When doing private domain marketing with cloud services, the merchants
u...
Autonomous navigation is the key to achieving the full automation of
agr...
Skeleton-based action recognition relies on the extraction of
spatial-te...
Industrial control systems (ICSs) are types of cyber-physical systems in...
Heterogeneity is a hallmark of many complex diseases. There are multiple...
Integer programming problems (IPs) are challenging to be solved efficien...
Clone detection is widely exploited for software vulnerability search. T...
Blockchain games introduce unique gameplay and incentive mechanisms by
a...
Named entity recognition is a traditional task in natural language
proce...
Named entity recognition is a fundamental task in natural language
proce...
We present a novel neural surface reconstruction method called NeuralRoo...
In this paper, we develop a new explicit scheme called modified truncate...
Physical rehabilitation is essential to recovery from joint replacement
...
Skeleton-based action recognition methods are limited by the semantic
ex...
Computer vision algorithms have been prevalently utilized for 3-D road
i...
An avatar mirroring the user's movement is commonly adopted in Virtual
R...
The urban transportation system is a combination of multiple transport m...
Medication errors most commonly occur at the ordering or prescribing sta...
Model compression can significantly reduce sizes of deep neural network ...
Majority models of remote sensing image changing detection can only get ...
Recent applications pose requirements of both cross-domain knowledge tra...
Recent trend demonstrates the effectiveness of deep neural networks (DNN...
Brain-inspired hyperdimensional computing (HDC) is an emerging computati...
Fuzzing is a technique widely used in vulnerability detection. The proce...
As an infrastructure for data persistence and analysis, Database Managem...
This study presents a Bayesian Optimization framework for area- and
dist...
Model compression becomes a recent trend due to the requirement of deplo...
This study investigates the efficiency and effectiveness of an area-base...
As Public Transport (PT) becomes more dynamic and demand-responsive, it
...
Gene-environment (G×E) interactions have important implications to
eluci...
This paper presented a deep reinforcement learning method named Double D...
The inverse problem of diffuse optical tomography is solved by the
Marko...
While huge efforts have been investigated in the adversarial testing of
...
In this paper, we produce some new classes of entanglement-assisted quan...
The out-of-gas error occurs when smart contract programs are provided wi...
The time-domain fluorescence diffuse optical tomography (FDOT) is
theore...
Many complex diseases are known to be affected by the interactions betwe...
Studies have shown that a dominant class of questions asked by visually
...
Ethereum Virtual Machine (EVM) is the run-time environment for smart
con...
This study develops an online predictive optimization framework for oper...
Identifying potentially vulnerable locations in a code base is critical ...
Nowadays, quantum program is widely used and quickly developed. However,...
Deep learning (DL) systems are increasingly applied to safety-critical
d...
This document describes Pythia v0.1, the winning entry from Facebook AI
...
Fuzzing is widely used for software vulnerability detection. There are
v...
The ultimate objective of medical cyber-physical systems is to enhance t...