@misc{ioannou2016roots, abstract = {We propose a new method for creating computationally efficient and compact convolutional neural networks (CNNs) using a novel sparse connection structure that resembles a tree root. This allows a significant reduction in computational cost and number of parameters compared to state-of-the-art deep CNNs, without compromising accuracy, by exploiting the sparsity of inter-layer filter dependencies. We validate our approach by using it to train more efficient variants of state-of-the-art CNN architectures, evaluated on the CIFAR10 and ILSVRC datasets. Our results show similar or higher accuracy than the baseline architectures with much less computation, as measured by CPU and GPU timings. For example, for ResNet 50, our model has 40% fewer parameters, 45% fewer floating point operations, and is 31% (12%) faster on a CPU (GPU). For the deeper ResNet 200 our model has 25% fewer floating point operations and 44% fewer parameters, while maintaining state-of-the-art accuracy. For GoogLeNet, our model has 7% fewer parameters and is 21% (16%) faster on a CPU (GPU).}, added-at = {2020-05-08T15:51:51.000+0200}, author = {Ioannou, Yani and Robertson, Duncan and Cipolla, Roberto and Criminisi, Antonio}, biburl = {http://www.jedawyah.com/bibtex/257599f4825c2ec2747c92062dc3d10fe/sohnki}, description = {[1605.06489] Deep Roots: Improving CNN Efficiency with Hierarchical Filter Groups}, interhash = {aa1e1d366e771e5895336cf150b64649}, intrahash = {57599f4825c2ec2747c92062dc3d10fe}, keywords = {convnets dnn}, note = {cite arxiv:1605.06489Comment: Updated full version of paper, in full letter paper two-column paper. Includes many textual changes, updated CIFAR10 results, and new analysis of inter/intra-layer correlation}, timestamp = {2020-05-08T15:51:51.000+0200}, title = {Deep Roots: Improving CNN Efficiency with Hierarchical Filter Groups}, url = {http://arxiv.org/abs/1605.06489}, year = 2016 } @techreport{lesch2020jahre, abstract = {Nach heftigen Auseinandersetzungen im deutschen Reichstag und auf der Stra?e trat am 4. Februar 1920 das sogenannte Betriebsr?tegesetz in Kraft. Dieses Gesetz stellt die Geburtsstunde der betrieblichen Mitbestimmung in Deutschland dar. Zwar hatte der Betriebsrat mit den Arbeiterausschüssen einen Vorl?ufer. Schon die Gewerbeordnung von 1891 sah vor, in Betrieben mit mehr als 20 Mitarbeitern Arbeiterausschüsse einzurichten, allerdings auf freiwilliger Basis.}, added-at = {2020-05-08T15:46:53.000+0200}, address = {K?ln}, author = {Lesch, Hagen}, biburl = {http://www.jedawyah.com/bibtex/288a23d5e4c3d66ce4d49836f059d51e0/meneteqel}, institution = {Institut der deutschen Wirtschaft}, interhash = {22a897d21f20d66e6bd6f0e4235d32d2}, intrahash = {88a23d5e4c3d66ce4d49836f059d51e0}, keywords = {Arbeitsbeziehungen Betriebsrat Betriebsr?tegesetz Mitbestimmung betrvg119}, language = {ger}, month = may, number = 21, timestamp = {2020-05-08T15:46:53.000+0200}, title = {100 Jahre Betriebsr?tegesetz : Wie steht es um die Partizipation von Besch?ftigten in Deutschland?}, type = {IW-Report}, url = {https://www.iwkoeln.de/studien/iw-reports/beitrag/hagen-lesch-wie-steht-es-um-die-partizipation-von-beschaeftigten-in-deutschland.html}, year = 2020 } @inproceedings{Klimiankou:2019, abstract = {Performance of program bytecode interpretation depends significantly from instruction dispatch technique implemented in the virtual machine. Threaded code is a well-known approach of instruction dispatch implementation of efficient interpreters. However, the plurality of current high-level programming languages and popular compilers are limited in support of threaded code and enforce designers of interpreters to either stick to GCC compiler which supports ``Labels as Values'' custom C extension or to resort to the implementation of a dispatch loop in assembler. In this work, we present the Interpretizer, a standalone tool which can be integrated into arbitrary interpreter build toolchain readily and transparently and which effectively converts switch-based dispatch loops into efficient threaded code. Therefore, Interpretizer reverts to the virtual machine designers flexibility of choice of programming language and compiler while it preserves the efficiency of the produced interpreter.