[1] |
ZHANG Mingming, LU Qingning, LI Wenzhong, SONG Hu.
Deep neural network compression algorithm based on combined dynamic pruning
[J]. Journal of Computer Applications, 2021, 41(6): 1589-1596.
|
[2] |
GUO Wenxu, SU Yuanqi, LIU Yuehu.
YOLOv3 compression and acceleration based on ZYNQ platform
[J]. Journal of Computer Applications, 2021, 41(3): 669-676.
|
[3] |
WANG Zhongfeng, XU Zhiyuan, SONG Chunhe, ZHANG Hongyu, CAI Yingkai.
Gradient-based deep network pruning algorithm
[J]. Journal of Computer Applications, 2020, 40(5): 1253-1259.
|
[4] |
CHEN Chengjun, MAO Yingchi, WANG Yichao.
CNN model compression based on activation-entropy based layer-wise iterative pruning strategy
[J]. Journal of Computer Applications, 2020, 40(5): 1260-1265.
|
[5] |
XIE Binhong, ZHONG Rixin, PAN Lihu, ZHANG Yingjun.
Accelerated compression method for convolutional neural network combining with pruning and stream merging
[J]. Journal of Computer Applications, 2020, 40(3): 621-625.
|
[6] |
GONG Kaiqiang, ZHANG Chunmei, ZENG Guanghua.
Convolution neural network model compression method based on pruning and tensor decomposition
[J]. Journal of Computer Applications, 2020, 40(11): 3146-3151.
|
[7] |
HE Yunhua, NIU Tong, LIU Tianyi, XIAO Ke, LU Xiang.
Design and optimization of network anonymous scanning system
[J]. Journal of Computer Applications, 2019, 39(5): 1385-1388.
|
[8] |
DU Yuan, ZHANG Shiwei.
Improved canonical-order tree algorithm based on restructure
[J]. Journal of Computer Applications, 2019, 39(2): 441-445.
|
[9] |
XU Shanshan, YAN Chao, GAO Linming.
Lake extraction algorithm based on three-dimensional convolutional neural network
[J]. Journal of Computer Applications, 2019, 39(12): 3450-3455.
|
[10] |
ZHOU Ying, WANG Hong, REN Yanju, HU Xiaohong.
Identification method of depressive tendency with multiple feature fusion
[J]. Journal of Computer Applications, 2019, 39(1): 168-175.
|
[11] |
CAI Ruichu, ZHONG Chunrong, YU Yang, CHEN Bingfeng, LU Ye, CHEN Yao.
CNN quantization and compression strategy for edge computing applications
[J]. Journal of Computer Applications, 2018, 38(9): 2449-2454.
|
[12] |
MENG Hongyue, ZHAI Donghai, LI Mengxue, CAO Daming.
Image inpainting algorithm based on pruning samples referring to four-neighborhood
[J]. Journal of Computer Applications, 2018, 38(4): 1111-1116.
|
[13] |
YIN Yuan, ZHANG Chang, WEN Kai, ZHENG Yunjun.
Maximal frequent itemset mining algorithm based on DiffNodeset structure
[J]. Journal of Computer Applications, 2018, 38(12): 3438-3443.
|
[14] |
WU Ruohao, DONG Ping, ZHENG Tao.
Malicious scanning protection technology based on OpenDayLight
[J]. Journal of Computer Applications, 2018, 38(1): 188-193.
|
[15] |
LIU Hong, WANG Wenxiang, LI Weishi.
Photogrammetric method for accurate tracking of 3D scanning probe
[J]. Journal of Computer Applications, 2017, 37(7): 2057-2061.
|