

2002
Craig C. Douglas Jonathan J. Hu Jaideep Ray Danny Thorne Ray S. Tuminaro

We describe a multilevel adaptive grid refinement package designed to provide a high performance, serial or parallel patch class for use in PDE solvers. We provide a high level description algorithmically with mathematical motivation. The C++ code uses cache aware data structures and automatically load balances.

2001
Peter Cowling Graham Kendall Eric Soubeiga

The concept of a hyperheuristic was recently proposed by the authors as an approach that operates at a higher level of abstraction than current metaheuristic approaches. The hyperheuristic chooses which low-level heuristic to apply depending upon the characteristics of the part of the search space being explored and the performance history of each low-level heuristic. In this paper we present v...

Journal: :IACR Cryptology ePrint Archive 2013
Carmit Hazay Arpita Patra

Adaptive security is a strong security notion that captures additional security threats that are not addressed by static corruptions. For instance, it captures real-world scenarios where “hackers” actively break into computers, possibly while they are executing secure protocols. Studying this setting is interesting from both theoretical and practical points of view. A primary building block in ...

2009
Saeed Sedghi Peter van Liesdonk Jeroen Doumen Pieter Hartel Willem Jonker

Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little information as possible to the server. In the symmetric searchable encryption domain, the storage and the retrieval are performed by the same client. Most conventional searchable encryption schemes suffer from two dis...

2005
MICHAEL P. FITZGERALD JAMES R. GRAHAM

Imaging observations are generally affected by a fluctuating background of speckles, a particular problem when detecting faint stellar companions at small angular separations. These speckles can be created by both short-lived atmopsheric aberrations and slowly changing distortions in the optical system. Over the course of a long-exposure image, the combination of many independent realizations o...

Journal: :Comput. Graph. Forum 2010
Carlos Andújar

Raster-based topographic maps are commonly used in geoinformation systems to overlay geographic entities on top of digital terrain models. Using compressed texture formats for encoding topographic maps allows reducing latency times while visualizing large geographic datasets. Topographic maps encompass high-frequency content with large uniform regions, making current compressed texture formats ...

Journal: :IEEE Journal on Selected Areas in Communications 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید