Skip to main content

previous disabled Page of 8
and
  1. No Access

    Article

    Towards High-Performance Graph Processing: From a Hardware/Software Co-Design Perspective

    Graph processing has been widely used in many scenarios, from scientific computing to artificial intelligence. Graph processing exhibits irregular computational parallelism and random memory accesses, unlike t...

    **ao-Fei Liao 廖小飞, Wen-Ju Zhao 赵文举 in Journal of Computer Science and Technology (2024)

  2. No Access

    Article

    RV16: An Ultra-Low-Cost Embedded RISC-V Processor Core

    Embedded and Internet of Things (IoT) devices have extremely strict requirements on the area and power consumption of the processor because of the limitation on its working environment. To reduce the overhead ...

    Yuan-Hu Cheng, Li-Bo Huang, Yi-Jun Cui in Journal of Computer Science and Technology (2022)

  3. Article

    Towards Exploring Large Molecular Space: An Efficient Chemical Genetic Algorithm

    Generating molecules with desired properties is an important task in chemistry and pharmacy. An efficient method may have a positive impact on finding drugs to treat diseases like COVID-19. Data mining and art...

    Jian-Fu Zhu, Zhong-Kai Hao, Qi Liu, Yu Yin in Journal of Computer Science and Technology (2022)

  4. No Access

    Article

    Reality matters? exploring a tangible user interface for augmented-reality-based fire education

    When fire disasters are imminent, disaster prevention measures and relief plans are critical. However, “fire education” to equip civilians with the know-how to cope with various emergencies and protect themsel...

    Hsiu-Mei Huang, Tien-Chi Huang in Universal Access in the Information Society (2022)

  5. No Access

    Article

    Accumulative Time Based Ranking Method to Reputation Evaluation in Information Networks

    Due to over-abundant information on the Web, information filtering becomes a key task for online users to obtain relevant suggestions and how to extract the most related item is always a key topic for research...

    Hao Liao, Qi-**n Liu, Ze-Cheng Huang in Journal of Computer Science and Technology (2022)

  6. No Access

    Chapter and Conference Paper

    No Pie in the Sky: The Digital Currency Fraud Website Detection

    In recent years, digital currencies based on blockchain technology are growing rapidly. Therefore, many criminal cases related to digital currency also took place. One of the most common ways is to induce vict...

    Haoran Ou, Yongyan Guo, Chaoyi Huang, Zhiying Zhao in Digital Forensics and Cyber Crime (2022)

  7. No Access

    Chapter and Conference Paper

    An EEG-EMG-Based Motor Intention Recognition for Walking Assistive Exoskeletons

    Lower Limb Exoskeleton (LLE) has received considerable interests in strength augmentation, rehabilitation and walking assistance scenarios. For walking assistance, the LLE is expected to have the capability of...

    Guangkui Song, Rui Huang, Yongzhi Guo, **g Qiu in Intelligent Robotics and Applications (2022)

  8. No Access

    Chapter and Conference Paper

    ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis

    The Non-Fungible Token (NFT) is viewed as one of the important applications of blockchain technology. Currently NFT has a large market scale and multiple practical standards, however several limitations of the...

    Hongyin Chen, Yukun Cheng, **aotie Deng in Financial Cryptography and Data Security (2022)

  9. No Access

    Chapter and Conference Paper

    Sparse Attack on Skeleton-Based Human Action Recognition for Internet of Video Things Systems

    Action recognition is widely used in industry like human-computer interaction and intelligent monitoring. But in the circumstance of deep model being threatened by adversarial attack, the robustness of skeleto...

    Yinqin Huang, Cheng Dai, Wei-Che Chien in Information Security Practice and Experience (2022)

  10. Article

    Open Access

    Beyond private 5G networks: applications, architectures, operator models and technological enablers

    Private networks will play a key role in 5G and beyond to enable smart factories with the required better deployment, operation and flexible usage of available resource and infrastructure. 5G private networks ...

