Skip to main content

previous disabled Page of 8
and
  1. No Access

    Chapter and Conference Paper

    Exploiting Spatial Attention and Contextual Information for Document Image Segmentation

    We propose a new framework of combining an attention mechanism with a conditional random field to deal with a document image segmentation task. The framework aims to recognize homogeneous regions, e.g. text, f...

    Yuman Sang, Yifeng Zeng, Ruiying Liu in Advances in Knowledge Discovery and Data M… (2022)

  2. No Access

    Chapter and Conference Paper

    Bi-granularity Adversarial Training for Non-factoid Answer Retrieval

    Answer Retrieval is a task of automatically retrieving relevant answers towards a specific question. The recent studies, in this field, have witnessed the vast success of non-factoid QA methods which leverage ...

    Zhiling **, Yu Hong, Hongyu Zhu, Jianmin Yao in Advances in Information Retrieval (2022)

  3. No Access

    Chapter and Conference Paper

    \(\mathbb {PSG}\) : Local Privacy Preserving Synthetic Social Graph Generation

    Social graph, as a representation of the network topology, contains users’ social relationship. In order to obtain a social graph, a server requires users to submit their relationships. As we know, using or pu...

    Hongyu Huang, Yao Yang, Yantao Li in Collaborative Computing: Networking, Appli… (2021)

  4. No Access

    Chapter and Conference Paper

    Location Differential Privacy Protection in Task Allocation for Mobile Crowdsensing Over Road Networks

    Mobile Crowdsensing (MCS) platforms often require workers to provide their locations for task allocation, which may cause privacy leakage

    Mohan Fang, Juan Yu, Jianmin Han, **n Yao in Collaborative Computing: Networking, Appli… (2021)

  5. No Access

    Chapter and Conference Paper

    Loopster++: Termination Analysis for Multi-path Linear Loop

    Loop structure is widely adopted in many applications, e.g. collaborative applications, social network applications, and edge computing. And the termination of the loop is of great significance to the correctness...

    Hui **, Weimin Ge, Yao Zhang, **aohong Li in Collaborative Computing: Networking, Appli… (2021)

  6. No Access

    Chapter and Conference Paper

    Clustering Study of Crowdsourced Test Report with Multi-source Heterogeneous Information

    Crowdsourced testing is an emerging testing method in the field of software testing and industrial practice. Crowdsourced testing can provide a more realistic user experience. But crowdsourced workers are inde...

    Yan Yang, **angjuan Yao, Dunwei Gong in Data Mining and Big Data (2019)

  7. No Access

    Chapter

    A Data Services Composition Approach for Continuous Query on Social Media Streams

    We witness a rapid increase in the number of social media streams due to development of Web2.0, IoT and Cloud Computing technology. These sources include both traditional relational databases and streaming dat...

    Guiling Wang, **aojiang Zuo, Marc Hesenius in Transactions on Large-Scale Data- and Know… (2019)

  8. No Access

    Chapter and Conference Paper

    Learning to Fuse Multiple Semantic Aspects from Rich Texts for Stock Price Prediction

    Stock price prediction is challenging due to the non-stationary fluctuation of stock price, which can be influenced by the stochastic trading behaviors in the market. In recent years, researchers have focused ...

    Ning Tang, Yanyan Shen, Junjie Yao in Web Information Systems Engineering – WISE 2019 (2019)

  9. Chapter and Conference Paper

    Classifying Quality Centrality for Source Localization in Social Networks

    Source localization, the process of estimating the originator of an epidemic outbreak or rumor propagation in a network, is an important issue in epidemiology and sociology. With the graph topology of the unde...

    Yao Yao, ** **ao, Cheng** Zhang, Shutao **a in Web Services – ICWS 2018 (2018)

  10. No Access

    Chapter and Conference Paper

    Model and Practice of Crowd-Based Education

    Based on connectivism pedagogy crowd-based education provides a practical method to extensively exploit wisdoms of core learners in education organization and external crowds on Internet. However, when applyin...

