Zobrazeno 1 - 10
of 107
pro vyhledávání: '"Yu Mingchao"'
Autor:
Shen Nianhong, Liu Pan, Li Caijun, Ye Hongying, Sun You, Chang Jie, Zhou Jinquan, Zhou Yunshan, Wang Donghu, Yu Mingchao, Huang Chengbing, Hou Xueyuan
Publikováno v:
BMC Psychiatry, Vol 23, Iss 1, Pp 1-7 (2023)
Abstract Objective To investigate the differences in the niacin skin flushing response of adolescent depressed patients and healthy adolescents and its diagnostic value in adolescent depression. Methods Thirty-eight cases of acute episodes of depress
Externí odkaz:
https://doaj.org/article/ed0c6b95ebe7452389dee577c8c84d5f
Autor:
Dong, Xinshu, Litos, Orfeas Stefanos Thyfronitis, Tas, Ertem Nusret, Tse, David, Woll, Robin Linus, Yang, Lei, Yu, Mingchao
Proof-of-stake (PoS) blockchains require validators to lock their tokens as collateral, slashing these tokens if they are identified as protocol violators. PoS chains have mostly been secured by their native tokens. However, using only the native tok
Externí odkaz:
http://arxiv.org/abs/2408.01896
Autor:
Huang, Lianghao, Yang, Weiwei, Bu, Yuru, Yu, Mingchao, Xu, Minghui, Guo, Jingjing, Ni, Wen, Jia, Yaru, Zhang, Jiaxiang
Publikováno v:
In Journal of Drug Delivery Science and Technology August 2024 97
Autor:
Yang, Yihui, Yu, Mingchao, Ren, Liwen, An, Qi, Li, Wan, Yang, Hong, Zhang, Yizhi, Zhang, Sen, Hao, Yue, Du, Guanhua, Yang, Dezhi, Lu, Yang, Wang, Jinhua
Publikováno v:
In International Journal of Pharmaceutics 5 November 2023 646
Training a machine learning model is both compute and data-intensive. Most of the model training is performed on high performance compute nodes and the training data is stored near these nodes for faster training. But there is a growing interest in e
Externí odkaz:
http://arxiv.org/abs/1910.10283
Autor:
Yu, Mingchao, Sahraei, Saeid, Li, Songze, Avestimehr, Salman, Kannan, Sreeram, Viswanath, Pramod
In this paper, we propose coded Merkle tree (CMT), a novel hash accumulator that offers a constant-cost protection against data availability attacks in blockchains, even if the majority of the network nodes are malicious. A CMT is constructed using a
Externí odkaz:
http://arxiv.org/abs/1910.01247
Autor:
Li, Songze, Sahraei, Saeid, Yu, Mingchao, Avestimehr, Salman, Kannan, Sreeram, Viswanath, Pramod
We introduce an information-theoretic framework, named Coded State Machine (CSM), to securely and efficiently execute multiple state machines on untrusted network nodes, some of which are Byzantine. The standard method of solving this problem is usin
Externí odkaz:
http://arxiv.org/abs/1906.10817
Autor:
Yu, Mingchao, Lin, Zhifeng, Narra, Krishna, Li, Songze, Li, Youjie, Kim, Nam Sung, Schwing, Alexander, Annavaram, Murali, Avestimehr, Salman
Data parallelism can boost the training speed of convolutional neural networks (CNN), but could suffer from significant communication costs caused by gradient aggregation. To alleviate this problem, several scalar quantization techniques have been de
Externí odkaz:
http://arxiv.org/abs/1811.03617
Distributed training of deep nets is an important technique to address some of the present day computing challenges like memory consumption and computational demands. Classical distributed approaches, synchronous or asynchronous, are based on the par
Externí odkaz:
http://arxiv.org/abs/1811.03619
Autor:
Li, Songze, Yu, Mingchao, Yang, Chien-Sheng, Avestimehr, A. Salman, Kannan, Sreeram, Viswanath, Pramod
Today's blockchain designs suffer from a trilemma claiming that no blockchain system can simultaneously achieve decentralization, security, and performance scalability. For current blockchain systems, as more nodes join the network, the efficiency of
Externí odkaz:
http://arxiv.org/abs/1809.10361