Skip to main content

previous disabled Page of 209
and
  1. No Access

    Chapter and Conference Paper

    Evaluation of Deep Reinforcement Learning Based Stock Trading

    Stock is one of the most important targets in investment. However, it is challenging to manually design a profitable strategy in the highly dynamic and complex stock market. Modern portfolio management usually...

    Yining Zhang, Zherui Zhang, Hongfei Yan in Information Retrieval (2023)

  2. No Access

    Chapter and Conference Paper

    Syntax-Aware Transformer for Sentence Classification

    Sentence classification is a significant task in natural language processing (NLP) and is applied in many fields. The syntactic and semantic properties of words and phrases often determine the success of sente...

    Jiajun Shan, Zhiqiang Zhang, Yuwei Zeng, Yuyan Ying, Haiyan Wu in Information Retrieval (2023)

  3. No Access

    Chapter and Conference Paper

    Enhance Performance of Ad-hoc Search via Prompt Learning

    Recently, pre-trained language models (PTM) have achieved great success on ad hoc search. However, the performance decline in low-resource scenarios demonstrates the capability of PTM has not been inspired ful...

    Shenghao Yang, Yiqun Liu, **aohui **e, Min Zhang, Shao** Ma in Information Retrieval (2023)

  4. No Access

    Chapter and Conference Paper

    Beyond Precision: A Study on Recall of Initial Retrieval with Neural Representations

    Vocabulary mismatch is a central problem in information retrieval (IR), i.e., the relevant documents may not contain the same (symbolic) terms of the query. Recently, neural representations have shown great su...

    Yan **ao, Yixing Fan, Ruqing Zhang, Jiafeng Guo in Information Retrieval (2023)

  5. No Access

    Chapter and Conference Paper

    Contrastive Deep Knowledge Tracing

    Knowledge tracing (KT) aims to predict student performance on the next question according to historical records. Recently deep learning-based models for KT task successfully modeling student responses receive ...

    Huan Dai, Yue Yun, Yupei Zhang, Wenxin Zhang in Artificial Intelligence in Education. Pos… (2022)

  6. No Access

    Chapter and Conference Paper

    Extreme Multi-label Classification with Hierarchical Multi-task for Product Attribute Identification

    Identification of product attributes (product type, brand, color, gender, etc.) from a query is critically important for e-commerce search systems, especially the identification of brand intent. Recently, Name...

    Jun Zhang, Menqian Cai, Chenyu Zhao in Advances in Knowledge Discovery and Data M… (2022)

  7. No Access

    Chapter and Conference Paper

    Research on Depth-Adaptive Dual-Arm Collaborative Gras** Method

    Among the existing dual-arm cooperative gras** methods, the dual-arm cooperative gras** method based on RGB camera is the mainstream intelligent method. However, these methods often require predefined dept...

    Hao Zhang, Pengfei Yi, Rui Liu, **g Dong in Collaborative Computing: Networking, Appli… (2022)

  8. No Access

    Chapter and Conference Paper

    DHA: Product Title Generation with Discriminative Hierarchical Attention for E-commerce

    Product titles play an important role in E-Commerce sites. However, manually crafting product titles needs tremendous time and human effort. It is expected that product titles can be automatically generated, b...

    Wenya Zhu, Yinghua Zhang, Yu Zhang in Advances in Knowledge Discovery and Data M… (2022)

  9. No Access

    Chapter and Conference Paper

    Managing Learners’ Memory Strength in a POMDP-Based Learning Path Recommender System

    This paper views the learning path recommendation task as a sequential decision problem and considers Partially Observable Markov Decision Process (POMDP) as an adequate approach. This work proposes M-POMDP, a...

    Zhao Zhang, Armelle Brun, Anne Boyer in Artificial Intelligence in Education. Pos… (2022)

  10. No Access

    Chapter and Conference Paper

    Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection

    Millions of radio frequency identification (RFID) tags are pervasively used all around the globe to identify a wide variety of objects inexpensively. However, the tag cannot use energy-hungry cryptography due ...

