Zobrazeno 1 - 10
of 643
pro vyhledávání: '"Zhu, Haoran"'
Intelligent auditing represents a crucial advancement in modern audit practices, enhancing both the quality and efficiency of audits within the realm of artificial intelligence. With the rise of large language model (LLM), there is enormous potential
Externí odkaz:
http://arxiv.org/abs/2410.10873
Publikováno v:
Acta Mathematica Sinica (2025)
In this paper, we study the structure of the representation ring of the symmetric group $S_6$. The Kronecker coefficients and all power formulas of irreducible representations of $S_6$ are computed using the character theory of finite groups. In addi
Externí odkaz:
http://arxiv.org/abs/2407.18152
Fine-Grained Object Detection (FGOD) is a critical task in high-resolution aerial image analysis. This letter introduces Orthogonal Mapping (OM), a simple yet effective method aimed at addressing the challenge of semantic confusion inherent in FGOD.
Externí odkaz:
http://arxiv.org/abs/2407.17738
The construction of Sweedler duality is an important tool in the theory of Hopf algebras over a field, which is a right adjoint to the dual algebra functor. In this paper, we study the Sweedler duality of Hom-algebras and their Hom-modules. We delve
Externí odkaz:
http://arxiv.org/abs/2405.11838
Traditional covert transmission (CT) approaches have been hindering CT application while blockchain technology offers new avenue. Current blockchain-based CT approaches require off-chain negotiation of critical information and often overlook the dyna
Externí odkaz:
http://arxiv.org/abs/2405.04046
Autor:
Wang, Weidong, Zhu, Haoran
In advancing parallel programming, particularly with OpenMP, the shift towards NLP-based methods marks a significant innovation beyond traditional S2S tools like Autopar and Cetus. These NLP approaches train on extensive datasets of examples to effic
Externí odkaz:
http://arxiv.org/abs/2405.03215
The Virtual Machine (VM)-based Trusted-Execution-Environment (TEE) technology, like AMD Secure-Encrypted-Virtualization (SEV), enables the establishment of Confidential VMs (CVMs) to protect data privacy. But CVM lacks ways to provide the trust proof
Externí odkaz:
http://arxiv.org/abs/2405.01030
Autor:
Zhu, Haoran
Publikováno v:
Elemente der Mathematik (2024)
We analyze a system of linear algebraic equations whose solutions lead to a proof of a generalization of Boole's formula. In particular, our approach provides an elementary and short alternative to Katsuura's proof of this generalization.
Commen
Commen
Externí odkaz:
http://arxiv.org/abs/2403.16731
We study an optimization problem originated from the Grothendieck constant. A generalized normal equation is proposed and analyzed. We establish a correspondence between solutions of the general normal equation and its dual equation. Explicit solutio
Externí odkaz:
http://arxiv.org/abs/2402.08599
In NFV networks, service functions (SFs) can be deployed on virtual machines (VMs) across multiple domains and then form a service function chain (MSFC) for end-to-end network service provision. However, any software component in a VM-based MSFC must
Externí odkaz:
http://arxiv.org/abs/2308.12748