We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Multi-instance embedding learning with deconfounded instance-level prediction

    Confounded information is an objective fact when using multi-instance learning (MIL) to classify bags of instances, which may be inherited by MIL...

    Yu-Xuan Zhang, Mei Yang, ... Fan Min in International Journal of Data Science and Analytics
    Article 15 November 2022
  2. Towards a general user model to develop intelligent user interfaces

    The way end-users interact with a system plays a crucial role in the high acceptance of software. Related to this, the concept of Intelligent User...

    Alberto Gaspar, Miriam Gil, ... VerĆ³nica Romero in Multimedia Tools and Applications
    Article Open access 25 January 2024
  3. Instance segmentation-based review photo validation scheme

    User reviews of products in online shop** malls significantly influence the purchase decision of those products. Consequently, many shop** malls...

    Sungwoo Park, Jaeuk Moon, ... Eenjun Hwang in The Journal of Supercomputing
    Article 05 September 2022
  4. Modeling of anticipation using instance-based learning: application to automation surprise in aviation using passive BCI and eye-tracking data

    Human-centered artificial intelligence (HCAI) needs to be able to adapt to anticipated user behavior. We argue that the anticipation capabilities...

    Oliver W. Klaproth, Emmanuelle Dietz, ... Nele Russwinkel in User Modeling and User-Adapted Interaction
    Article 28 March 2024
  5. InstaFormer++: Multi-Domain Instance-Aware Image-to-Image Translation with Transformer

    We present a novel Transformer-based network architecture for instance-aware image-to-image translation, dubbed InstaFormer, to effectively integrate...

    Soohyun Kim, Jongbeom Baek, ... Seungryong Kim in International Journal of Computer Vision
    Article 31 October 2023
  6. HMM-CPM: a cloud instance resource prediction method tracing the workload trends via hidden Markov model

    Accurate prediction of cloud resource instances is becoming increasingly important for public cloud users and cloud service providers, because it...

    Zhihe Yang, **aogang Wang, ... Yangli Liu in Cluster Computing
    Article 06 June 2024
  7. Inferring Attention Shifts for Salient Instance Ranking

    The human visual system has limited capacity in simultaneously processing multiple visual inputs. Consequently, humans rely on shifting their...

    Avishek Siris, Jianbo Jiao, ... Rynson W. H. Lau in International Journal of Computer Vision
    Article Open access 18 October 2023
  8. Instance segmentation on distributed deep learning big data cluster

    Distributed deep learning is a promising approach for training and deploying large and complex deep learning models. This paper presents a...

    Mohammed Elhmadany, Islam Elmadah, Hossam E. Abdelmunim in Journal of Big Data
    Article Open access 02 January 2024
  9. Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting

    We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many...

    Dennis Hofheinz, Jessica Koch, Christoph Striecks in Journal of Cryptology
    Article Open access 29 February 2024
  10. Configuring the Instance

    The installation and configuration of your SQL Server instance does not end when setup successfully completes. There are many other considerations...
    Chapter 2023
  11. NICE: an algorithm for nearest instance counterfactual explanations

    In this paper we propose a new algorithm, named NICE, to generate counterfactual explanations for tabular data that specifically takes into account...

    Dieter Brughmans, Pieter Leyman, David Martens in Data Mining and Knowledge Discovery
    Article 07 April 2023
  12. Optimal prediction of cloud spot instance price utilizing deep learning

    Cloud platforms often offer a variety of virtual machine (VM) models of various types and capacities, enabling users to choose the instances that...

    Seyed Soroush Nezamdoust, Mohammad Ali Pourmina, Farbod Razzazi in The Journal of Supercomputing
    Article 02 December 2022
  13. Incremental User Identification Across Social Networks Based on User-Guider Similarity Index

    Identifying accounts across different online social networks that belong to the same user has attracted extensive attentions. However, existing...

    Yue Kou, Dong Li, ... Ge Yu in Journal of Computer Science and Technology
    Article 30 September 2022
  14. Fast instance selection method for SVM training based on fuzzy distance metric

    Support Vector Machine (SVM) is a well-known classification technique which has achieved excellent performance in many nonlinear and high dimensional...

    Junyuan Zhang, Chuan Liu in Applied Intelligence
    Article 24 January 2023
  15. Intelligent data-driven acquisition method for user requirements

    Consumer behavior has changed due to digitization. Online shoppers now refer to user reviews containing comprehensive data produced in real-time,...

    Zhenwei You, Jian Liu, ... Wei-Chen Chang in Personal and Ubiquitous Computing
    Article 20 April 2024
  16. Automatic user story generation: a comprehensive systematic literature review

    User stories are the lifeblood of agile software development due to their semi-structured format and ease of implementation. However, the variety of...

    Carlos Alberto dos Santos, Kevin Bouchard, Bianca Minetto NapoleĆ£o in International Journal of Data Science and Analytics
    Article 03 June 2024
  17. Adaptive user interface based on accessibility context

    The substantial involvement of Adaptive User Interfaces (AUI) in providing adaptive and accessible interactive systems has created the need to...

    Lamia Zouhaier, Yousra BenDalyHlaoui, Leila Ben Ayed in Multimedia Tools and Applications
    Article 09 March 2023
  18. Anomaly detection in IOT edge computing using deep learning and instance-level horizontal reduction

    The increasing number of network attacks has led to the development of intrusion detection systems. However, these methods often face limitations...

    Negar Abbasi, Mohammadreza Soltanaghaei, Farsad Zamani Boroujeni in The Journal of Supercomputing
    Article 02 December 2023
  19. Adapting approaching proxemics of a service robot based on physical user behavior and user feedback

    Service robots with social interactive features are developed to cater to the demand in various application domains. These robots often need to...

    S. M. Bhagya P. Samarakoon, M. A. Viraj J. Muthugala, ... Mohan Rajesh Elara in User Modeling and User-Adapted Interaction
    Article 30 May 2022
  20. Reliable and privacy-preserving multi-instance iris verification using Paillier homomorphic encryption and one-digit checksum

    The utilization of a biometric authentication system (BAS) for reliable automatic human recognition has increased exponentially in recent years over...

    Mahesh Kumar Morampudi, Nagamani Gonthina, ... Duggineni Veeraiah in Signal, Image and Video Processing
    Article 24 February 2024
Did you find what you were looking for? Share feedback.