All Stories

  1. Effects of wind speed and wind direction on crop yield forecasting using dynamic time warping and an ensembled learning model
  2. CoBjeason: Reasoning Covered Object in Image by Multi-Agent Collaboration Based on Informed Knowledge Graph
  3. FuFaction: Fuzzy Factual Inconsistency Correction on Crowdsourced Documents With Hybrid-Mask at the Hidden-State Level
  4. KGCDP-T: Interpreting knowledge graphs into text by content ordering and dynamic planning with three-level reconstruction
  5. MOFC: Network Embedding Based on Multi-Orders Friends Contribution for User Identification
  6. A Three-Stage Transferable and Generative Crowdsourced Comment Integration Framework Based on Zero-and-Few-Shot Learning with Domain Distribution Alignment
  7. Multivariate spatio-temporal modeling of drought prediction using graph neural network
  8. SPK-CG: Siamese Network based Posterior Knowledge Selection Model for Knowledge Driven Conversation Generation
  9. Joint Syntax-Enhanced and Topic-Driven Graph Networks for Emotion Recognition in Multi-Speaker Conversations
  10. Fuzzy theory and method for evaluating the importance of college course teaching for future education
  11. A Personalized Multi-Turn Generation-Based Chatbot with Various-Persona-Distribution Data
  12. A Rearrangement and Restore Mixer Model for Target-Oriented Multimodal Sentiment Classification
  13. ATFSAD: Enhancing Long Sequence Time-Series Forecasting on Air Temperature Prediction
  14. Affective Region Recognition and Fusion Network for Target-Level Multimodal Sentiment Classification
  15. GCMA: An Adaptive Multi-Agent Reinforcement Learning Framework With Group Communication for Complex and Similar Tasks Coordination
  16. Hierarchical Coordination Multi-Agent Reinforcement Learning With Spatio-Temporal Abstraction
  17. Extraction of Winter Wheat Planting Area Based on Multi-Scale Fusion
  18. A Unified Dialogue Framework Based on Joint Generation of Dialogue Acts and Responses
  19. Source-free Unsupervised Domain Adaptation with Trusted Pseudo Samples
  20. A Novel Generative Model for Face Privacy Protection in Video Surveillance with Utility Maintenance
  21. T-BERTSum: Topic-Aware Text Summarization Based on BERT
  22. Rule Fusion of Privacy Protection Strategies for Co-Ownership Data Sharing
  23. A Self-Play and Sentiment-Emphasized Comment Integration Framework Based on Deep Q-Learning in a Crowdsourcing Scenario
  24. A Novel Sentiment Polarity Detection Framework for Chinese
  25. A Trajectory Privacy Protection Method Based on Random Sampling Differential Privacy
  26. Aggregated squeeze-and-excitation transformations for densely connected convolutional networks
  27. Bi-Tier Differential Privacy for Precise Auction-Based People-Centric IoT Service
  28. Graph classification algorithm based on graph structure embedding
  29. The Impact of Weighting Schemes and Stemming Process on Topic Modeling of Arabic Long and Short Texts
  30. Community Detection Based on DeepWalk Model in Large-Scale Networks
  31. Multiple clustering and selecting algorithms with combining strategy for selective clustering ensemble
  32. Smartphone Architecture for Edge-Centric IoT Analytics
  33. The Research on Covert Communication Model Based on Blockchain: A Case Study of Ethereum’s Whisper Protocol
  34. Evaluation of the Rossby Centre Regional Climate Model Rainfall Simulations over West Africa Using Large-Scale Spatial and Temporal Statistical Metrics
  35. Deep rolling: A novel emotion prediction model for a multi-participant communication context
  36. PPSDT: A Novel Privacy-Preserving Single Decision Tree Algorithm for Clinical Decision-Support Systems Using IoT Devices
  37. Natural disaster topic extraction in Sina microblogging based on graph analysis
  38. $\mathcal{K}$ -Lowest-Influence Overlapping Nodes Based Community Detection in Complex Networks
