標題: Titlebook: Neural Information Processing; 27th International C Haiqin Yang,Kitsuchart Pasupa,Irwin King Conference proceedings 2020 Springer Nature Sw [打印本頁] 作者: deflate 時間: 2025-3-21 18:14
書目名稱Neural Information Processing影響因子(影響力)
書目名稱Neural Information Processing影響因子(影響力)學科排名
書目名稱Neural Information Processing網絡公開度
書目名稱Neural Information Processing網絡公開度學科排名
書目名稱Neural Information Processing被引頻次
書目名稱Neural Information Processing被引頻次學科排名
書目名稱Neural Information Processing年度引用
書目名稱Neural Information Processing年度引用學科排名
書目名稱Neural Information Processing讀者反饋
書目名稱Neural Information Processing讀者反饋學科排名
作者: 細微的差異 時間: 2025-3-21 20:23 作者: 眨眼 時間: 2025-3-22 01:18 作者: 令人發(fā)膩 時間: 2025-3-22 04:35 作者: 失望未來 時間: 2025-3-22 11:26 作者: 揮舞 時間: 2025-3-22 13:47
gers an evolution of software development practices in a different way. Compared to classical methods, where products were developed in projects, contemporary methods for continuous integration, delivery, and deployment develop products as part of continuous programs. In this context, software archi作者: fringe 時間: 2025-3-22 19:08 作者: arrogant 時間: 2025-3-22 22:32
Kai Xue,Yiyu Ding,Zhirong Yang,Natasa Nord,Mael Roger Albert Barillec,Hans Martin Mathisen,Meng Liu,gers an evolution of software development practices in a different way. Compared to classical methods, where products were developed in projects, contemporary methods for continuous integration, delivery, and deployment develop products as part of continuous programs. In this context, software archi作者: 流眼淚 時間: 2025-3-23 01:24
Rasmita Panigrahi,Lov Kumar,Sanjay Kumar Kuanargers an evolution of software development practices in a different way. Compared to classical methods, where products were developed in projects, contemporary methods for continuous integration, delivery, and deployment develop products as part of continuous programs. In this context, software archi作者: SIT 時間: 2025-3-23 07:46
Junwen Di,Zhiguo Shigers an evolution of software development practices in a different way. Compared to classical methods, where products were developed in projects, contemporary methods for continuous integration, delivery, and deployment develop products as part of continuous programs. In this context, software archi作者: 極少 時間: 2025-3-23 11:07 作者: 健談的人 時間: 2025-3-23 15:38 作者: 祝賀 時間: 2025-3-23 20:06 作者: explicit 時間: 2025-3-23 22:40 作者: 提煉 時間: 2025-3-24 04:39 作者: SPALL 時間: 2025-3-24 07:06
Thin Nguyen,Duc Thanh Nguyen,Thuc Duy Le,Svetha Venkateshftware systems and extracting this knowledge requires processing the source code and reconstructing structure and dependency information. In analysis projects over the last years, we have created tools and services using graph databases for representing and analyzing source code and other software e作者: Chemotherapy 時間: 2025-3-24 13:11 作者: somnambulism 時間: 2025-3-24 17:01 作者: hemophilia 時間: 2025-3-24 21:07
Yifei Zhang,Neng Gao,Junsha Chen,Chenyang Tu,Jiong Wangs, while engineers actually work in parallel and distributed groups following a .-.-. (RTE) process. Unfortunately, the applied RTE process in PSE is coarse-grained, i.e., often data are exchanged via E-Mail and integrated seldom and inefficiently as the RTE process is not well supported by methods 作者: larder 時間: 2025-3-25 00:23 作者: 被告 時間: 2025-3-25 04:37 作者: Psa617 時間: 2025-3-25 10:43
Xiaoyuan Hu,Qing Xu,Yuejun Guoprojects, the number of changes that need to be integrated, and consequently the number of comments triggered during MCRs could be overwhelming. Therefore, there is a need for quickly recognizing which comments are concerning issues that need prompt attention to guide the focus of the code authors, 作者: 披肩 時間: 2025-3-25 12:29
Amina Ben Meriem,Lobna Hlaoua,Lotfi Ben Romdhaneprojects, the number of changes that need to be integrated, and consequently the number of comments triggered during MCRs could be overwhelming. Therefore, there is a need for quickly recognizing which comments are concerning issues that need prompt attention to guide the focus of the code authors, 作者: 神刊 時間: 2025-3-25 17:22 作者: –scent 時間: 2025-3-25 23:55
A Hybrid Representation of Word Images for Keyword Spottingcabulary (OOV) is frequently occurred in keyword spotting. Therefore, the problem of OOV keyword spotting is a challenging task. In this paper, a hybrid representation approach of word images has been presented to accomplish the aim of OOV keyword spotting. To be specific, a sequence to sequence mod作者: G-spot 時間: 2025-3-26 03:33
