書目名稱Collaborative Computing: Networking, Applications and Worksharing影響因子(影響力)學科排名
書目名稱Collaborative Computing: Networking, Applications and Worksharing網絡公開度
書目名稱Collaborative Computing: Networking, Applications and Worksharing網絡公開度學科排名
書目名稱Collaborative Computing: Networking, Applications and Worksharing被引頻次
書目名稱Collaborative Computing: Networking, Applications and Worksharing被引頻次學科排名
書目名稱Collaborative Computing: Networking, Applications and Worksharing年度引用
書目名稱Collaborative Computing: Networking, Applications and Worksharing年度引用學科排名
書目名稱Collaborative Computing: Networking, Applications and Worksharing讀者反饋
書目名稱Collaborative Computing: Networking, Applications and Worksharing讀者反饋學科排名
作者: Dungeon 時間: 2025-3-21 22:28
Genders and Sexualities in Historyion network as a whole. Next, we design several meta-paths to guide the random walk to product node sequences and utilize the skip-gram model to generate user embeddings. Meanwhile, users’ latent factors are decomposed by matrix factorization. Finally, we incorporate these embeddings and factors to 作者: 爭議的蘋果 時間: 2025-3-22 01:46
https://doi.org/10.1007/978-3-030-27427-6 reward in the current context to find the optimal choice. Incorporating collaborative effects into Thompson sampling allows to capture real-time changes of the environment and adjust decision making strategy accordingly. We compare our algorithm with standard Thompson sampling algorithms on two rea作者: adipose-tissue 時間: 2025-3-22 05:09 作者: CLEFT 時間: 2025-3-22 11:23 作者: Pudendal-Nerve 時間: 2025-3-22 15:09 作者: Pudendal-Nerve 時間: 2025-3-22 17:33
Prostitution and the Contours of Controld is applied to discover the optimal features for the following recommendation. Second, we construct different feature groups according to the feature weights and introduce Naive Bayes model and Adaboost algorithm to train these feature groups, which will output a base classifier for each feature gr作者: 尾巴 時間: 2025-3-23 01:16
Prostitution and the Contours of Controlisiting probability is combined to quantize the probability of location spoofing. Experiments on a large scale and real-world LBSN dataset collected from Weibo show that the proposed approach can effectively detect certain types of location spoofing.作者: 約會 時間: 2025-3-23 03:26 作者: 變形詞 時間: 2025-3-23 07:22 作者: LINES 時間: 2025-3-23 11:16
Sexual Difference in European Cinema payload and fast convergence in various network environments. Numerical results reveal our novel strategy performs well across different network scenarios in terms of convergence and payload cost, showing its robustness, adaptive capability and potential applications in UAV swarms.作者: 爆米花 時間: 2025-3-23 14:43 作者: 驚惶 時間: 2025-3-23 18:03 作者: CLAM 時間: 2025-3-24 00:39 作者: Detonate 時間: 2025-3-24 06:01
Collaborative Workflow Scheduling over MANET, a User Position Prediction-Based Approachrresponding shared resources and consequently impact the success rate of workflows. In this paper, we propose a reliability-aware mobile workflow scheduling approach based on prediction of mobile users’ positions. We model the scheduling problem as a multi-objective optimization problem and develop 作者: nonplus 時間: 2025-3-24 07:59
Worker Recommendation with High Acceptance Rates in Collaborative Crowdsourcing Systems requesters and workers. And also, to accurately measure the matching degree between tasks and workers, a comprehensive and practical task matching mechanism has been presented by incorporating time matching, skill matching, payment matching, and location matching. Finally, extensive simulations and作者: Anthem 時間: 2025-3-24 11:34
Exploring Influence Maximization in Location-Based Social Networkslem in LBSNs and present an algorithm obtaining an approximation factor of .) in near-linear expected time. The experimental results show that the algorithm is efficient meanwhile offering strong theoretical guarantees.作者: Myocarditis 時間: 2025-3-24 15:08
Recommending More Suitable Music Based on Users’ Real Contextd is applied to discover the optimal features for the following recommendation. Second, we construct different feature groups according to the feature weights and introduce Naive Bayes model and Adaboost algorithm to train these feature groups, which will output a base classifier for each feature gr作者: ALE 時間: 2025-3-24 21:25
A Location Spoofing Detection Method for Social Networks (Short Paper)isiting probability is combined to quantize the probability of location spoofing. Experiments on a large scale and real-world LBSN dataset collected from Weibo show that the proposed approach can effectively detect certain types of location spoofing.作者: 不能平靜 時間: 2025-3-25 02:25