    Yue Feng, Weiqing Huang, Siye Wang in Collaborative Computing: Networking, Appli… (2022)

  11. No Access

    Chapter and Conference Paper

    Temporal Event Reasoning Using Multi-source Auxiliary Learning Objectives

    Temporal event reasoning is vital in modern information-driven applications operating on news articles, social media, financial reports, etc. Recent works train deep neural nets to infer temporal events and re...

    **n Dong, Tanay Kumar Saha, Ke Zhang, Joel Tetreault in Advances in Information Retrieval (2022)

  12. No Access

    Chapter and Conference Paper

    A Model Driven Approach to Transform Business Vision-Oriented Decision-Making Requirement into Solution-Oriented Optimization Model

    Currently in our highly connected society, there is a strong requirement for decision-makers in organizations to coordinate and schedule their activities. Frequently, there are various uncertain factors, multi...

    Liwen Zhang, Hervé **aud, Elyes Lamine in Advances and Trends in Artificial Intellig… (2022)

  13. No Access

    Chapter and Conference Paper

    ToothCR: A Two-Stage Completion and Reconstruction Approach on 3D Dental Model

    Deep neural networks have made a number of achievements both in tooth segmentation and arrangement on complete 3D dental models. But few studies have used deep learning methods on the tooth completion and reco...

    Haoyu Zhu, **uyi Jia, Changdong Zhang in Advances in Knowledge Discovery and Data M… (2022)

  14. Chapter and Conference Paper

    Leveraging Customer Reviews for E-commerce Query Generation

    Customer reviews are an effective source of information about what people deem important in products (e.g. “strong zipper” for tents). These crowd-created descriptors not only highlight key product attributes,...

    Yen-Chieh Lien, Rongting Zhang, F. Maxwell Harper in Advances in Information Retrieval (2022)

  15. No Access

    Chapter and Conference Paper

    Parallel High Utility Itemset Mining

    Association rule mining is a popular data mining task for finding relationships between values from the itemsets that co-occur frequently in a transactional database. Association rule mining has many applicati...

    Gaojuan Fan, Huaiyuan **ao, Chongsheng Zhang in Advances and Trends in Artificial Intellig… (2022)

  16. No Access

    Chapter and Conference Paper

    An Oriented Attention Model for Infectious Disease Cases Prediction

    Effective infectious disease prediction supports the success of infection prevention and control. Several attention-based predictive models can be applied to undertake the prediction task. However, using a sin...

    Peisong Zhang, Zhi** Wang, Guoqing Chao in Advances and Trends in Artificial Intellig… (2022)

  17. No Access

    Chapter and Conference Paper

    Ultra-short-Term Load Forecasting Model Based on VMD and TGCN-GRU

    Load forecasting is to use historical load information to estimate the load demand for a period of time in the future. At present, mode decomposition algorithm is often used in the field to improve the forecas...

    Meirong Ding, Hang Zhang, Biqing Zeng in Advances and Trends in Artificial Intellig… (2022)

  18. No Access

    Chapter and Conference Paper

    Squeezing Water from a Stone: A Bag of Tricks for Further Improving Cross-Encoder Effectiveness for Reranking

    While much recent work has demonstrated that hard negative mining can be used to train better bi-encoder models, few have considered it in the context of cross-encoders, which are key ingredients in modern re...

    Ronak Pradeep, Yuqi Liu, **nyu Zhang, Yilin Li in Advances in Information Retrieval (2022)

  19. No Access

    Chapter and Conference Paper

    A Novel Risk Assessment Method Based on Hybrid Algorithm for SCADA

    With the frequent occurrence of cyber attacks in recent years, cyber attacks have become a major factor affecting the security and reliability of power SCADA. We urgently need an effective SCADA risk assessmen...

    Chen Yenan, Lu Tinghui, Li Linsen, Zhang Han in Collaborative Computing: Networking, Appli… (2022)

  20. No Access

    Chapter and Conference Paper

    Two-Stage Traffic Clustering Based on HNSW

    Traffic flow clustering is a common task to analyze urban traffic using GPS data of urban vehicles. Existing density-based traffic flow clustering methods generally have two important problems, that is to not ...

    Xu Zhang, **nzheng Niu in Advances and Trends in Artificial Intellig… (2022)

previous disabled Page of 209