}, added-at = {2020-05-08T14:22:21.000+0200}, address = {Cham}, author = {Klimiankou, Yauhen}, biburl = {http://www.jedawyah.com/bibtex/29599a1d3b5ea0bedde8b65283696d001/gron}, booktitle = {Software Technology: Methods and Tools}, description = {Interpretizer:?A Compiler-Independent Conversion of Switch-Based Dispatch into Threaded Code | SpringerLink}, editor = {Mazzara, Manuel and Bruel, Jean-Michel and Meyer, Bertrand and Petrenko, Alexander}, interhash = {edc92405ce570196196fc49a751cc40d}, intrahash = {9599a1d3b5ea0bedde8b65283696d001}, isbn = {978-3-030-29852-4}, keywords = {Binary Bytecode Dispatch Interpreter Optimization Rewriting VM}, pages = {59--72}, publisher = {Springer}, timestamp = {2020-05-08T14:22:21.000+0200}, title = {Interpretizer:?A Compiler-Independent Conversion of Switch-Based Dispatch into Threaded Code}, year = 2019 } @article{PhysRevB.101.201402, added-at = {2020-05-08T13:00:35.000+0200}, author = {Knoll, Andy and Timm, Carsten and Meng, Tobias}, biburl = {http://www.jedawyah.com/bibtex/252d7524f5b9274f838b61062f769a33a/ctqmat}, description = {Phys. Rev. B 101, 201402(R) (2020) - Negative longitudinal magnetoconductance at weak fields in Weyl semimetals}, doi = {10.1103/PhysRevB.101.201402}, interhash = {f94c1d695df143751233bb74de9bc33c}, intrahash = {52d7524f5b9274f838b61062f769a33a}, journal = {Phys. Rev. B}, keywords = {b}, month = may, number = 20, numpages = {5}, pages = 201402, publisher = {American Physical Society}, timestamp = {2020-05-08T13:00:35.000+0200}, title = {Negative longitudinal magnetoconductance at weak fields in Weyl semimetals}, url = {https://link.aps.org/doi/10.1103/PhysRevB.101.201402}, volume = 101, year = 2020 } @article{noauthororeditor, abstract = {In most applications of Mobile Ad-hoc Networking and Wireless Sensor networks (WSNs), security and power consumption is a recurring problem which is very difficult to solve due to unpredictable behaviour, environmental changes and mobility of nodes. TERP is a Trust based Energy Routing Protocol that considers the energy conservation and security aspects of WSNs. It is an improved version of AODV and ensures low power consumption while adding a trust based system to the reactive nature of AODV. It also provides the solutions for the most basic attacks like node selfishness, spoofing, misbehaviour and packet sniffing. But black-hole attack, gray-hole attack, Sybil and wormhole attacks are yet to be addressed in the TERP. This paper provides a solution to detect and prevent the node misbehaviour and gray-hole attack. TERP identifies the node misbehaviour using direct and indirect trust recommendations received from neighbour nodes. The detection rate of misbehaving nodes is less during the initial life of the network. Therefore we propose a method that detects the node misbehaviour during the initial life by using a multi-hop acknowledgement system. The simulation results show that the proposed method performs well in detecting the gray-hole and node misbehaviour}, added-at = {2020-05-08T12:42:23.000+0200}, author = {Saravanan, Aditya and Pant, Arjun and Jeyasekar, A.}, biburl = {http://www.jedawyah.com/bibtex/211d4498b0b6c3e47ff93a5d73ad2caab/johnkenadi1985}, doi = {10.5121/ijwmn.2020.12201}, interhash = {f814901886701fd3d5c12cb4640443e8}, intrahash = {11d4498b0b6c3e47ff93a5d73ad2caab}, issn = {0975-3834}, journal = {International Journal of Wireless & Mobile Networks (IJWMN) }, keywords = {Acknowledgement AoDV Attack Blackhole Grayhole Multihop NACK TERP}, language = {English}, month = {April}, number = 2, pages = 11, timestamp = {2020-05-08T12:42:23.000+0200}, title = {Security Enhancements over AODV Using Multi-hop Acknowledgment }, url = {https://aircconline.com/ijwmn/V12N2/12220ijwmn01.pdf}, volume = 12, year = 2020 } 男女做爰高清免费视频-骚虎视频-4虎视频