標(biāo)題: Titlebook: Collaborative Computing: Networking, Applications and Worksharing; 17th EAI Internation Honghao Gao,Xinheng Wang Conference proceedings 202 [打印本頁] 作者: HAND 時間: 2025-3-21 16:51
書目名稱Collaborative Computing: Networking, Applications and Worksharing影響因子(影響力)
書目名稱Collaborative Computing: Networking, Applications and Worksharing影響因子(影響力)學(xué)科排名
書目名稱Collaborative Computing: Networking, Applications and Worksharing網(wǎng)絡(luò)公開度
書目名稱Collaborative Computing: Networking, Applications and Worksharing網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Collaborative Computing: Networking, Applications and Worksharing被引頻次
書目名稱Collaborative Computing: Networking, Applications and Worksharing被引頻次學(xué)科排名
書目名稱Collaborative Computing: Networking, Applications and Worksharing年度引用
書目名稱Collaborative Computing: Networking, Applications and Worksharing年度引用學(xué)科排名
書目名稱Collaborative Computing: Networking, Applications and Worksharing讀者反饋
書目名稱Collaborative Computing: Networking, Applications and Worksharing讀者反饋學(xué)科排名
作者: Commodious 時間: 2025-3-21 23:32 作者: 樂章 時間: 2025-3-22 04:24 作者: Palpate 時間: 2025-3-22 07:35
Failure” Service Pattern Mining for Exploratory Service Compositionining algorithm (FSPMA) for exploratory service composition, which extends the gSpan algorithm, and can mine “failure” service patterns from service composition processes for further reuse. Meanwhile, the exploratory service composition model and the service pattern model are explained for the FSPMA作者: META 時間: 2025-3-22 11:05 作者: 嘴唇可修剪 時間: 2025-3-22 15:38
KTOBS: An Approach of Bayesian Network Learning Based on K-tree Optimizing Ordering-Based Searchy, it optimizes the network iteratively through switching nodes until the score of network no longer increases. The experimental results show that . can learn a network structure with higher accuracy than other .-tree algorithms in a given limited time..Availability and implementation: codes and exp作者: 嘴唇可修剪 時間: 2025-3-22 18:14
Attention Based Spatial-Temporal Graph Convolutional Networks for?RSU Communication Load ForecastingU. Finally, according to the forecast of the future communication load, a RSU working mode alteration scheme is proposed with respect to the safety range amongst vehicles in order to control the corresponding area communication load. Compared with other models, our model has better accuracy and perf作者: occult 時間: 2025-3-23 00:05 作者: 我正派 時間: 2025-3-23 03:53 作者: 不可磨滅 時間: 2025-3-23 08:06 作者: Maximizer 時間: 2025-3-23 10:59
Unpaired Learning of?Roadway-Level Traffic Paths from?Trajectoriesers, which can preserve the spatio-temporal information of the features, thus making the extraction results more accurate. We conduct experiments using urban and maritime traffic trajectory data and compare the proposed method with the state-of-the-art methods. The results of our model have more roa作者: chastise 時間: 2025-3-23 17:40
MR-FI: Mobile Application Recommendation Based on Feature Importance and Bilinear Feature Interactioion Network) mechanism to dynamically learn the importance of mobile applications’ features and uses a bilinear function with combining inner product and Hadamard product to effectively learn these features interactions, respectively. Then, the user preferences for different mobile applications are 作者: leniency 時間: 2025-3-23 22:01
The Missing POI Completion Based on Bidirectional Masked Trajectory Modelto strengthen the relationship between POIs in the user trajectory sequence, we build a graph for each user’s incomplete POIs sequence to explore the user’s hidden behavior habits. Besides, we design experiments to explore the relationship between the continuity of the number of missing POIs and the作者: Irksome 時間: 2025-3-23 22:59
Context-aware Graph Collaborative Recommendation Without Feature Entanglemente the semantic independence on the embedding dimensions and thus improves the interpretability of neural collaborative filtering. We use generalized matrix factorization as the matching function so that the model can be trained in an efficient non-sampling manner. We further give two examples of CGC作者: IVORY 時間: 2025-3-24 02:56 作者: promote 時間: 2025-3-24 07:56 作者: 完成才能戰(zhàn)勝 時間: 2025-3-24 13:44
