Skip to main content

previous disabled Page of 2
and
Your search also matched 147 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Nearly Time-Optimal Kernelization Algorithms for the Line-Cover Problem with Big Data

Include preview-only content
  1. Article

    Secure control and filtering for industrial metaverse

    元宇宙可被视为一个社会化和虚拟化的网络空间, 与现实世界**行但互动. 得益于云计算和数字孪生的快速发展, 元宇宙**在将带有传统控制和滤波范式的工业自动化系统转变为信息物理社会融合系统. 在此情况下, 未来的工业自动化系统可能是在一定时间和空间范围内具有**大计算能力的现实世界系统与虚拟孪生系统的集成. 在该领域中, 元宇宙重点涉及信息传输管理、 用户的行为识别以及控制、 滤波和决策, 且性能和成本将是系统在网络空间和...

    Qing-Long Han **清龙, Derui Ding 丁德锐 in Frontiers of Information Technology & Elec… (2024)

  2. Chapter and Conference Paper

    A Formal Model to Prove Instantiation Termination for E-matching-Based Axiomatisations

    SMT-based program analysis and verification often involve reasoning about program features that have been specified using quantifiers; incorporating quantifiers into SMT-based reasoning is, however, known to b...

    Rui Ge, Ronald Garcia, Alexander J. Summers in Automated Reasoning (2024)

  3. Article

    Open Access

    Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

    With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to ach...

    Liang Yan, Lina Ge, Zhe Wang, Guifen Zhang, **gya Xu in Journal of Cloud Computing (2023)

  4. Article

    Open Access

    FSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings

    With the awakening of health awareness, people are raising a series of health-related requirements for the buildings they live in, with a view to improving their living conditions. In this context, BIM (Buildi...

    Min Yang, Chengmin Ge, **aoran Zhao, Huaizhen Kou in Journal of Cloud Computing (2023)

  5. Article

    Open Access

    Memory sharing for handling memory overload on physical machines in cloud data centers

    Over-committing computing resources is a widely adopted strategy for increased cluster utilization in Infrastructure as a Service (IaaS) cloud data centers. A potential consequence of over-committing computing...

    Yaozhong Ge, Yu-Chu Tian, Zu-Guo Yu, Weizhe Zhang in Journal of Cloud Computing (2023)

  6. Article

    Open Access

    Collaborative task offloading and resource allocation with hybrid energy supply for UAV-assisted multi-clouds

    Cloud computing has emerged as a promising paradigm for meeting the growing resource demands of Internet of Things (IoT) devices. Meanwhile, with the popularity of mobile aerial base stations, Unmanned Aerial ...

    Yu Zhou, Hui Ge, Bowen Ma, Shuhang Zhang, Jiwei Huang in Journal of Cloud Computing (2022)

  7. Article

    Intelligent analysis for software data: research and applications

    Tao Zhang 张涛, **aobing Sun 孙小兵 in Frontiers of Information Technology & Elec… (2022)

  8. Article

    Open Access

    Clustering Algorithm of Density Difference Optimized by Mixed Teaching and Learning

    Density peak clustering (DPC) algorithm is to find clustering centers by calculating the local density and distance of data points based on the distance between data points and the cutoff distance (dc) set manual...

    Hailong Chen, Miaomiao Ge, Yutong Xue in SN Computer Science (2020)

  9. Chapter and Conference Paper

    Effects of Recipient Information and Urgency Cues on Phishing Detection

    Phishing causes significant economic damage and erodes consumer trust in business communication. To better filter phishing emails, researchers have paid a substantial amount of attention to the characteristics...

    **nyue Cui, Yan Ge, Weina Qu, Kan Zhang in HCI International 2020 - Posters (2020)

  10. Chapter and Conference Paper

    Managing Information in the Case of Opinion Spamming

    The rapid innovation of information and communication technology (ICT) within the last decades has come along with the development of new opportunities and challenges, new business models, new systems, etc. Co...

