Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Exploring Parent's Needs for Children-Centered AI to Support Preschoolers' Interactive Storytelling and Reading Activities
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 8, Issue CSCW2Article No.: 496, Pages 1–25https://doi.org/10.1145/3687035Interactive storytelling is vital for preschooler development. While children's interactive partners have traditionally been their parents and teachers, recent advances in artificial intelligence (AI) have sparked a surge of AI-based storytelling and ...
- ArticleNovember 2024
Modeling Comparative Logical Relation with Contrastive Learning for Text Generation
Natural Language Processing and Chinese ComputingPages 107–119https://doi.org/10.1007/978-981-97-9440-9_9AbstractData-to-Text Generation (D2T), a classic natural language generation problem, aims at producing fluent descriptions for structured input data, such as a table. Existing D2T works mainly focus on describing the superficial associative relations ...
- short-paperOctober 2024
McGE '24: The 2nd International Workshop on Multimedia Content Generation and Evaluation: New Methods & Practice
McGE '24: Proceedings of the 2nd International Workshop on Multimedia Content Generation and Evaluation: New Methods and PracticePages 1–2https://doi.org/10.1145/3688867.3695937This workshop aims to explore key topics in the multimedia field, focusing on multimedia content generation, quality assessment, dataset creation, and construction. These topics are essential for the growth and advancement of the multimedia domain. ...
- research-articleOctober 2024
Focus & Gating: A Multimodal Approach for Unveiling Relations in Noisy Social Media
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 1379–1388https://doi.org/10.1145/3664647.3680995Multimedia content's surge on the internet has made multimodal relation extraction vital for applications like intelligent search and knowledge graph construction. As a rich source of image-text data, social media plays a crucial role in populating ...
- proceedingOctober 2024
McGE '24: Proceedings of the 2nd International Workshop on Multimedia Content Generation and Evaluation: New Methods and Practice
It is our great pleasure to welcome you to the 2nd International Workshop on Multimedia Content Generation and Evaluation: New Methods and Practice- McGE 2024
We believe that this workshop will provide a valuable platform for researchers and ...
-
- posterOctober 2024
Towards Rapid Fabrication of Custom Tactile Surface Indicators for Indoor Navigation
ASSETS '24: Proceedings of the 26th International ACM SIGACCESS Conference on Computers and AccessibilityArticle No.: 97, Pages 1–5https://doi.org/10.1145/3663548.3688519Tactile surface indicators (TSIs) provide ground-based tactile cues to help pedestrians who are blind or low-vision safely and independently navigate different environments. For example, TSIs can serve as warnings for hazards (e.g., edge of a subway ...
- short-paperOctober 2024
Boosting Large Language Models with Socratic Method for Conversational Mathematics Teaching
CIKM '24: Proceedings of the 33rd ACM International Conference on Information and Knowledge ManagementPages 3730–3735https://doi.org/10.1145/3627673.3679881With the introduction of large language models (LLMs), automatic math reasoning has seen tremendous success. However, current methods primarily focus on providing solutions or using techniques like Chain-of-Thought to enhance problem-solving accuracy. In ...
- ArticleNovember 2024
Refined and Locality-Enhanced Feature for Handwritten Mathematical Expression Recognition
AbstractMany studies have been conducted on handwritten mathematical expression recognition (HMER) based on encoder-decoder architecture. However, the previous methods fail to predict accurate results due to low-quality images such as blur, complex ...
- ArticleNovember 2024
Scene Text Recognition Via k-NN Attention-Based Decoder and Margin-Based Softmax Loss
AbstractFacing various complex background and diverse text image shape, this paper proposes an encoder-decoder-based scene text recognition model named E2D-Rec to enhance the recognition capability of irregular text and achieve stronger generalization. ...
- ArticleOctober 2024
Charting the Uncharted: Building and Analyzing a Multifaceted Chart Question Answering Dataset for Complex Logical Reasoning Process
AbstractCharts, as a vital part of visualization language, are omnipresent in real-world. Understanding charts is crucial for unveiling implicit data insights. The evolution of large-scale models has marked significant milestones in chart comprehension. ...
