標(biāo)題: Titlebook: Parallel and Distributed Computing, Applications and Technologies; 21st International C Yong Zhang,Yicheng Xu,Hui Tian Conference proceedin [打印本頁] 作者: Blandishment 時間: 2025-3-21 17:20
書目名稱Parallel and Distributed Computing, Applications and Technologies影響因子(影響力)
書目名稱Parallel and Distributed Computing, Applications and Technologies影響因子(影響力)學(xué)科排名
書目名稱Parallel and Distributed Computing, Applications and Technologies網(wǎng)絡(luò)公開度
書目名稱Parallel and Distributed Computing, Applications and Technologies網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Parallel and Distributed Computing, Applications and Technologies被引頻次
書目名稱Parallel and Distributed Computing, Applications and Technologies被引頻次學(xué)科排名
書目名稱Parallel and Distributed Computing, Applications and Technologies年度引用
書目名稱Parallel and Distributed Computing, Applications and Technologies年度引用學(xué)科排名
書目名稱Parallel and Distributed Computing, Applications and Technologies讀者反饋
書目名稱Parallel and Distributed Computing, Applications and Technologies讀者反饋學(xué)科排名
作者: Goblet-Cells 時間: 2025-3-21 21:29
Short-Term Load Forecasting Based on CNN-BiLSTM with Bayesian Optimization and Attention Mechanism,ce, the data set is divided into four subsets with respect to four seasons. The performance of the proposed model is compared with other forecasting models by MAE, RMSE, MAPE, and . score. The experiment results show that the proposed model fits the actual values best and has the best forecasting performance among the contrast models.作者: hidebound 時間: 2025-3-22 02:37
Preventing DDoS Attacks on Bitcoin Memory Pool by the Dynamic Fee Threshold Mechanism,sactions in Bitcoin from the malicious spam transactions. We also make an analysis and experiments on the method, to demonstrate its effectiveness and accuracy of detecting the malicious transactions.作者: Encephalitis 時間: 2025-3-22 06:33 作者: VEST 時間: 2025-3-22 11:04
Kaizhi Chen,Wencheng Wei,Shangping Zhong,Longkun Guo作者: 侵略 時間: 2025-3-22 15:30
Fumin Qi,Xiao-Yuan Jing,Xiaoke Zhu,Xiaodong Jia,Li Cheng,Yichuan Dong,Ziseng Fang,Fei Ma,Shengzhong Feng作者: Evolve 時間: 2025-3-22 18:03 作者: AMITY 時間: 2025-3-22 21:28 作者: jarring 時間: 2025-3-23 05:00
On the Non-ergodic Convergence Rate of the Directed Nonsmooth Composite Optimization,ve functions and .(1/.) for strongly convex objective functions, showing improvement relative to the rates . and . provided by the existing methods. Simulation examples further illustrate the effectiveness of the proposed method.作者: FAWN 時間: 2025-3-23 05:36
Blood Leukocyte Object Detection According to Model Parameter-Transfer and Deformable Convolution,ental results show that compare our method with the traditional Faster RCNN object detection algorithm, . is 0.056 higher, . is 0.119?higher, with higher recall by 4%, and better accuracy by 5%. Thus, the method proposed in this paper can achieve highly accurate leukocyte detection.作者: Hdl348 時間: 2025-3-23 12:34
Jing Zhang,Jinrong Li,Zheng Du,Jiwu Shu,Qiuming Luondern durch solche Variationen bei verschiedenen Kundengruppen Zufriedenheit bzw. Unzufriedenheit hervorruft. Um solche Situationen eindeutig zu machen, ist es zweckm??ig, ein weiteres Kriterium einzuführen.作者: PANIC 時間: 2025-3-23 14:56 作者: synovial-joint 時間: 2025-3-23 20:48
Ningning Liu,Yujie Zhang,Weibei Fanvit?ten verteilen, so mü?te man auch von einer ?nderung der jeweiligen Handlung sprechen. Diese Definition ist nicht mehr als eine formale Sprachregelung, keineswegs ver?ndert sie die Natur des betrachteten Problems. Sie bringt nur deutlich zum Ausdruck, da? sich für das Individuum haupts?chlich die作者: MIRE 時間: 2025-3-23 23:59
