We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. A scientific paper recommendation method using the time decay heterogeneous graph

    Finding appropriate and relevant papers about a project in various digital libraries with millions of scientific papers is challenging for...

    Zhenye Huang, Deyou Tang, ... Wen**g Rao in Scientometrics
    Article 23 January 2024
  2. AVSDA: Autonomous Vehicle Security Decay Assessment

    Security practices become weaker over time as attackers’ capabilities evolve. Security decay within vehicle software systems can have devastating...
    Lama Moukahal, Mohammad Zulkernine, Martin Soukup in Risks and Security of Internet and Systems
    Conference paper 2022
  3. 18 million links in commit messages: purpose, evolution, and decay

    Commit messages contain diverse and valuable types of knowledge in all aspects of software maintenance and evolution. Links are an example of such...

    Tao **ao, Sebastian Baltes, ... Kenichi Matsumoto in Empirical Software Engineering
    Article 25 May 2023
  4. A Digital Body Farm for Collecting Deleted File Decay Data

    Recovering deleted data can be a time-consuming task during digital forensic investigations. As tedious as the task is, it may not produce useful...
    Omoche Cheche Agada, Ibifubara Iganibo, ... Kevin Fairbanks in Advances in Digital Forensics XVIII
    Conference paper 2022
  5. Analysis of Radioactive Decay Based Entropy Generator in the IoT Environments

    In cryptography, random numbers are the most important element for security. Random numbers are generated through RNG (Random Number Generator), and...
    Taewan Kim, Seyoon Lee, ... Okyeon Yi in Information Security Applications
    Conference paper 2023
  6. GADN: GCN-Based Attentive Decay Network for Course Recommendation

    Course recommendation in online platforms aims to address the information explosion problem and make personalized recommendations for users. Most of...
    Wen Chen, Wenjun Ma, ... **aomao Fan in Knowledge Science, Engineering and Management
    Conference paper 2022
  7. General Decay Synchronization of Fuzzy Inertial Memristive Neural Networks with Discontinuous Activation Function

    This paper studied the general decay synchronization (GDS) of fuzzy inertial memristive neural networks (FIMNNs) with mixed delays and discontinuous...

    Huihui Chen, Minghui Jiang, ... ** Yang in Neural Processing Letters
    Article 15 July 2023
  8. Breaking Time Invariance: Assorted-Time Normalization for RNNs

    Methods such as Layer Normalization (LN) and Batch Normalization have proven to be effective in improving the training of Recurrent Neural Networks...

    Cole Pospisil, Vasily Zadorozhnyy, Qiang Ye in Neural Processing Letters
    Article Open access 01 March 2024
  9. Mittag–Leffler stability of numerical solutions to time fractional ODEs

    The asymptotic stable region and long-time decay rate of solutions to linear homogeneous Caputo time fractional ordinary differential equations...

    Dongling Wang, Jun Zou in Numerical Algorithms
    Article 06 August 2022
  10. Enhanced Time-Aware Collaborative Filtering for QoS Web Service Prediction

    Predicting Quality of Service (QoS) is an essential task in Service Oriented Computing (SOC). In service selection, choosing the right services is a...
    Ezdehar Jawabreh, Adel Taweel in Service-Oriented and Cloud Computing
    Conference paper 2023
  11. Time-aware neural ordinary differential equations for incomplete time series modeling

    Internet of Things realizes the ubiquitous connection of all things, generating countless time-tagged data called time series. However, real-world...

    Zhuoqing Chang, Shubo Liu, ... Guoqing Tu in The Journal of Supercomputing
    Article 18 May 2023
  12. Sliding modes: from asymptoticity, to finite time and fixed time

    This paper proposes a new fixed-time sliding mode (FSM) control, where the settling time for reaching the system origin is bounded to a constant...

    Wenwu Yu, **nghuo Yu, He Wang in Science China Information Sciences
    Article 28 August 2023
  13. Time and value aware influence blocking maximization in geo-social networks

    The influence blocking maximization (IBM) problem aims to identify the most influential set of positive nodes in a social network to prevent the...

    Wenlong Zhu, Chongyuan Peng, ... Shuangshuang Yang in The Journal of Supercomputing
    Article 06 June 2024
  14. Thompson Sampling with Time-Varying Reward for Contextual Bandits

    Contextual bandits efficiently solve the exploration and exploitation (EE) problem in online recommendation tasks. Most existing contextual bandit...
    Cairong Yan, Hualu Xu, ... Zijian Wang in Database Systems for Advanced Applications
    Conference paper 2023
  15. A Preliminary Effort to Develop a Framework of Distance Decay Functions for New Urban Active Mobility

    Sustainable mobility in urban areas has made a giant leap forward with the widespread diffusion of muscular bike, e-bike and e-scooter in the last...
    Mauro D’Apuzzo, Giuseppe Cappelli, ... Azzurra Evangelisti in Computational Science and Its Applications – ICCSA 2023 Workshops
    Conference paper 2023
  16. Time Series

    There is a very old story about time series analysis. In ancient Egypt 7000 years ago, people recorded the ups and downs of the Nile River day by day...
    Wang He, Peng Liu, Qian Qian in Machine Learning Contests: A Guidebook
    Chapter 2023
  17. A collaborative filtering recommendation system with dynamic time decay

    The collaborative filtering (CF) technique has been widely utilized in recommendation systems due to the precise prediction of users' interests. Most...

    Yi-Cheng Chen, Lin Hui, Tipa** Thaipisutikul in The Journal of Supercomputing
    Article 01 April 2020
  18. LW-DeepFakeNet: a lightweight time distributed CNN-LSTM network for real-time DeepFake video detection

    With the large-scale and pervading social media platforms and the recent advances in generative deep learning techniques, it is nowadays quite common...

    Umar Masud, Mohd. Sadiq, ... Ahmed A. Abd El-Latif in Signal, Image and Video Processing
    Article 15 June 2023
  19. Time-sensitive propagation values discount centrality measure

    The detection of influential individuals in social networks is called influence maximization which has many applications in advertising and...

    Salman Mokhtarzadeh, Behzad Zamani Dehkordi, ... Ali Barati in Computing
    Article 04 March 2024
  20. Stock Price Prediction Using Time Series

    The stock price of a commodity is an essential factor for determining market volatility. Exact prediction of stock price and forecasting the market...
    Rahul Maurya, Dashniet Kaur, ... Shashi Ranjan in Advanced Computing
    Conference paper 2024
Did you find what you were looking for? Share feedback.