派博傳思國際中心

標題: Titlebook: Neural Information Processing; 27th International C Haiqin Yang,Kitsuchart Pasupa,Irwin King Conference proceedings 2020 Springer Nature Sw [打印本頁]

作者: deflate    時間: 2025-3-21 18:14
書目名稱Neural Information Processing影響因子(影響力)




書目名稱Neural Information Processing影響因子(影響力)學科排名




書目名稱Neural Information Processing網絡公開度




書目名稱Neural Information Processing網絡公開度學科排名




書目名稱Neural Information Processing被引頻次




書目名稱Neural Information Processing被引頻次學科排名




書目名稱Neural Information Processing年度引用




書目名稱Neural Information Processing年度引用學科排名




書目名稱Neural Information Processing讀者反饋




書目名稱Neural Information Processing讀者反饋學科排名





作者: 細微的差異    時間: 2025-3-21 20:23

作者: 眨眼    時間: 2025-3-22 01:18

作者: 令人發(fā)膩    時間: 2025-3-22 04:35

作者: 失望未來    時間: 2025-3-22 11:26

作者: 揮舞    時間: 2025-3-22 13:47
gers an evolution of software development practices in a different way. Compared to classical methods, where products were developed in projects, contemporary methods for continuous integration, delivery, and deployment develop products as part of continuous programs. In this context, software archi
作者: fringe    時間: 2025-3-22 19:08

作者: arrogant    時間: 2025-3-22 22:32
Kai Xue,Yiyu Ding,Zhirong Yang,Natasa Nord,Mael Roger Albert Barillec,Hans Martin Mathisen,Meng Liu,gers an evolution of software development practices in a different way. Compared to classical methods, where products were developed in projects, contemporary methods for continuous integration, delivery, and deployment develop products as part of continuous programs. In this context, software archi
作者: 流眼淚    時間: 2025-3-23 01:24
Rasmita Panigrahi,Lov Kumar,Sanjay Kumar Kuanargers an evolution of software development practices in a different way. Compared to classical methods, where products were developed in projects, contemporary methods for continuous integration, delivery, and deployment develop products as part of continuous programs. In this context, software archi
作者: SIT    時間: 2025-3-23 07:46
Junwen Di,Zhiguo Shigers an evolution of software development practices in a different way. Compared to classical methods, where products were developed in projects, contemporary methods for continuous integration, delivery, and deployment develop products as part of continuous programs. In this context, software archi
作者: 極少    時間: 2025-3-23 11:07

作者: 健談的人    時間: 2025-3-23 15:38

作者: 祝賀    時間: 2025-3-23 20:06

作者: explicit    時間: 2025-3-23 22:40

作者: 提煉    時間: 2025-3-24 04:39

作者: SPALL    時間: 2025-3-24 07:06
Thin Nguyen,Duc Thanh Nguyen,Thuc Duy Le,Svetha Venkateshftware systems and extracting this knowledge requires processing the source code and reconstructing structure and dependency information. In analysis projects over the last years, we have created tools and services using graph databases for representing and analyzing source code and other software e
作者: Chemotherapy    時間: 2025-3-24 13:11

作者: somnambulism    時間: 2025-3-24 17:01

作者: hemophilia    時間: 2025-3-24 21:07
Yifei Zhang,Neng Gao,Junsha Chen,Chenyang Tu,Jiong Wangs, while engineers actually work in parallel and distributed groups following a .-.-. (RTE) process. Unfortunately, the applied RTE process in PSE is coarse-grained, i.e., often data are exchanged via E-Mail and integrated seldom and inefficiently as the RTE process is not well supported by methods
作者: larder    時間: 2025-3-25 00:23

作者: 被告    時間: 2025-3-25 04:37

作者: Psa617    時間: 2025-3-25 10:43
Xiaoyuan Hu,Qing Xu,Yuejun Guoprojects, the number of changes that need to be integrated, and consequently the number of comments triggered during MCRs could be overwhelming. Therefore, there is a need for quickly recognizing which comments are concerning issues that need prompt attention to guide the focus of the code authors,
作者: 披肩    時間: 2025-3-25 12:29
Amina Ben Meriem,Lobna Hlaoua,Lotfi Ben Romdhaneprojects, the number of changes that need to be integrated, and consequently the number of comments triggered during MCRs could be overwhelming. Therefore, there is a need for quickly recognizing which comments are concerning issues that need prompt attention to guide the focus of the code authors,
作者: 神刊    時間: 2025-3-25 17:22

