Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Unsupervised Domain Adaptation on Sentence Matching Through Self-Supervision

    Although neural approaches have yielded state-of-the-art results in the sentence matching task, their performance inevitably drops dramatically when applied to unseen domains. To tackle this cross-domain chall...

    Gui-Rong Bai, Qing-Bin Liu, Shi-Zhu He in Journal of Computer Science and Technology (2023)

  2. No Access

    Article

    Unsupervised Dialogue State Tracking for End-to-End Task-Oriented Dialogue with a Multi-Span Prediction Network

    This paper focuses on end-to-end task-oriented dialogue systems, which jointly handle dialogue state tracking (DST) and response generation. Traditional methods usually adopt a supervised paradigm to learn DST...

    Qing-Bin Liu, Shi-Zhu He, Cao Liu, Kang Liu in Journal of Computer Science and Technology (2023)

  3. No Access

    Chapter and Conference Paper

    A Distilled 2D CNN-LSTM Framework with Temporal Attention Mechanism for Action Recognition

    Action Recognition has been studied for many years. In recent years, there are some methods using 3D-CNN (C3D, I3D, R2 + 1D), which have high accuracy, but it is hard to train and quite time-consuming due to t...

    Shi-Jie Zhu, Cheng-Rong Lin, Wei-Ting Lin in Recent Challenges in Intelligent Informati… (2023)

  4. No Access

    Article

    Graph fusion network for multi-oriented object detection

    In object detection, non-maximum suppression (NMS) methods are extensively adopted to remove horizontal duplicates of detected dense boxes for generating final object instances. However, due to the degraded qu...

    Shi-Xue Zhang, **aobin Zhu, Jie-Bo Hou, Xu-Cheng Yin in Applied Intelligence (2023)

  5. Article

    Open Access

    A practical Alzheimer’s disease classifier via brain imaging-based deep learning on 85,721 samples

    Beyond detecting brain lesions or tumors, comparatively little success has been attained in identifying brain disorders such as Alzheimer’s disease (AD), based on magnetic resonance imaging (MRI). Many machine...

    Bin Lu, Hui-**an Li, Zhi-Kai Chang, Le Li, Ning-Xuan Chen in Journal of Big Data (2022)

  6. No Access

    Article

    A Unified Shared-Private Network with Denoising for Dialogue State Tracking

    Dialogue state tracking (DST) leverages dialogue information to predict dialogues states which are generally represented as slot-value pairs. However, previous work usually has limitations to efficiently predi...

    Qing-Bin Liu, Shi-Zhu He, Kang Liu in Journal of Computer Science and Technology (2021)

  7. No Access

    Article

    Filling the gap: thermal properties and device applications of graphene

    With the miniaturization and integration of electronic devices, the heat dissipation problems caused by higher power density are getting more serious, limiting the development of integrated circuits industry. ...

    Rui Wu, Rui-Zhi Zhu, Shi-Hui Zhao, Gang Zhang in Science China Information Sciences (2021)

  8. No Access

    Article

    Heterogeneous defect prediction with two-stage ensemble learning

    Heterogeneous defect prediction (HDP) refers to predicting defect-prone software modules in one project (target) using heterogeneous data collected from other projects (source). Recently, several HDP methods h...

    Zhiqiang Li, **ao-Yuan **g, **aoke Zhu, Hongyu Zhang in Automated Software Engineering (2019)

  9. No Access

    Article

    A Large Chinese Text Dataset in the Wild

    In this paper, we introduce a very large Chinese text dataset in the wild. While optical character recognition (OCR) in document images is well studied and many commercial tools are available, the detection an...

    Tai-Ling Yuan, Zhe Zhu, Kun Xu, Cheng-Jun Li in Journal of Computer Science and Technology (2019)

  10. No Access

    Article

    1.3-µm 4×25-Gb/s hybrid integrated TOSA and ROSA

    The design and fabrication of a compact and low-cost 4×25-Gb/s transmitter optical sub-assembly (TOSA) and receiver optical sub-assembly (ROSA) using a hybrid integrated technique are reported. TOSA and ROSA a...