    Mickael Maman, Emilio Calvanese-Strinati in EURASIP Journal on Wireless Communications… (2021)

  11. No Access

    Chapter and Conference Paper

    An Ensemble Fuzziness-Based Online Sequential Learning Approach and Its Application

    Traditional deep learning algorithms are difficult to deploy on most IoT terminal devices due to their limited computing power. To solve this problem, this paper proposes a novel ensemble fuzziness-based onlin...

    Wei-Peng Cao, Sheng-Dong Li in Knowledge Science, Engineering and Managem… (2021)

  12. No Access

    Chapter and Conference Paper

    Combining Flipped Learning and Formative Assessment to Enhance the Learning Performance of Students in Programming

    Information technology is booming, students are no longer just acquiring knowledge through books, and their learning approaches are no longer limited to traditional lectures or classrooms. In recent years, fli...

    Shu-Chen Cheng, Yu-** Cheng, Yueh-Min Huang in Innovative Technologies and Learning (2021)

  13. No Access

    Chapter and Conference Paper

    PQ-HDC: Projection-Based Quantization Scheme for Flexible and Efficient Hyperdimensional Computing

    Brain-inspired Hyperdimensional (HD) computing is an emerging technique for low-power/energy designs in many machine learning tasks. Recent works further exploit the low-cost quantized (bipolarized or ternariz...

    Chi-Tse Huang, Cheng-Yang Chang in Artificial Intelligence Applications and I… (2021)

  14. No Access

    Chapter and Conference Paper

    Progressive AutoSpeech: An Efficient and General Framework for Automatic Speech Classification

    Speech classification has been widely used in many speech-related applications. However, the complexity of speech classification tasks often exceeds the scope of non-experts, the off-the-shelf speech classific...

    Guanghui Zhu, Feng Cheng, Mengchuan Qiu in Advances in Knowledge Discovery and Data M… (2021)

  15. No Access

    Chapter and Conference Paper

    Use Object-Detection to Identify Materials and Tools for STEAM Hands-on Activity

    The STEAM is an educational concept of interdisciplinary curriculum integration, which involves the knowledge and skills of science, technology, engineering, arts, and math courses. Countries worldwide are act...

    Hsin-Yu Lee, Yu-Cheng Chien, Pei-Yu Chang in Innovative Technologies and Learning (2021)

  16. No Access

    Article

    EmotionMap: Visual Analysis of Video Emotional Content on a Map

    Emotion plays a crucial role in gratifying users’ needs during their experience of movies and TV series, and may be underutilized as a framework for exploring video content and analysis. In this paper, we pres...

    Cui-**a Ma, Jian-Cheng Song, Qian Zhu in Journal of Computer Science and Technology (2020)

  17. Chapter and Conference Paper

    Correction to: MultiMedia Modeling

    The original version of this book was revised. Due to a technical error, the first volume editor did not appear in the volumes of the MMM 2020 proceedings. This was corrected and the first volume editor was ad...

    Yong Man Ro, Wen-Huang Cheng, Junmo Kim, Wei-Ta Chu, Peng Cui in MultiMedia Modeling (2020)

  18. No Access

    Book and Conference Proceedings

    MultiMedia Modeling

    26th International Conference, MMM 2020, Daejeon, South Korea, January 5–8, 2020, Proceedings, Part I

    Yong Man Ro, Wen-Huang Cheng, Prof. Junmo Kim in Lecture Notes in Computer Science (2020)

  19. No Access

    Book and Conference Proceedings

    MultiMedia Modeling

    26th International Conference, MMM 2020, Daejeon, South Korea, January 5–8, 2020, Proceedings, Part II

    Yong Man Ro, Wen-Huang Cheng, Prof. Junmo Kim in Lecture Notes in Computer Science (2020)

  20. No Access

    Chapter and Conference Paper

    Improving RGB-D Face Recognition via Transfer Learning from a Pretrained 2D Network

    2D Face recognition has been extensively studied for decades and has reached remarkable results in recent years. However, 2D Face recognition is sensitive to variations in poses, facial expressions and illumin...

    **ngwang **ong, Xu Wen, Cheng Huang in Benchmarking, Measuring, and Optimizing (2020)

previous disabled Page of 8