We show how to teach and motivate small quantum computer programs as a supplemental topic in a CS2 data structures class. A traditional example such as Shor’s factorization [8] ...
State-of-the-art person re-identication methods seek robust person matching through combining various feature types. Often, these features are implicitly assigned with a single ve...
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
In many recent object recognition systems, feature extraction
stages are generally composed of a filter bank, a
non-linear transformation, and some sort of feature pooling
layer...
Kevin Jarrett, Koray Kavukcuoglu, Marc’Aurelio R...
As online markets for the exchange of goods and services become more common, the study of markets composed at least in part of autonomous agents has taken on increasing importance...
Christopher H. Brooks, Robert S. Gazzale, Rajarshi...