Cyber deception and theft is the utilization of technology to perpetrate deception and enable theft. Theft typically denotes ...
Source code Documentation Sample data — The original data used for this product have been supplied by JAXA’s ALOS-2 sample product. These instructions are intended for contributors or advanced users ...
* Program re-ordering for improved L2 cache hit rate. * Automatic performance tuning. # Motivations # Matrix multiplications are a key building block of most modern high-performance computing systems.
Abstract: Computational notebooks have become the tool of choice for many data scientists and practitioners for performing analyses and disseminating results. Despite their increasing popularity, the ...
Abstract: This work provides a tutorial to model a nonlinear system by means of a set of linear parameter varying (LPV) systems, linearized around equilibrium points in which the control design will ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results