An improved anonymous DoS-resistant authentication protocol in smart city | 0 | 0.34 | 2022 |
Modulation Format Recognition Based on CNN in Satellite Communication System. | 0 | 0.34 | 2021 |
What users tell us - User Understanding and Modeling for Personalized Recommendation. | 0 | 0.34 | 2021 |
New Symbolic Model and Equivalences Checking for Open Automata. | 0 | 0.34 | 2021 |
Transformer-based Alarm Context-Vectorization Representation for Reliable Alarm Root Cause Identification in Optical Networks. | 0 | 0.34 | 2021 |
Hyperspectral Anomaly Detection via Local Gradient Guidance. | 0 | 0.34 | 2021 |
The Necessity of Low-code Engineering for Industrial Software Development - A Case Study and Reflections. | 0 | 0.34 | 2021 |
Cooperative Edge Caching via Federated Deep Reinforcement Learning in Fog-RANs. | 0 | 0.34 | 2021 |
Efficiency and Influencing Factors of Crowd Innovation Spaces in China. | 0 | 0.34 | 2020 |
Beauty is Value? The Impact of Image Presentation on Hospital Financial Performance in a Cosmetic Context. | 0 | 0.34 | 2020 |
Data Information Protection Quality Management of the Characteristic Tourism Virtual Experience System in Changbai Mountain | 0 | 0.34 | 2020 |
An Improved Frost Filtering Algorithm Based on the Four Rectangular Windows. | 0 | 0.34 | 2019 |
基于词嵌入辅助机制的情感分析 (Sentiment Analysis Based on Word Embedding Auxiliary Mechanism). | 0 | 0.34 | 2019 |
SMTBCF - Efficient Backbone Computing for SMT Formulas. | 0 | 0.34 | 2019 |
基于主题模型的社交网络匿名用户重识别 (Topic-based Re-identification for Anonymous Users in Social Network). | 0 | 0.34 | 2019 |
An Analysis Method for Subliminal Affective Priming Effect Based on CEEMDAN and MPE. | 0 | 0.34 | 2019 |
HLT@SUDA at SemEval-2019 Task 1: UCCA Graph Parsing as Constituent Tree Parsing. | 0 | 0.34 | 2019 |
On a Diophantine Equation With Three Prime Variables. | 0 | 0.34 | 2019 |
Evaluation on multi-threaded queue test data for multi-channel filter rod forming machine. | 0 | 0.34 | 2019 |
On Test Case Prioritization Using Ant Colony Optimization Algorithm. | 0 | 0.34 | 2019 |
基于BiLSTM并结合自注意力机制和句法信息的隐式篇章关系分类 (BiLSTM-based Implicit Discourse Relation Classification Combining Self-attentionMechanism and Syntactic Information). | 0 | 0.34 | 2019 |
A Novel Euler's Elastica based Segmentation Approach for Noisy Images via using the Progressive Hedging Algorithm. | 0 | 0.34 | 2019 |
Heat Discharge of Molten Salt in Double Energy Storage Tank. | 0 | 0.34 | 2019 |
Facial Attribute Editing By Latent Space Adversarial Variational Autoencoders | 0 | 0.34 | 2018 |
基于BiLSTM-CRF的关键词自动抽取 (Automatic Keyword Extraction Based on BiLSTM-CRF). | 0 | 0.34 | 2018 |
自纠正词对齐 (Self-correction of Word Alignments). | 0 | 0.34 | 2018 |
Weighted Graph Classification by Self-Aligned Graph Convolutional Networks Using Self-Generated Structural Features. | 0 | 0.34 | 2018 |
LineNet: a Zoomable CNN for Crowdsourced High Definition Maps Modeling in Urban Environments. | 0 | 0.34 | 2018 |
Study on the Traffic Impact Assessment of Large-Scale Stadiums and Gymnasiums - From the Perspective of Meta-Analysis Theory. | 0 | 0.34 | 2018 |
Classification of lung nodules in CT images based on Wasserstein distance in differential geometry. | 0 | 0.34 | 2018 |
列车组合定位中改进CPF算法的探讨 (Research of Improved CPF Algorithm for Intergrated Train Positioning). | 0 | 0.34 | 2018 |
The Effects of the Externality of Public Goods on Doctor's Private Benefit: Evidence from Online Health Community. | 0 | 0.34 | 2017 |
Improving Shift-Reduce Phrase-Structure Parsing with Constituent Boundary Information. | 0 | 0.34 | 2017 |
Through wall human detection under small samples based on deep learning algorithm. | 0 | 0.34 | 2017 |
A New Interference Detection Method Based on Joint Hybrid Time-Frequency Distribution for GNSS Receivers. | 2 | 0.42 | 2016 |
Flow Field Analysis of Cutter Head for Cutter Suction Dredgers. | 0 | 0.34 | 2016 |
Improving Sponsor’s Experience in Reward-Based Crowdfunding: A Psychological Ownership Perspective | 0 | 0.34 | 2015 |
Case Studies on Extracting the Characteristics of the Reachable States of State Machines Formalizing Communication Protocols with Inductive Logic Programing. | 0 | 0.34 | 2015 |
Privacy-Enhancing Range Query Processing over Encrypted Cloud Databases. | 1 | 0.35 | 2015 |
A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences. | 0 | 0.34 | 2015 |
Literature Review of Spread Spectrum Signaling: Performance, Applications and Implementation. | 0 | 0.34 | 2015 |
A Preliminary Examination of the User Behavior in Query-by-Drawing Portrait Painting Search on Mobile Devices. | 0 | 0.34 | 2015 |
A novel Hessian based algorithm for rat kidney glomerulus detection in 3D MRI. | 0 | 0.34 | 2015 |
Determination of Aspect Ratio Limitations, Accuracy and Repeatability of a Laser Line Scanning CMM Probe. | 0 | 0.34 | 2015 |
Expressive and Secure Searchable Encryption in the Public Key Setting. | 1 | 0.35 | 2014 |
Impact of supply chain strategy on mass customisation implementation and effectiveness: evidence from China. | 0 | 0.34 | 2013 |
'A is for Art' - Draw Paintings in You Mind. | 0 | 0.34 | 2013 |
A Proof System in PADS. | 0 | 0.34 | 2013 |
Efficient Querying of Correlated Uncertain Data with Cached Results. | 0 | 0.34 | 2013 |
The Application of Corpus Tools in the Teaching of Discipline-Specific Academic Vocabulary: A Case Study for Information Engineering Undergraduates. | 0 | 0.34 | 2013 |