Zobrazeno 1 - 10
of 3 879
pro vyhledávání: '"Wang, HaiBin"'
Autor:
Wang, Haibin, Xu, Guoyi
We prove the sharp lower bound of the first Neumann eigenvalue for bounded convex planar domain in term of its diameter and width.
Comment: reference and Remark 1.4 is added
Comment: reference and Remark 1.4 is added
Externí odkaz:
http://arxiv.org/abs/2407.13984
The emergence of large-scale multi-modal generative models has drastically advanced artificial intelligence, introducing unprecedented levels of performance and functionality. However, optimizing these models remains challenging due to historically i
Externí odkaz:
http://arxiv.org/abs/2407.11784
Autor:
Qian, Yichen, He, Yongyi, Zhu, Rong, Huang, Jintao, Ma, Zhijian, Wang, Haibin, Wang, Yaohua, Sun, Xiuyu, Lian, Defu, Ding, Bolin, Zhou, Jingren
Designing effective data manipulation methods is a long standing problem in data lakes. Traditional methods, which rely on rules or machine learning models, require extensive human efforts on training data collection and tuning models. Recent methods
Externí odkaz:
http://arxiv.org/abs/2405.06510
Autor:
Diao, Xiaolin, Huo, Yanni, Yan, Zhanzheng, Wang, Haibin, Yuan, Jing, Wang, Yuxin, Cai, Jun, Zhao, Wei
Publikováno v:
JMIR Medical Informatics, Vol 9, Iss 1, p e19739 (2021)
BackgroundSecondary hypertension is a kind of hypertension with a definite etiology and may be cured. Patients with suspected secondary hypertension can benefit from timely detection and treatment and, conversely, will have a higher risk of morbidity
Externí odkaz:
https://doaj.org/article/e6f148ba52574948a99c34a7b474bc94
Publikováno v:
International Journal of Theoretical Physics,2022.61(3):p.53
Recently, Liu and Yin (Int. J. Theor. Phys. 60, 2074-2083 (2021)) proposed a two-party private set intersection protocol based on quantum Fourier transform. We find the participant can deduce the other party's private information, which violates the
Externí odkaz:
http://arxiv.org/abs/2311.11951
Publikováno v:
IEEE Access,2019.7:p.186284-186295
Searchable encryption (SE) is a positive way to protect users sensitive data in cloud computing setting, while preserving search ability on the server side, i.e., it allows the server to search encrypted data without leaking information about the pla
Externí odkaz:
http://arxiv.org/abs/2309.13685
Large language models (LLMs) have emerged as a new paradigm for Text-to-SQL task. However, the absence of a systematical benchmark inhibits the development of designing effective, efficient and economic LLM-based Text-to-SQL solutions. To address thi
Externí odkaz:
http://arxiv.org/abs/2308.15363
Publikováno v:
矿业科学学报, Vol 9, Iss 5, Pp 747-758 (2024)
The roof of the main coal seam in Tingnan Coal Mine of Binchang Mining Area is a typical thick sandstone aquifer structure, and the multi-dynamic disaster outburst problem of rock burst, water damage and gas. Based on the analysis of the field measur
Externí odkaz:
https://doaj.org/article/e5937a6e0a9a43ddb9d81f7bfa169b62
Publikováno v:
Hangkong gongcheng jinzhan, Vol 15, Iss 4, Pp 179-188 (2024)
At present, the civilian aircraft cargo hold is mainly used photoelectric smoke detector as a fire smoke identification, due to the other interference particles(dust, or water vapor, etc)will be suspended in the aircraft cargo hold, which will tr
Externí odkaz:
https://doaj.org/article/9dc97de96e8f468499c6a46fdadaaf6a
The wide application of pre-trained models is driving the trend of once-for-all training in one-shot neural architecture search (NAS). However, training within a huge sample space damages the performance of individual subnets and requires much comput
Externí odkaz:
http://arxiv.org/abs/2304.14636