- posterOctober 2024
Fluxable: A Tool for Making 3D Printable Sensors and Actuators
UIST Adjunct '24: Adjunct Proceedings of the 37th Annual ACM Symposium on User Interface Software and TechnologyArticle No.: 74, Pages 1–3https://doi.org/10.1145/3672539.3686342We present Fluxable, a tool for making custom sensors and actuators 3D printable with customer-grade Stereolithography (SLA) 3D printers. With this tool, the user converts an arbitrary 3D model into a deformable body with integrated helix-and-lattice ...
- research-articleOctober 2024
MobiPrint: A Mobile 3D Printer for Environment-Scale Design and Fabrication
UIST '24: Proceedings of the 37th Annual ACM Symposium on User Interface Software and TechnologyArticle No.: 38, Pages 1–10https://doi.org/10.1145/3654777.36764593D printing is transforming how we customize and create physical objects in engineering, accessibility, and art. However, this technology is still primarily limited to confined working areas and dedicated print beds, thereby detaching design and ...
- research-articleSeptember 2024
Deception-Resistant Stochastic Manufacturing for Automated Production Lines
RAID '24: Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and DefensesPages 546–560https://doi.org/10.1145/3678890.3678896The advancement of Industrial Internet-of-Things (IIoT) magnifies the cyber risk of automated production lines, especially to deception attacks that tamper with the monitoring data to prevent the manipulated operation of production lines from being ...
- research-articleSeptember 2024
AI-Vision: A Three-Layer Accessible Image Exploration System for People with Visual Impairments in China
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 145, Pages 1–27https://doi.org/10.1145/3678537Accessible image exploration systems are able to help people with visual impairments (PVI) to understand image content by providing different types of interactions. With the development of computer vision technologies, image exploration systems are ...
- research-articleSeptember 2024
Self-supervised BGP-graph reasoning enhanced complex KBQA via SPARQL generation
Information Processing and Management: an International Journal (IPRM), Volume 61, Issue 5https://doi.org/10.1016/j.ipm.2024.103802AbstractKnowledge base question answering aims to answer complex questions from large-scale knowledge bases. Although existing generative language models that translate questions into SPARQL queries have achieved promising results, there are still ...
- research-articleSeptember 2024
Novel behavior-enhanced long- and short-term interest model for sequential recommendation
Information Sciences: an International Journal (ISCI), Volume 679, Issue Chttps://doi.org/10.1016/j.ins.2024.121127AbstractIn the realm of modern recommender systems, user-item interaction data often exhibit sequential patterns in relation to various behaviors, such as clicks and purchases on e-commerce platforms. The objective of heterogeneous sequential ...
Highlights- Enhancing self-attention network with cross-type behavior influences to capture user short-term preferences.
- Iteratively aggregating information from nodes and behavior-relevant relationships to capture user long-term interests.
- ...
- research-articleSeptember 2024
GateKeeper: An UltraLite malicious traffic identification method with dual-aspect optimization strategies on IoT gateways
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 250, Issue Chttps://doi.org/10.1016/j.comnet.2024.110556AbstractThe Internet of Things (IoT) landscape is booming, and a wide range of IoT endpoints has been integrated into various aspects of life, opening opportunities for malicious attacks that compromise IoT security. Consequently, effective malicious ...
- posterJuly 2024
3D Printing Shape-Changing Devices with Inductive Sensing
SIGGRAPH '24: ACM SIGGRAPH 2024 PostersArticle No.: 50, Pages 1–2https://doi.org/10.1145/3641234.3671039We present a novel technique that converts arbitrary 3D models into 3D printable shape-changing devices with sensing capability through the integrated helix-and-lattice structure. The structure comprises a central hollow helical channel, surrounded by ...
- short-paperJuly 2024
Boosting Conversational Question Answering with Fine-Grained Retrieval-Augmentation and Self-Check
SIGIR '24: Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information RetrievalPages 2301–2305https://doi.org/10.1145/3626772.3657980Retrieval-Augmented Generation (RAG) aims to generate more reliable and accurate responses, by augmenting large language models(LLMs) with the external vast and dynamic knowledge. Most previous work focuses on using RAG for single-round question ...
- research-articleJuly 2024
FinHunter: Improved Search-Based Test Generation for Structural Testing of FinTech Systems
FSE 2024: Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software EngineeringPages 10–20https://doi.org/10.1145/3663529.3663823Ensuring high quality of software systems is highly critical in mission-critical industrial sectors such as FinTech. To test such systems, replaying the historical data (typically in the form of input field values) recorded during system real usage has ...