‘When the State Abuses Children’eoGI. We also improve the time-efficiency of the privacy mechanism generation by using a δ-spanner graph. Finally, we design an optimal task allocation scheme based on obfuscated locations via integer programming, which aims to minimize workers’ travel distance to task locations. Experimental result作者: 枯燥 時間: 2025-3-24 18:56
Genders and Sexualities in Historyining algorithm (FSPMA) for exploratory service composition, which extends the gSpan algorithm, and can mine “failure” service patterns from service composition processes for further reuse. Meanwhile, the exploratory service composition model and the service pattern model are explained for the FSPMA作者: 開玩笑 時間: 2025-3-24 21:47 作者: 柱廊 時間: 2025-3-25 00:10 作者: Synthesize 時間: 2025-3-25 04:09
Sexual Violence during War and PeaceU. Finally, according to the forecast of the future communication load, a RSU working mode alteration scheme is proposed with respect to the safety range amongst vehicles in order to control the corresponding area communication load. Compared with other models, our model has better accuracy and perf作者: 指令 時間: 2025-3-25 07:45 作者: 截斷 時間: 2025-3-25 15:43 作者: ARM 時間: 2025-3-25 18:20
How Do We Think, Read, Write Rape?, the intermittent chaos theory and variable step method are leveraged to improve the existing dual-coupled Duffing oscillator method. The simulation results show that the proposed method can sense weak signals in the background of strong Lévy noise and estimate its frequency, with an estimation err作者: 發(fā)芽 時間: 2025-3-25 21:11
How Do We Think, Read, Write Rape?ers, which can preserve the spatio-temporal information of the features, thus making the extraction results more accurate. We conduct experiments using urban and maritime traffic trajectory data and compare the proposed method with the state-of-the-art methods. The results of our model have more roa作者: 別名 時間: 2025-3-26 03:21 作者: infantile 時間: 2025-3-26 07:09 作者: 真實的你 時間: 2025-3-26 11:37
https://doi.org/10.1057/978-1-137-58047-4e the semantic independence on the embedding dimensions and thus improves the interpretability of neural collaborative filtering. We use generalized matrix factorization as the matching function so that the model can be trained in an efficient non-sampling manner. We further give two examples of CGC作者: Albumin 時間: 2025-3-26 15:00 作者: invert 時間: 2025-3-26 18:29
1867-8211 ations, and Worksharing, CollaborateCom 2021, held in October 2021. Due to COVID-19 pandemic the conference was held virtually..The 62 full papers and 7 short papers presented were carefully reviewed and selected from 206 submissions. The papers reflect the conference sessions as follows: Optimizati作者: Peak-Bone-Mass 時間: 2025-3-26 22:54 作者: 設(shè)施 時間: 2025-3-27 02:26 作者: LAIR 時間: 2025-3-27 09:09 作者: patriarch 時間: 2025-3-27 11:55 作者: 膝蓋 時間: 2025-3-27 17:28
Recommendation Model Based on Social Homogeneity Factor and Social Influence Factora contextual multi-armed bandit to weigh the interaction between the two domains. We have conducted extensive comparative experiments and ablation experiments on two real public datasets. The experimental results show that the performance of our proposed model in the rating prediction task is better than other social recommendation model.作者: BILK 時間: 2025-3-27 20:23
Multi-UAV Cooperative Exploring for?the?Unknown Indoor Environment Based on?Dynamic Target Trackings. Moreover, the method can also draw the boundary-contour map of the entire environment at last. Once extended to the real world, this method can be applied to dangerous buildings after earthquakes, hazardous gas factories, underground mines, or other search and rescue scenarios.作者: 克制 時間: 2025-3-27 23:53
Conference proceedings 2021andling and human recognition & Edge Computing; Edge Computing; Edge Computing & Collaborative working; Collaborative working & Deep Learning and application; Deep Learning and application; Deep Learning and application; Deep Learning and application & UVA..作者: 成份 時間: 2025-3-28 05:18 作者: 阻擋 時間: 2025-3-28 09:17 作者: 南極 時間: 2025-3-28 11:26
