Skip to main content

previous disabled Page of 35
and
Your search also matched 5,143 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

InDNI: An Infection Time Independent Method for Diffusion Network Inference

Include preview-only content
  1. Chapter and Conference Paper

    Sound Pressure Field Reconstruction for Ultrasound Phased Array by Linear Synthesis Scheme Optimization

    Ultrasound phased array is a device that is usually used to provide mid air tactile sensations like three-dimensional shape haptics images by generating various specific sound fields. Forming foci for the ultr...

    Jianyu Chen, Shun Suzuki, Tao Morisaki in Haptics: Science, Technology, Applications (2022)

  2. Chapter and Conference Paper

    Correction to: Anonymizing Global Edge Weighted Social Network Graphs

    In the originally published chapter 9 some of the paragraphs were presented in their unfinished version, which affected the readability of the paper. The sections Introduction, Preliminary and References have ...

    Jiaru Wang, Ziyi Wan, Jiankang Song in Security and Privacy in Social Networks an… (2021)

  3. Chapter and Conference Paper

    Correction to: Short Text Clustering with a Deep Multi-embedded Self-supervised Model

    Due to an oversight, the second affiliation of three co-authors was omitted in the originally published version. The revised version has the correct affiliations of all co-authors.

    Kai Zhang, Zheng Lian, Jiangmeng Li in Artificial Neural Networks and Machine Lea… (2021)

  4. Chapter and Conference Paper

    Correction to: Federated Learning for Non-IID Data: From Theory to Algorithm

    In the originally published version of chapter 3 the second affiliation of the author Bojian Wei was incorrect. The second affiliation of the author Bojian Wei has been corrected as “School of Cyber Security, ...

    Bojian Wei, Jian Li, Yong Liu, Wei** Wang in PRICAI 2021: Trends in Artificial Intellig… (2021)

  5. Chapter and Conference Paper

    Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing

    The Meet-in-the-Middle (MITM) preimage attack is highly effective in breaking the preimage resistance of many hash functions, including but not limited to the full MD5, HAVAL, and Tiger, and reduced SHA-0/1/2. It...

    Zhenzhen Bao, **aoyang Dong, Jian Guo, Zheng Li in Advances in Cryptology – EUROCRYPT 2021 (2021)

  6. Chapter and Conference Paper

    Correction to: Rethinking Image Inpainting via a Mutual Encoder-Decoder with Feature Equalizations

    In the originally published version of chapter 43, the second affiliation stated a wrong city and country. This has been corrected.

    Hongyu Liu, Bin Jiang, Yibing Song, Wei Huang, Chao Yang in Computer Vision – ECCV 2020 (2020)

  7. Chapter and Conference Paper

    A Mixed Semantic Features Model for Chinese NER with Characters and Words

    Named Entity Recognition (NER) is an essential part of many natural language processing (NLP) tasks. The existing Chinese NER methods are mostly based on word segmentation, or use the character sequences as in...

    Ning Chang, Jiang Zhong, Qing Li, Jiang Zhu in Advances in Information Retrieval (2020)

  8. Chapter and Conference Paper

    Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization

    In recent years, with the development of mobile terminals, geographic location has attracted the attention of many researchers because of its convenience in collection and its ability to reflect user profile. ...

    Huichuan Liu, Yong Zeng, Jiale Liu, Zhihong Liu, Jianfeng Ma, **aoyan Zhu in Cyber Security (2020)

  9. Chapter and Conference Paper

    HGAR: Hybrid Granular Algorithm for Rating Recommendation

    Recommendation algorithms based on collaborative filtering show products which people might like and play an important role in personalized service. Nevertheless, the most of them just adopt explicit informati...

    Fulan Qian, Yafan Huang, Jianhong Li, Shu Zhao, Jie Chen, in Rough Sets (2020)

  10. Chapter and Conference Paper

    Visual Compiler: Towards Translating Digital UI Design Draft to Front-End Code Automatically

    One assignment of a front-end engineer is to transform the User Interface (UI) design drafts to arrangements with program compatibilities. To furnish the customer requirement, engineers usually need to consid...