    **njun Mao, Yao Lu, Liangze Yin, Tao Wang, Gang Yin in Web and Big Data (2018)

  11. No Access

    Chapter and Conference Paper

    Personalized Item-of-Interest Recommendation on Storage Constrained Smartphone Based on Word Embedding Quantization

    In recent years, word embedding models receive tremendous research attentions due to their capability of capturing textual semantics. This study investigates the issue of employing word embedding models into r...

    Si-Ying Huang, Yung-Yu Chen, Hung-Yuan Chen in Advances in Knowledge Discovery and Data M… (2018)

  12. No Access

    Chapter and Conference Paper

    Sub2Vec: Feature Learning for Subgraphs

    Network embeddings have become very popular in learning effective feature representations of networks. Motivated by the recent successes of embeddings in natural language processing, researchers have tried to ...

    Bijaya Adhikari, Yao Zhang in Advances in Knowledge Discovery and Data M… (2018)

  13. No Access

    Chapter and Conference Paper

    Processing Missing Information in Big Data Environment

    How to handle missing information is essential for system efficiency and robustness in the field of the database. Missing information in big data environment tends to have richer semantics, leading to more com...

    Yuxin Chen, Shun Li, Jiahui Yao in Data Mining and Big Data (2018)

  14. No Access

    Chapter and Conference Paper

    Mining POI Alias from Microblog Conversations

    In location-based analysis for microblogs, it is important to know if two toponyms refer to the same point-of-interest, i.e., alias. However, existing online knowledge bases are often incomplete or inaccurate ...

    Yihong Zhang, Lina Yao in Advances in Knowledge Discovery and Data Mining (2018)

  15. No Access

    Chapter and Conference Paper

    Data-Augmented Regression with Generative Convolutional Network

    Generative adversarial networks (GAN)-based approaches have been extensively investigated whereas GAN-inspired regression (i.e., numeric prediction) has rarely been studied in image and video processing domain...

    **aodong Ning, Lina Yao, **anzhi Wang in Web Information Systems Engineering – WISE… (2018)

  16. No Access

    Chapter and Conference Paper

    Cross-Scenario Inference Based Event-Event Relation Detection

    Event-Event Relation Detection (RD \(_{2e}\) ) aims to detect the relations between a pair of news events, su...

    Yu Hong, **gli Zhang, Rui Song, Jianmin Yao in Natural Language Processing and Chinese Co… (2018)

  17. No Access

    Chapter and Conference Paper

    Causal Discovery with Bayesian Networks Inductive Transfer

    Bayesian networks (BNs) is a dominate model for representing causal knowledge with uncertainty. Causal discovery with BNs requiring large amount of training data for learning BNs structure. When confronted wit...

    Haiyang Jia, Zuoxi Wu, Juan Chen in Knowledge Science, Engineering and Managem… (2018)

  18. No Access

    Chapter and Conference Paper

    \(R^2\) -Tree: An Efficient Indexing Scheme for Server-Centric Data Center Networks

    Index plays a very important role in cloud storage systems, which can support efficient querying tasks for data-intensive applications. However, most of existing indexing schemes for data centers focus on one ...

    Yin Lin, **nyi Chen, **aofeng Gao, Bin Yao in Database and Expert Systems Applications (2018)

  19. No Access

    Chapter and Conference Paper

    Community Structure Based Shortest Path Finding for Social Networks

    With the rapid expansion of communication data, research about analyzing social networks has become a hotspot. Finding the shortest path (SP) in social networks can help us to investigate the potential social ...

    Yale Chai, Chunyao Song, Peng Nie, **aojie Yuan in Database and Expert Systems Applications (2018)

  20. No Access

    Chapter and Conference Paper

    Cost-Sensitive Reference Pair Encoding for Multi-Label Learning

    Label space expansion for multi-label classification (MLC) is a methodology that encodes the original label vectors to higher dimensional codes before training and decodes the predicted codes back to the label...

    Yao-Yuan Yang, Kuan-Hao Huang in Advances in Knowledge Discovery and Data M… (2018)

previous disabled Page of 8