Failure” Service Pattern Mining for Exploratory Service Composition trial-and-error manner. A large number of service composition processes are generated, which can be learned to improve the reusability of the service composition processes. By mining these service composition processes and abstracting the mining results to service patterns, the efficiency of servic作者: 高深莫測 時間: 2025-3-28 16:12
Optimal Control and?Reinforcement Learning for Robot: A Surveylopment of reinforcement learning and optimal control has become an impetus of engineering, which has show large potentials on automation. Currently, the optimization applications on robot are facing challenges caused by model bias, high dimensional systems, and computational complexity. To solve th作者: 訓(xùn)誡 時間: 2025-3-28 22:35 作者: TEM 時間: 2025-3-29 01:29
Recommendation Model Based on Social Homogeneity Factor and Social Influence Factorsider the social homogeneity factor between users and do not consider the social influence factor. To make the recommendation model more in line with the real-life situation, this paper proposes a novel graph attention network to model the homogeneity effect and the influence effect in the user doma作者: Cardiac-Output 時間: 2025-3-29 05:07
Attention Based Spatial-Temporal Graph Convolutional Networks for?RSU Communication Load Forecastinghicular Ad-hoc Networks (VANETs). However, because of peak hour communication demands in VANETs and limited energy storage, it is necessary for RSU to adjust their participation in communication according to the requirements and allocate energy reasonably to balance the workload. Firstly, tidal traf作者: Thymus 時間: 2025-3-29 08:37
Mobile Encrypted Traffic Classification Based on?Message Type Inferenceation confidentiality and prevent privacy leakage. These cryptographic protocols make it difficult to classify encrypted traffic for network management and intrusion detection. Existing mobile encrypted traffic classification approaches intend to alleviate this problem for TLS 1.2 encrypted traffic 作者: Palpitation 時間: 2025-3-29 12:05 作者: spondylosis 時間: 2025-3-29 16:20
Underwater Information Sensing Method Based on Improved Dual-Coupled Duffing Oscillator Under Lévy Nsent, most interference models for underwater information sensing tasks under substantial interference choose Gaussian noise models. However, it often contains a strong impact and does not conform to the Gaussian distribution. Moreover, in the current research on the sensing of underwater unknown fr作者: Organonitrile 時間: 2025-3-29 19:57 作者: 使堅硬 時間: 2025-3-30 03:35 作者: hyperuricemia 時間: 2025-3-30 07:37 作者: ordain 時間: 2025-3-30 11:22
The Missing POI Completion Based on Bidirectional Masked Trajectory Modeln all places they have visited, so the POI trajectory sequence generated through LBSNs is incomplete. An incomplete POI trajectory will have a negative impact on subsequent tasks such as POI recommendation and next POI prediction. Therefore, we complete the missing POI in the user trajectory sequenc作者: 啞巴 時間: 2025-3-30 13:59 作者: milligram 時間: 2025-3-30 17:41 作者: 保全 時間: 2025-3-30 21:40
‘No Adjective’: Reading the Moors Murdersn answering system and machine translation. The extraction of sequence features of datasets directly affects the recognition effect of named entities, and only the accumulation of local sequence features cannot capture the long distance dependencies. The extraction of global sequence features improv作者: 圓錐體 時間: 2025-3-31 01:18
‘When the State Abuses Children’workers’ location privacy, various methods based on location obfuscation have been proposed. MCS over road networks is a practical scenario. However, existing work on location protection and task allocation few considers road networks and the negative effects of location obfuscation. To solve these 作者: intoxicate 時間: 2025-3-31 08:20
Genders and Sexualities in History trial-and-error manner. A large number of service composition processes are generated, which can be learned to improve the reusability of the service composition processes. By mining these service composition processes and abstracting the mining results to service patterns, the efficiency of servic作者: Extort 時間: 2025-3-31 12:24 作者: tendinitis 時間: 2025-3-31 13:39 作者: 漂白 時間: 2025-3-31 20:58