299 Result(s)
-
Article
DPHM-Net:de-redundant multi-period hybrid modeling network for long-term series forecasting
Deep learning models have been widely applied in the field of long-term forecasting has achieved significant success, with the incorporation of inductive bias such as periodicity to model multi-granularity rep...
-
Article
The effects of students’ self-efficacy, self-regulated learning strategy, perceived and actual learning effectiveness: A digital game-based learning system
Self-regulated learning (SRL) strategies have been identified as a valuable component of digital game-based learning system (GBLS) activities. However, few studies have focused on the effects of information fe...
-
Article
Open AccessAnalysis and prediction of virtual machine boot time on virtualized computing environments
Starting a virtual machine (VM) is a common operation in cloud computing platforms. In order to achieve better management of resource provisioning, a cloud platform needs to accurately estimate the VM boot tim...
-
Article
Open AccessFactors affecting parental intention to use AI-based social robots for children’s ESL learning
The use of AI-based social robots has been shown to be beneficial for learning English as a Second Language (ESL). Not much is known, however, about the drivers of parental intention to use those robots in sup...
-
Article
CAT: A Simple yet Effective Cross-Attention Transformer for One-Shot Object Detection
Given a query patch from a novel class, one-shot object detection aims to detect all instances of this class in a target image through the semantic similarity comparison. However, due to the extremely limited ...
-
Article
SinGRAV: Learning a Generative Radiance Volume from a Single Natural Scene
We present SinGRAV, an attempt to learn a generative radiance volume from multi-view observations of a single natural scene, in stark contrast to existing category-level 3D generative models that learn from im...
-
Article
10-Million Atoms Simulation of First-Principle Package LS3DF
The growing demand for semiconductor devices simulation poses a big challenge for large-scale electronic structure calculations. Among various methods, the linearly scaling three-dimensional fragment (LS3DF) m...
-
Article
VPI: Vehicle Programming Interface for Vehicle Computing
The emergence of software-defined vehicles (SDVs), combined with autonomous driving technologies, has enabled a new era of vehicle computing (VC), where vehicles serve as a mobile computing platform. However, ...
-
Article
Enhancing students’ online collaborative PBL learning performance in the context of coauthoring-based technologies: A case of wiki technologies
Understandability and completeness are essential in modern collaborative digital platforms and their learning systems. These platforms have shaken up the traditional education setting, particularly in leveragi...
-
Article
Graph convolutional network for difficulty-controllable visual question generation
In this article, we address the problem of difficulty-controllable visual question generation, which is to generate questions that satisfy the given difficulty levels based on the images and target answer. The...
-
Article
What drives undergraduates’ effort and persistence in learning programming
This study attempts to: (a) investigate whether positive and negative emotions mediate the pathways linking self-efficacy for learning programming with effort and persistence in undergraduates’ learning Scratc...
-
Article
Open AccessLeveraging computer vision for adaptive learning in STEM education: effect of engagement and self-efficacy
In the field of Science, Technology, Engineering, and Mathematics (STEM) education, which aims to cultivate problem-solving skills, accurately assessing learners' engagement remains a significant challenge. We...
-
Article
Open AccessSSDLog: a semi-supervised dual branch model for log anomaly detection
With versatility and complexity of computer systems, warning and errors are inevitable. To effectively monitor system’s status, system logs are critical. To detect anomalies in system logs, deep learning is a ...
-
Article
HAN-CAD: hierarchical attention network for context anomaly detection in multivariate time series
Anomaly Detection in multivariate time series (MTS) plays an important role in many real-world Web services such as the Web traffic monitoring system. With abundant MTS data, exploiting the relationships among...
-
Article
Functional Verification for Agile Processor Development: A Case for Workflow Integration
Agile hardware development methodology has been widely adopted over the past decade. Despite the research progress, the industry still doubts its applicability, especially for the functional verification of co...
-
Article
Exploring the effect of improved learning performance: A mobile augmented reality learning system
Students are commonly in a high cognitive load state when they encounter sophisticated knowledge. Whether the novel augmented reality (AR) technology can be utilized in an online learning course to explain com...
-
Article
EDU-Capsule: aspect-based sentiment analysis at clause level
Many studies on aspect-based sentiment analysis (ABSA) aim to directly predict aspects and polarities at sentence level. However, it is not rare that a long sentence expresses multiple aspects. In this paper, ...
-
Article
Personalized tag recommendation via denoising auto-encoder
Personalized tag recommender systems automatically recommend users a set of tags used to annotate items according to users’ past tagging information. Learning the representations of involved entities (i.e. use...
-
Article
I/O Efficient Early Bursting Cohesive Subgraph Discovery in Massive Temporal Networks
Temporal networks are an effective way to encode temporal information into graph data losslessly. Finding the bursting cohesive subgraph (BCS), which accumulates its cohesiveness at the fastest rate, is an imp...
-
Article
Object detection network pruning with multi-task information fusion
In this work, we propose a novel channel pruning method for object detection. Most of existing works performing network pruning ignore the multi-task nature of object detection, i.e., object classification and...