作者: –scent    時間: 2025-3-25 23:55
A Hybrid Representation of Word Images for Keyword Spottingcabulary (OOV) is frequently occurred in keyword spotting. Therefore, the problem of OOV keyword spotting is a challenging task. In this paper, a hybrid representation approach of word images has been presented to accomplish the aim of OOV keyword spotting. To be specific, a sequence to sequence mod
作者: G-spot    時間: 2025-3-26 03:33
A Simple and Novel Method to Predict the Hospital Energy Use Based on Machine Learning: A Case Studyutilization and great variability of usage characteristic. With the development of machine learning techniques, it can offer opportunities for predicting the energy consumptions in hospital. With a case hospital building in Norway, through analyzing the characteristic of this building, this paper fo
作者: 態(tài)度暖昧    時間: 2025-3-26 06:52

作者: 職業(yè)拳擊手    時間: 2025-3-26 10:55

作者: maculated    時間: 2025-3-26 14:04
Clustering Ensemble Selection with Analytic Hierarchy Process. The significance of base clustering is quantified by the average or weighted average of multiple evaluation indexes. However, there exist two limitations in these methods. First, the evaluation of base clusterings in the form of linear combination of multiple indexes lacks the structural analysis
作者: Libido    時間: 2025-3-26 18:00
Deep Learning for In-Vehicle Intrusion Detection Systemur safety directly. In this work, we propose a Deep CAN intrusion detection system framework. We introduce a multivariate time series representation for asynchronous CAN data which enhances the temporal modelling of deep learning architectures for anomaly detection. We study different deep learning
作者: Humble    時間: 2025-3-27 00:08
Efficient Binary Multi-view Subspace Learning for Instance-Level Image Retrievalrts are devoted to instance retrieval problem. Besides, although multi-view hashing methods are capable of exploring the complementarity among multiple heterogeneous visual features, they heavily rely on massive labeled training data, and somewhat affects the real-world applications. In this paper,
作者: 劇毒    時間: 2025-3-27 02:38
Hyper-Sphere Support Vector Classifier with Hybrid Decision Strategyfication accuracy. But real application data are very complicated and relationships between classification bounding spheres are very complicated too. Based on detailed analysis of relationships between bounding hyper-spheres, a hybrid decision strategy is put forward to solve classification problem
作者: 懸崖    時間: 2025-3-27 07:29

作者: 沉著    時間: 2025-3-27 09:42

作者: OVER    時間: 2025-3-27 13:47
Online Multi-objective Subspace Clustering for Streaming Dataustering is a technique where the subset of features that are used to represent a cluster are different for different clusters. Most of the streaming data clustering methods primarily optimize only a single objective function which limits the model in capturing only a particular shape or property. H
作者: Supplement    時間: 2025-3-27 21:44
Predicting Information Diffusion Cascades Using Graph Attention Networksial recommendations on social platforms. This paper improves existing models and proposes an end-to-end deep learning method called CasGAT. The method of graph attention network is designed to optimize the processing of large networks. After that, we only need to pay attention to the characteristics
作者: Invertebrate    時間: 2025-3-28 01:20

作者: 進取心    時間: 2025-3-28 05:01
Simultaneous Customer Segmentation and Behavior Discoverymed Simultaneous Customer Segmentation and Utility Discovery (UtSeg), to discover customer segmentation without knowing specific forms of utility functions and parameters. For the segmentation based on BNP models, the unknown type of functions is usually modeled as a non-homogeneous point process (N
作者: 音樂會    時間: 2025-3-28 07:37
Structural Text Steganography Using Unseen Tag Attribute Values Aside from images, document files are one of the most exchanged attached content via electronic mailings. In this paper, we present a structural steganographic scheme based on unseen tag attribute values using office documents as the medium. Specifically, we use the XML file that builds the core of
作者: 女上癮    時間: 2025-3-28 13:17
Trajectory Anomaly Detection Based on the Mean Distance Deviation the abnormal trajectory from many trajectories has become a hot issue. In order to study trajectory anomaly detection better, we analyze the Sequential conformal anomaly detection in trajectories based on hausdorff distance (SNN-CAD) method, and propose a new measurement method of trajectory distan
作者: 中古    時間: 2025-3-28 15:26

