Skip to main content

previous disabled Page of 10
and
  1. No Access

    Article

    CAT: A Simple yet Effective Cross-Attention Transformer for One-Shot Object Detection

    Given a query patch from a novel class, one-shot object detection aims to detect all instances of this class in a target image through the semantic similarity comparison. However, due to the extremely limited ...

    Wei-Dong Lin 林蔚东, Yu-Yan Deng 邓玉岩 in Journal of Computer Science and Technology (2024)

  2. No Access

    Article

    SinGRAV: Learning a Generative Radiance Volume from a Single Natural Scene

    We present SinGRAV, an attempt to learn a generative radiance volume from multi-view observations of a single natural scene, in stark contrast to existing category-level 3D generative models that learn from im...

    Yu-Jie Wang 王玉洁, Xue-Lin Chen 陈学霖 in Journal of Computer Science and Technology (2024)

  3. No Access

    Article

    10-Million Atoms Simulation of First-Principle Package LS3DF

    The growing demand for semiconductor devices simulation poses a big challenge for large-scale electronic structure calculations. Among various methods, the linearly scaling three-dimensional fragment (LS3DF) m...

    Yu-** Yan, Hai-Bo Li, Tong Zhao in Journal of Computer Science and Technology (2024)

  4. No Access

    Article

    VPI: Vehicle Programming Interface for Vehicle Computing

    The emergence of software-defined vehicles (SDVs), combined with autonomous driving technologies, has enabled a new era of vehicle computing (VC), where vehicles serve as a mobile computing platform. However, ...

    Bao-Fu Wu, Ren Zhong, Yuxin Wang, Jian Wan in Journal of Computer Science and Technology (2024)

  5. No Access

    Article

    Functional Verification for Agile Processor Development: A Case for Workflow Integration

    Agile hardware development methodology has been widely adopted over the past decade. Despite the research progress, the industry still doubts its applicability, especially for the functional verification of co...

    Yi-Nan Xu, Zi-Hao Yu, Kai-Fan Wang in Journal of Computer Science and Technology (2023)

  6. Article

    I/O Efficient Early Bursting Cohesive Subgraph Discovery in Massive Temporal Networks

    Temporal networks are an effective way to encode temporal information into graph data losslessly. Finding the bursting cohesive subgraph (BCS), which accumulates its cohesiveness at the fastest rate, is an imp...

    Yuan Li, Jie Dai, **ao-Lin Fan, Yu-Hai Zhao in Journal of Computer Science and Technology (2022)

  7. No Access

    Chapter and Conference Paper

    Numerical Investigation on Turbulence Models and the Hydrodynamics of a UVMS

    Underwater vehicle-manipulator systems (UVMS) have been widely used in many underwater tasks. In this paper, a numerical investigation of the hydrodynamic performances of a small-size UVMS is carried out by us...

    Hang Xu, Lin Hong, **n Wang, Ming Zhao in Intelligent Robotics and Applications (2022)

  8. No Access

    Chapter and Conference Paper

    Exploring the Role of Culture-Centric Design Guidelines in the Design of mHealth Application for Senior Informal Caregivers: Lessons Learned in a Field Study

    Mobile health (mHealth) applications help reduce the burden of informal caregivers. However, limited mHealth applications are fully adopted by informal caregivers. Research has suggested that cultural tendency...

    Wen-Lin Chiao, Ying-Jia Hong, Hsin-Pei Tsai, Yu-Hsin Wang in HCI International 2022 Posters (2022)

  9. No Access

    Chapter and Conference Paper

    Design and Control of a Bimanual Rehabilitation System for Trunk Impairment Patients

    Stroke is one of the leading causes of severe long-term disability worldwide. Past research has proved the effectiveness and importance of trunk rehabilitation in enhancing the locomotive capacities and balanc...

    Lufeng Chen, **g Qiu, Lin Zhou, Hongwei Wang in Intelligent Robotics and Applications (2022)

  10. No Access

    Chapter and Conference Paper

    Facial Action Unit Detection by Exploring the Weak Relationships Between AU Labels

    In recent years, facial action unit (AU) detection attracts more and more attentions and great progress has been made. However, few approaches solve AU detection problem by applying the emotion information, an...

    Mengke Tian, Hengliang Zhu, Yong Wang in Collaborative Computing: Networking, Appli… (2022)

  11. No Access

    Article

    A Survey of Text Summarization Approaches Based on Deep Learning

    Automatic text summarization (ATS) has achieved impressive performance thanks to recent advances in deep learning (DL) and the availability of large-scale corpora. The key points in ATS are to estimate the sal...

