Ability-Based Asymmetrical Fitness Calculation Promotes Cooperation In Spatial Prisoner'S Dilemma Game | 0 | 0.34 | 2022 |
Segmentation with Residual Attention U-Net and an Edge-Enhancement Approach Preserves Cell Shape Features. | 0 | 0.34 | 2022 |
Matching the Medical Demand in the Context of Online Medical Consultation Data. | 0 | 0.34 | 2021 |
Service Deployment with Predictive Ability for Data Stream Processing in a Cloud-Edge Environment. | 0 | 0.34 | 2021 |
Detect Geographical Location By Multi-View Scene Matching | 0 | 0.34 | 2020 |
Using Discriminative Methods to Learn Fashion Compatibility Across Datasets. | 0 | 0.34 | 2019 |
An Improved Prediction Model for the Network Security Situation. | 0 | 0.34 | 2019 |
PPIDS - A Pyramid-Like Printer Intrusion Detection System Based on ATT&CK Framework. | 0 | 0.34 | 2019 |
Parsimonious Deep Learning: A Differential Inclusion Approach with Global Convergence. | 0 | 0.34 | 2019 |
Frequent Subtree Mining Algorithm for Ribonucleic Acid Topological Pattern. | 0 | 0.34 | 2019 |
MASC: Multi-scale Affinity with Sparse Convolution for 3D Instance Segmentation. | 5 | 0.39 | 2019 |
Exploring Multilingual Syntactic Sentence Representations. | 0 | 0.34 | 2019 |
L_1 -Regularized Continuous Conditional Random Fields. | 0 | 0.34 | 2016 |
From Attention to Citation, What and How Does Altmetrics Work? | 3 | 0.51 | 2014 |
Topologic and dynamic resilience model of Chinese airport network | 0 | 0.34 | 2014 |
"I Know U" - A Proposed VUI Design for Improving User Experience in HRI. | 1 | 0.39 | 2013 |
Games and Culture: Using Online-gaming Data to Cluster Chinese Regional Cultures. | 0 | 0.34 | 2013 |
Using Hardware Acceleration to Improve the Security of Wi-Fi Client Devices. | 0 | 0.34 | 2013 |
The WSN Real-Time Monitoring System for Agricultural Products Cold-Chain Logistics. | 1 | 0.36 | 2013 |
Workload characterization of cryptography algorithms for hardware acceleration (abstracts only) | 0 | 0.34 | 2011 |
The Performance Analysis and Hardware Acceleration of Crypto-computations for Enhanced Security | 0 | 0.34 | 2010 |
On Better Performance from Scheduling Threads According to Resource Demands in MMMP | 4 | 0.45 | 2010 |
A Hybrid Method for XML Clustering | 1 | 0.35 | 2010 |
A Real-time Interactive Tool for Image Cutout. | 0 | 0.34 | 2009 |
Automatic Generation of Host-Based Network Attack Graph | 1 | 0.34 | 2009 |
An Approach to Discover Dependencies between Service Operations | 3 | 0.40 | 2008 |
A DBOASTBC-OFDM system for wireless communications | 0 | 0.34 | 2008 |
A Programmable Frequency Divider in 0.18µm CMOS Library | 1 | 0.35 | 2008 |
Reifying Control of Multi-Owned Network Resources | 1 | 0.37 | 2007 |
"Service Hyperlink" for Exploratory Service Composition | 3 | 0.57 | 2007 |
An automated linguistic knowledge-based cross-language transfer method for building acoustic models for a language without native training data | 5 | 0.54 | 2005 |