default search action
4th SmartCom 2019: Birmingham, UK
- Meikang Qiu:
Smart Computing and Communication - 4th International Conference, SmartCom 2019, Birmingham, UK, October 11-13, 2019, Proceedings. Lecture Notes in Computer Science 11910, Springer 2019, ISBN 978-3-030-34138-1 - Chenglong Hou, Chensong Zhou, Kun Zhou, Jinan Sun, Sisi Xuanyuanj:
A Survey of Deep Learning Applied to Story Generation. 1-10 - Kui Zhang, Xiaohu Zhou, Heng He, Yonghao Wang, Weihao Wang, Huajian Li:
A Smart Roll Wear Check Scheme for Ensuring the Rolling Quality of Steel Plates. 11-21 - Jingjing Hu, Dongyan Ma, Chen Liu, Huaizhi Yan, Changzhen Hu:
An Improved Prediction Model for the Network Security Situation. 22-33 - Xiao Yu, Kunqing Wang, Quanxin Zhang, Yuanzhang Li:
A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles. 34-41 - Jingjing Hu, Shuangshuang Guo, Fankun Meng, Dongsheng Hu, Zhiyu Shi:
An Improved Assessment Method for the Network Security Risk. 42-52 - Jingyu Liu, Jinrong Zhang, Juan Li, Lu Liu:
A High-Performance Storage System Based with Dual RAID Engine. 53-62 - Yuhang Zhao, Kunqing Wang, Yuan Xue, Quanxin Zhang, Xiaosong Zhang:
An Universal Perturbation Generator for Black-Box Attacks Against Object Detectors. 63-72 - Zhao Wang, Yanqi Wang, Yanan Zhang, Yangyang Liu, Chao Ma, Haijun Wang:
A Brief Survey on Cyber Security Attack Entrances and Protection Strategies of Intelligent Connected Vehicle. 73-82 - Yirui Wu, Yao Xiao, Jun Feng:
Hierarchically Channel-Wise Attention Model for Clean and Polluted Water Images Classification. 83-92 - Yuanyuan Liu, Xiaohui Wei, Lina Li, Xingwang Wang:
Energy-Efficient Approximate Data Collection and BP-Based Reconstruction in UWSNs. 93-104 - Likun Liu, Hongli Zhang, Jiantao Shi, Xiangzhan Yu, Haixiao Xu:
I2P Anonymous Communication Network Measurement and Analysis. 105-115 - Zhanyang Xu, Haoyang Shi, Xihua Liu:
Plot Digitizing over Big Data Using Beam Search. 116-125 - Ruichao Mo, Lianyong Qi, Zhanyang Xu, Xiaolong Xu:
Trust-Aware Resource Provisioning for Meteorological Workflow in Cloud. 126-135 - Hao Jiang, Min Lin, Bingqing Liu, Huifang Liu, Yuanyuan Zeng, He Nai, Xiaoli Zhang, Xianlong Zhao, Wen Du, Haining Ye:
Do Top Social Apps Effect Voice Call? Evidence from Propensity Score Matching Methods. 136-149 - Kexin Yang, Yuanyuan Zeng, Hao Jiang, Qimei Chen:
Cognitive Hierarchy Based Coexistence and Resource Allocation for URLLC and eMBB. 150-160 - Zhian Yang, Cong Zheng, Hao Jiang, Yuanyuan Zeng, Zhiyi Hu, Wen Du:
Smart Custom Package Decision for Mobile Internet Services. 161-170 - Zhaojun Wang, Hao Jiang, Xiaoyue Zhao, Yuanyuan Zeng, Yi Zhang, Wen Du:
A Space Dynamic Discovery Scheme for Crowd Flow of Urban City. 171-179 - Hailong Liu, Bo Li:
Automated Classification of Attacker Privileges Based on Deep Neural Network. 180-189 - Zhe Wang, Linghe Kong, Guihai Chen, Ming Ni:
NnD: Shallow Neural Network Based Collision Decoding in IoT Communications. 190-199 - He Nai, Min Lin, Hao Jiang, Huifang Liu, Haining Ye:
Subordinate Relationship Discovery Method Based on Directed Link Prediction. 200-211 - Kaihao Lou, Yongjian Yang, Chuncai Wang:
An Elephant Flow Detection Method Based on Machine Learning. 212-220 - Song Xia, Meikang Qiu, Meiqin Liu, Ming Zhong, Hui Zhao:
AI Enhanced Automatic Response System for Resisting Network Threats. 221-230 - Yongyi Cao, Jing Wu, Bo Zhu, Hao Jiang, Yuchuan Deng, Wei Luo:
A Cross-Plane Cooperative DDoS Detection and Defense Mechanism in Software-Defined Networking. 231-243 - Wenzhi Wu, Ying Wei, Ruizhe Ye:
A Hardware Trojan Detection Method Design Based on TensorFlow. 244-252 - Xin Wang, Linghe Kong, Changjun Jiang:
Resolving the Loop in High-Level SDN Program for Multi-table Pipeline Compilation. 253-265 - Han Qiu, Qinkai Zheng, Meikang Qiu, Gérard Memmi:
DC Coefficients Recovery from AC Coefficients in the JPEG Compression Scenario. 266-276 - Yingyue Chen, Lijun Xiao, Osama Hosam:
A Performance Evaluation Method of Coal-Fired Boiler Based on Neural Network. 277-285 - Xiao Zeng, Hong Guo, Zhe Liu:
Analysis and Prediction of Commercial Big Data Based on WIFI Probe. 286-295 - Yu Gan, Wei Hu, Yonghao Wang:
Design and Optimization of Camera HAL Layer Based on Android. 296-303 - Yining Li, Wei Hu, Yonghao Wang:
Music Rhythm Customized Mobile Application Based on Information Extraction. 304-309 - Art Sedighi, Doug Jacobson:
Computational Challenges and Opportunities in Financial Services. 310-319 - Weidong Xiao, Weihong Huang, Wei Liang, Xia Lei, Jiahong Cai, Yuanming Wang, Yanting Li:
A Shamir Threshold Model Based Recoverable IP Watermarking Scheme. 320-329 - Joseph L. Fracasso, Md Liakat Ali:
Applications of Machine Learning Tools in Genomics: A Review. 330-340 - Xiang Shen, Caiming Yang, Zhengwei Jiang, Dong Xie, Yingtao Sun, Shuibiao Chen, Bo Li:
Hierarchical Graph Neural Networks for Personalized Recommendations with User-Session Context. 341-348 - Lifeng Liu, Lizong Zhang, Fengming Zhang, Jianguo Qian, Xinxin Zhang, Peidong Chen, Bo Li:
Coattention-Based Recurrent Neural Networks for Sentiment Analysis of Chinese Texts. 349-356 - Honglei Zheng, Hong Guo, Shimin Wu:
Design and Implementation of Small-scale Sensor Network Based on Raspberry Pi. 357-365 - Wenhui Hu, Xueyang Liu, Chengli Xing, Minghui Zhang, Sen Ma:
Research on Template-Based Factual Automatic Question Answering Technology. 366-375 - Wenshuai Qin, Wenjie Guo, Xin Liu, Hui Zhao:
A Novel Scheme for Recruitment Text Categorization Based on KNN Algorithm. 376-386 - Yan Liu, Xu-Dong Wang, Meikang Qiu, Hui Zhao:
Machine Learning for Cancer Subtype Prediction with FSA Method. 387-397 - YauKa Cheung, Meikang Qiu, Meiqin Liu:
Autonomous Vehicle Communication in V2X Network with LoRa Protocol. 398-410
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.