    Sheng-Luan Hou, **-Kun Huang, Chao-Qun Fei in Journal of Computer Science and Technology (2021)

  12. No Access

    Chapter and Conference Paper

    An Improved MAX-Log MPA Multiuser Detection Algorithm in SCMA System

    Sparse code multiple access (SCMA) technology is a new type of Non-Orthogonal Multiple Access (NOMA) technology for next-generation mobile communications. Aiming at the poor bit error rate (BER) performance of...

    Guanghua Zhang, Zongyuan Fan, Zonglin Gu in Artificial Intelligence for Communications… (2021)

  13. No Access

    Chapter and Conference Paper

    Content-Based Open Knowledge Graph Search: A Preliminary Study with OpenKG.CN

    Users rely on open data portals and search engines to find open knowledge graphs (KGs). However, existing systems only provide metadata-based KG search but ignore the contents of KGs, i.e., triples. In this pa...

    **axia Wang, Tengteng Lin, Weiqing Luo in Knowledge Graph and Semantic Computing: Kn… (2021)

  14. No Access

    Chapter and Conference Paper

    A Transparently-Secure and Robust Stock Data Supply Framework for Financial-Technology Applications

    Recently, program trading has become the mainstream of financial information technology. The current FinTech applications mainly encounter three technical issues, including scalability, long-time retrieval, an...

    Lin-Yi Jiang, Cheng-Ju Kuo, Yu-Hsin Wang in Intelligent Information and Database Syste… (2021)

  15. No Access

    Chapter and Conference Paper

    DDAE-GAN: Seismic Data Denoising by Integrating Autoencoder and Generative Adversarial Network

    Machine learning methods face two main challenges in denoising tasks. One is the lack of supervised training data, and the other is the limited knowledge of complex unknown noise. In this paper, for seismic de...

    Fan Min, Lin-Rong Wang, Shu-Lin Pan, Guo-Jie Song in Rough Sets (2021)

  16. No Access

    Chapter and Conference Paper

    Applying E-Book System to Facilitate Student’ Flipped Learning Performance in Software Engineering Courses

    In recent years, many institutions have pointed out that software developments are important to nations, societies, and individuals. However, to develop quality software, students should not only possess progr...

    I-Chun Lin, Tz-Chi Wang, Yen-Ting Lin in Innovative Technologies and Learning (2021)

  17. No Access

    Chapter and Conference Paper

    Adaptive Technologies of Hybrid Carrier Based on WFRFT Facing Coverage and Spectral Efficiency Balance

    Adaptive Modulation and Coding (AMC) and power control are adopted to balance spectral efficiency and coverage facing the problem of spectrum shortage in recent years. Considering the Orthogonal Frequency Divi...

    Ning Pan, Lin Mei, Linan Wang, Libin Jiao in Artificial Intelligence for Communications… (2021)

  18. No Access

    Chapter and Conference Paper

    Numeric Keypads or Character Keyboards for Numeric Entries on Surveys and Forms: Surprising Results from Older Adults Using Mobile Devices

    These days a growing number of adults are using smartphones to fill out online forms or surveys (For a review of recent empirical studies on older adults using smartphone when answering forms see: [24]). The tou...

    Erica Olmsted-Hawala, Elizabeth Nichols in Human Aspects of IT for the Aged Populatio… (2021)

  19. No Access

    Chapter and Conference Paper

    XRR: Explainable Risk Ranking for Financial Reports

    We propose an eXplainable Risk Ranking (XRR) model that uses multilevel encoders and attention mechanisms to analyze financial risks among companies. In specific, the proposed method utilizes the textual infor...

    Ting-Wei Lin, Ruei-Yao Sun, Hsuan-Ling Chang in Machine Learning and Knowledge Discovery i… (2021)

  20. No Access

    Chapter and Conference Paper

    VTLayout: Fusion of Visual and Text Features for Document Layout Analysis

    Documents often contain complex physical structures, which make the Document Layout Analysis (DLA) task challenging. As a pre-processing step for content extraction, DLA has the potential to capture rich infor...

    Shoubin Li, Xuyan Ma, Shuaiqun Pan, Jun Hu in PRICAI 2021: Trends in Artificial Intellig… (2021)

previous disabled Page of 10