Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Hyper-relational knowledge graph neural network for next POI recommendation

    With the advancement of mobile technology, Point of Interest (POI) recommendation systems in Location-based Social Networks (LBSN) have brought numerous benefits to both users and companies. Many existing work...

    Jixiao Zhang, Yongkang Li, Ruotong Zou, **gyuan Zhang, Renhe Jiang in World Wide Web (2024)

  2. No Access

    Article

    Text-assisted attention-based cross-modal hashing

    As one of the hottest research topics in multimedia information retrieval, cross-modal hashing has drawn widespread attention in the past decades. How to minimize the semantic gap of heterogeneous data and acc...

    **ang Yuan, Shihao Shan, Yuwen Huo in International Journal of Multimedia Inform… (2024)

  3. No Access

    Article

    HMGCL: Heterogeneous multigraph contrastive learning for LBSN friend recommendation

    Friend recommendation from user trajectory is a vital real-world application of location-based social networks (LBSN) services. Previous statistical analysis indicated that social network relationships could e...

    Yongkang Li, Zipei Fan, Du Yin, Renhe Jiang, **liang Deng, Xuan Song in World Wide Web (2023)

  4. No Access

    Article

    Perceived usefulness predicts second language learners’ continuance intention toward language learning applications: a serial multiple mediation model of integrative motivation and flow

    Mobile language learning has attracted much attention in recent years. Previous research has demonstrated a relationship between perceived usefulness and continuance intention to use technology. This study use...

    Xuebin Wang, Aitao Lu, Tao Lin, Siyi Liu in Education and Information Technologies (2022)

  5. No Access

    Chapter and Conference Paper

    D2D-Based Multi-relay-Assisted Computation Offloading in Edge Computing Network

    With the rapid development of edge computing, a large number of compute-intensive tasks are offloaded to the edge server, and computation offloading strategy has become a hot research topic. Because the deploy...

    Xuan Zhao, Song Zhang, Bowen Liu in Collaborative Computing: Networking, Appli… (2021)

  6. No Access

    Chapter and Conference Paper

    Countrywide Origin-Destination Matrix Prediction and Its Application for COVID-19

    Modeling and predicting human mobility are of great significance to various application scenarios such as intelligent transportation system, crowd management, and disaster response. In particular, in a severe ...

    Renhe Jiang, Zhaonan Wang, Zekun Cai in Machine Learning and Knowledge Discovery i… (2021)

  7. No Access

    Chapter and Conference Paper

    The Eighth Visual Object Tracking VOT2020 Challenge Results

    The Visual Object Tracking challenge VOT2020 is the eighth annual tracker benchmarking activity organized by the VOT initiative. Results of 58 trackers are presented; many are state-of-the-art trackers publish...

    Matej Kristan, Aleš Leonardis, Jiří Matas in Computer Vision – ECCV 2020 Workshops (2020)

  8. No Access

    Chapter and Conference Paper

    Cross Fusion for Egocentric Interactive Action Recognition

    The characteristics of egocentric interactive videos, which include heavy ego-motion, frequent viewpoint changes and multiple types of activities, hinder the action recognition methods of third-person vision f...

    Haiyu Jiang, Yan Song, Jiang He, **angbo Shu in MultiMedia Modeling (2020)

  9. No Access

    Chapter and Conference Paper

    Capability Assessment of Networking Information-Centric System of Systems: Review and Prospect

    This paper reviews the research progress of capability assessment of the networking information-centric system of systems. The concept, characteristics and capability structure of the networking information-ce...

    Yang Guo, Jiang Cao, Yuan Gao, Yanchang Du, Shaochi Cheng in Space Information Networks (2020)

  10. No Access

    Chapter and Conference Paper

    Federated Acoustic Model Optimization for Automatic Speech Recognition

    Traditional Automatic Speech Recognition (ASR) systems are usually trained with speech records centralized on the ASR vendor’s machines. However, with data regulations such as General Data Protection Regulatio...

