Search
Search Results
-
Multi-instance embedding learning with deconfounded instance-level prediction
Confounded information is an objective fact when using multi-instance learning (MIL) to classify bags of instances, which may be inherited by MIL...
-
Towards a general user model to develop intelligent user interfaces
The way end-users interact with a system plays a crucial role in the high acceptance of software. Related to this, the concept of Intelligent User...
-
Instance segmentation-based review photo validation scheme
User reviews of products in online shop** malls significantly influence the purchase decision of those products. Consequently, many shop** malls...
-
Modeling of anticipation using instance-based learning: application to automation surprise in aviation using passive BCI and eye-tracking data
Human-centered artificial intelligence (HCAI) needs to be able to adapt to anticipated user behavior. We argue that the anticipation capabilities...
-
InstaFormer++: Multi-Domain Instance-Aware Image-to-Image Translation with Transformer
We present a novel Transformer-based network architecture for instance-aware image-to-image translation, dubbed InstaFormer, to effectively integrate...
-
HMM-CPM: a cloud instance resource prediction method tracing the workload trends via hidden Markov model
Accurate prediction of cloud resource instances is becoming increasingly important for public cloud users and cloud service providers, because it...
-
Inferring Attention Shifts for Salient Instance Ranking
The human visual system has limited capacity in simultaneously processing multiple visual inputs. Consequently, humans rely on shifting their...
-
Instance segmentation on distributed deep learning big data cluster
Distributed deep learning is a promising approach for training and deploying large and complex deep learning models. This paper presents a...
-
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many...
-
Configuring the Instance
The installation and configuration of your SQL Server instance does not end when setup successfully completes. There are many other considerations... -
NICE: an algorithm for nearest instance counterfactual explanations
In this paper we propose a new algorithm, named NICE, to generate counterfactual explanations for tabular data that specifically takes into account...
-
Optimal prediction of cloud spot instance price utilizing deep learning
Cloud platforms often offer a variety of virtual machine (VM) models of various types and capacities, enabling users to choose the instances that...
-
Incremental User Identification Across Social Networks Based on User-Guider Similarity Index
Identifying accounts across different online social networks that belong to the same user has attracted extensive attentions. However, existing...
-
Fast instance selection method for SVM training based on fuzzy distance metric
Support Vector Machine (SVM) is a well-known classification technique which has achieved excellent performance in many nonlinear and high dimensional...
-
Intelligent data-driven acquisition method for user requirements
Consumer behavior has changed due to digitization. Online shoppers now refer to user reviews containing comprehensive data produced in real-time,...
-
Automatic user story generation: a comprehensive systematic literature review
User stories are the lifeblood of agile software development due to their semi-structured format and ease of implementation. However, the variety of...
-
Adaptive user interface based on accessibility context
The substantial involvement of Adaptive User Interfaces (AUI) in providing adaptive and accessible interactive systems has created the need to...
-
Anomaly detection in IOT edge computing using deep learning and instance-level horizontal reduction
The increasing number of network attacks has led to the development of intrusion detection systems. However, these methods often face limitations...
-
Adapting approaching proxemics of a service robot based on physical user behavior and user feedback
Service robots with social interactive features are developed to cater to the demand in various application domains. These robots often need to...
-
Reliable and privacy-preserving multi-instance iris verification using Paillier homomorphic encryption and one-digit checksum
The utilization of a biometric authentication system (BAS) for reliable automatic human recognition has increased exponentially in recent years over...