![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
446 Result(s)
-
Article
Online Nonstop Task Management for Storm-Based Distributed Stream Processing Engines
Most distributed stream processing engines (DSPEs) do not support online task management and cannot adapt to time-varying data flows. Recently, some studies have proposed online task deployment algorithms to s...
-
Article
Characterization of Exact One-Query Quantum Algorithms for Partial Boolean Functions
The query model (or black-box model) has attracted much attention from the communities of both classical and quantum computing. Usually, quantum advantages are revealed by presenting a quantum algorithm that h...
-
Article
Reinvent Cloud Software Stacks for Resource Disaggregation
Due to the unprecedented development of low-latency interconnect technology, building large-scale disaggregated architecture is drawing more and more attention from both industry and academia. Resource disaggr...
-
Article
Chinese Named Entity Recognition Augmented with Lexicon Memory
Inspired by the concept of content-addressable retrieval from cognitive science, we propose a novel fragmentbased Chinese named entity recognition (NER) model augmented with a lexicon-based memory in which bot...
-
Article
Top-down Text-Level Discourse Rhetorical Structure Parsing with Bidirectional Representation Learning
Early studies on discourse rhetorical structure parsing mainly adopt bottom-up approaches, limiting the parsing process to local information. Although current top-down parsers can better capture global informa...
-
Article
Improving BERT Fine-Tuning via Self-Ensemble and Self-Distillation
Fine-tuning pre-trained language models like BERT have become an effective way in natural language processing (NLP) and yield state-of-the-art results on many downstream tasks. Recent studies on adapting BERT ...
-
Article
Prepartition: Load Balancing Approach for Virtual Machine Reservations in a Cloud Data Center
Load balancing is vital for the efficient and long-term operation of cloud data centers. With virtualization, post (reactive) migration of virtual machines (VMs) after allocation is the traditional way for loa...
-
Article
Query Authentication Using Intel SGX for Blockchain Light Clients
Due to limited computing and storage resources, light clients and full nodes coexist in a typical blockchain system. Any query from light clients must be forwarded to full nodes for execution, and light client...
-
Article
Facebook and Tencent Data Fit a Cube Law Better than Metcalfe’s Law
Metcalfe ’s law states that the value of a network grows as the square of the number of its users (V ∝ n2), which was validated by actual data of Facebook and Tencent in 2013–2015. Since then, the users and the v...
-
Article
Neural Emotion Detection via Personal Attributes
There has been a recent line of work to automatically detect the emotions of posts in social media. In literature, studies treat posts independently and detect their emotions separately. Different from previou...
-
Article
Towards Defense Against Adversarial Attacks on Graph Neural Networks via Calibrated Co-Training
Graph neural networks (GNNs) have achieved significant success in graph representation learning. Nevertheless, the recent work indicates that current GNNs are vulnerable to adversarial perturbations, in partic...
-
Article
Preface
-
Article
NfvInsight: A Framework for Automatically Deploying and Benchmarking VNF Chains
With the advent of virtualization techniques and software-defined networking (SDN), network function virtualization (NFV) shifts network functions (NFs) from hardware implementations to software appliances, be...
-
Article
Extracting Variable-Depth Logical Document Hierarchy from Long Documents: Method, Evaluation, and Application
In this paper, we study the problem of extracting variable-depth “logical document hierarchy” from long documents, namely organizing the recognized “physical document objects” into hierarchical structures. The...
-
Article
Self-Supervised Music Motion Synchronization Learning for Music-Driven Conducting Motion Generation
The correlation between music and human motion has attracted widespread research attention. Although recent studies have successfully generated motion for singers, dancers, and musicians, few have explored mot...
-
Article
Test-Driven Feature Extraction of Web Components
With the growing requirements of web applications, web components are developed to package the implementation of commonly-used features for reuse. In some cases, the developer may want to reuse some features w...
-
Article
ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference
Grey-box fuzzing is an effective technology to detect software vulnerabilities, such as memory corruption. Previous fuzzers in detecting memory corruption bugs either use heavy-weight analysis, or use techniqu...
-
Article
Imputing DNA Methylation by Transferred Learning Based Neural Network
DNA methylation is one important epigenetic type to play a vital role in many diseases including cancers. With the development of the high-throughput sequencing technology, there is much progress to disclose t...
-
Article
Document-Level Neural Machine Translation with Hierarchical Modeling of Global Context
Document-level machine translation (MT) remains challenging due to its difficulty in efficiently using document-level global context for translation. In this paper, we propose a hierarchical model to learn the...
-
Article
Meaningful Update and Repair of Markov Decision Processes for Self-Adaptive Systems
Self-adaptive systems are able to adjust their behaviour in response to environmental condition changes and are widely deployed as Internetwares. Considered as a promising way to handle the ever-growing comple...