    Yu Liu, Hao-tian Bao, Yi-ming Zhang in Frontiers of Information Technology & Elec… (2019)

  11. No Access

    Chapter and Conference Paper

    Pick-and-Learn: Automatic Quality Evaluation for Noisy-Labeled Image Segmentation

    Deep learning methods have achieved promising performance in many areas, but they are still struggling with noisy-labeled images during the training process. Considering that the annotation quality indispensab...

    Haidong Zhu, Jialin Shi, Ji Wu in Medical Image Computing and Computer Assis… (2019)

  12. No Access

    Article

    Energy management for multi-microgrid system based on model predictive control

    To reduce the computation complexity of the optimization algorithm used in energy management of a multi-microgrid system, an energy optimization management method based on model predictive control is presented...

    Ke-yong Hu, Wen-juan Li, Li-dong Wang in Frontiers of Information Technology & Elec… (2018)

  13. No Access

    Article

    An oversampling approach for mining program specifications

    Automatic protocol mining is a promising approach for inferring accurate and complete API protocols. However, just as with any data-mining technique, this approach requires sufficient training data (object usa...

    Deng Chen, Yan-duo Zhang, Wei Wei in Frontiers of Information Technology & Elec… (2018)

  14. No Access

    Article

    A space-saving steering method for underwater gliders in lake monitoring

    An increasing number of underwater gliders have been applied to lake monitoring. Lakes have a limited vertical space. Therefore, good space-saving capacity is required for underwater gliders to enlarge the spa...

    Yu-shi Zhu, Can-jun Yang, Shi-jun Wu in Frontiers of Information Technology & Elec… (2017)

  15. No Access

    Article

    Approximate Continuous Top-k Query over Sliding Window

    Continuous top-k query over sliding window is a fundamental problem in database, which retrieves k objects with the highest scores when the window slides. Existing studies mainly adopt exact algorithms to tackle ...

    Rui Zhu, Bin Wang, Shi-Ying Luo in Journal of Computer Science and Technology (2017)

  16. No Access

    Article

    xBreeze/ADL: A language for software architecture specification and analysis

    Architecture description languages play an important role in modelling software architectures. However, many architecture description languages (ADLs) are either unable to deal with the verification and dynami...

    Chen Li, Hong-Ji Yang, Mei-Yu Shi, Wei Zhu in International Journal of Automation and Co… (2016)

  17. Article

    Open Access

    Panorama completion for street views

    This paper considers panorama images used for street views. Their viewing angle of 360° causes pixels at the top and bottom to appear stretched and warped. Although current image completion algorithms work wel...

    Zhe Zhu, Ralph R. Martin, Shi-Min Hu in Computational Visual Media (2015)

  18. No Access

    Article

    Adaptive contourlet-wavelet iterative shrinkage/thresholding for remote sensing image restoration

    In this paper, we present an adaptive two-step contourlet-wavelet iterative shrinkage/thresholding (TcwIST) algorithm for remote sensing image restoration. This algorithm can be used to deal with various linea...

    Nu Wen, Shi-zhi Yang, Cheng-jie Zhu in Journal of Zhejiang University SCIENCE C (2014)

  19. No Access

    Chapter and Conference Paper

    The Implications of Diverse Applications and Scalable Data Sets in Benchmarking Big Data Systems

    Now we live in an era of big data, and big data applications are becoming more and more pervasive. How to benchmark data center computer systems running big data applications (in short big data systems) is a h...

    Zhen Jia, Runlin Zhou, Chunge Zhu, Lei Wang, Wanling Gao in Specifying Big Data Benchmarks (2014)

  20. No Access

    Article

    Adapting grid computing environments dependable with virtual machines: design, implementation, and evaluations

    Due to its potential, using virtual machines in grid computing is attracting increasing attention. Most of the researches focus on how to create or destroy a virtual execution environments for different kinds ...

    Xuanhua Shi, Hai **, Song Wu, Wei Zhu, Li Qi in The Journal of Supercomputing (2013)

previous disabled Page of 2