default search action
3rd AIKE 2020: Laguna Hills, CA, USA
- 3rd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, AIKE 2020, Laguna Hills, CA, USA, December 9-13, 2020. IEEE 2020, ISBN 978-1-7281-8708-2
- Jorge Sampaio Silveira Junior, João Paulo, Jérôme Mendes, Daniela Alves, Luís Mário Ribeiro:
Automatic Calibration of Forest Fire Weather Index For Independent Customizable Regions Based on Historical Records. 1-8 - Ying Fung Yiu, Rabi N. Mahapatra:
Multi-Agent Pathfinding with Hierarchical Evolutionary Hueristic A. 9-16 - Hadi Ghahremannezhad, Hang Shi, Chengjun Liu:
A New Adaptive Bidirectional Region-of-Interest Detection Method for Intelligent Traffic Video Analysis. 17-24 - Wasif Bokhari, Ajay Bansal:
Asymmetric Error Control for Binary Classification in Medical Disease Diagnosis. 25-32 - Yuto Tsukagoshi, Shusaku Egami, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Ontology-Based Correlation Detection Among Heterogeneous Data Sets: A Case Study of University Campus Issues. 33-40 - Clement Leung, Longjun Hao:
Analysis of Rewards in Bernoulli Bandits Using Martingales. 41-49 - A. A. Periola, Akintunde A. Alonge, Kingsley A. Ogudo:
Architecture Model for Wireless Network Conscious Agent. 50-57 - Zhenyu Zhang, Chunhui Guo, Wenyu Peng, Shangping Ren:
Using Event Log Timing Information to Assist Process Scenario Discoveries. 58-64 - Alina Nesen, Bharat K. Bhargava:
Knowledge Graphs for Semantic-Aware Anomaly Detection in Video. 65-70 - Ying-Jia Lin, Daniel Tan, Tzu-Hsuan Chou, Hung-Yu Kao, Hsin-Yang Wang:
Knowledge Distillation on Extractive Summarization. 71-76 - Mirjam Minor, Miriam Herold:
Discovery of Analogical Knowledge for the Transfer of Workflow Tasks. 77-83 - Anas Al-Tirawi, Robert G. Reynolds:
Using Cultural Algorithms with Common Value Auctions to Provide Sustainability in Complex Dynamic Environments. 84-91 - Jihyeon Park, Munyeong Kang, Seong-je Cho, Hyoil Han, Kyoungwon Suh:
Analysis of Permission Selection Techniques in Machine Learning-based Malicious App Detection. 92-99 - Tomoki Chiba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
A Defense Method against Poisoning Attacks on IoT Machine Learning Using Poisonous Data. 100-107 - Ying Fung Yiu, Rabi N. Mahapatra:
Heuristic Function Evolution For Pathfinding Algorithm in FPGA Accelerator. 108-115 - Javier Pastorino, Ashis Kumer Biswas:
Hey ML, what can you do for me? 116-119 - Aishwarya Asesh:
Computational Semantics: How to solve the suspense of supersense. 120-125 - Taskin Koçak, Cagkan Ciloglu:
Real-time Restoration of Quality Distortions in Mobile Images using Deep Learning. 126-129 - Ching-Lung Su, Wen-Cheng Lai, Yu-Kai Zhang, Ting-Jia Guo, Yi-Jiun Hung, Hui-Chiao Chen:
Artificial Intelligence Design on Embedded Board with Edge Computing for Vehicle Applications. 130-133 - Agostino Forestiero:
Intrusion detection algorithm in Smart Environments featuring activity footprints approach. 134-137 - Maulik Gohil, Sathish A. P. Kumar:
Evaluation of Classification algorithms for Distributed Denial of Service Attack Detection. 138-141 - Negar Tajziyehchi, Mohammad Moshirpour, George Jergeas, Farnaz Sadeghpour:
A Predictive Model of Cost Growth in Construction Projects Using Feature Selection. 142-147 - Huber Nieto-Chaupis:
Convolution-based Machine Learning To Attenuate Covid-19's Infections in Large Cities. 148-152 - Satoru Watanabe, Hayato Yamana:
Deep Neural Network Pruning Using Persistent Homology. 153-156 - Joshua Ho, Chien-Min Wang:
Explainable and Adaptable Augmentation in Knowledge Attention Network for Multi-Agent Deep Reinforcement Learning Systems. 157-161 - Malka N. Halgamuge, Samurdika C. Hettikankanamge, Azeem Mohammad:
Trust Model to Minimize the Influence of Malicious Attacks in Sharding Based Blockchain Networks. 162-167 - Kengo Kuwana, Kenji Tei, Yoshiaki Fukazawa, Shinichi Honiden:
Method of Applying Df-pn Algorithm to On-the-fly Controller Synthesis. 168-173 - Rungsiman Nararatwong, Natthawut Kertkeidkachorn, Ryutaro Ichise:
Knowledge Graph Visualization: Challenges, Framework, and Implementation. 174-178 - Debmalya Biswas:
Privacy Preserving Chatbot Conversations. 179-182 - Takuto Yamauchi, Kenji Tei, Shinichi Honiden:
Method for Low-Cost Environment Partitioning Modeling in Dynamic Update. 183-187 - Nina Kharlamova, Seyedmostafa Hashemi, Chresten Træholt:
The Cyber Security of Battery Energy Storage Systems and Adoption of Data-driven Methods. 188-192 - Huber Nieto-Chaupis:
Computational Simulation of Artificial Nanoparticles Paths. 193-197 - Nahed Abdelgaber, Chris Christos Nikolopoulos:
Overview on Quantum Computing and its Applications in Artificial Intelligence. 198-199 - Abhishek Gupta, Arun Sahayadhas, Vivek Gupta:
Proposed Techniques to Design Speed Efficient Data Warehouse Architecture for Fastening Knowledge Discovery Process. 200-201 - Jumpei Ono, Miku Kawai, Takashi Ogata:
Toward Explanation-Centered Story Generation. 202-203
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.