THE ARCHITECTURE OF COMPLEXITY HERBERT A. SIMON* Professor of Administration, Carnegie Institute of Technology (Read April 26, 1962)…
1. Massachusetts Institute of Technology, Cambridge, MA Massachusetts Institute of Technology is a private institution that was founded in 1861. It has a total undergraduate enrollment of 4,299, its setting is urban, and the campus size is 168 acres.…
Next to have their jobs automated: airport-security screeners? Aviation and government authorities are starting to use machines in lieu of people to verify the identities of fliers by scanning their faces, irises or fingerprints. Dozens of airports i…
Architecture Review Board What's an Architecture Review? Architecture design is not a one-time final work under a project, but a continuous job since it has to develop from AS-IS to TO-BE architecture so it also have been called 'Building Evoluationa…
https://www.quora.com/How-do-I-learn-machine-learning-1?redirected_qid=6578644   How Can I Learn X? Learning Machine Learning Learning About Computer Science Educational Resources Advice Artificial Intelligence How-to Question Learning New Things Lea…
Accepted Papers by Session Research Session RT01: Social and Graphs 1Tuesday 10:20 am–12:00 pm | Level 3 – Ballroom AChair: Tanya Berger-Wolf Efficient Algorithms for Public-Private Social NetworksFlavio Chierichetti,Sapienza University of Rome; Ales…
This article come from HEREARS-L1: Learning Tuesday 10:30–12:30; Oral Session; Room: Leonard de Vinci 10:30  ARS-L1.1—GROUP STRUCTURED DIRTY DICTIONARY LEARNING FOR CLASSIFICATION Yuanming Suo, Minh Dao, Trac Tran, Johns Hopkins University, USA; Hojj…
Awesome Courses  Introduction There is a lot of hidden treasure lying within university pages scattered across the internet. This list is an attempt to bring to light those awesome courses which make their high-quality material i.e. assignments, lect…
Time Series Anomaly Detection in Network Traffic: A Use Case for Deep Neural Networks from:https://jask.com/time-series-anomaly-detection-in-network-traffic-a-use-case-for-deep-neural-networks/ Introduction As the waves of the big data revolution cas…
这是一篇Dr. Dobb's Journal对STL之父stepanov的采访.文中数次提到STL的基本思想.语言的特性.编程的一些根本问题等,非常精彩.这篇文章让我想去拜读下stepanov的大作<Elements of Programming>了.原文链接: http://www.stepanovpapers.com/drdobbs-interview.html 我先对文章内容做下总结,并在最后附上原文,把一些认为重要又精彩的语句进行了标红. Stepanov讲到其关于“泛型编程”(gen…
From:  http://www.pamitc.org/cvpr15/program.php Official Program for CVPR 2015 Monday, June 8 8:30am-8:40am Ballrooms A,B,C Rooms 302,304,306 Opening Remarks from Conference Chairs The opening remarks will be made from Ballrooms A,B,C, but a live vid…
这是一篇非常详细和精彩的介绍MAPI over HTTP协议英文博文.原文地址如下: http://blogs.technet.com/b/exchange/archive/2014/05/09/outlook-connectivity-with-mapi-over-http.aspx 作者:Brian Shiers | Technical Product Manager Outlook Connectivity with MAPI over HTTP Among the many new fe…
机器学习原理.实现与实践——机器学习概论 如果一个系统能够通过执行某个过程改进它的性能,这就是学习. ——— Herbert A. Simon 1. 机器学习是什么 计算机基于数据来构建概率统计模型并运用模型对数据进行预测与分析的一门学科. 从上面的机器学习的定义中,我们可以了解到以下的信息: 机器学习以计算机及网络为平台,是建立在计算机及网络之上的: 机器学习以数据为研究对象. 机器学习的目的是对数据进行预测与分析 机器学习以模型为中心.构建模型.优化模型并用模型来进行预测. 机器学习的模型是…
做机器视觉和图像处理方面的研究工作,最重要的两个问题:其一是要把握住国际上最前沿的内容:其二是所作工作要具备很高的实用背景.解决第一个问题 的办法就是找出这个方向公认最高成就的几个超级专家(看看他们都在作什么)和最权威的出版物(阅读上面最新的文献),解决第二个问题的办法是你最好能够找 到一个实际应用的项目,边做边写文章. 做好这几点的途径之一就是利用网络资源,利用权威网站和专家们的个人主页. 依照下面目录整理:[1]. 研究群体(国际国内) [2]. 专家主页 [3]. 前沿国际国内期刊与会议…
Large Scale Visual Recognition Challenge 2015 (ILSVRC2015) Legend: Yellow background = winner in this task according to this metric; authors are willing to reveal the method White background = authors are willing to reveal the method Grey background…
