Skip to main content

and
Your search also matched 344 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Specifying communicating systems with temporal logic

Include preview-only content
  1. Chapter and Conference Paper

    Information Service System For Small Forestowners

    Individual owned forests have boomed in the last decade in China. Hundreds of millions of private forest owners have emerged since years of afforestation practice and collective forest ownership reform. Most o...

    Shaochen Zhang, Yun Li in Computer and Computing Technologies in Agriculture II, Volume 3 (2009)

  2. Chapter and Conference Paper

    Small-Scale Evaluation of Tobacco Planting Suitability Based on Spatial Information Technology

    Crop planting suitability evaluation is important for agricultural production. In this study, a comprehensive evaluation framework which combined geographical information system, remote sensing, global positio...

    Fengrui Chen, Guangxiong Peng, Wei Su in Computer and Computing Technologies in Agr… (2012)

  3. Chapter and Conference Paper

    Deep CORAL: Correlation Alignment for Deep Domain Adaptation

    Deep neural networks are able to learn powerful representations from large quantities of labeled input data, however they cannot always generalize well across changes in input distributions. Domain adaptation ...

    Baochen Sun, Kate Saenko in Computer Vision – ECCV 2016 Workshops (2016)

  4. Chapter and Conference Paper

    MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage

    Outsourcing data to are remote cloud service provider allows organizations or individual users to store more data on the cloud storage than on private computer systems. However, a specific problem encountered ...

    Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu in Information and Communications Security (2016)

  5. Chapter and Conference Paper

    Three Dimensional Stress Wave Imaging Method of Wood Internal Defects Based on TKriging

    In order to detect the size, shape and degree of decay inside wood, a three dimensional stress wave imaging method based on TKriging is proposed. The method uses sensors to obtain the stress wave velocity data...

    **aochen Du, Hailin Feng, Mingyue Hu, Yiming Fang, Jiajie Li in Computer Vision (2017)

  6. Chapter and Conference Paper

    Parallel Search by Reinforcement Learning for Object Detection

    Object detection algorithms generally search through extensive potential areas without considering spatial correlations. To fully utilize rich information contained in high-level image features, a hierarchical...

    Ye Huang, Chaochen Gu, Kaijie Wu, ** Guan in Pattern Recognition and Computer Vision (2018)

  7. Chapter and Conference Paper

    A Security-Enhanced vTPM 2.0 for Cloud Computing

    Virtual Trusted Platform Module is required in cloud due to the scalability and migration of virtual machine. Through allocating a vTPM (Virtual Trusted Platform Module) to a VM (Virtual Machine), users of VM...

    Juan Wang, Feng **ao, Jianwei Huang, Daochen Zha in Information and Communications Security (2018)

  8. Chapter and Conference Paper

    Philosophical Principles of Data Discovery

    Data discovery is a basis in science and technology research because of nothing to do in case of no data. So, it is very important to find data. Where is the data? Data exists in the research objects which inc...

    Quan Wu, Min Liu, Juanying Sun, Weijie Jiao in Computer and Computing Technologies in Agr… (2019)

  9. Chapter and Conference Paper

    Neural Multi-task Learning for Teacher Question Detection in Online Classrooms

    Asking questions is one of the most crucial pedagogical techniques used by teachers in class. It not only offers open-ended discussions between teachers and students to exchange ideas but also provokes deeper ...

    Gale Yan Huang, Jiahao Chen, Haochen Liu in Artificial Intelligence in Education (2020)

  10. Chapter and Conference Paper

    Multilateral Boundary Blasting Theory of High and Steep Slope in Open Pit Mine and Its Application

    At present, the blasting theory of high and steep rock slope mainly focuses on flat terrain, ignoring the influence of micro-terrain boundary factors on blasting effect, which leads to excessive blasting energ...

    Junkai Chen, Wenxue Gao, **angjun Hao in Proceedings of the 8th International Confe… (2022)

  11. Chapter and Conference Paper

    Research on Vibration Signal Characteristics of Multilateral Boundary Deep Hole Blasting

    The essence of blasting action is the interaction between explosive energy and medium, and the blasting effect depends on the characteristics of explosive energy, medium and interaction law. The multi-boundary...

    Junkai Chen, **angjun Hao, Zheng Wei in Proceedings of the 9th International Confe… (2023)

  12. Chapter and Conference Paper

    Non-destructive Detection of Grouting Defects Behind Shield Tunnel Wall by Combining Ground Penetrating Radar with Seismic Wave Method

    The shield construction is a mature tunnel construction technology. Grouting behind segment wall synchronously during shield construction is an important measure to control stratum deformation, reduce ground s...

    Qing Han, Yihui Huang, Chaochen Li in Proceedings of the 2nd International Confe… (2023)