Voice Recognition Systems (VRSs) employ deep learning for speech recogni...
In this work, we develop and release Llama 2, a collection of pretrained...
Trust evaluation assesses trust relationships between entities and
facil...
With the rapid development and large-scale popularity of program softwar...
As a powerful Bayesian non-parameterized algorithm, the Gaussian process...
Differentiable architecture search has gradually become the mainstream
r...
Cloud computing offers resource-constrained users big-volume data storag...
Software reuse, especially partial reuse, poses legal and security threa...
By leveraging experience from previous tasks, meta-learning algorithms c...
Q learning is widely used to simulate the behaviors of generation compan...
The roles of trust, security and privacy are somewhat interconnected, bu...
While the security of the cloud remains a concern, a common practice is ...
This paper presents an observer-integrated Reinforcement Learning (RL)
a...
In this paper, we compare the performances of FAISS and FENSHSES on near...
A growing interest has been witnessed recently in building nearest neigh...
This paper uses the weather forecasting as an application background to
...
Currently there exists a gap between deep learning and the techniques
re...
In this paper, we describe our end-to-end content-based image retrieval
...
We consider the problem of retrieving and ranking items in an eCommerce
...
We revisit skip-gram negative sampling (SGNS), a popular neural-network ...