The Parallel and Precision Adaptive Method of Marine Lane Extraction Based on QuadTreend obtaining a new grid result with different size. The sliding local window filtering algorithm based on the QuadTree is proposed to obtain the marine lane grid set data. Applying the Delaunay triangulation method on the grid data, the multi-precision marine lane results are effectively extracted. 作者: Exclude 時間: 2025-3-25 06:03 作者: 騷擾 時間: 2025-3-25 08:17 作者: Keshan-disease 時間: 2025-3-25 11:45
Safety Message Propagation Using Vehicle-Infrastructure Cooperation in Urban Vehicular Networksin two directions and roadside units enhances the performances of safety-related applications. Besides, three checking policies are designed to avoid transmission failures and hence save network resources. Simulation experiments show that SMP achieves a high reception ratio and a short propagation d作者: 類似思想 時間: 2025-3-25 17:27 作者: MANIA 時間: 2025-3-25 21:35
Conference proceedings 2019rative computing, social networks, vehicular networks, networks and sensors, information processing and collaborative computing, mobility and software testing and formal verification, web services and image information processing, web services and remote sensing..作者: Consequence 時間: 2025-3-26 02:54
Genders and Sexualities in HistoryM respectively to get a solution with an approximation ratio. To the best of our knowledge, this is the first algorithm that can provide approximation guarantee for our problem. Our empirical study over several real-world networks demonstrates the performances of our proposed solutions.作者: 金桌活畫面 時間: 2025-3-26 05:20
Sexual Difference in European Cinemat search to traverse all vertices in the trace network. Then it discovers and refines relevant circles derived from this network tree, the rank score is calculated based on these relevant circles. Finally, we use the classical 911 covert network dataset to validate our approach.作者: 不要不誠實 時間: 2025-3-26 12:29 作者: 不開心 時間: 2025-3-26 16:14
Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper)t search to traverse all vertices in the trace network. Then it discovers and refines relevant circles derived from this network tree, the rank score is calculated based on these relevant circles. Finally, we use the classical 911 covert network dataset to validate our approach.作者: clarify 時間: 2025-3-26 19:14 作者: Extemporize 時間: 2025-3-27 00:09
The Three-Degree Calculation Model of Microblog Users’ Influence (Short Paper)uence, the users’ influence calculation model is constructed. Finally, the experimental results show that the three-degree force calculation model is more accurate and effective than other similar models.作者: BROW 時間: 2025-3-27 03:16
Identifying Local Clustering Structures of Evolving Social Networks Using Graph Spectra (Short Paper networks in contrast to the clustering coefficient. Moreover, the difference of the WSD3’s performances on social networks and communication networks is investigated, and it is found that the difference is induced by the different symmetrical features of the normalized Laplacian spectral densities on these networks.作者: debacle 時間: 2025-3-27 06:07 作者: 惡名聲 時間: 2025-3-27 10:32 作者: 鄙視 時間: 2025-3-27 13:56 作者: 手榴彈 時間: 2025-3-27 18:14
https://doi.org/10.1007/978-1-349-24518-5the bidirectional subjective strength of a social relationship, we propose a computational model synthetizing the features from participants’ interactive language and the adjacent balance in social network. Experimental results on real collaboration in Enron email dataset verify the effectiveness of the proposed model.作者: recede 時間: 2025-3-27 23:09
Sexual Difference in European Cinemaal and textual similarity. We propose an efficient method which uses IR-tree to retrieve objects with text descriptions. To accelerate the query process, a pruning method that effectively reduces computing is proposed. The experiments over real and synthesis data sets demonstrate the efficiency of our approaches.作者: 燈泡 時間: 2025-3-28 02:21
Measuring Bidirectional Subjective Strength of Online Social Relationship by Synthetizing the Interathe bidirectional subjective strength of a social relationship, we propose a computational model synthetizing the features from participants’ interactive language and the adjacent balance in social network. Experimental results on real collaboration in Enron email dataset verify the effectiveness of the proposed model.作者: Commemorate 時間: 2025-3-28 07:23 作者: epicondylitis 時間: 2025-3-28 10:45 作者: 擁護者 時間: 2025-3-28 15:04