    Conghui Tan, Di Jiang, Huaxiao Mo in Database Systems for Advanced Applications (2020)

  11. No Access

    Chapter and Conference Paper

    Rethinking Image Inpainting via a Mutual Encoder-Decoder with Feature Equalizations

    Deep encoder-decoder based CNNs have advanced image inpainting methods for hole filling. While existing methods recover structures and textures step-by-step in the hole regions, they typically use two encoder-...

    Hongyu Liu, Bin Jiang, Yibing Song, Wei Huang, Chao Yang in Computer Vision – ECCV 2020 (2020)

  12. No Access

    Article

    A novel temporal and topic-aware recommender model

    Individuals’ interests and concerning topics are generally changing over time, with strong impact on their behaviors in social media. Accordingly, designing an intelligent recommender system which can adapt wi...

    Dandan Song, Zhifan Li, Mingming Jiang, Lifei Qin, Lejian Liao in World Wide Web (2019)

  13. No Access

    Chapter and Conference Paper

    An Interpretable Recommendations Approach Based on User Preferences and Knowledge Graph

    In recent years, how to accurately recommend and solve the opacity of the recommendation system has received more and more attention. Some researchers introduced some auxiliary information into the recommendat...

    Yanru Zhong, **ulai Song, Bing Yang, Chaohao Jiang in Advances in Swarm Intelligence (2019)

  14. No Access

    Chapter and Conference Paper

    Analysis on the Block Reward of Fork After Withholding (FAW)

    The irreversible trend in clustering of mining power raises severe concerns on stability and security of PoW based on cryptocurrency. It has been shown that, in some case, reward of a mining pool can be signif...

    Junming Ke, Han Jiang, **angfu Song, Shengnan Zhao, Hao Wang in Network and System Security (2018)

  15. No Access

    Article

    Retrieving Aerial Scene Images with Learned Deep Image-Sketch Features

    This paper investigates the problem of retrieving aerial scene images by using semantic sketches, since the state-of-the-art retrieval systems turn out to be invalid when there is no exemplar query aerial imag...

    Tian-Bi Jiang, Gui-Song **a, Qi-Kai Lu in Journal of Computer Science and Technology (2017)

  16. No Access

    Article

    Evolution of Cloud Operating System: From Technology to Ecosystem

    The cloud operating system (cloud OS) is used for managing the cloud resources such that they can be used effectively and efficiently. And also it is the duty of cloud OS to provide convenient interface for us...

    Zuo-Ning Chen, Kang Chen, **-Lei Jiang in Journal of Computer Science and Technology (2017)

  17. No Access

    Chapter and Conference Paper

    Epileptic Seizure Detection Using EEGs Based on Kernel Radius of Intrinsic Mode Functions

    The study of automated epileptic seizure detection using EEGs has attracted more and more researchers in these decades. How to extract appropriate features in EEGs, which can be applied to differentiate non-se...

    Qiang Li, Meina Ye, Jiang-Ling Song, Rui Zhang in Health Information Science (2017)

  18. No Access

    Chapter and Conference Paper

    On Optimizing Partitioning Strategies for Faster Inverted Index Compression

    Inverted index is a key component for search engine to manage billions of documents and fast respond to users’ queries. While substantial effort has been made to compromise space occupancy and decoding speed, ...

    **ngshen Song, Kun Jiang, Yu Jiang in Computational Science and Its Applications… (2016)

  19. No Access

    Chapter and Conference Paper

    A Parallel Multiple K-Means Clustering and Application on Detect Near Native Model

    Protein structure clustering is an important and essential step in protein 3D structure prediction. However, two issues limited current methods. But the large-scale candidate models in the decoy and undisting...

    Hongjie Wu, Chuang Wu, Chen cheng in Intelligent Computing Theories and Applica… (2016)

  20. No Access

    Article

    Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-Based Speed Estimation

    Numerous indoor localization techniques have been proposed recently to meet the intensive demand for location-based service (LBS). Among them, the most popular solutions are the Wi-Fi fingerprint-based approac...

    Zhi-** Jiang, Wei **, **angyang Li in Journal of Computer Science and Technology (2014)

previous disabled Page of 2