Yichuan Dong,Zhuoxu Cui,Yong Zhang,Shengzhong FengStaaten charakteristisch ist, an die Vorg?nge bei der Bildung von Koalitionsregierungen in Mehrparteienparlamenten und an das Problem der milit?risch-politischen Stabilit?t der internationalen Beziehungen, von der die Zukunft der Menschheit abh?ngt.作者: Resign 時間: 2025-3-24 04:18 作者: Parabola 時間: 2025-3-24 08:35
Heterogeneous Software Effort Estimation via Cascaded Adversarial Auto-Encoder,ata collected by other companies is a feasible solution to relieve the data drought problem. However, how to make full use of the heterogeneous effort data to conduct SEE, which is called as Heterogeneous Software Effort Estimation (HSEE), has not been well studied. In this paper, we propose a HSEE 作者: BAN 時間: 2025-3-24 13:38 作者: 嬉耍 時間: 2025-3-24 17:33 作者: Decline 時間: 2025-3-24 20:51 作者: inferno 時間: 2025-3-25 00:24
Adaptive Tensor-Train Decomposition for Neural Network Compression,s. This paper aims to solve such problem through improving the compactness of the model and efficiency of computing. On the basis of MobileNet, a mainstream lightweight neural network, we proposed an Adaptive Tensor-Train Decomposition (ATTD) algorithm to solve the cumbersome problem of finding opti作者: AGOG 時間: 2025-3-25 04:01 作者: Exclaim 時間: 2025-3-25 09:12
Construction of Completely Independent Spanning Tree Based on Vertex Degree,nt spanning tree (CISTs) plays an important role in the reliable transmission, parallel transmission, and safe distribution of information. Two spanning trees . and . of graph . are completely independent if, for any two distinct vertices . and . of ., the two paths from . to . on . and . are intern作者: Graphite 時間: 2025-3-25 12:57
Distributed Algorithm for Truss Maintenance in Dynamic Graphs, in large-scale graphs. The .-truss is a subgraph where each edge is contained in at least . triangles and the problem of truss decomposition is computing the .-trusses of a graph for all .. However, most graphs in real scenarios are usually changing over time. The previous studies take the static g作者: Lice692 時間: 2025-3-25 18:12
Short-Term Load Forecasting Based on CNN-BiLSTM with Bayesian Optimization and Attention Mechanism,on accuracy not only affects the power grid construction, but also influences the economic development of the power grid. This paper proposes a short-term load forecasting based on Convolutional Neural Networks and Bidirectional Long Short-Term Memory (CNN-BiLSTM) with Bayesian Optimization (BO) and作者: 變化無常 時間: 2025-3-25 21:52 作者: 狼群 時間: 2025-3-26 04:07 作者: 裙帶關(guān)系 時間: 2025-3-26 05:01 作者: Ancillary 時間: 2025-3-26 09:34
Multiple Projections Learning for Dimensional Reduction,single projection matrix to reduce the dimension and preserve the locality structure of data, it may cause the single matrix may not handle these two tasks well at the same time. Therefore, in this paper, we proposed relaxed sparse locality presenting projection (RSLPP) which introduces two differen作者: outset 時間: 2025-3-26 13:11
Preventing DDoS Attacks on Bitcoin Memory Pool by the Dynamic Fee Threshold Mechanism,graphy and consensus mechanism. As the first and most famous application of blockchain and cryptocurrencies, Bitcoin also suffers from different kinds of attacks. Several studies have been done to analyze and solve these attacks. In this paper, we research the Distributed Denial-of-Service (DDoS) on作者: 小爭吵 時間: 2025-3-26 18:36 作者: 匯總 時間: 2025-3-26 22:46
Online Learning-Based Co-task Dispatching with Function Configuration in Edge Computing,of great importance to implement delay-sensitive applications like AR, Cloud Gaming and Auto Driving. Due to the limited resources of edge servers, task dispatching and function configuration are the key to fully utilize edge servers. Moreover, a typical task request in edge computing (called a co-t作者: 縮影 時間: 2025-3-27 03:14 作者: 平躺 時間: 2025-3-27 08:32 作者: jaunty 時間: 2025-3-27 13:04 作者: 吸引力 時間: 2025-3-27 13:49 作者: ALIAS 時間: 2025-3-27 17:53