Skip to main content

previous disabled Page of 17
and
  1. No Access

    Article

    DPHM-Net:de-redundant multi-period hybrid modeling network for long-term series forecasting

    Deep learning models have been widely applied in the field of long-term forecasting has achieved significant success, with the incorporation of inductive bias such as periodicity to model multi-granularity rep...

    Chengdong Zheng, Yuliang Shi, Wu Lee, Lin Cheng, **njun Wang in World Wide Web (2024)

  2. No Access

    Article

    The effects of students’ self-efficacy, self-regulated learning strategy, perceived and actual learning effectiveness: A digital game-based learning system

    Self-regulated learning (SRL) strategies have been identified as a valuable component of digital game-based learning system (GBLS) activities. However, few studies have focused on the effects of information fe...

    Ying-Lien Lin, Wei-Tsong Wang, Min-Ju Hsieh in Education and Information Technologies (2024)

  3. Article

    Open Access

    Analysis and prediction of virtual machine boot time on virtualized computing environments

    Starting a virtual machine (VM) is a common operation in cloud computing platforms. In order to achieve better management of resource provisioning, a cloud platform needs to accurately estimate the VM boot tim...

    Ridlo Sayyidina Auliya, Yen-Lin Lee, Chia-Ching Chen in Journal of Cloud Computing (2024)

  4. Article

    Open Access

    Factors affecting parental intention to use AI-based social robots for children’s ESL learning

    The use of AI-based social robots has been shown to be beneficial for learning English as a Second Language (ESL). Not much is known, however, about the drivers of parental intention to use those robots in sup...

    Guan-Yu Lin, Ciao-Chun Jhang, Yi-Shun Wang in Education and Information Technologies (2024)

  5. No Access

    Article

    CAT: A Simple yet Effective Cross-Attention Transformer for One-Shot Object Detection

    Given a query patch from a novel class, one-shot object detection aims to detect all instances of this class in a target image through the semantic similarity comparison. However, due to the extremely limited ...

    Wei-Dong Lin 林蔚东, Yu-Yan Deng 邓玉岩 in Journal of Computer Science and Technology (2024)

  6. No Access

    Article

    SinGRAV: Learning a Generative Radiance Volume from a Single Natural Scene

    We present SinGRAV, an attempt to learn a generative radiance volume from multi-view observations of a single natural scene, in stark contrast to existing category-level 3D generative models that learn from im...

    Yu-Jie Wang 王玉洁, Xue-Lin Chen 陈学霖 in Journal of Computer Science and Technology (2024)

  7. No Access

    Article

    10-Million Atoms Simulation of First-Principle Package LS3DF

    The growing demand for semiconductor devices simulation poses a big challenge for large-scale electronic structure calculations. Among various methods, the linearly scaling three-dimensional fragment (LS3DF) m...

    Yu-** Yan, Hai-Bo Li, Tong Zhao in Journal of Computer Science and Technology (2024)

  8. No Access

    Article

    VPI: Vehicle Programming Interface for Vehicle Computing

    The emergence of software-defined vehicles (SDVs), combined with autonomous driving technologies, has enabled a new era of vehicle computing (VC), where vehicles serve as a mobile computing platform. However, ...

    Bao-Fu Wu, Ren Zhong, Yuxin Wang, Jian Wan in Journal of Computer Science and Technology (2024)

  9. Article

    Enhancing students’ online collaborative PBL learning performance in the context of coauthoring-based technologies: A case of wiki technologies

    Understandability and completeness are essential in modern collaborative digital platforms and their learning systems. These platforms have shaken up the traditional education setting, particularly in leveragi...

    Ying-Lien Lin, Wei-Tsong Wang in Education and Information Technologies (2024)

  10. No Access

    Article

    Graph convolutional network for difficulty-controllable visual question generation

    In this article, we address the problem of difficulty-controllable visual question generation, which is to generate questions that satisfy the given difficulty levels based on the images and target answer. The...