A Simple and Novel Method to Predict the Hospital Energy Use Based on Machine Learning: A Case Studyutilization and great variability of usage characteristic. With the development of machine learning techniques, it can offer opportunities for predicting the energy consumptions in hospital. With a case hospital building in Norway, through analyzing the characteristic of this building, this paper fo作者: 態(tài)度暖昧 時間: 2025-3-26 06:52 作者: 職業(yè)拳擊手 時間: 2025-3-26 10:55 作者: maculated 時間: 2025-3-26 14:04
Clustering Ensemble Selection with Analytic Hierarchy Process. The significance of base clustering is quantified by the average or weighted average of multiple evaluation indexes. However, there exist two limitations in these methods. First, the evaluation of base clusterings in the form of linear combination of multiple indexes lacks the structural analysis 作者: Libido 時間: 2025-3-26 18:00
Deep Learning for In-Vehicle Intrusion Detection Systemur safety directly. In this work, we propose a Deep CAN intrusion detection system framework. We introduce a multivariate time series representation for asynchronous CAN data which enhances the temporal modelling of deep learning architectures for anomaly detection. We study different deep learning 作者: Humble 時間: 2025-3-27 00:08
Efficient Binary Multi-view Subspace Learning for Instance-Level Image Retrievalrts are devoted to instance retrieval problem. Besides, although multi-view hashing methods are capable of exploring the complementarity among multiple heterogeneous visual features, they heavily rely on massive labeled training data, and somewhat affects the real-world applications. In this paper, 作者: 劇毒 時間: 2025-3-27 02:38
Hyper-Sphere Support Vector Classifier with Hybrid Decision Strategyfication accuracy. But real application data are very complicated and relationships between classification bounding spheres are very complicated too. Based on detailed analysis of relationships between bounding hyper-spheres, a hybrid decision strategy is put forward to solve classification problem 作者: 懸崖 時間: 2025-3-27 07:29 作者: 沉著 時間: 2025-3-27 09:42 作者: OVER 時間: 2025-3-27 13:47
Online Multi-objective Subspace Clustering for Streaming Dataustering is a technique where the subset of features that are used to represent a cluster are different for different clusters. Most of the streaming data clustering methods primarily optimize only a single objective function which limits the model in capturing only a particular shape or property. H作者: Supplement 時間: 2025-3-27 21:44
Predicting Information Diffusion Cascades Using Graph Attention Networksial recommendations on social platforms. This paper improves existing models and proposes an end-to-end deep learning method called CasGAT. The method of graph attention network is designed to optimize the processing of large networks. After that, we only need to pay attention to the characteristics作者: Invertebrate 時間: 2025-3-28 01:20 作者: 進取心 時間: 2025-3-28 05:01
Simultaneous Customer Segmentation and Behavior Discoverymed Simultaneous Customer Segmentation and Utility Discovery (UtSeg), to discover customer segmentation without knowing specific forms of utility functions and parameters. For the segmentation based on BNP models, the unknown type of functions is usually modeled as a non-homogeneous point process (N作者: 音樂會 時間: 2025-3-28 07:37
Structural Text Steganography Using Unseen Tag Attribute Values Aside from images, document files are one of the most exchanged attached content via electronic mailings. In this paper, we present a structural steganographic scheme based on unseen tag attribute values using office documents as the medium. Specifically, we use the XML file that builds the core of作者: 女上癮 時間: 2025-3-28 13:17
Trajectory Anomaly Detection Based on the Mean Distance Deviation the abnormal trajectory from many trajectories has become a hot issue. In order to study trajectory anomaly detection better, we analyze the Sequential conformal anomaly detection in trajectories based on hausdorff distance (SNN-CAD) method, and propose a new measurement method of trajectory distan作者: 中古 時間: 2025-3-28 15:26 作者: Monotonous 時間: 2025-3-28 22:15 作者: ethereal 時間: 2025-3-28 23:08
An Empirical Study to Investigate Different SMOTE Data Sampling Techniques for Improving Software Rects a set of software code metrics from object-oriented software systems, which are then processed for feature selection method to choose an appropriate sample set of features using Wilcoxon rank test. Once obtaining the optimal set of code-metrics, a novel ANN classifier using 5 different hidden la作者: 領帶 時間: 2025-3-29 04:43
