Would Humans Want to Work Side-by-Side with Autonomous Robots - The Effect of Robot Autonomy on Perceived Usefulness, Ease of Use and Desire for Contact. | 0 | 0.34 | 2021 |
A Study of Spectra Bandwidth Index Setting of Infrared Imager Based on Spectrum Simulation. | 0 | 0.34 | 2021 |
Web Objectionable Video Recognition Based on Deep Multi-Instance Learning With Representative Prototypes Selection | 0 | 0.34 | 2021 |
Asynchronous Teacher Guided Bit-Wise Hard Mining For Online Hashing | 0 | 0.34 | 2021 |
Hyperspectral Image Classification Based on a Shuffled Group Convolutional Neural Network with Transfer Learning. | 0 | 0.34 | 2020 |
SSAH: Semi-supervised Adversarial Deep Hashing with Self-paced Hard Sample Generation | 0 | 0.34 | 2020 |
A Planning Approach Based On Aptl | 0 | 0.34 | 2019 |
Bidirectional Temporal Convolution with Self-Attention Network for CTC-Based Acoustic Modeling | 0 | 0.34 | 2019 |
Clustering-Based Score Normalization for Speaker Verification | 0 | 0.34 | 2019 |
Lightweight Secure Processor Prototype on FPGA | 0 | 0.34 | 2018 |
Overview of Logistics Equilibrium Distribution Networks System - An Urban Perspective. | 0 | 0.34 | 2018 |
Optimizing TLB for Access Pattern Privacy Protection in Data Outsourcing. | 0 | 0.34 | 2017 |
NodeLeaper: Lower Overhead Oblivious AVL Tree | 0 | 0.34 | 2017 |
Spoofing Attacks against FM Indoor Localization. | 0 | 0.34 | 2016 |
Hashing for Cross-Modal Similarity Retrieval. | 0 | 0.34 | 2015 |
Isboxing: An Instruction Substitution Based Data Sandboxing For X86 Untrusted Libraries | 4 | 0.41 | 2015 |
A Simple Filtering Algorithm for Continuous Collision Detection Using Taylor Models | 0 | 0.34 | 2015 |
A New Approach to Embedding Semantic Link Network with Word2Vec Binary Code. | 0 | 0.34 | 2015 |
A 2+1 multi-bit incremental architecture using Smart-DEM algorithm | 0 | 0.34 | 2014 |
Stiffness Modeling and Optimization Analysis of a Novel 6-DOF Collaborative Parallel Manipulator. | 0 | 0.34 | 2014 |
EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor | 0 | 0.34 | 2014 |
Using Machine Language Model for Mimimorphic Malware Detection. | 0 | 0.34 | 2014 |
Community Detecting and Feature Analysis in Real Directed Weighted Social Networks. | 4 | 0.71 | 2013 |
A social similarity-aware multicast routing protocol in delay tolerant networks | 1 | 0.35 | 2013 |
A non-monetary protocol for peer-to-peer content distribution in wireless broadcast networks with network coding | 2 | 0.41 | 2013 |
Study on Construction of Semantic Metadata Structure in Professional Fields | 0 | 0.34 | 2013 |
Digital assisted high-order multi-bit analog to digital ramp converters. | 0 | 0.34 | 2011 |
Spatio-temporal data clustering based on type-2 fuzzy sets and cloud models | 0 | 0.34 | 2010 |
Research on Non-interactive Literature-Based Knowledge Discovery | 1 | 0.43 | 2008 |
Research on the Key Technology Based-NLP Of Chinese Medicine Pulse's Mathematical Quantifying | 2 | 0.45 | 2008 |
On Method and Automatic Construction Theory of Domain Ontology Based on Depended Text | 3 | 0.51 | 2006 |
Privacy Preservation for Data Cubes | 14 | 0.67 | 2004 |