Zobrazeno 1 - 10
of 19 597
pro vyhledávání: '"Legay, A."'
Autor:
Legay, Bastien, Latapy, Matthieu
Publikováno v:
In: Botta, F., Macedo, M., Barbosa, H., Menezes, R. (eds) Complex Networks XV. CompleNet-Live 2024. Springer Proceedings in Complexity. Springer, Cham
We consider the following problem : we have a high-resolution street network of a given city, and low-resolution measurements of traffic within this city. We want to associate to each measurement the set of streets corresponding to the observed traff
Externí odkaz:
http://arxiv.org/abs/2401.08539
Autor:
Brecht Dewilde
Publikováno v:
Early Modern Low Countries, Vol 1, Iss 1, Pp 177-180 (2017)
Externí odkaz:
https://doaj.org/article/51960cc96f7a49fe8f4d7bcc38e4b642
Autor:
Velinov, Daniel
Publikováno v:
Revue d'histoire moderne et contemporaine (1954-), 2018 Jan 01. 65(1), 191-193.
Externí odkaz:
https://www.jstor.org/stable/44986749
Autor:
Legay, Alexandre1 (AUTHOR) alexandre.legay@univ-grenoble-alpes.fr, Deremble, Bruno1 (AUTHOR), Penduff, Thierry1 (AUTHOR), Brasseur, Pierre1 (AUTHOR), Molines, Jean‐Marc1 (AUTHOR)
Publikováno v:
Journal of Advances in Modeling Earth Systems. Oct2024, Vol. 16 Issue 10, p1-29. 29p.
Autor:
Koumeri, Lisa Koutsoviti, Legast, Magali, Yousefi, Yasaman, Vanhoof, Koen, Legay, Axel, Schommer, Christoph
Empirical evidence suggests that algorithmic decisions driven by Machine Learning (ML) techniques threaten to discriminate against legally protected groups or create new sources of unfairness. This work supports the contextual approach to fairness in
Externí odkaz:
http://arxiv.org/abs/2306.08394
Autor:
Jelten Baguet
Publikováno v:
BMGN: Low Countries Historical Review, Vol 132, Iss 0 (2017)
Marie-Laure Legay, La souveraineté monétaire dans les Pays-Bas méridionaux xvie-xixe siècle (Turnhout: Brepols 2016, xxiii + 271 pp., isbn 9782503567303 (print), isbn 9782503567372 (online)).
Externí odkaz:
https://doaj.org/article/6d5a6638fffb490f8d37f1af14541ecf
Autor:
Korichi, Amel, Clément, Emmanuel, Dosme, Nicolas, Legay, Eric, Stézowski, Olivier, Goasduff, Alain, Aubert, Yann, Dudouet, Jéremie, Elloumi, Souhir, Gauron, Phillipe, Grave, Xavier, Gulmini, Michele, Jacob, Jéremie, Lafage, Vincent, Jeannic, Patrick Le, Lalaire, Guillaume, Ljungvall, Joa, Maugeais, Clothilde, Michelagnoli, Caterina, Molini, Roméo, Philippon, Guillaume, Pietri, Stephane, Ralet, Damian, Roetta, Marco, Saillant, Frederic, Taurigna-Quere, Monique, Toniolo, Nicola
The AGATA tracking detector array represents a significant improvement over previous Compton suppressed arrays. The construction of AGATA led to numerous technological breakthroughs in order to meet the requirements and the challenges of building a m
Externí odkaz:
http://arxiv.org/abs/2305.18653
Autor:
Stézowski, O., Dudouet, J., Goasduff, A., Korichi, A., Aubert, Y., Balogh, M., Baulieu, G., Bazzacco, D., Brambilla, S., Brugnara, D., Dosme, N., Elloumi, S., Gauron, P., Grave, X., Jacob, J., Lafage, V., Lemasson, A., Legay, E., Jeannic, P. Le, Ljungvall, J., Matta, A., Molina, R., Philippon, G., Sedlak, M., Taurigna-Quere, M., Toniolo, N.
Presently, gamma-ray tracking in germanium segmented detectors is realised by applying two advanced, complex algorithms. While they have already triggered an intensive R&D, they are still subject to further improvements. Making such algorithms effect
Externí odkaz:
http://arxiv.org/abs/2303.01275
Autor:
Gil Blas Illustré Édition, ., Paul Balluriau (1860-1917), ., Marcel Legay (1851-1915), ., Daphy, Éliane
La veine : musique de Marcel Legay ; feuille volante extrait de Gil Blas illustré n°45 p.5 [mentions au verso] ; sans date ; illustration Paul Balluriau ; poésie de Maurice de Sonnier. Datation : recherche en cours (non datée dans le catalogue Yv
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______166::e07dfbfd7cc6ddf0af689105a5547668
https://media.hal.science/medihal-01257710
https://media.hal.science/medihal-01257710
Be it for a malicious or legitimate purpose, packing, a transformation that consists in applying various operations like compression or encryption to a binary file, i.e. for making reverse engineering harder or obfuscating code, is widely employed si
Externí odkaz:
http://arxiv.org/abs/2302.09286