    Li** Ge, Stefan Voß in Design, User Experience, and Usability. Interaction Design (2020)

  11. Chapter and Conference Paper

    Multi-source Manifold Outlier Detection

    Outlier detection is an important task in data mining, with many practical applications ranging from fraud detection to public health. However, with the emergence of more and more multi-source data in many rea...

    Lei Zhang, Shupeng Wang, Ge Fu, Zhenyu Wang, Lei Cui in Computational Science – ICCS 2019 (2019)

  12. Chapter and Conference Paper

    Spindle: A Write-Optimized NVM Cache for Journaling File System

    Journaling techniques are widely employed in modern file systems to guarantee crash consistency. However, journaling usually leads to system performance decrease due to the frequent storage accesses it entails...

    Ge Yan, Kaixin Huang, Linpeng Huang in Network and Parallel Computing (2019)

  13. Chapter and Conference Paper

    Synchronized Detection and Recovery of Steganographic Messages with Adversarial Learning

    In this work, we mainly study the mechanism of learning the steganographic algorithm as well as combining the learning process with adversarial learning to learn a good steganographic algorithm. To handle the ...

    Haichao Shi, **ao-Yu Zhang, Shupeng Wang, Ge Fu in Computational Science – ICCS 2019 (2019)

  14. Chapter and Conference Paper

    Parallel Strongly Connected Components Detection with Multi-partition on GPUs

    The graph computing is often used to analyze complex relationships in the interconnected world, and the strongly connected components (SCC) detection in digraphs is a basic problem in graph computing. As graph...

    Junteng Hou, Shupeng Wang, Guangjun Wu, Ge Fu in Computational Science – ICCS 2019 (2019)

  15. Chapter and Conference Paper

    A Fast kNN-Based Approach for Time Sensitive Anomaly Detection over Data Streams

    Anomaly detection is an important data mining method aiming to discover outliers that show significant diversion from their expected behavior. A widely used criteria for determining outliers is based on the nu...

    Guangjun Wu, Zhihui Zhao, Ge Fu, Hai** Wang in Computational Science – ICCS 2019 (2019)

  16. Chapter and Conference Paper

    How Users Distinguish Trees Within a Virtual Environment

    The gaming industry always faces the continual challenges of striking balance between real-time computing performance and graphics presentation quality. This is particularly apparent for a game with vast wildl...

    Ge Gao, Yingjie Chen, Hui Tang in HCI International 2018 – Posters' Extended Abstracts (2018)

  17. Chapter and Conference Paper

    End-to-End Bloody Video Recognition by Audio-Visual Feature Fusion

    With the rapid development of Internet technology, the spread of bloody video has become increasingly serious, causing huge harm to society. In this paper, a bloody video recognition method based on audio-vis...

    Congcong Hou, **aoyu Wu, Ge Wang in Pattern Recognition and Computer Vision (2018)

  18. Chapter and Conference Paper

    Self-Paced Densely Connected Convolutional Neural Network for Visual Tracking

    Convolutional neural networks (CNNs) have achieved surprising results in visual tracking. To address the model drift problem, we propose a novel self-paced densely connected convolutional neural netwrok (SPDCT...

    Daohui Ge, Jianfeng Song, Yutao Qi in Pattern Recognition and Computer Vision (2018)

  19. Chapter and Conference Paper

    A Sparse Substitute for Deconvolution Layers in GANs

    Generative adversarial networks are useful tools in image generation task, but training and running them are relatively slow due to the large amount parameters introduced by their generators. In this paper, S-...

    Juzheng Li, Pengfei Ge, Chuan-**an Ren in Pattern Recognition and Computer Vision (2018)

  20. Chapter and Conference Paper

    Predicting Aesthetic Radar Map Using a Hierarchical Multi-task Network

    The aesthetic quality assessment of images is a challenging work in the field of computer vision because of its complex subjective semantic information. The recent research work can utilize the deep convolutio...

    **n **, Le Wu, **nghui Zhou, Geng Zhao in Pattern Recognition and Computer Vision (2018)

previous disabled Page of 2