搜索结果: 1-15 共查到“pattern”相关记录564条 . 查询时间(0.171 秒)
Pathogen-associated Molecular Pattern-triggered Immunity Involves Proteolytic Degradation of Core Nonsense-mediated mRNA Decay Factors During the Early Defense Response
UPF protein ubiquitination resistance gene Nonsense-mediated mRNA decay (NMD) Defense response Effective immunity
2024/1/22
Nonsense-mediated mRNA decay (NMD), an mRNA quality control process, has been implicated in plant immunity. A subset of fully spliced (FS) transcripts of Arabidopsis resistance (R) genes are reportedl...
南京农业大学农学院《IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE》发表甘祥超教授团队“An integrated fast Hough transform for multidimensional data”(图)
甘祥超 高维数据 计算机图像
2023/10/28
2023年5月4日,南京农业大学农学院及前沿交叉研究院甘祥超教授团队在TPAMI (IEEE Transactions on Pattern Analysis and Machine Intelligence, IF=24.314)上发表题为“An integrated fast Hough transform for multidimensional data”的研究论文(https://doi...
江南大学人工智能与计算机学院吴小俊教授团队在人工智能顶级期刊《IEEE Transactions on Pattern Analysis and Machine Intelligence》发表深度学习最新研究成果(图)
吴小俊 人工智能 深度学习 模式识别 IEEE TPAMI
2024/3/2
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Artificial intelligence and the pattern of skill demand
人工智能 技能需求模式 低技能劳动力 高技能劳动力
2023/4/19
西安邮电大学计算机学院教师孙巍在《Pattern Recognition》(SCI一区,TOP期刊,IF:7.740)上发表学术论文
西安邮电大学计算机学院 孙巍 Pattern Recognition 学术论文 人工智能 模式识别
2022/12/6
吉林大学人工智能学院曹晓锋副教授在人工智能国际顶级期刊《IEEE Transactions on Pattern Analysis and Machine Intelligence》发表最新研究成果(图)
吉林大学人工智能学院 曹晓锋 人工智能 IEEE Transactions on Pattern Analysis and Machine Intelligence
2022/4/4
近日,人工智能领域顶级学术刊物《IEEE Transactions on Pattern Analysis and Machine Intelligence》(即IEEE T-PAMI,影响因子17.861)接收了我院“准长聘人才计划” 引进的海外优秀学者曹晓锋副教授的最新研究成果《Distribution Disagreement via Lorentzian Focal Representat...
四川大学电气工程学院青年教师雒瑞森的研究成果被国际权威学术期刊《IEEE Transactions on Pattern Analysis and Machine Intelligence》录用(图)
四川大学电气工程学院 青年教师 雒瑞森 国际权威学术期刊 IEEE Transactions on Pattern Analysis and Machine Intelligence
2019/11/27
近日,以四川大学电气工程学院雒瑞森为独立通讯作者的科研论文:“Scalar Quantization as Sparse Least Square Optimization”被国际权威学术期刊《IEEE模式分析与机器智能汇刊》(IEEE Transactions on Pattern Analysis and Machine Intelligence)录用。论文的第一作者单位为四川大学电气工程学院...
Correcting historic sea surface temperatures reveals simpler pattern of ocean warming(图)
sea surface temperatures simpler pattern ocean warming
2019/10/23
Something odd happened in the oceans in the early 20th century. The North Atlantic and Northeast Pacific appeared to warm twice as much as the global average. Atmospheric and oceanic models have had t...
When Encryption is Not Enough -- Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop)
Zero-Leakage Information Hiding Winnowing
2019/5/27
How much we say, to whom, and when, is inherently telling, even if the contents of our communication is unclear. In other words: encryption is not enough; neither to secure privacy, nor to maintain co...
Full Database Reconstruction with Access and Search Pattern Leakage
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2019/4/22
The widespread use of cloud computing has enabled several database providers to store their data on servers in the cloud and answer queries from those servers. In order to protect the confidentiality ...
FROM THE INTEGRATED SURVEY OF HISTORIC SETTLEMENTS TO THE PATTERN BOOK WITHIN THE BIM
HBIM Digital Heritage Documentation Laser Scanning Photogrammetry Heritage Management Procedural Modelling Pattern book
2019/3/1
The object of the study is the survey of minor historic settlements through integrated architectural survey techniques, the BIM modelling for the management of information at multiple levels, and the ...
FROM THE INTEGRATED SURVEY OF HISTORIC SETTLEMENTS TO THE PATTERN BOOK WITHIN THE BIM
HBIM Digital Heritage Documentation Laser Scanning Photogrammetry Heritage Management Procedural Modelling Pattern book
2019/3/1
The object of the study is the survey of minor historic settlements through integrated architectural survey techniques, the BIM modelling for the management of information at multiple levels, and the ...
Result Pattern Hiding Searchable Encryption for Conjunctive Queries
Searchable Encryption Hidden Vector Encryption Leakage Profile
2018/12/3
The recently proposed Oblivious Cross-Tags (OXT) protocol (CRYPTO 2013) has broken new ground in designing efficient searchable symmetric encryption (SSE) protocol with support for conjunctive keyword...