  39. A New Method of Privacy Protection: Random k-Anonymous
  40. Ordinal space projection learning via neighbor classes representation
  41. Graph classification based on graph set reconstruction and graph kernel feature reduction
  42. Protection of location privacy for moving k NN queries in social networks
  43. A comparative study of clustering ensemble algorithms
  44. Weighted Greedy Dual Size Frequency Based Caching Replacement Algorithm
  45. An Improved Web Cache Replacement Algorithm Based on Weighting and Cost
  46. A Comparative Study of Subgraph Matching Isomorphic Methods in Social Networks
  47. A Self-Adaptive Fireworks Algorithm for Classification Problems
  48. Friends Classification of Ego Network Based on Combined Features
  49. Improved FIFO Scheduling Algorithm Based on Fuzzy Clustering in Cloud Computing
  50. A novel subgraph $$K^{+}$$ K + -isomorphi...
  51. Augmenting matrix factorization technique with the combination of tags and genres
  52. LED: A fast overlapping communities detection algorithm based on structural clustering
  53. An efficient and scalable density-based clustering algorithm for datasets with complex structures
  54. K-anonymisation of social network by vertex and edge modification
  55. Weighted curvature-preserving PDE image filtering method
  56. $$\varvec{\textit{KDVEM}}$$ KDVEM : a $$k$$ k -degree anonymity with vertex and edge modification algorithm
  57. Chi-square Statistics Feature Selection Based on Term Frequency and Distribution for Text Categorization
  58. Detect structural-connected communities based on BSCHEF in C-DBLP
  59. Social Network and Tag Sources Based Augmenting Collaborative Recommender System
  60. The performance research of artificial bee colony algorithm on the large scale global optimisation problems
  61. Optimized Laplacian image sharpening algorithm based on graphic processing unit
  62. Information Quantity Based Automatic Reconstruction of Shredded Chinese Documents
  63. A Hybrid Evolutionary Algorithm for Numerical Optimization Problem
  64. Detecting potential labeling errors for bioinformatics by multiple voting
  65. Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration
  66. Improved locality-sensitive hashing method for the approximate nearest neighbor problem
  67. Entropy Based Personal Privacy Measurement in Ubiquitous Computing
  68. A Survey of Privacy Preserving Data Publishing using Generalization and Suppression
  69. The performance improvements of highly-concurrent grid-based server
  70. Data resource discovery model based on hybrid architecture in data grid environment
  71. Resource Allocation and Scheduling in Cloud Computing: Policy and Algorithm
  72. A Replica Selection Algorithm in Data Grid
  73. Implementation of the Fuzzy C-Means Clustering Algorithm in Meteorological Data
  74. Analyzing on the Failure Mode of BFNNs' Learning and its Improving Algorithm
  75. Replica creation strategy based on quantum evolutionary algorithm in data gird
  76. XML Data Cube Based on Tree Structure
  77. Using DNA Soft Computing with Molecular Beacon to Solve Hamilton Circuit Problem
  78. Emerging Technologies for Information Systems, Computing, and Management
  79. Training Pool Selection for Semi-supervised Learning
  80. Review on Grid Resource Discovery: Models and Strategies
  81. Real time services for future cloud computing enabled vehicle networks
  82. Quantizing Personal Privacy in Ubiquitous Computing
  83. A Comparative Study of Quantum Evolutionary Algorithm and Particle Swarm Optimization for Numerical Optimization Problems
  84. Welcome
  85. High Performance Computing Model for Processing Meteorological Data in Cluster System
  86. Review of Sensor-based Activity Recognition Systems
  87. Privacy preserving in ubiquitous computing: Classification & hierarchy
  88. Multiparty Simultaneous Quantum Secure Direct Communication Based on GHZ States and Mutual Authentication
  89. Grid Task Scheduling: Algorithm Review
  90. Combining active learning and semi-supervised for improving learning performance
  91. An energy efficient and load balancing routing algorithm for wireless sensor networks
  92. A survey on grid task scheduling
  93. Weather data sharing system: an agent-based distributed data management
  94. Virtual Resource Management Based Meteorological Computational Grid
  95. Construction of national meteorological computational Grid
  96. Design and Implementation of Virtual Resources Management in Meteorology Grid
  97. Study on the usage of virtual resource management technologies in meteorological computational Grid
  98. Privacy preserving based on association rule mining
  99. Full-scale privacy preserving for association rule mining
  100. New Parallel Three-level Iterative Method for Diffusion Equation
  101. Enlarge the Training Data for Activity Recognition
  102. An Agei Method for Solving Four-Order Diffusion Equations
  103. New Finite Difference Domain Decomposition Algorithms for Two-Dimensional Heat Equation
  104. Research on Index Technology for Group-by Aggregation Query in XML Cube
  105. Distributed Fault Detection for Wireless Sensor Based on Weighted Average
  106. Study and Implementation of Chinese Intelligent Question Answering System Based on Restricted Domain
  107. Architecture of Collaborative Design Based on Grid
  108. The Empirical Impact of Internal Knowledge Structure on the Endogenous Industrial Clusters Innovation
  109. An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication
  110. Inducing Positive and Negative Rules Based on Rough Set
  111. Privacy Preserving in Ubiquitous Computing: Architecture
  112. Research of Collaborative Model for Disaster Case Management Based on Doppler Weather Radar
  113. Design and Implementation of National Meteorological Computing Resource Management System Based on Grid
  114. Efficient Deterministic Secure Quantum Communication with Cluster State
  115. Design and Research of Grid Resource Collaboration Model Based on Facilitator Role
  116. An Efficient Deterministic Secure Quantum Communication Scheme with W State
  117. SensorGrid-Based Radiation Detection System in High Energy Physics
  118. Sharing Weather Data in an Agent-based Distributed Platform
  119. Privacy Preserving in Ubiquitous Computing: Challenges & Issues
  120. Evaluation of High-tech Program Based on Rough Set Theory
  121. Weighted Rough Set Model
  122. Context-aware implementation based on CBR for smart home