Collaborative Thompson Samplingnd achieved remarkable success. Thompson sampling makes decisions in a noisy but stationary environment by accumulating uncertain information over time to improve prediction accuracy. In highly dynamic domains, however, the environment undergoes frequent and unpredictable changes. Making decisions i作者: Hallowed 時間: 2025-3-28 21:51 作者: hair-bulb 時間: 2025-3-29 02:32 作者: OWL 時間: 2025-3-29 06:26 作者: 折磨 時間: 2025-3-29 10:11 作者: 遭受 時間: 2025-3-29 14:06 作者: 細胞 時間: 2025-3-29 18:06
Recommending More Suitable Music Based on Users’ Real Context. The traditional music recommendation strategy captured users’ music preference by analyzing their historical behaviors to conduct personalized recommendation. However, users’ current states, such as in busy working or in a leisure travel, etc., have an important influence on their music enjoyment.作者: voluble 時間: 2025-3-29 20:54 作者: Nebulous 時間: 2025-3-30 00:30 作者: 形容詞 時間: 2025-3-30 05:19
Identifying Local Clustering Structures of Evolving Social Networks Using Graph Spectra (Short Paperh 3-cycle (WSD3) that is similar (but not equal) to the clustering coefficient is studied on evolving social networks. It is demonstrated that the ratio of the WSD3 to the network size (i.e., the node number) provides a more sensitive discrimination for the size-independent local structure of social作者: Cardiac-Output 時間: 2025-3-30 09:25
The Parallel and Precision Adaptive Method of Marine Lane Extraction Based on QuadTreery data is quite low, and the trajectory data quality is extremely different in different areas. A parallel and precision adaptive method of marine lane extraction based on QuadTree is proposed to meet this challenge. The method takes advantage of several methods including average sampling, interpol作者: 袋鼠 時間: 2025-3-30 15:16
GPU-accelerated Large-Scale Non-negative Matrix Factorization Using Sparkg highly-interpretable parts from data sets, and it has also been applied to various fields, such as recommendations, image analysis, and text clustering. However, as the size of the matrix increases, the processing speed of non-negative matrix factorization algorithm is very slow. To solve this pro作者: kidney 時間: 2025-3-30 18:34
Adaptive Data Sharing Algorithm for Aerial Swarm Coordination in Heterogeneous Network Environments ion constraints faced in UAV swarm coordination, both the lazy and the eager strategies were proposed to enable swarm-wide reliable information exchange to further behavior coordination for UAV swarms. However, these two algorithms are only evaluated in a fixed and homogeneous network scenario. Henc作者: 容易生皺紋 時間: 2025-3-30 20:49 作者: 不要不誠實 時間: 2025-3-31 03:18
Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper) attacker and his organization is a promising means to keep the cyberspace security. The exposing of attackers halts their further operation. To profile them, we combine these retrieved attack related information pieces to form a trace network. In this attributional trace network, distinguishing the作者: 吸引人的花招 時間: 2025-3-31 08:22
Safety Message Propagation Using Vehicle-Infrastructure Cooperation in Urban Vehicular Networksto quickly disseminate this alert to other vehicles is very important to avoid rear-end collision and traffic jam. Existing studies mainly use the vehicles travelling in the same direction as the collision vehicles to forward safety messages, which strictly limit the performance improvements. In thi作者: JIBE 時間: 2025-3-31 12:58 作者: grandiose 時間: 2025-3-31 13:31
https://doi.org/10.1007/978-3-030-27427-6nd achieved remarkable success. Thompson sampling makes decisions in a noisy but stationary environment by accumulating uncertain information over time to improve prediction accuracy. In highly dynamic domains, however, the environment undergoes frequent and unpredictable changes. Making decisions i作者: 鉆孔 時間: 2025-3-31 19:51
Racial Seeing and Sexual Desire: , and ers’ idle resources can be shared as service through device-to-device links to other users. Some complex workflow-based mobile applications are therefor no longer need to be offloaded to remote cloud, on the contrary, they can be solved locally with the help of other devices in a collaborative way. 作者: 不合 時間: 2025-3-31 22:52
https://doi.org/10.1007/978-3-030-27427-6ly accomplished by crowd workers. To ensure the quality of service (QoS) provided by crowd workers, requesters are more likely to assign tasks to trustworthy workers, therefore, trust have played an important role in the design of worker recommendation mechanisms in crowdsourcing systems. Most exist作者: Confirm 時間: 2025-4-1 03:31
Genders and Sexualities in History a set of . users that can maximize the expected influence, which is known as Influence Maximization (IM) problem. In this paper, we incorporate . of users and ., including . and . of influence diffusion, in IM problem and propose . (CTVMT) problem to find the most cost-effective seed users who can