作者: Monotonous    時間: 2025-3-28 22:15

作者: ethereal    時間: 2025-3-28 23:08
An Empirical Study to Investigate Different SMOTE Data Sampling Techniques for Improving Software Rects a set of software code metrics from object-oriented software systems, which are then processed for feature selection method to choose an appropriate sample set of features using Wilcoxon rank test. Once obtaining the optimal set of code-metrics, a novel ANN classifier using 5 different hidden la
作者: 領帶    時間: 2025-3-29 04:43
Efficient Binary Multi-view Subspace Learning for Instance-Level Image Retrievalive optimization for learning a compact similarity-preserving binary code. The resulting binary codes demonstrate significant advantage in retrieval precision and computational efficiency at the cost of limited memory footprint. More importantly, our method is essentially an unsupervised learning sc
作者: calorie    時間: 2025-3-29 10:56
Hyper-Sphere Support Vector Classifier with Hybrid Decision Strategy the intersection can be approximately linearly classified, new test samples can be classified by standard optimal binary-SVM hyper-plane. If training samples of two classes in the intersection cannot be linearly classified, new test samples can be decided by introducing kernel function to get optim
作者: Evolve    時間: 2025-3-29 13:15
Knowledge Graph Embedding Based on Relevance and Inner Sequence of Relationste the effectiveness of the proposed KGERSR on standard FB15k-237 and WN18RR datasets, and it gives about 2% relative improvement over the state-of-the-art method in terms of .@1, and .@10. Furthermore, KGERSR has fewer parameters than ConmplEX and TransGate. These results indicate that our method c
作者: DAMP    時間: 2025-3-29 17:21
MrPC: Causal Structure Learning in Distributed Systemsperimental results on benchmark datasets show that the proposed .gains up?to seven times faster than sequential . implementation. In addition, kernel functions outperform conventional linear causal modelling approach across different datasets.
作者: mastopexy    時間: 2025-3-29 23:19
Online Multi-objective Subspace Clustering for Streaming Dataal subspace clusters. The generated clusters in the proposed method are allowed to contain overlapping of objects. To establish the superiority of using multiple objectives, the proposed method is evaluated on three real-life and three synthetic data sets. The results obtained by the proposed method
作者: 全部    時間: 2025-3-30 02:02
PrivRec: User-Centric Differentially Private Collaborative Filtering Using LSH and KDe hashing (LSH) and the teacher-student knowledge distillation (KD) techniques. A teacher model is trained on the original user data without privacy constraints, and a student model learns from the hidden layers of the teacher model. The published student model is trained without access to the origi
作者: 輕快來事    時間: 2025-3-30 06:22
Simultaneous Customer Segmentation and Behavior Discoveryistribution to improve efficiency. We tested our model with synthetic data and applied the framework to real-supermarket data with different products, and showed that our results can be interpreted with common knowledge.
作者: RENAL    時間: 2025-3-30 09:55
Trajectory Anomaly Detection Based on the Mean Distance Deviationl measures mentioned above and under the framework of enhanced conformal prediction theory detection, we also build our own detector called Mean Distance Deviation Detector (MDD-ECAD). Using a large number of synthetic trajectory data and real world trajectory data on two detectors, the experimental
作者: Foregery    時間: 2025-3-30 14:58

作者: intrigue    時間: 2025-3-30 18:46
pired SimSAX measure and clustering of subsequences (k-Means and Hierarchical clustering). Our results show that the clustering algorithms are much more sensitive to parameters and often find similarities that are not correct. SimSAX, on the other hand, can be calibrated to find fewer similarities b
作者: 招待    時間: 2025-3-30 22:20

作者: 遠地點    時間: 2025-3-31 01:32
Hongxi Wei,Jing Zhang,Kexin Liupired SimSAX measure and clustering of subsequences (k-Means and Hierarchical clustering). Our results show that the clustering algorithms are much more sensitive to parameters and often find similarities that are not correct. SimSAX, on the other hand, can be calibrated to find fewer similarities b
作者: 歸功于    時間: 2025-3-31 09:04
Kai Xue,Yiyu Ding,Zhirong Yang,Natasa Nord,Mael Roger Albert Barillec,Hans Martin Mathisen,Meng Liu,pired SimSAX measure and clustering of subsequences (k-Means and Hierarchical clustering). Our results show that the clustering algorithms are much more sensitive to parameters and often find similarities that are not correct. SimSAX, on the other hand, can be calibrated to find fewer similarities b
作者: irritation    時間: 2025-3-31 13:06





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
巴南区| 泰兴市| 商洛市| 万荣县| 城固县| 颍上县| 长治县| 赫章县| 上饶市| 铜鼓县| 永顺县| 莒南县| 金华市| 若羌县| 永顺县| 赣榆县| 深泽县| 六盘水市| 巴东县| 建阳市| 山东| 德阳市| 民和| 澄江县| 梧州市| 石楼县| 丰都县| 高雄市| 四会市| 彭泽县| 潜山县| 泌阳县| 临猗县| 凤翔县| 商城县| 肇州县| 临泽县| 茶陵县| 安多县| 沂源县| 荣昌县|