WeAnimate: Motion-coherent animation generation from video data | 0 | 0.34 | 2022 |
TOP-ALCM: A novel video analysis method for violence detection in crowded scenes | 0 | 0.34 | 2022 |
Hyperspectral Anomaly Detection Using Deep Learning: A Review | 0 | 0.34 | 2022 |
Discovering Semantically Related Technical Terms And Web Resources In Q&A Discussions | 1 | 0.35 | 2021 |
Design and Analysis of a Human–Machine Interaction System for Researching Human’s Dynamic Emotion | 0 | 0.34 | 2021 |
A Parallel Implementation of Liveness on Knowledge Graphs under Label Constraints | 0 | 0.34 | 2021 |
An Effective Data-Driven Cloud Resource Procurement Scheme With Personalized Reserve Prices | 0 | 0.34 | 2021 |
SLAMVis: An Interactive Visualization Approach for Smart Labeling on Multidimensional Data | 0 | 0.34 | 2021 |
Integrating Information Flow Analysis in Unifying Theories of Programming | 0 | 0.34 | 2021 |
Learning Natural Ordering Of Tags In Domain-Specific Q&A Sites | 0 | 0.34 | 2021 |
Unblind your apps: predicting natural-language labels for mobile GUI components by deep learning | 9 | 0.43 | 2020 |
Seenomaly: vision-based linting of GUI animation effects against design-don't guidelines | 8 | 0.43 | 2020 |
Pipeline provenance for cloud‐based big data analytics | 0 | 0.34 | 2020 |
Temporal Tensor Local Binary Pattern: A Novel Local Tensor Time Series Descriptor | 0 | 0.34 | 2020 |
Effective Data-Driven Technology for Efficient Vision-Based Outdoor Industrial Systems | 0 | 0.34 | 2020 |
IoT-Enabled Service for Crude-Oil Production Systems Against Unpredictable Disturbance | 1 | 0.35 | 2020 |
Detect Triangle Attack on Blockchain by Trace Analysis | 0 | 0.34 | 2019 |
Ada-Things: An adaptive virtual machine monitoring and migration strategy for internet of things applications | 3 | 0.39 | 2019 |
Hierarchical extreme learning machine based image denoising network for visual Internet of Things. | 0 | 0.34 | 2019 |
Video denoising for security and privacy in fog computing | 0 | 0.34 | 2019 |
Object Detection Boosting Using Object Attributes In Detect And Describe Framework | 0 | 0.34 | 2019 |
A context-based service matching approach towards functional reliability for industrial systems. | 0 | 0.34 | 2019 |
Data Provenance Based System For Classification And Linear Regression In Distributed Machine Learning | 0 | 0.34 | 2019 |
ActionNet: vision-based workflow action recognition from programming screencasts | 4 | 0.40 | 2019 |
Discovering, Explaining and Summarizing Controversial Discussions in Community Q&A Sites. | 1 | 0.35 | 2019 |
Multi-objective Optimisation of Online Distributed Software Update for DevOps in Clouds | 0 | 0.34 | 2019 |
A CNN-SIFT Hybrid Pedestrian Navigation Method Based on First-Person Vision. | 1 | 0.37 | 2018 |
Intelligent Healthcare Knowledge Resources in Chinese: A Survey | 0 | 0.34 | 2018 |
Fog Computing Approach for Music Cognition System Based on Machine Learning Algorithm. | 1 | 0.35 | 2018 |
R2C: Robust Rolling-Upgrade in Clouds. | 0 | 0.34 | 2018 |
autoC: an efficient translator for model checking deterministic scheduler based OSEK/VDX applications. | 1 | 0.34 | 2018 |
Toward Sustainable Smart Mobility Information Infrastructure Platform - Current Status - | 0 | 0.34 | 2018 |
Digital image splicing detection based on Markov features in block DWT domain. | 5 | 0.38 | 2018 |
SCFM: Social and crowdsourcing factorization machines for recommendation. | 0 | 0.34 | 2018 |
Verifying OSEK/VDX automotive applications: A Spin-based model checking approach. | 0 | 0.34 | 2018 |
A customised automata algorithm and toolkit for language learning and application. | 0 | 0.34 | 2018 |
Evaluation of redundancy-based system: a model checking approach. | 0 | 0.34 | 2018 |
Analysis of Security in Blockchain: Case Study in 51%-Attack Detecting | 1 | 0.40 | 2018 |
Examine Manipulated Datasets with Topology Data Analysis: A Case Study. | 0 | 0.34 | 2018 |
Comparison among Four Prominent Text Processing Tools | 0 | 0.34 | 2018 |
Updatable timed automata with one updatable clock. | 0 | 0.34 | 2018 |
Detecting users' anomalous emotion using social media for business intelligence. | 2 | 0.39 | 2018 |
The Complexity of Linear-Time Temporal Logic Model Repair. | 0 | 0.34 | 2017 |
Dynamic Weight-Based Individual Similarity Calculation for Information Searching in Social Computing. | 2 | 0.40 | 2017 |
A Behavior Analysis Method Towards Product Quality Management. | 0 | 0.34 | 2017 |
Indexing for Large Scale Data Querying Based on Spark SQL | 1 | 0.40 | 2017 |
Exploiting long-term and short-term preferences and RFID trajectories in shop recommendation. | 0 | 0.34 | 2017 |
A Novel Hidden Markov Model for Genome-Wide Association Studies | 0 | 0.34 | 2017 |
Verifying cooperative software: A SMT-based bounded model checking approach for deterministic scheduler. | 0 | 0.34 | 2017 |
Nested Timed Automata with Invariants. | 0 | 0.34 | 2017 |