    Jiemao Pan, **ang Chen, Ting Chen, Bin Tang in Human Interface and the Management of Info… (2020)

  11. Chapter and Conference Paper

    MHDNE: Network Embedding Based on Multivariate Hawkes Process

    With the evolution of the network, the interactions among nodes in networks make networks exhibit dynamic properties. Mining the rich information behind dynamic networks is of great importance for network anal...

    Ying Yin, Jianpeng Zhang, Yulong Pei in Machine Learning and Knowledge Discovery i… (2020)

  12. Chapter and Conference Paper

    A Comparison of Explanatory Measures in Abductive Inference

    Computer simulations have been carried out to investigate the performance of two measures for abductive inference, Maximum Likelihood (ML), and Product Coherence Measure (PCM), by comparing them with a third a...

    Jian-Dong Huang, David H. Glass in Information Processing and Management of U… (2020)

  13. Chapter and Conference Paper

    Research on Consumers’ Decision-Making Factors of Cultural and Creative Products of the Palace Museum Under the Background of New Media

    With the development of social economy, new media platform has gradually become an important channel for people to communicate. The cultural and creative industry of the Palace Museum has attracted more and mo...

    Ziwei Chen, Jiaqian Xu, Bing **ao in Culture and Computing (2020)

  14. Chapter and Conference Paper

    A Web-Based Platform for Mining and Ranking Association Rules

    In this demo, we introduce an interactive system, which effectively applies multiple criteria analysis to rank association rules. We first use association rules techniques to explore the correlations between v...

    Addi Ait-Mlouk, Lili Jiang in Advances in Information Retrieval (2020)

  15. Chapter and Conference Paper

    Recommending Music Curators: A Neural Style-Aware Approach

    We propose a framework for personalized music curator recommendation to connect users with curators who have matching curation style. Three unique features of the proposed framework are: (i) models of curation s...

    Jianling Wang, James Caverlee in Advances in Information Retrieval (2020)

  16. Chapter and Conference Paper

    Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security

    We propose a generic construction of 2-pass authenticated key exchange (AKE) scheme with explicit authentication from key encapsulation mechanism (KEM) and signature (SIG) schemes. We improve the security mode...

    **angyu Liu, Shengli Liu, Dawu Gu, Jian Weng in Advances in Cryptology – ASIACRYPT 2020 (2020)

  17. Chapter and Conference Paper

    An Approach for Process Model Extraction by Multi-grained Text Classification

    Process model extraction (PME) is a recently emerged interdiscipline between natural language processing (NLP) and business process management (BPM), which aims to extract process models from textual descripti...

    Chen Qian, Lijie Wen, Akhil Kumar, Leilei Lin in Advanced Information Systems Engineering (2020)

  18. Chapter and Conference Paper

    Identification of Key Factors Affecting Logistics Service Quality of Cross-border E-commerce

    As cross-border e-commerce has broad market space and rapid development momentum, more and more manufacturing enterprises begin to explore the application of cross-border e-commerce, especially small and mediu...

    Peng Jiang, Hang Jiang, Yi-Chung Hu in HCI in Business, Government and Organizati… (2020)

  19. Chapter and Conference Paper

    VGCN-BERT: Augmenting BERT with Graph Embedding for Text Classification

    Much progress has been made recently on text classification with methods based on neural networks. In particular, models using attention mechanism such as BERT have shown to have the capability of capturing th...

    Zhibin Lu, Pan Du, Jian-Yun Nie in Advances in Information Retrieval (2020)

  20. Chapter and Conference Paper

    Quantum Circuit Implementations of AES with Fewer Qubits

    We propose some quantum circuit implementations of AES with the following improvements. Firstly, we propose some quantum circuits of the AES S-box and S-box

    Jian Zou, Zihao Wei, Siwei Sun, **meng Liu in Advances in Cryptology – ASIACRYPT 2020 (2020)

previous disabled Page of 35