暂无分享,去创建一个
Mark Tygert | Laurens van der Maaten | Awni Hannun | Ruiyu Zhu | Brian Knott | Chuan Guo | M. Tygert | Awni Y. Hannun | Ruiyu Zhu | Chuan Guo | Brian Knott | L. Maaten
[1] NICHOLAS J. HIGHAM,et al. A SCHUR–NEWTON METHOD FOR THE MATRIX PTH ROOT AND ITS INVERSE∗ , 2005 .
[2] Donald Beaver,et al. Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.
[3] A. Laub,et al. Rational iterative methods for the matrix sign function , 1991 .
[4] Nicholas J. Higham,et al. The Scaling and Squaring Method for the Matrix Exponential Revisited , 2005, SIAM J. Matrix Anal. Appl..
[5] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[6] Stephen M. Stigler,et al. Data Have a Limited Shelf Life , 2019, 1.2.
[7] Nicholas J. Higham,et al. A Schur-Newton Method for the Matrix \lowercase{\boldmathp}th Root and its Inverse , 2006, SIAM J. Matrix Anal. Appl..
[8] Jorge Nocedal,et al. Optimization Methods for Large-Scale Machine Learning , 2016, SIAM Rev..
[9] Dan Bogdanov,et al. Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.
[10] Susan A. Murphy,et al. Monographs on statistics and applied probability , 1990 .
[11] Bruce Curry. Parameter redundancy in neural networks: an application of Chebyshev polynomials , 2007, Comput. Manag. Sci..
[12] Fu Jie Huang,et al. A Tutorial on Energy-Based Learning , 2006 .