Credibility-based knowledge graph embedding for identifying social brand advocates [0.03%]
基于可信度的知识图嵌入在识别社交品牌倡导者中的应用
Bilal Abu-Salih,Salihah Alotaibi,Manaf Al-Okaily et al.
Bilal Abu-Salih et al.
Brand advocates, characterized by their enthusiasm for promoting a brand without incentives, play a crucial role in driving positive word-of-mouth (WOM) and influencing potential customers. However, there is a notable lack of intelligent sy...
ActiveReach: an active learning framework for approximate reachability query answering in large-scale graphs [0.03%]
基于主动学习的大规模图的近似可达性查询框架
Zohreh Raghebi,Farnoush Banaei-Kashani
Zohreh Raghebi
With graph reachability query, one can answer whether there exists a path between two query vertices in a given graph. The existing reachability query processing solutions use traditional reachability index structures and can only compute e...
Bowen Yang,LinLin Yu,Feng Chen
Bowen Yang
Bird's-eye-view Semantic Segmentation (BEVSS) is a powerful and crucial component of planning and control systems in many autonomous vehicles. Current methods rely on end-to-end learning to train models, leading to indirectly supervised and...
Cultural big data: nineteenth to twenty-first century panoramic visualization [0.03%]
文化大数据:十九至二十一世纪全景可视化研究
Tsz Kin Chau,Paul Bourke,Lily Hibberd et al.
Tsz Kin Chau et al.
From the nineteenth-century panorama to the emergence of the digital panoramic format in the 1990's, the visualization of large images frequently relies on panoramic viewing strategies. Originally rendered in the form of epic painted canvas...
Cybermycelium: a reference architecture for domain-driven distributed big data systems [0.03%]
网络菌丝体:面向领域驱动的分布式大数据系统的参考架构
Pouya Ataei
Pouya Ataei
Introduction: The ubiquity of digital devices, the infrastructure of today, and the ever-increasing proliferation of digital products have dawned a new era, the era of big data (BD). This era began when the volume, variet...
Cognitive warfare: a conceptual analysis of the NATO ACT cognitive warfare exploratory concept [0.03%]
认知作战:北约认知作战探索性概念之理论分析
Christoph Deppe,Gary S Schaal
Christoph Deppe
This study evaluates NATO ACT's cognitive warfare concept from a political science perspective, exploring its utility beyond military applications. Despite its growing presence in scholarly discourse, the concept's interdisciplinary nature ...
An enhanced whale optimization algorithm for task scheduling in edge computing environments [0.03%]
用于边缘计算环境的任务调度的增强鲸鱼优化算法
Li Han,Shuaijie Zhu,Haoyang Zhao et al.
Li Han et al.
The widespread use of mobile devices and compute-intensive applications has increased the connection of smart devices to networks, generating significant data. Real-time execution faces challenges due to limited resources and demanding appl...
Yezi Liu,Hanning Chen,Mohsen Imani
Yezi Liu
Link prediction is a crucial task in network analysis, but it has been shown to be prone to biased predictions, particularly when links are unfairly predicted between nodes from different sensitive groups. In this paper, we study the fair l...
Exploring code portability solutions for HEP with a particle tracking test code [0.03%]
利用粒子跟踪测试代码探索HEP中的代码可移植性解决方案
Hammad Ather,Sophie Berkman,Giuseppe Cerati et al.
Hammad Ather et al.
Traditionally, high energy physics (HEP) experiments have relied on x86 CPUs for the majority of their significant computing needs. As the field looks ahead to the next generation of experiments such as DUNE and the High-Luminosity LHC, the...
Editorial: Utilizing big data and deep learning to improve healthcare intelligence and biomedical service delivery [0.03%]
述评:利用大数据和深度学习提升医疗智能及生物医学服务递送水平
V E Sathishkumar
V E Sathishkumar