Efficient Binary Multi-view Subspace Learning for Instance-Level Image Retrievalive optimization for learning a compact similarity-preserving binary code. The resulting binary codes demonstrate significant advantage in retrieval precision and computational efficiency at the cost of limited memory footprint. More importantly, our method is essentially an unsupervised learning sc作者: calorie 時間: 2025-3-29 10:56
Hyper-Sphere Support Vector Classifier with Hybrid Decision Strategy the intersection can be approximately linearly classified, new test samples can be classified by standard optimal binary-SVM hyper-plane. If training samples of two classes in the intersection cannot be linearly classified, new test samples can be decided by introducing kernel function to get optim作者: Evolve 時間: 2025-3-29 13:15
Knowledge Graph Embedding Based on Relevance and Inner Sequence of Relationste the effectiveness of the proposed KGERSR on standard FB15k-237 and WN18RR datasets, and it gives about 2% relative improvement over the state-of-the-art method in terms of .@1, and .@10. Furthermore, KGERSR has fewer parameters than ConmplEX and TransGate. These results indicate that our method c作者: DAMP 時間: 2025-3-29 17:21
MrPC: Causal Structure Learning in Distributed Systemsperimental results on benchmark datasets show that the proposed .gains up?to seven times faster than sequential . implementation. In addition, kernel functions outperform conventional linear causal modelling approach across different datasets.作者: mastopexy 時間: 2025-3-29 23:19
Online Multi-objective Subspace Clustering for Streaming Dataal subspace clusters. The generated clusters in the proposed method are allowed to contain overlapping of objects. To establish the superiority of using multiple objectives, the proposed method is evaluated on three real-life and three synthetic data sets. The results obtained by the proposed method作者: 全部 時間: 2025-3-30 02:02
PrivRec: User-Centric Differentially Private Collaborative Filtering Using LSH and KDe hashing (LSH) and the teacher-student knowledge distillation (KD) techniques. A teacher model is trained on the original user data without privacy constraints, and a student model learns from the hidden layers of the teacher model. The published student model is trained without access to the origi作者: 輕快來事 時間: 2025-3-30 06:22
Simultaneous Customer Segmentation and Behavior Discoveryistribution to improve efficiency. We tested our model with synthetic data and applied the framework to real-supermarket data with different products, and showed that our results can be interpreted with common knowledge.作者: RENAL 時間: 2025-3-30 09:55
Trajectory Anomaly Detection Based on the Mean Distance Deviationl measures mentioned above and under the framework of enhanced conformal prediction theory detection, we also build our own detector called Mean Distance Deviation Detector (MDD-ECAD). Using a large number of synthetic trajectory data and real world trajectory data on two detectors, the experimental作者: Foregery 時間: 2025-3-30 14:58 作者: intrigue 時間: 2025-3-30 18:46
pired SimSAX measure and clustering of subsequences (k-Means and Hierarchical clustering). Our results show that the clustering algorithms are much more sensitive to parameters and often find similarities that are not correct. SimSAX, on the other hand, can be calibrated to find fewer similarities b作者: 招待 時間: 2025-3-30 22:20 作者: 遠地點 時間: 2025-3-31 01:32
Hongxi Wei,Jing Zhang,Kexin Liupired SimSAX measure and clustering of subsequences (k-Means and Hierarchical clustering). Our results show that the clustering algorithms are much more sensitive to parameters and often find similarities that are not correct. SimSAX, on the other hand, can be calibrated to find fewer similarities b作者: 歸功于 時間: 2025-3-31 09:04
Kai Xue,Yiyu Ding,Zhirong Yang,Natasa Nord,Mael Roger Albert Barillec,Hans Martin Mathisen,Meng Liu,pired SimSAX measure and clustering of subsequences (k-Means and Hierarchical clustering). Our results show that the clustering algorithms are much more sensitive to parameters and often find similarities that are not correct. SimSAX, on the other hand, can be calibrated to find fewer similarities b作者: irritation 時間: 2025-3-31 13:06