ref:http://www.ibm.com/developerworks/linux/library/l-linux-kernel/?S_TACT=105AGX52&S_CMP=cn-a-l Given that the goal of this article is to introduce you to the Linux kernel and explore its architecture and major components, let's start with a short t…
reference from:http://highscalability.com/7-stages-scaling-web-apps TUESDAY, SEPTEMBER 23, 2008 AT 4:22AM By John Engales CTO, Rackspace. Good presentation of the stages a typical successful website goes through: Stage 1 - The Beginning: Simple archi…
Research Code A rational methodology for lossy compression - REWIC is a software-based implementation of a a rational system for progressive transmission which, in absence of a priori knowledge about regions of interest, choose at any truncation time…
Earlier articles in this series: Part I: Idempotence Part II: Immutability Part III: Volatility Part IV: Singletons Oh, hell, this article just had to be about state machines, didn’t it? State machines! Those damned little circles and arrows and q’s.…
转:http://www.sigvc.org/bbs/thread-72-1-1.html 一.特征提取Feature Extraction:   SIFT [1] [Demo program][SIFT Library] [VLFeat]   PCA-SIFT [2] [Project]   Affine-SIFT [3] [Project]   SURF [4] [OpenSURF] [Matlab Wrapper]   Affine Covariant Features [5] [Oxfo…
Internet Draft                                                   B. FordDocument: draft-ford-midcom-p2p-01.txt                            M.I.T.Expires: April 27, 2004                                     P. Srisuresh                                  …
As virtualization shifts the network edge from top of rack switches to software virtual switches running on the hypervisors; visibility in the virtual switching layer is essential in order to provide network, server and storage management teams with…
单细胞在脑科学方面的应用 Session 1: Deciphering the Cellular Landscape of the Brain Using Single Cell Transcriptomics Single cell/nucleus transcriptomics has emerged as a powerful approach to classify cell types and dynamic cell states in any multicellular organ…
Peer-to-Peer Communication Across Network Address Translators Bryan Ford Massachusetts Institute of Technology baford (at) mit.edu Pyda Srisuresh Caymas Systems, Inc. srisuresh (at) yahoo.com Dan Kegel dank (at) kegel.com J'fais des trous, des petits…
I researched a lot about storage system classes given at good universities this year. This had two reasons: The first was thispost of a researcher at NetApp, about the missing of a good storage or file system class book and secondly our own storage s…
ImageNet Classification with Deep Convolutional Neural Networks 深度卷积神经网络的ImageNet分类 Alex Krizhevsky University of Toronto 多伦多大学 kriz@cs.utoronto.ca Ilya Sutskever University of Toronto 多伦多大学 ilya@cs.utoronto.ca Geoffrey E. Hinton University of Toront…
deb包的文件结构: deb包里面的结构:DEBIAN目录 和 软件具体安装目录(模拟安装目录)(如etc, usr, opt, tmp等). 在DEBIAN目录中至少有control文件,还可能有postinst(postinstallation).postrm(postremove).preinst(preinstallation).prerm(preremove).copyright (版权).changlog (修订记录)和conffiles等. control文件:描述软件包的名称(P…
https://www.gpsworld.com/resources/archives/ Going 3D Personal Nav and LBS To enrich user experience of location-based services  and personal navigation, three-dimensional models such as those used in urban planning are added to a smartphone platform…
Turing奖最早设立于1966年,是美国计算机协会在计算机技术方面所授予的最高奖项,被喻为计算机界的诺贝尔奖.它是以英国数学天才Alan Turing先生的名字命名的,Alan Turing先生对早期计算的理论和实践做出了突出的贡献.图灵奖主要授予在计算机技术领域做出突出贡献的个人,而这些贡献必须对计算机科学与技术有长远而重要的影响.1966年,A. J. Perlis因其在新一代编程技术和编译架构方面的贡献成为图灵奖的第一个得主. 每年,美国计算机协会将要求提名人推荐本年度的图灵奖候选人,并…
from:http://www.sigvc.org/bbs/thread-72-1-1.html 一.特征提取Feature Extraction:   SIFT [1] [Demo program][SIFT Library] [VLFeat]   PCA-SIFT [2] [Project]   Affine-SIFT [3] [Project]   SURF [4] [OpenSURF] [Matlab Wrapper]   Affine Covariant Features [5] [O…