A survey on ensemble learning
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8208-z
NEXT: a neural network framework for next POI recommendation
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8011-2
Safe semi-supervised learning: a brief introduction
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8452-2
A correlative denoising autoencoder to model social influence for top-N recommender system
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8123-3
SMER: a secure method of exchanging resources in heterogeneous internet of things
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-6524-3
Real-time visual tracking using complementary kernel support correlation filters
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8116-1
Bayesian dual neural networks for recommendation
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8049-1
Analyzing time-dimension communication characterizations for representative scientific applications on supercomputer systems
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7239-1
AAMcon: an adaptively distributed SDN controller in data center networks
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-7266-6
A perspective on off-policy evaluation in reinforcement learning
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-9901-7
Bangla language modeling algorithm for automatic recognition of hand-sign-spelled Bangla sign language
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7253-3
An efficient energy aware virtual network migration based on genetic algorithm
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8084-6
Real-time manifold regularized context-aware correlation tracking
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8104-y
System architecture for high-performance permissioned blockchains
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-6345-4
TPII: tracking personally identifiable information via user behaviors in HTTP traffic
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7451-z
Non-negative matrix factorization based modeling and training algorithm for multi-label learning
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7452-y
A neighborhood proximity based algorithm for overlapping community structure detection in weighted networks
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8098-0
Abnormal event detection via the analysis of multi-frame optical flow information
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7407-3
Meta-path-based outlier detection in heterogeneous information network
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7289-4
Dynamic data auditing scheme for big data storage
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8117-6
Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-7342-y
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8106-9
Joint view synthesis and disparity refinement for stereo matching
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8099-4
A primal perspective for indefinite kernel SVM problem
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8148-z
Partition pruning for range query on distributed log-structured merge-tree
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8234-x
Fast and accurate visual odometry from a monocular camera
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-6600-8
Algebraic criteria for finite automata understanding of regular language
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-6525-x
Ordinal factorization machine with hierarchical sparsity
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-7290-6
An efficient parallel algorithm of N-hop neighborhoods on graphs in distributed environment
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7167-0
Transparent partial page migration between CPU and GPU
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7386-4
Graph-ranking collective Chinese entity linking algorithm
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7175-0
New multi-objective approach for dynamic risk-driven intrusion responses
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8175-4
Connection models for the Internet-of-Things
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7395-3
Evaluating and improving the interpretability of item embeddings using item-tag relevance information
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-7427-7
Focus-sensitive relation disambiguation for implicit discourse relation detection
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-017-6558-y
Extreme vocabulary learning
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8249-3
Most similar maximal clique query on large graphs
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-7235-0
A privacy-enhancing scheme against contextual knowledge-based attacks in location-based services
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8300-4
Software testing without the oracle correctness assumption
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8434-4
Practices of backuping homomorphically encrypted databases
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8394-8
TRAP: trace runtime analysis of properties
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7217-7
Launch of the Excellent Young Computer Scientists Forum
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-9900-8
A unified latent variable model for contrastive opinion mining
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7073-5
State synchronization in process-oriented chaincode
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-017-6484-z
Detection of common wound infection bacteria based on FAIMS technology
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8218-x
Optimized high order product quantization for approximate nearest neighbors search
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7049-5
Personalized query suggestion diversification in information retrieval
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7283-x
Sichuan dialect speech recognition with deep LSTM network
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-8030-z
Timestamp reassignment: taming transaction abort for serializable snapshot isolation
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-018-7018-z
Answering range-based reverse kNN and why-not reverse kNN queries
来源期刊:Frontiers of Computer ScienceDOI:10.1007/s11704-019-8190-5