We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation

    Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...

    Zhigao Zhang, Fanfei Song, ... Chuansheng Dong in Data Science and Engineering
    Article Open access 09 July 2024
  2. Negative-sample-free knowledge graph embedding

    Recently, knowledge graphs (KGs) have been shown to benefit many machine learning applications in multiple domains (e.g. self-driving, agriculture,...

    Adil Bahaj, Mounir Ghogho in Data Mining and Knowledge Discovery
    Article 09 July 2024
  3. Open benchmark for filtering techniques in entity resolution

    Entity Resolution identifies entity profiles that represent the same real-world object. A brute-force approach that considers all pairs of entities...

    Franziska Neuhof, Marco Fisichella, ... Manolis Koubarakis in The VLDB Journal
    Article 09 July 2024
  4. Requirements for modelling tools for teaching

    Modelling is an important activity in software development and it is essential that students learn the relevant skills. Modelling relies on dedicated...

    Jörg Kienzle, Steffen Zschaler, ... Sofia Meacham in Software and Systems Modeling
    Article Open access 09 July 2024
  5. A robust hubness-based algorithm for image data stream classification

    Image data stream classification is in high demand and can be used in various contexts, such as public security, medicine, and remote sensing....

    Mateus C. de Lima, Elaine R. Faria, Maria Camila N. Barioni in International Journal of Data Science and Analytics
    Article 09 July 2024
  6. Video anomaly localization using modified faster RCNN with soft NMS algorithm

    Localization of anomalies in surveillance videos is a critical component of smart and intelligent surveillance systems. The goal of anomaly detection...

    S. Anoopa, A. Salim, S. Nadera Beevi in International Journal of Data Science and Analytics
    Article 08 July 2024
  7. Minimum motif-cut: a workload-aware RDF graph partitioning strategy

    In designing a distributed RDF system, it is quite common to divide an RDF graph into subgraphs, called partitions , which are then distributed. Graph...

    Peng Peng, Shengyi Ji, ... Lei Zou in The VLDB Journal
    Article 08 July 2024
  8. An efficient facial emotion recognition using convolutional neural network with local sorting binary pattern and whale optimization algorithm

    Facial emotion recognition is one of the fields of machine learning and pattern recognition. Facial expression recognition is used in a variety of...

    Fereshteh Aghabeigi, Sara Nazari, Nafiseh Osati Eraghi in International Journal of Data Science and Analytics
    Article 08 July 2024
  9. Similarity-based face image retrieval using sparsely embedded deep features and binary code learning

    Human face retrieval has long been established as one of the most interesting research topics in computer vision. With the recent development of deep...

    Abdessamad Elboushaki, Rachida Hannane, Karim Afdel in International Journal of Multimedia Information Retrieval
    Article 08 July 2024
  10. Digital Sustainability for Energy-Efficient Behaviours: A User Representation and Touchpoint Model

    In response to climate change, nations have been tasked with reducing energy consumption and lessening their carbon footprint through targeted...

    Stephen McCarthy, Titiana Ertiö, ... Nina Kahma in Information Systems Frontiers
    Article Open access 08 July 2024
  11. English listening and speaking ability improvement strategy from Artificial Intelligence wireless network

    With the rapid development of science and technology, there are many derivatives of Artificial Intelligence (AI) technology based on wireless...

    Nan Hu in Wireless Networks
    Article 08 July 2024
  12. Virtual Experiences, Real Memories? A Study on Information Recall and Recognition in the Metaverse

    There are high expectations towards extended reality (XR), namely the “metaverse”. However, human performance in the metaverse has been called into...

    Nannan **, Juan Chen, ... Juho Hamari in Information Systems Frontiers
    Article Open access 08 July 2024
  13. DOCA: a UAV-assisted multi-hop D2D resource allocation scheme for 5G and beyond using machine learning

    Device-to-Device (D2D) relayed communication helps in extending the coverage range of cellular networks. Relay devices support multi-hop D2D...

    Pradip Kumar Barik, Ashu Dayal Chaurasiya, Raja Datta in Telecommunication Systems
    Article 08 July 2024
  14. A Taxonomy of Home Automation: Expert Perspectives on the Future of Smarter Homes

    Recent advancements in digital technologies, including artificial intelligence (AI), Internet of Things (IoT), and information and communication...

    Shabnam FakhrHosseini, Chaiwoo Lee, ... Joseph Coughlin in Information Systems Frontiers
    Article Open access 08 July 2024
  15. Research performance of higher education institutions in Türkiye: 1980–2022

    In recent years, there has been a growing interest in the measurement of research performance. These studies evaluate a country or groups of...

    Muammer Maral in Scientometrics
    Article Open access 08 July 2024
  16. An anonymous broadcasting system with accountability based on group signatures

    Advanced anonymous communication schemes have been proposed to protect the privacy of network users, enabling them to communicate anonymously on the...

    Huan Ye, Fagen Li in Telecommunication Systems
    Article 07 July 2024
  17. Crystals kyber cryptographic algorithm for efficient IoT D2d communication

    Device-to-Device (D2D) communication stands as a pivotal technology revolutionizing conventional base station-to-device (B2D) communication...

    S. Selvakumar, A. Ahilan, ... N. Muthukumaran in Wireless Networks
    Article 07 July 2024
  18. Hyper-relational knowledge graph neural network for next POI recommendation

    With the advancement of mobile technology, Point of Interest (POI) recommendation systems in Location-based Social Networks (LBSN) have brought...

    Jixiao Zhang, Yongkang Li, ... Xuan Song in World Wide Web
    Article 06 July 2024
  19. Parallel continuous skyline query over high-dimensional data stream windows

    Real-time multi-criteria decision-making applications in fields like high-speed algorithmic trading, emergency response, and disaster management have...

    Walid Khames, Allel Hadjali, Mohand Lagha in Distributed and Parallel Databases
    Article 06 July 2024
Did you find what you were looking for? Share feedback.