We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 1,452 results
  1. Weakly-supervised instance co-segmentation via tensor-based salient co-peak search

    Instance co-segmentation aims to segment the co-occurrent instances among two images. This task heavily relies on instance-related cues provided by...

    Wuxiu Quan, Yu Hu, ... Hongmin Cai in Frontiers of Computer Science
    Article 13 September 2023
  2. Weakly supervised semantic segmentation for skin cancer via CNN superpixel region response

    Precise segmentation for skin cancer lesions at different stages is conducive to early detection and further treatment. We propose a weakly...

    Yanfei Hong, Guisheng Zhang, ... Kuixing Zhang in Multimedia Tools and Applications
    Article 10 August 2022
  3. Real-time global path planning for mobile robots with a complex 3-D shape in large-scale 3-D environment

    Real-time global path planning in a large-scale dynamic environment for mobile robots is a complex task, especially when the 3-D configurations of...

    **xun Wang, Kozo Moriyama, ... Fumitoshi Matsuno in Artificial Life and Robotics
    Article 25 October 2021
  4. Robust Human Matting via Semantic Guidance

    Automatic human matting is highly desired for many real applications. We investigate recent human matting methods and show that common bad cases...
    **angguang Chen, Ye Zhu, ... Shan Liu in Computer Vision – ACCV 2022
    Conference paper 2023
  5. SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients

    The success of blockchains has led to ever-growing ledgers that are stored by all participating full nodes. In contrast, light clients only store...
    Hamza Abusalah, Georg Fuchsbauer, ... Karen Klein in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  6. Personalized Re-ranking for Recommendation with Mask Pretraining

    Re-ranking is to refine the candidate ranking list of recommended items, such that the re-ranked list attracts users to purchase or click more items...

    Peng Han, Silin Zhou, ... Shuo Shang in Data Science and Engineering
    Article Open access 02 September 2023
  7. Mix-Nets from Re-randomizable and Replayable CCA-Secure Public-Key Encryption

    Mix-nets are protocols that allow a set of senders to send messages anonymously. Faonio et al.  (ASIACRYPT’19) showed how to instantiate mix-net...
    Antonio Faonio, Luigi Russo in Security and Cryptography for Networks
    Conference paper 2022
  8. Crowd Simulation

    Reference work entry 2024
  9. A Systematic Review of AI Privileges to Combat Widen Threat of Flavivirus

    In order to prevent the extraordinary spread of sickness caused by Flavivirus, the healthcare business as well as public health are working...
    Sirisha Potluri, Suneeta Satpathy, ... Sachi Nandan Mohanty in Ambient Intelligence in Health Care
    Conference paper 2023
  10. A Review of Goal Search Algorithms for Multi-robot Systems Based on Blockchain

    The main focus of this paper is to review the task allocation and goal search of multi-robot systems. This paper will sort out the development and...
    Jiansheng Peng, Fengbo Bao, ... Yong Qin in Blockchain Technology and Application
    Conference paper 2024
  11. Progressive residual networks for image super-resolution

    The recent advances in deep convolutional neural networks (DCNNs) have convincingly demonstrated high-capability reconstruction for single image...

    ** Wan, Hui Yin, ... Zhi-Hao Liu in Applied Intelligence
    Article 01 February 2020
  12. Multi-domain fusion deep graph convolution neural network for EEG emotion recognition

    Electroencephalogram (EEG)-based emotion recognition has become a hot research field, with the most attention given to decoding three basic types of...

    **ying Bi, Fei Wang, ... Yongzhao Wen in Neural Computing and Applications
    Article 17 August 2022
  13. LKAU-Net: 3D Large-Kernel Attention-Based U-Net for Automatic MRI Brain Tumor Segmentation

    Automatic segmentation of brain tumors from multi-modal magnetic resonance images (MRI) using deep learning methods has emerged in assisting the...
    Hao Li, Yang Nan, Guang Yang in Medical Image Understanding and Analysis
    Conference paper 2022
  14. Machine Learning with the Wolfram Language

    This chapter introduces the gradient descent algorithm as an optimization method for linear regression; the corresponding computations are shown, as...
    Chapter 2024
  15. Frequency Information Matters for Image Matting

    Image matting aims to estimate the opacity of foreground objects in order to accurately extract them from the background. Existing methods are only...
    Rongsheng Luo, Rukai Wei, ... Nong Sang in Pattern Recognition
    Conference paper 2023
  16. Iterative Solution for the Narrow Passage Problem in Motion Planning

    Finding a path in a narrow passage is a bottleneck for randomised sampling-based motion planning methods. This paper introduces a technique that...
    Jakub Szkandera, Ivana Kolingerová in Computational Science – ICCS 2022
    Conference paper 2022
  17. Chinese Relation Extraction with Bi-directional Context-Based Lattice LSTM

    Chinese entity relation extraction (Chinese RE) is a crucial task for various NLP applications. It aims to automatically extract relationships...
    Chengyi Ding, Lianwei Wu, ... Linyong Wang in Knowledge Science, Engineering and Management
    Conference paper 2023
  18. ViTAEv2: Vision Transformer Advanced by Exploring Inductive Bias for Image Recognition and Beyond

    Vision transformers have shown great potential in various computer vision tasks owing to their strong capability to model long-range dependency using...

    Qiming Zhang, Yufei Xu, ... Dacheng Tao in International Journal of Computer Vision
    Article 12 January 2023
  19. Revealing the character of journals in higher-order citation networks

    Revealing the character of journals based on citation data remains an interesting issue nowadays. It aims to establish a reasonable journal...

    **ang Li, Chengli Zhao, ... **aojun Duan in Scientometrics
    Article 11 October 2022
  20. Identity-Based Encryption in DDH Hard Groups

    The concept of Identity-Based Encryption was first introduced by Shamir (CRYPTO 1984) but were not realised until much later by Sakai, Ohgishi and...
    Olivier Blazy, Saqib A. Kakvi in Progress in Cryptology - AFRICACRYPT 2022
    Conference paper 2022
Did you find what you were looking for? Share feedback.