Skip to main content

previous disabled Page of 24
and
  1. No Access

    Chapter and Conference Paper

    Predicting Future Spatio-Temporal States Using a Robust Causal Graph Attention Model

    Spatiotemporal prediction is a research topic in urban planning and management. Most existing spatiotemporal prediction models currently face challenges. More specifically, most prediction models are sensitive...

    Peixiao Wang, Hengcai Zhang, Feng Lu in Spatial Data and Intelligence (2024)

  2. No Access

    Chapter and Conference Paper

    Measurement and Research on the Conflict Between Residential Space and Tourism Space in Pianyan Ancient Township

    Studying spatial behavioral conflicts is the main method to understand the conflicts between tourists and residents. However, academic research on spatial conflict mostly involves urban macro-level discussions...

    Hong Hui, Lan Feng, Renjun Zhang in Spatial Data and Intelligence (2024)

  3. No Access

    Chapter and Conference Paper

    Smoke Segmentation Method Based on Super Pixel Segmentation and Convolutional Neural Network

    The steps of the fire disaster are from smokes to open flame. It has significant and practical meaning to use fixed camera stands to detect smoke. As the rapid development of AI in recent years the methods tha...

    Wang chengkun, Zhang **qiu, Yang jiale, Feng kaiyue in 6GN for Future Wireless Networks (2024)

  4. No Access

    Chapter and Conference Paper

    Roadside IRS Assisted Task Offloading in Vehicular Edge Computing Network

    Vehicular edge computing (VEC) has been recognized as a promising technique to process delay-sensitive vehicular applications. Nevertheless, in order to accommodate the rapid growth in the number of connected ...

    Yibin **e, Lei Shi, Zhehao Li, Xu Ding in Collaborative Computing: Networking, Appli… (2024)

  5. No Access

    Chapter and Conference Paper

    Joint Optimization of PAoI and Queue Backlog with Energy Constraints in LoRa Gateway Systems

    Peak Age of Information(PAoI), as a performance indicator representing the freshness of information, has attracted the attention of researchers in recent years. The data packet transmission rate in the LoRa ne...

    Lei Shi, Rui Ji, Zhen Wei, Shilong Feng in Collaborative Computing: Networking, Appli… (2024)

  6. No Access

    Chapter and Conference Paper

    Delay-Constrained Multicast Throughput Maximization in MEC Networks for High-Speed Railways

    Multi-access Edge Computing presents a compelling solution for delivering seamless connectivity to computing services. In this study, we aim to optimize multicast throughput to ensure high-quality experiences ...

    Junyi Xu, Zhenchun Wei, **aohui Yuan in Collaborative Computing: Networking, Appli… (2024)

  7. No Access

    Chapter and Conference Paper

    A Semi-supervised Learning Method for Malware Traffic Classification with Raw Bitmaps

    The rapid growth of malware and its variants has a significant detrimental effect on the security of the Internet infrastructure. In recent years, deep learning-based methods have demonstrated significant succ...

    **grun Ma, **aolin Xu, Tianning Zang in Collaborative Computing: Networking, Appli… (2024)

  8. No Access

    Chapter and Conference Paper

    Collaborative Decision-Making Processes Analysis of Service Ecosystem: A Case Study of Academic Ecosystem Involution

    With the collaboration of several intelligent services, a crowd intelligence service network has been formed, and a service ecosystem has gradually emerged. As a novel service organization model, the Service E...

    **angpei Yan, **ao Xue, Chao Peng in Collaborative Computing: Networking, Appli… (2024)

  9. No Access

    Chapter and Conference Paper

    Collaborative Task Processing and Resource Allocation Based on Multiple MEC Servers

    Mobile Edge Computing (MEC), an emerging computing paradigm, shifts computing and storage capabilities from the cloud to the network edge, aiming to meet the delay requirements of emerging applications and sav...

    Lei Shi, Shilong Feng, Rui Ji, Juan Xu in Collaborative Computing: Networking, Appli… (2024)

  10. No Access

    Chapter and Conference Paper

    Enhancing Session-Based Recommendation with Multi-granularity User Interest-Aware Graph Neural Networks

    Session-based recommendation aims at predicting the next interaction based on short-term behaviors within an anonymous session. Conventional session-based recommendation methods primarily focus on studying the...

