半球 发表于 2025-3-26 22:50:55

A Combined Routing Path and Node Importance Network Invulnerability Evaluating Method for Ad Hoc Netlgorithm lies in two levels, comprehensive consideration of the influencing factors of network to point-to-line network invulnerability. The algorithm considers the influence of the proportion of important nodes of the network on the invulnerability of the network, and considers the influence of the

结果 发表于 2025-3-27 02:26:13

http://reply.papertrans.cn/103/10290/1028978/1028978_32.png

foreign 发表于 2025-3-27 05:43:08

Understanding Mobile User Intent Using Attentive Sequence-to-Sequence RNNsapplications. In this paper, we propose to address a novel task called . which attempts to capture user intents based on smartphone usage log. The goal of Intention2Text is to learn a deep learning model taking mobile context logs as input and generate sentences as output for describing mobile user

带子 发表于 2025-3-27 11:16:13

http://reply.papertrans.cn/103/10290/1028978/1028978_34.png

Contracture 发表于 2025-3-27 17:32:27

http://reply.papertrans.cn/103/10290/1028978/1028978_35.png

STEER 发表于 2025-3-27 20:10:12

http://reply.papertrans.cn/103/10290/1028978/1028978_36.png

联邦 发表于 2025-3-28 00:24:06

Towards the Implementation of Movie Recommender System by Using Unsupervised Machine Learning Schemeon system as information for customers in selecting films according to features. The recommendation system can be performed with several algorithms as a grouping such as K-Means, K-Means Mini Batch, Birch Algorithm, Affinity Propagation Algorithm and Mean Shift Algorithm. We recommend methods to opt

POLYP 发表于 2025-3-28 03:19:22

A Group Signature Scheme for Securing Blockchain-Based Mobile Edge Computingmputing resources of devices in the mobile blockchain environment while ensuring the distributed deployment of computing resources and the traceable of transaction data. However, some consensus-level security threats exist in the mobile blockchain environment, i.e., double-spend attacks, long-range

诱导 发表于 2025-3-28 09:35:23

http://reply.papertrans.cn/103/10290/1028978/1028978_39.png

exhibit 发表于 2025-3-28 12:57:10

http://reply.papertrans.cn/103/10290/1028978/1028978_40.png
页: 1 2 3 [4] 5
查看完整版本: Titlebook: Wireless Internet; 12th EAI Internation Der-Jiunn Deng,Ai-Chun Pang,Chun-Cheng Lin Conference proceedings 2020 ICST Institute for Computer