default search action
26th CSCWD 2023: Rio de Janeiro, Brazil
- Weiming Shen, Jean-Paul A. Barthès, Junzhou Luo, Adriana S. Vivacqua, Daniel Schneider, Cheng Xie, Jinghui Zhang, Haibin Zhu, Kunkun Peng, Cláudia Lage Rebello da Motta:
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023, Rio de Janeiro, Brazil, May 24-26, 2023. IEEE 2023, ISBN 979-8-3503-3168-4 - Bin Ning, Fang Liu, Zhixiong Liu:
Creativity Support in AI Co-creative Tools: Current Research, Challenges and Opportunities. 5-10 - Junkai Fei, Xiaojun Zhu, Ruyan Zhang:
Evaluation of TCP Variants on Dynamic UAV Networks. 11-16 - Qianqian Chang, Lin Xu, Lei Zhang:
Practical privacy-preserving mixing protocol for Bitcoin. 17-22 - Xianfeng Ye, Zhiyun Deng, Yanjun Shi, Weiming Shen:
An Agent-based System Architecture for Automated Guided Vehicles in Cloud-Edge Computing Environments. 23-28 - Chaofei Li, Ziyuan Zhu, Ruicheng Niu, Tao Leng, Dan Meng:
Enhancing Adversarial Robustness for Deep Metric Learning through Adaptive Adversarial Strategy. 29-34 - Bowen Guo, Qianmu Li, Xiao Liu:
Improving Adversarial Transferability with Heuristic Random Transformation. 35-40 - Hanqing Li, Niannian Chen:
Understanding Social Relations with Graph-Based and Global Attention. 41-46 - Leiqi Wang, Zijun Cheng, Qiujian Lv, Yan Wang, Shixiang Zhang, Weiqing Huang:
ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention Networks. 47-52 - Luiz Fernando Puttow Southier, Esther Maria Rojas Krugger, Cleiton dos Santos Garcia, Edson Emílio Scalabrin:
Process Mining and Root Cause Analysis for Detecting Inefficiencies in Business Processes: an Applied Case in a Brazilian Telecommunications Provider. 53-58 - Hao An, Dongsheng Chen, Weiyuan Xu, Zhihong Zhu, Yuexian Zou:
TLAG: An Informative Trigger and Label-Aware Knowledge Guided Model for Dialogue-based Relation Extraction. 59-64 - Yuanmeng Tian, Shuying Wang, Shen Xu, Qing Zheng:
Crowdsourcing Workers Recommendation Algorithm Based on Improved Deep Matrix Factorization. 65-70 - Jialu Zhang, Xingguo Jiang, Yan Sun, Hong Luo:
RS-TTS: A Novel Joint Entity and Relation Extraction Model. 71-76 - António Correia, Dennis Paulino, Hugo Paredes, Diogo Guimarães, Daniel Schneider, Benjamim Fonseca:
Investigating Author Research Relatedness through Crowdsourcing: A Replication Study on MTurk. 77-82 - Aimei Dong, Zhiyun Qi, Yi Zhai, Guohua Lv:
Multi-Source Domain Transfer Learning on Epilepsy Diagnosis. 83-88 - Yahui Lu, Yu Jiang:
Dirty page prediction by machine learning methods based on temporal and spatial locality. 89-94 - Yuyang Liu, Junruo Gao, Zefang Zhao, Jun Li:
Complement Coupling Network for Multiple Activated Users Prediction in Social Cascade. 95-100 - Fuqing Zhao, Tao Jiang:
A Cooperative Two-stage Migrating Birds Optimization Algorithm Based on Quasi-Entropy. 101-106 - Bing Shi, Wenan Tan, Pengfei Yu:
Momentum Contrastive Learning for Sequential Recommendation. 107-112 - Fujia Zhou, Wei Zhang, Guangxu Zhu, Hang Li, Qingjiang Shi:
CHA-Sens: An End-to-End Comprehensive Residual Convolution Framework for CSI-based Human Activity Sensing. 113-118 - Yangyan Xu, Fangfang Yuan, Cong Cao, Xiaoliang Zhang, Majing Su, Dakui Wang, Yanbing Liu:
MetaBERT: Collaborative Meta-Learning for Accelerating BERT Inference. 119-124 - Bo Li, Wuwen Chen, Shicheng Jin, Yuhao Shi:
DVFS-based Energy-saving Workflow Offloading Strategy in Mobile Edge Computing Environments. 125-130 - Zhenyu Wang, Yanghui Li, Pengfei Fu:
An Automatic Configuration Memetic Algorithm with Reinforcement Learning Mechanism for Real-value Optimization Problems. 131-136 - Runhuan Chen, Hua Dai, Hui Li, Geng Yang, Haozhe Wu, Weihong Yang:
An Urban Electric Load Forecasting Model Using Discrepancy Compensation and Short-term Sampling Contrastive Loss in LSTM. 137-142 - Xiaolong Xu, Yihao Dong, Jian Song:
An Answer Summarization Scheme Based on Multilayer Attention Model. 143-148 - Herbert Salazar Dos Santos, Carlos Eduardo Barbosa, Yuri Oliveira de Lima, Alan De Oliveira Lyra, Matheus Margarido Argôlo, Jano Moreira de Souza:
Crowdsourced Deals: the Crowd Using Itself to Find and Filter Deals. 149-154 - Pengfei Liu, Liang Xiao:
An Intelligent Human-Agent Interaction Support System in Medicine. 155-160 - Yuhao Zhao, Siguang Chen:
Dynamic Privacy-Enhanced Federated Learning Algorithm Based on Gradients Perturbation. 161-166 - Marcos Antonio de Almeida, António Correia, Jano Moreira de Souza, Daniel Schneider:
Mapping Tokenomics Arrangements to Expand the Digital Nomad Ecosystem. 167-174 - Yongfei Liu, Hong Li, Wenyuan Zhang, Fei Lv, Shuaizong Si:
Intrusion Detection Based on Sampling and Improved OVA Technique on Imbalanced Data. 175-180 - Caiyan Li, Lizhen Cui, Yonghui Xu, Ning Liu:
Logic Event Graph Enhanced Narrative Generation. 181-186 - Xigang Sun, Jingya Zhou, Zhen Wu, Jie Wang:
Information Diffusion Prediction via Exploiting Cascade Relationship Diversity. 187-192 - Emilly Marques Da Silva, António Correia, Claudio Miceli, Daniel Schneider:
Understanding the Support of IoT and Persuasive Technology for Smart Bin Design: A Scoping Review. 193-198 - Xue Lin, Yushui Geng, Jing Zhao, Daquan Cheng, Xuefeng Zhang, Hu Liang:
Multi-modal medical image classification method combining graph convolution neural networks. 199-206 - Zilong Zeng, Buqing Cao, Hongfan Ye, Dong Zhou, Mingdong Tang, Feng Xiao:
An Edge Server Co-deployment Method via Joint Optimization of Communication Delay and Load Balancing in Edge Collaborative Environment. 207-212 - Yixuan Ge, Qing Yu, Zuohua Wang:
SKRAG: Sampling on Knowledge Graph for Recommendation with Relational Path-aware Graph Neural Network. 213-218 - Guoqing Zhang, Hongbo Sun, Xin Liu, Lei Liu:
A Surface Defect Detection Method based on Information Entropy. 219-224 - Xiao-Min Hu, Jing-Hui Xu, Min Li, Ying Zeng, Yi Liu:
Optimization of Resource Allocation based on Swarm Intelligence for Multi-Objective Dynamic SEIV Models. 225-230 - Hanlin Liu, Jiantao Zhou, Hua Li:
Using Rough Sets to Improve the High-dimensional Data Anomaly Detection Method Based on Extended Isolation Forest. 231-236 - Yingying Xue, Kun Huang, Hui Peng, Aibo Song, Kun Zhao, Jibin Sun:
A Multi-granularity Knowledge-enhanced Sequential Recommendation. 237-242 - Haibo Wang, Ding Ding, Yuhao Liu, Chi Wang:
IVRSandplay: An Immersive Virtual Reality Sandplay System Coupled with Hand Motion Capture and Eye Tracking. 243-248 - Zheng Luo, Xiaojie Lin, Wei Zhong, Encheng Feng:
Research on Coarse Granularity Data Sample Completion Method for District Heating System. 249-254 - Xiaobo Wei, Peng Li, Weiyi Huang, Zhiyuan Liu, Qin Liu:
Two-stage Vehicle Pair Dispatch in Multi-hop Ridesharing. 255-260 - Changyong Yu, Rong Hu, Bangjun Wang:
AKGIN: An API Knowledge Graph and Intent Network based Mashup-Oriented API Recommendation Method. 261-266 - Zuyang Ma, Kaihong Yan, Hongwei Wang:
BERT-based Question Answering using Knowledge Graph Embeddings in Nuclear Power Domain. 267-272 - Xiang Li, Renjie Huang, Guoqiang Xiao:
A Self-Attention Based Task-Adaptive Integration of Pre-trained Global and Local Classifiers for Few-Shot Classification. 273-278 - Chaokai Wu, Yansong Wang, Tao Jia:
Dynamic Link Prediction Using Graph Representation Learning with Enhanced Structure and Temporal Information. 279-284 - Xiaojing Ji, Peilin Yang, Qingbo Hao, Wenguang Zheng, Yingyuan Xiao:
Item Multi-Information Evolution Network for Click-Through Rate Prediction. 285-290 - Chenyang Zhang, Lu Liang:
Crowdsourcing Tasks Allocation based on Incentives via Group Multirole Assignment. 291-296 - Zhengyu Hou, Wuyungerile Li, Qinan Li, Bing Jia:
A Multi-path Routing Protocol based on Node Multiple Performances in Mobile Ad Hoc Networks. 297-302 - Caishan Weng, Zhiyang Shu, Zhengjia Xu, Jinghui Zhang, Junzhou Luo, Fang Dong, Peng Wang, Zhengang Wang:
FreezePipe: An Efficient Dynamic Pipeline Parallel Approach Based on Freezing Mechanism for Distributed DNN Training. 303-308 - Yang Jin, Hui Xu, Zhengbin Qin, Lang Huang:
Improved Wild Horse Optimizer with Cooperative Multi-Strategies for Network Intrusion Detection. 309-314 - Xiaoling Zeng, Zhaoyang Yang, Chuanbiao Wen:
Region Symmetry Mask for TCM-based Face Shape Classification. 315-319 - Haoqian Li, Jiayi Song, Wenguang Zheng, Yingyuan Xiao:
Scoring prediction model focusing on local feature interaction of text. 320-325 - Meimei Li, Yuhan Li, Nan Li, Zhongfeng Jin, Jiguo Liu, Chao Liu:
Intrusion Detection Method for SCADA System Based on Spatio-Temporal Characteristics. 326-331 - Qingguo Zhou, Xiaorun Tang, Qingquan Lv, Ziyuan Li, Jun Shen, Jinqiang Wang, Binbin Yong:
Ensemble Machine Learning Method for Photovoltaic Power Forecasting. 332-337 - Yan Wang, Chongwen Wang:
Analysis of Students' Seats Distribution Based on Single-channel Video. 338-334 - Caiyun Wu, Fazhi He, Bo Fan, Yaqian Liang:
Adaptive error-bounded simplification of Delaunay meshes with multi-objective optimization. 345-350 - Fuwei Li, Dianjie Lu, Baoxu An, Guijuan Zhang:
Risk Region-based Prediction Model for the Epidemic Spreading. 351-356 - Jiahui Liu, Lvqing Yang, Sien Chen, Wensheng Dong, Bo Yu, Qingkai Wang:
An Improved MOEA Based on Adaptive Adjustment Strategy for Optimizing Deep Model of RFID Indoor Positioning. 357-362 - Xiaohan Zhang, Han Wang, Chenze Wang, Qing Liu, Min Liu:
A Safe-Domain Generative Adversarial Network with Transformer for Noisy Imbalanced Fault Diagnosis. 363-368 - Yin Wu, Mingpei Cao, Yueze Zhang, Yong Jiang:
Detecting Clickbait in Chinese Social Media by Prompt Learning. 369-374 - Junhua Zhang, Junzhou Luo, Haozhe Zhang, Qingfeng Yuan, Xiaolin Fang:
Embedded Platform Based Intelligent Lecture Recording System. 375-380 - Guangbin Bao, Bo Zhang, Ling Tang, Jinyuan Yang, Xiaolian Wu:
Research on the short-term electric load forecasting model based on the graph learning layer and timeseries convolutional network. 381-386 - Wanying Liang, Yong Tang, Jia Zhu:
Social Network Community Detection based on Inner-Community Information Diffusion Simulation Algorithm. 387-392 - Chen Yang, Zou Lai, Yingchao Wang, Shulin Lan, Lihui Wang, Liehuang Zhu:
A Novel Bearing Fault Diagnosis Method based on Stacked Autoencoder and End-edge Collaboration. 393-398 - Xin Feng, Xingguo Jiang, Yan Sun, Hong Luo:
An Anomaly Detection Method for Multivariate Time Series Based on Cross Window. 399-404 - Juliana Câmara, Leonardo Pio Vasconcelos, Monica da Silva, Anderson Zudio, Daniela Trevisan, José Viterbo:
Using the Engagement by Design to Reflect on Recruiting and Selecting IT Professionals. 405-410 - Yunsong Xiang, Xuemei Yang, Yan Sun, Hong Luo:
A Fault-tolerant and Cost-efficient Workflow Scheduling Approach Based on Deep Reinforcement Learning for IT Operation and Maintenance. 411-416 - Jingqi Yang, Cheng Xie, Peng Tang:
Discriminative Feature Focus via Masked Autoencoder for Zero-Shot Learning. 417-422 - Yuhua Yin, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak:
Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset. 423-431 - Qun Ding, Xiaolong Xu, Wenming Gui:
Path Planning based on Reinforcement Learning with Improved APF model for Synergistic Multi-UAVs. 432-437 - Junnan Yin, Yuyan Sun, Lei Cui, Zhengyang Ai, Hongsong Zhu:
SynCPFL: Synthetic Distribution Aware Clustered Framework for Personalized Federated Learning. 438-443 - Xiuxian Li, Guiling Wang, Yongpeng Shi, Jian Yu:
A Dynamic Binding Method for Situation-aware IoT Services Targeting Proactive BPM. 444-449 - Boao Xiao, Siyuan Wu, Xin He, Wanchun Dou:
Generalized Image Embedding for Multi-Domain Image Retrieval. 450-455 - Wanqiu Huang, Hanrong Zhang, Peng Peng, Hongwei Wang:
Multi-gate Mixture-of-Expert Combined with Synthetic Minority Over-sampling Technique for Multimode Imbalanced Fault Diagnosis. 456-461 - Ramon Chaves, Cláudia L. R. Motta, António Correia, Jano de Souza, Daniel Schneider:
Tensions in design and participation processes: An ethnographic approach to the design, building and evaluation of a collective intelligence model. 462-467 - Hua Ma, Wen Zhao, Zixu Jiang, Peiji Huang, Wensheng Tang, Hongyu Zhang:
A Multi-level Approach to Learning Early Warning based on Cognitive Diagnosis and Learning Behaviors Analysis. 468-473 - Jiaqi Chang, Zhujuan Ma, Binghao Cao, Erzhou Zhu:
VDDA: An Effective Software Vulnerability Detection Model Based on Deep Learning and Attention Mechanism. 474-479 - Jiaying Chen, Xiaojie Lin, Wei Zhong, Yihui Mao, Liwei Ding:
Internet of Things in Smart Heating Systems: Critical Technologies Progress and Prospect. 480-485 - Wencong Geng, Guijuan Zhang, Dianjie Lu:
An Epidemic Model Based on Intra- and Inter-group Interactions. 486-491 - Haizhu Bao, Quanke Pan, Miao Rong, Aolei Yang, Xiaohua Wang:
A Multi-action Reinforcement Learning Algorithm for Energy-efficiency Blocking Flow-shop Scheduling Problem. 492-497 - Sheng Chen, Jinxi Li, Baochao Chen, Deke Guo, Keqiu Li:
vHSFC: Generic and Agile Verification of Service Function Chain with parallel VNFs. 498-503 - Fuqing Zhao, Qiaoyun Wang, Zesong Xu:
Reinforcement Learning Driven Moth-flame Optimization Algorithm for Solving Numerical Optimization Problems. 504-509 - Qihui Zhou, Qianyun Ruan, Dongdong Huo, Penghui Lv, Yu Wang, Zhen Xu:
The malicious resource consumption detection in permissioned blockchain based on traffic analysis. 510-515 - Fanshu Gong, Lanju Kong, Yuxuan Lu, Jin Qian, Xinping Min:
An Overview of Blockchain Scalability for Storage. 516-521 - Xin Liu, Hongbo Sun, Guoqing Zhang, Lei Liu:
A Machine Vision-based Deep Learning Method in Hemodialysis Filter Defects Detection. 522-527 - Xiaotong Lei, Zhe Yang, Yunwei Huang, Jianyu Long, Chuan Li, Huiyu Huang:
Anomaly Detection of Rolling Element Bearings Based on Contrastive Representation. 528-532 - Yubo Shen, Wenduo Jiang, Yu Zheng, Ru Jia, Ru Li:
Research on False Comment Recognition Algorithm Integrating crazy fan base Subculture Phenomenon. 533-538 - Zhiheng Zhang, Guowei Wu, Kaiwen Ning:
Optimizing The Access Control System for IOTA Tangle: A Game-Theoretic Perspective. 539-544 - Yirong Wu, Wenjing He, Shuifa Sun, Tinglong Tang:
A Defect Detection Method Based on Parallel Multiple AutoEncoders. 545-551 - Han Sun, Yan Zhang, Zhen Xu, Runmei Zhang, Mingxuan Li:
MK-FLFHNN: A Privacy-Preserving Vertical Federated Learning Framework For Heterogeneous Neural Network Via Multi-Key Homomorphic Encryption. 552-558 - Jun Li, Fengshi Zhang, Yonghe Guo, Siyuan Li, Guanjun Wu, Dahui Li, Hongsong Zhu:
A Privacy-Preserving Online Deep Learning Algorithm Based on Differential Privacy. 559-564 - Ya Zhang, Xi Lin, Jun Wu, Bei Pei, Yunyun Han:
Blockchain-Assisted UAV Data Free-Boundary Spatial Querying and Authenticated Sharing. 565-570 - Yi Liu, Weiqing Huang, Siye Wang:
TransRF: Towards a Generalized and Cross-Domain RFID Sensing System Using Few-Shot Learning. 571-576 - Xingze Guo, Feng Gao, Xiaojun Zheng, Shiduo Ning:
Multi-Agent Collaborative Behavior Decision-Making based on Deep Reinforcement Learning. 577-581 - Xinshuai Zhu, Songheng He, Xuren Wang, Chang Gao, Yushi Wang, Peian Yang, Yuxia Fu:
Simplified-Xception: A New Way to Speed Up Malicious Code Classification. 582-587 - Xiaolong Xu, Qun Ding, Licheng Lin:
Indoor Navigation Mechanism based on 5G network for Large Parking Garage. 588-593 - Xiaojiao Xie, Pengwei Zhan:
Improving the Quality of Textual Adversarial Examples with Dynamic N-gram Based Attack. 594-599 - Chengwu Tu, Shengjie Zhao, Hao Deng:
FedWNS: Data Distribution-Wise Node Selection in Federated Learning via Reinforcement Learning. 600-605 - Ruobing Wang, Daren Zha, Qingfei Zhao, Yuanye He, Xin Wang:
RW-MMDCG: Muti-modal via Rolling-Window Directed Graph Network for Conversational Emotion Recognition. 606-611 - Leping Li, Kun Ma, Benkuan Cui:
Multi-Information Filter Encoding Network for Multi-Label Text Classification. 612-617 - Shengzhe Zhang, Jiayu Ye, Qingxiang Wang:
Spa-L Transformer: Sparse-self attention model of Long short-term memory positional encoding based on long text classification. 618-623 - Chaoyi Yan, Xinli Huang, Hongyan Gu, Siyuan Meng:
SimulE: A novel convolution-based model for knowledge graph embedding. 624-629 - Haikun Yu, Dacheng Jiang, Guipeng Zhang, Zhenguo Yang, Wenyin Liu:
A Reputation System based on Blockchain and Deep Learning in Social Networks. 630-635 - Zhenxuan Xu, Yunzhou Xie, Fang Dong, Shucun Fu, Jiangshan Hao:
Joint Optimization of Task Offloading and Resource Allocation for Edge Video Analytics. 636-641 - Shuang Qiao, Chenhong Cao, Haoquan Zhou, Wei Gong:
The trip to WiFi indoor localization across a decade - A systematic review. 642-647 - Baowei Wang, Yi Yuan, Bin Li, Changyu Dai, Yufeng Wu, Weiqian Zheng:
QAIC: Quality-assured image crowdsourcing via blockchain and deep learning. 648-653 - Yuri Oliveira de Lima, Carlos Eduardo Barbosa, Alan De Oliveira Lyra, Herbert Salazar, Matheus Margarido Argôlo, Jano de Souza:
Providing Patients with Actionable Medical Knowledge: mHealth Apps for Laypeople. 654-659 - Yuan Liu, ChenYu Li, Zhiqiang Zheng, Qingli Guo, Xiaorui Gong:
Reverse Engineering Workload Measure based on Function Classification. 660-665 - Yuntao Ma, Lihe Wang, Junzhou Luo, Xiaolin Fang:
A Trusted and Intelligent Service System for the Decoction of Traditional Chinese Medicine. 666-672 - Baoxu An, Guijuan Zhang, Fuwei Li, Nianyun Song, Hong Liu, Dianjie Lu:
Deep reinforcement learning-based panic crowd evacuation simulation. 673-678 - Baijun Chen, Daheng Yin, Lifei Teng, Fang Dong:
HyperRTV: Neural-Enhanced Adaptive Real-Time Video Streaming Based on Terminal-Edge Collaboration. 679-684 - Chuanmiao Zhao, Guijuan Zhang, Lei Lv, Hong Liu, Dianjie Lu:
Spatial-temporal Consistency based Crowd Emotion Recognition. 685-690 - Tianshuo Yang, Haibin Zhu:
New Employee Training Scheduling Using the E-CARGO Model. 691-696