    Cairong Yan, Yiwei Zhang, **angyang Feng in Collaborative Computing: Networking, Appli… (2024)

  11. No Access

    Chapter and Conference Paper

    Robustness-Enhanced Assertion Generation Method Based on Code Mutation and Attack Defense

    Writing high-quality unit tests plays a crucial role in discovering and diagnosing early-stage errors and preventing their further propagation throughout the development cycle. However, the low readability of ...

    Min Li, Shizhan Chen, Guodong Fan, Lu Zhang in Collaborative Computing: Networking, Appli… (2024)

  12. No Access

    Chapter and Conference Paper

    Balanced Graph Structure Information for Brain Disease Detection

    Analyzing connections between brain regions of interest (ROI) is vital to detect neurological disorders such as autism or schizophrenia. Recent advancements employ graph neural networks (GNNs) to utilize graph...

    Falih Gozi Febrinanto, Mujie Liu, Feng **a in Knowledge Management and Acquisition for I… (2023)

  13. No Access

    Chapter and Conference Paper

    Bridging the Research-Practice Gap in China’s Librarianship through Library Societies: A Pilot Study

    The integration of research and practice is the basic guarantee for librarianship, but there is still a research-practice gap in China’s librarianship. Library Society of China (LSC) is an important force to p...

    Wei Feng, Lihong Zhou in Information for a Better World: Normality,… (2023)

  14. No Access

    Chapter and Conference Paper

    Class Specialized Knowledge Distillation

    Knowledge Distillation (KD) is a compression framework that transfers distilled knowledge from a teacher to a smaller student model. KD approaches conventionally address problem domains where the teacher and s...

    Li-Yun Wang, Anthony Rhodes, Wu-chi Feng in Computer Vision – ACCV 2022 (2023)

  15. No Access

    Chapter and Conference Paper

    The Rural Informatization Policies in China: The Power Dynamics and Policy Instruments

    Rural informatization in China has developed rapidly in recent years. However, there are still significant differences in the rate of informatization of rural and urban areas resulting from the historical reso...

    **aoqian Zhang, Feng Yang, Yi Wan in Information for a Better World: Normality,… (2023)

  16. No Access

    Chapter and Conference Paper

    Multi-modal Segment Assemblage Network for Ad Video Editing with Importance-Coherence Reward

    Advertisement video editing aims to automatically edit advertising videos into shorter videos while retaining coherent content and crucial information conveyed by advertisers. It mainly contains two stages: vi...

    Yunlong Tang, Siting Xu, Teng Wang, Qin Lin, Qinglin Lu in Computer Vision – ACCV 2022 (2023)

  17. No Access

    Chapter and Conference Paper

    Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection

    Millions of radio frequency identification (RFID) tags are pervasively used all around the globe to identify a wide variety of objects inexpensively. However, the tag cannot use energy-hungry cryptography due ...

    Yue Feng, Weiqing Huang, Siye Wang in Collaborative Computing: Networking, Appli… (2022)

  18. No Access

    Chapter and Conference Paper

    An Adaptive Ensembled Neural Network-Based Approach to IoT Device Identification

    The Internet of Things (IoT) has developed rapidly in recent years and has been widely used in our daily life. An online report claimed that the connected IoT devices will reach the scale of 14.4 billion globa...

    **grun Ma, Yafei Sang, Yongzheng Zhang in Collaborative Computing: Networking, Appli… (2022)

  19. No Access

    Chapter and Conference Paper

    Cost Performance Driven Multi-request Allocation in D2D Service Provision Systems

    Device-to-Device (D2D) communication has emerged as a promising technique to cope with the increasing heavy traffic in mobile networks. A critical problem in D2D service is request allocation, which aims to fi...

    Dandan Li, Hongyue Wu, Shizhan Chen in Collaborative Computing: Networking, Appli… (2022)

  20. No Access

    Chapter and Conference Paper

    ITAR: A Method for Indoor RFID Trajectory Automatic Recovery

    With the increasing popularity of Radio Frequency Identification (RFID) technology, indoor applications based on RFID trajectory data analysis are becoming more and more extensive, such as personnel location, ...

    Ziwen Cao, Siye Wang, Degang Sun in Collaborative Computing: Networking, Appli… (2022)

previous disabled Page of 24