


default search action
CSSE 2021: Singapore
- CSSE 2021: 2021 4th International Conference on Computer Science and Software Engineering, Singapore, October 22 - 24, 2021. ACM 2021, ISBN 978-1-4503-9067-5

- You Wu, Jin Bo Wang, Wen-zheng Zhang:

Parametrical Construction of MDS Based on Block Cyclic Shift. 1-5 - Xi Wang, Weisen Feng, Fei Wang:

Determining the Rumour Stance with Ensemble Method Based on BSAF Model. 6-12 - Fei Wang, Weisen Feng:

Multi-interest sequence recommendation algorithm based on BERT. 13-17 - Shiwei Zhang, Xin Lyu, Yunfei Zhang:

An Image Encryption Method based on Pixel-level Diffusion and Bit Flip. 18-24 - Simin Zhu, Xin Lv, Lin Yu:

Location Privacy Protection Method based on Variable-Order Markov Prediction Model. 25-30 - Siyang Lu, Yihong Chen, Xiaolin Zhu, Ziyi Wang, Yangjun Ou, Yuhang Xie:

Exploring Support Vector Machines for Big Data Analyses. 31-37 - Haiyan Geng, Baoliang Dong:

The topic model of voice interactive dialogue based on the localized command and control system. 38-42 - Zhibo Liu, Baoliang Dong, Fei Tian:

A controllable historical message playback method and application of message middleware. 43-48 - Tilei Gao, Ming Yang

, Xiaohui Jia, Tao Zhang, Bingfu Mou:
Research on software service risk uncertainty calculation method based on information entropy. 49-52 - Yutong Liu, Yumei Wang:

Synthetic Aperture Radar Image Target Recognition Based on Improved Fusion of R-FCN and SRC. 53-60 - Tao Zhang, Jun Feng

, Jiamin Lu
:
Distant Supervision Relation Extraction via Reinforcement Learning with Potential Energy Function. 61-66 - Jayati Gulati, Bharti Suri

, Luiz Fernando Capretz, Bimlesh Wadhwa, Anu Singh Lather:
Developing a Suitability Assessment Criteria for Software Developers: Behavioral Assessment Using Psychometric Test. 67-70 - Pankaj Kamthan, Nazlie Shahmir:

On Ethically-Sensitive User Story Engineering. 71-79 - Jie Pu, Kangkang Dou, Zhen Li, Zhengqi Jiang:

Safety Modeling and Analysis of Undercarriage System Based on Cross-Verification of FHA and PHA. 80-86 - Weiwei Lin, Hongwei Zeng:

Test Sequence Generation Based on Chain Unique Input-Output Sequence in FSM Conformance Testing. 87-92 - Zhongguo Wang, Bao Zhang:

Chinese Text Similarity Calculation Model Based on Multi-Attention Siamese Bi-LSTM. 93-98 - Yuanyuan Tian, Kan Wang:

A Review of Fatigue Driving Detection Based on Electrooculogram. 99-102 - Wenguang Ju:

A new process algebra more suitable for formal specification. 103-106 - Lijun Liu:

The Implementation of Video DES Encryption Engine in FPGA. 107-111 - Quang-Vinh Dang

:
Evaluating machine learning algorithms for intrusion detection systems using the dataset CIDDS-002. 112-118 - Xuebin Yang, Jianguo Hu, Ziming Wang, Fanglei Xu, Lu Zhu:

Self-supervised Fine-grained Image Classification via Progressive Global Disturbance. 119-125 - Xiaoyuan Jia:

Understanding Tail-latency in Sphinx Speech Recognition System. 126-130 - Hangze Wu:

Analyzing the Tail Latency in TailBench Image Recognition Application IMG-DNN. 131-134 - Alessandro Midolo

, Emiliano Tramontana:
Refactoring Java Loops to Streams Automatically. 135-139 - Yunjing Yao:

Reflections on Computer Pipeline Technology from an Analytical Perspective. 140-145 - Yadamanee Kuengjai, Lachana Ramingwong:

A Pilot Study of Requirement Prioritization Techniques in Agile Software Development. 146-151 - Rui Zhang

, Xin Li:
Improving Graph Neural Network by Filter Preprocessing. 152-157 - Bo Sun:

Memory Mountain Experiment Analysis. 158-162 - GuangPing Qiu, Zhihao Zheng, YongChuang Xu, YanCong Deng:

Development of Personalized IoT Mobile Applications Using MIT APP Inventor 2. 163-167 - Aruna P

, N. Priya
:
Analysis of Machine Learning techniques for Predicting Student Success in an Educational Institution. 168-173 - Hao Tan, Dong Xu Miao, Bin Shen, Wenzheng Zhang:

Fast MILP Modelings for Sboxes. 174-177 - Shiyu Liu

, Dongfang Li, Jixing Xue, Guang Yang, Wei Shen, Zhihao Wang:
Model Checking for an HDLC IP Core Transparency Error in an Aerospace Industrial Context. 178-183 - Chia-Yi Chuang, Megn-Chi Huang, Y. Y. Lin, Yi-Hao Hsiao, T. C. Wang:

Using Contextual Text Mining Algorithm to Analysis Yearly Trend for Population Ageing and Declining Fertility with Government Science and Technology Projects in Taiwan. 184-189 - Wenjing Qi, Weihua Yuan, Li Zhao:

Fuzzy Comprehensive Evaluation of Online Course Based on Learner Profile and User Experience. 190-194 - Youna Jung, Tanner Mallari, Emily Hattman:

DRMACert: Certification for Disaster Response Mobile Applications. 195-199 - Paulo Roberto Martins de Andrade, Samira Sadaoui:

RM3: A Risk Management Framework For IT Project Success. 200-205 - Hongquan Li, Yunfei Cao:

Study on linear optimization of activation function of homomorphic encryption neural network. 206-211 - Jiayu Chen:

Understanding and Analyzing the Performance Scalability of N-body Problem. 212-215 - Kainan Zhao, Baoliang Dong, Cheng Yang:

Military Target Recognition Technology based on WGAN-GP and XGBoost. 216-220 - Junyou Wang, Yizhong Fu:

The Impact of Financial Service Industry Opening-up on Manufacturing Domestic Value-added Exports. 221-232 - Tianhao Guo, Fuzhong Wang, Yalin Zhang:

Research on BER of BPSK signal based on stochastic resonance under Levy noise. 233-237 - Jinxin Liu, Yingyuan Xiao, Wenguang Zheng:

LCW: A Lightweight Recommendation Framework for Non-profit Crowdfunding Projects. 238-242 - Yunfeng Peng, Congming Shi, Guowei Gao, Jianan Wang, Hai Liu:

Parallel Component Composition and Performance Optimization Based on Agent Technology. 243-252 - Pingyuan Li, Xiaoguang Yuan, Suiping Jiang:

Image Hashing Based on SIFT Features. 253-256 - Ming Yang

, Tao Zhang, Tilei Gao, Di Zhang, Di Yang:
The Assessment Method of Mobile privacy security Based on AHP and Risk Matrix. 257-261 - Ling Gan, Qiao Tang:

Graph Attention Network with Dependency Parsing for Aspect-level Sentiment Classification. 262-267 - Dongsheng Jin, Zhi Wang, Mingyang Li, Xinjie Zhu:

Construction and application of knowledge graph of domestic operating system testing. 268-273 - Jinlan Kong, Qinglei Zhou, Mengfei Lin:

Design And Implementation of Video Learning Platform Based on B / S Architecture. 274-278 - Kangli Chang, Fuchuan Li:

An optimization algorithm of IPO with forbidden constraints. 279-284 - Jinzhu Zhang, Yifeng Li:

Technology convergence prediction based on semantic representation of patent classification's text. 285-289 - Yuyang Jing:

Design and Implementation of Intelligent Course Arrangement System in Colleges Based on JSP Technology: Design Intelligent Course Arrangement System. 290-294 - Yan Wang, Zihao Zhao, Hang Li:

Overview of information visualization for business under the background of big data: Overview of information visualization. 295-299 - Xudong Yang, Hui Peng, Qingming Zhang:

Visual Analysis of Heterogenous Air Pollution Data. 300-306 - Lehao Wang, Yucheng Chen, Weijun Duan:

Monocular Keypoint based Pull-ups Measurement on Strict Pull-ups Benchmark. 307-311 - Xiaofan Liu, Jinjin Lu, Rongshan Lu, Shaoshao Xie, Congfang Liu:

The review of color balance method for UAV image By COMPUTER technology. 312-316 - Duhita Wani, Tomas Maul:

Image Super-Resolution for Arthropod Identification. 317-324 - Yanghong Han, Xing Qiao, Yan Wu, Zili Zhang:

End-to-End 3D Facial Shape Reconstruction From an Unconstrained Image. 325-332 - Jian Du, Shengwei Qin, Gengbin Ma, Zilong Wu:

Research on Rendering Effect and Frame Rate Analysis of Group Behavior Oriented to VR Environment. 333-337 - Linrun Li, Zhangjian Qin, Qin Zhang:

Landslide Recognition Based on the Improved U-net. 338-345 - Lai Jiang:

Development of Virtual Reality Training System. 346-350 - Dingwen Dong:

Adaptive prediction model of gas concentration based on EMD and GPR. 351-355 - Yavor Dankov

:
A Functional Model of a Designer of Educational Maze Game. 356-361 - Oscar Dadfar, Lingdong Huang, Hizal Çelik:

GAN Theft Auto: Autonomous Texturing of Procedurally Generated Interactive Cities. 362-366

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