    Feng Chen, Jiayuan **e, Yi Cai, Zehang Lin, Qing Li, Tao Wang in World Wide Web (2023)

  11. No Access

    Article

    What drives undergraduates’ effort and persistence in learning programming

    This study attempts to: (a) investigate whether positive and negative emotions mediate the pathways linking self-efficacy for learning programming with effort and persistence in undergraduates’ learning Scratc...

    Guan-Yu Lin, Yi-Wen Liao, Zhi-Yuan Su in Education and Information Technologies (2023)

  12. Article

    Open Access

    Leveraging computer vision for adaptive learning in STEM education: effect of engagement and self-efficacy

    In the field of Science, Technology, Engineering, and Mathematics (STEM) education, which aims to cultivate problem-solving skills, accurately assessing learners' engagement remains a significant challenge. We...

    Ting-Ting Wu, Hsin-Yu Lee, Wei-Sheng Wang in International Journal of Educational Techn… (2023)

  13. Article

    Open Access

    SSDLog: a semi-supervised dual branch model for log anomaly detection

    With versatility and complexity of computer systems, warning and errors are inevitable. To effectively monitor system’s status, system logs are critical. To detect anomalies in system logs, deep learning is a ...

    Siyang Lu, Ningning Han, Mingquan Wang, **ang Wei, Zaichao Lin in World Wide Web (2023)

  14. No Access

    Article

    HAN-CAD: hierarchical attention network for context anomaly detection in multivariate time series

    Anomaly Detection in multivariate time series (MTS) plays an important role in many real-world Web services such as the Web traffic monitoring system. With abundant MTS data, exploiting the relationships among...

    Haicheng Tao, Jiawei Miao, Lin Zhao, Zhenyu Zhang, Shuming Feng, Shu Wang in World Wide Web (2023)

  15. No Access

    Article

    Functional Verification for Agile Processor Development: A Case for Workflow Integration

    Agile hardware development methodology has been widely adopted over the past decade. Despite the research progress, the industry still doubts its applicability, especially for the functional verification of co...

    Yi-Nan Xu, Zi-Hao Yu, Kai-Fan Wang in Journal of Computer Science and Technology (2023)

  16. Article

    Exploring the effect of improved learning performance: A mobile augmented reality learning system

    Students are commonly in a high cognitive load state when they encounter sophisticated knowledge. Whether the novel augmented reality (AR) technology can be utilized in an online learning course to explain com...

    Wei-Tsong Wang, Ying-Lien Lin, Hsin-En Lu in Education and Information Technologies (2023)

  17. No Access

    Article

    EDU-Capsule: aspect-based sentiment analysis at clause level

    Many studies on aspect-based sentiment analysis (ABSA) aim to directly predict aspects and polarities at sentence level. However, it is not rare that a long sentence expresses multiple aspects. In this paper, ...

    Ting Lin, Aixin Sun, Yequan Wang in Knowledge and Information Systems (2023)

  18. No Access

    Article

    Personalized tag recommendation via denoising auto-encoder

    Personalized tag recommender systems automatically recommend users a set of tags used to annotate items according to users’ past tagging information. Learning the representations of involved entities (i.e. use...

    Weibin Zhao, Lin Shang, Yonghong Yu, Li Zhang, Can Wang, Jiajun Chen in World Wide Web (2023)

  19. Article

    I/O Efficient Early Bursting Cohesive Subgraph Discovery in Massive Temporal Networks

    Temporal networks are an effective way to encode temporal information into graph data losslessly. Finding the bursting cohesive subgraph (BCS), which accumulates its cohesiveness at the fastest rate, is an imp...

    Yuan Li, Jie Dai, **ao-Lin Fan, Yu-Hai Zhao in Journal of Computer Science and Technology (2022)

  20. No Access

    Article

    Geochronology and structural deformation of Precambrian metamorphic basement in the eastern Jiangnan orogenic belt: constraints on the assembly time of the Yangtze and Cathaysia blocks

    The Jiangnan Orogenic Belt in South China formed as a result of the amalgamation between the Yangtze Block and the Cathaysian Block and records the geological information of collision. However, the timing of t...

    Yangyang Wang, Chuanzhong Song, Jiahao Li, Shoufa Lin in Earth Science Informatics (2022)

previous disabled Page of 17