Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Deadline and Period Assignment for Guaranteeing Timely Response of the Cyber-Physical System
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 30, Issue 1Article No.: 1, Pages 1–26https://doi.org/10.1145/3689048Cyber-physical systems (CPSs) need to respond to each change of each monitored object in time. The entire response process can be divided into two stages: the update stage and the control stage. Tasks in CPSs can thus be divided into two kinds: update ...
- research-articleOctober 2024
SynopGround: A Large-Scale Dataset for Multi-Paragraph Video Grounding from TV Dramas and Synopses
- Chaolei Tan,
- Zihang Lin,
- Junfu Pu,
- Zhongang Qi,
- Wei-Yi Pei,
- Zhi Qu,
- Yexin Wang,
- Ying Shan,
- Wei-Shi Zheng,
- Jian-Fang Hu
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 8383–8392https://doi.org/10.1145/3664647.3681042Video grounding is a fundamental problem in multimodal content understanding, aiming to localize specific natural language queries in an untrimmed video. However, current video grounding datasets merely focus on simple events and are either limited to ...
- research-articleSeptember 2024
Artificial Bacteria Flagella With Microstructured Soft-Magnetic Teeth
IEEE Transactions on Robotics (TOR), Volume 40Pages 4719–4732https://doi.org/10.1109/TRO.2024.3463482Integrating functional subunits into a microrobot offers a promising pathway to enhance its operational capabilities. The functional integration of microrobots lies in organizing subunit distribution into a 3-D morphology while balancing the geometry ...
- correctionMarch 2021
Correction to: The early warning research on nursing care of stroke patients with intelligent wearable devices under COVID-19
Personal and Ubiquitous Computing (PUC), Volume 27, Issue 3Page 781https://doi.org/10.1007/s00779-021-01537-0A Correction to this paper has been published: https://doi.org/10.1007/s00779-021-01537-0
- research-articleJanuary 2021
The early warning research on nursing care of stroke patients with intelligent wearable devices under COVID-19
Personal and Ubiquitous Computing (PUC), Volume 27, Issue 3Pages 767–779https://doi.org/10.1007/s00779-021-01520-9AbstractStroke patients under the background of the new crown epidemic need to be home-based care. However, traditional nursing methods cannot take care of the patients’ lives in all aspects. Based on this, based on machine learning algorithms, our work ...
- research-articleOctober 2020
Jointly Integrating VCF-Based Variants and OWL-Based Biomedical Ontologies in MongoDB
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), Volume 17, Issue 5Pages 1504–1515https://doi.org/10.1109/TCBB.2019.2951137The development of the next-generation sequencing (NGS) technologies has led to massive amounts of VCF (Variant Call Format) files, which have been the standard formats developed with 1000 Genomes Project. At the same time, with the widespread use of ...
- correctionAugust 2020
Correction to: Effects of a navigation spoofing signal on a receiver loop and a UAV spoofing approach
In the original article, some typos regarding Eq. (1) and respective sentence are corrected, and corrections are made to a sentence in section “Effect of the frequency difference on the PLL and DLL”.
- research-articleMay 2020
Effects of a navigation spoofing signal on a receiver loop and a UAV spoofing approach
AbstractA civil navigation signal is vulnerable to interference and tampering owing to its open interface and low signal power. We focus on navigation spoofing. First, using a piecewise function, we quantitatively analyze the effects of the navigation ...
- articleMay 2019
Game theory-based device-to-device network access algorithm for heterogeneous networks
The Journal of Supercomputing (JSCO), Volume 75, Issue 5Pages 2423–2435https://doi.org/10.1007/s11227-018-2628-7The device-to-device (D2D) communication, as a high-speed communication from device to device, has attracted large researchers' attention recently. Namely, by using the D2D communication in the cellular networks, mobile users can transmit data to the ...
- ArticleDecember 2018
DeepExposure: learning to expose photos with asynchronously reinforced adversarial learning
NIPS'18: Proceedings of the 32nd International Conference on Neural Information Processing SystemsPages 2153–2163The accurate exposure is the key of capturing high-quality photos in computational photography, especially for mobile phones that are limited by sizes of camera modules. Inspired by luminosity masks usually applied by professional photographers, in this ...
- ArticleAugust 2016
Face verification algorithm with exploiting feature distribution
PRICAI'16: Proceedings of the 14th Pacific Rim International Conference on Trends in Artificial IntelligencePages 393–405https://doi.org/10.1007/978-3-319-42911-3_33Deep feature is widely applied in many fields such as image retrieval, image classification, face verification, etc. All the post-processing methods using deep feature make some assumptions about feature distribution. However, in most situations, ...
- articleMay 2015
Continuous Wave Interference Effects on Ranging Performance of Spread Spectrum Receivers
Wireless Personal Communications: An International Journal (WPCO), Volume 82, Issue 1Pages 473–494https://doi.org/10.1007/s11277-014-2236-7Continuous wave interference (CWI) can induce significant ranging error for a spread spectrum receiver. Since both the spread spectrum signal and CWI are deterministic signals but truncated by the integrate and dump filters, deterministic signal models ...
- research-articleJune 2014
Seraph: an efficient, low-cost system for concurrent graph processing
HPDC '14: Proceedings of the 23rd international symposium on High-performance parallel and distributed computingPages 227–238https://doi.org/10.1145/2600212.2600222Graph processing systems have been widely used in enterprises like online social networks to process their daily jobs. With the fast growing of social applications, they have to efficiently handle massive concurrent jobs. However, due to the inherent ...