نتایج جستجو برای: itself
تعداد نتایج: 129574 فیلتر نتایج به سال:
rather than obviate, human creativity. In Deep Thinking, Kasparov also delves into the renaissance of machine learning, an AI subdomain focusing on generalpurpose algorithms that learn from data. He highlights the radical differences between Deep Blue and AlphaGo, a learning algorithm created by my company DeepMind to play the massively complex game of Go. Last year, AlphaGo defeated Lee Sedol,...
In \bucket brigade" manufacturing, such as recently introduced to the apparel industry, a production line has n workers moving among m stations, where each worker independently follows a simple rule that determines what to do next. Our analysis suggests and experiments con rm that if the workers are sequenced from slowest to fastest then, independently of the stations at which they begin, a sta...
We propose a general approach of protecting a two-level system against decoherence via quantum engineering of non-classical multiple superpositions of coherent states in a non-Markovian reservoir. The scheme surprisingly only uses the system-environment interaction responsible for the decoherence and projective measurements of the two-level system. We demonstrate the method on the example of an...
For studying the mechanism of the brain, so called “synthetic approach” is effective. Synthetic approach is to conjecture the mechanism of the target through constructing its model. We have constructed some twenty models of the brain for this study. In this article, we describe one of them which we constructed recently. The model includes abilities of perception, memory, and action. To have the...
Machine learning is making substantial progress in diverse applications. The success is mostly due to advances in deep learning. However, deep learning can make mistakes and its generalization abilities to new tasks are questionable. We ask when and how one can combine network outputs, when (i) details of the observations are evaluated by learned deep components and (ii) facts and confirmation ...
The objective of this paper is to report on research to construct a model, which should provide guidance to an organization on how to address all dimensions associated with phishing and assist in solving the problem holistically. The emphasis will be placed on the human and organizational dimensions. Most research in this area has shown that only certain dimensions used to combat phishing attac...
is published by Princeton University Press and copyrighted, © 2006, by Princeton University Press. All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher, except for reading and browsing via the World Wide Web. Users ar...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید