Initial Access for Millimeter-Wave and Terahertz Communications with Hybrid Beamforming | 0 | 0.34 | 2022 |
Data-Driven Modeling the Nonlinear Backlash of Steerable Endoscope Under a Large Deflection Cannulation in ERCP Surgery. | 0 | 0.34 | 2021 |
Design of a Novel High-Power Density Negative Ion Virus Destructor for Confined Shipboard Space. | 0 | 0.34 | 2021 |
Semi-supervised Attention-Guided VNet for Breast Cancer Detection via Multi-task Learning. | 0 | 0.34 | 2021 |
Mode Selection and Power Allocation for UAV-Assisted Cellular Networks. | 0 | 0.34 | 2021 |
Dynamic Popularity-Aware Contrastive Learning for Recommendation. | 0 | 0.34 | 2021 |
Multi-Agent Resource Allocation for NOMA-Based Broadcasting Vehicular Networks. | 0 | 0.34 | 2021 |
An Asynchronous Approximate Distributed Alternating Direction Method of Multipliers in Digraphs. | 0 | 0.34 | 2021 |
Decision-Based Marginal Diffusion For Salt-And-Pepper Noise Removal In Color Images | 0 | 0.34 | 2021 |
Battery Energy Storage Converter for Shipboard Energy Magazine System. | 0 | 0.34 | 2021 |
Short-term PM2.5 Forecasting with a Hybrid Model Based on Ensemble GRU Neural Network. | 0 | 0.34 | 2020 |
SUDA-Alibaba at MRP 2019 - Graph-Based Models with BERT. | 0 | 0.34 | 2019 |
Oscillation and The Suppression Strategy in Microgrid - A Review. | 0 | 0.34 | 2019 |
Analytical Derivatives for Differentiable Renderer: 3D Pose Estimation by Silhouette Consistency. | 0 | 0.34 | 2019 |
ShopSign: a Diverse Scene Text Dataset of Chinese Shop Signs in Street Views. | 0 | 0.34 | 2019 |
Improve Object Detection by Data Enhancement based on Generative Adversarial Nets. | 0 | 0.34 | 2019 |
A Dual-level Model Predictive Control Scheme for Multi-timescale Dynamical Systems. | 0 | 0.34 | 2019 |
A Seq-to-Seq Transformer Premised Temporal Convolutional Network for Chinese Word Segmentation. | 0 | 0.34 | 2019 |
Dynamic Characteristic Analysis and Stability Control of Microgrid. | 0 | 0.34 | 2019 |
一种云环境下的主机负载预测方法 (Workload Forecasting Method in Cloud). | 0 | 0.34 | 2018 |
AlignedReID: Surpassing Human-Level Performance in Person Re-Identification. | 11 | 0.65 | 2017 |
The offline software framework of the DAMPE experiment. | 0 | 0.34 | 2016 |
Study on Identification of Subjective Sentences in Product Reviews Based on Weekly Supervised Topic Model. | 0 | 0.34 | 2014 |
For User-Driven Software Evolution: Requirements Elicitation Derived from Mining Online Reviews. | 9 | 0.49 | 2014 |
What, where, and when: keyword search with spatio-temporal ranges | 6 | 0.44 | 2014 |
A Simplified Active Shape Model for Speeding-Up Facial Features Detection. | 0 | 0.34 | 2013 |
An Improved PAPR Suppression Algorithm based on Channel Coding in OFDM System. | 0 | 0.34 | 2013 |
A robust radio access technology classification scheme with practical considerations | 0 | 0.34 | 2013 |
Low-Complexity Spectral Precoding for Rectangularly Pulsed OFDM | 5 | 0.57 | 2012 |
Resource Allocation of Security-Critical Tasks with Statistically Guaranteed Energy Constraint | 9 | 0.56 | 2012 |
ARCSM: A Distributed Feedback Control Mechanism for Security-critical Real-time System | 0 | 0.34 | 2012 |
An enhanced random beamforming scheme for signal broadcasting in multi-antenna systems | 0 | 0.34 | 2012 |
Feedback Vertex Sets on Tree Convex Bipartite Graphs. | 7 | 0.56 | 2012 |
Design of Real Time Multimedia Platform and Protocol to the Internet of Things | 5 | 0.45 | 2012 |
Large-Scale Longitudinal Analysis of SOAP-Based and RESTful Web Services | 19 | 0.80 | 2012 |
Suppressing the out-of-band power radiation in multi-carrier systems: A comparative study | 3 | 0.43 | 2012 |
The Application of the Fuzzy Theory in the Design of Intelligent Building Control of Water Tank. | 4 | 0.60 | 2011 |
Ex-MATE: Data Intensive Computing with Large Reduction Objects and Its Application to Graph Mining | 8 | 0.53 | 2011 |
Energy Measurement and Analysis of Security Algorithms for Embedded Systems | 1 | 0.37 | 2011 |
QSynth: A Tool for QoS-aware Automatic Service Composition | 55 | 1.55 | 2010 |
Supporting fault tolerance in a data-intensive computing middleware | 10 | 0.57 | 2010 |
Periodic Real-Time Message Scheduling for Confidentiality-Aware Cyber-Physical System in Wireless Networks | 6 | 0.61 | 2010 |
Two-phase graph search algorithm for QoS-aware automatic service composition | 6 | 0.46 | 2010 |
An Implementation of Post-Processing Software in Quantum Key Distribution | 4 | 0.73 | 2009 |
Efficiency of Winnow Protocol in Secret Key Reconciliation | 5 | 0.70 | 2009 |
Effective Pruning Algorithm for QoS-Aware Service Composition | 34 | 1.32 | 2009 |
A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy | 13 | 1.07 | 2007 |