长处 发表于 2025-3-30 11:35:51

http://reply.papertrans.cn/15/1485/148412/148412_51.png

osteocytes 发表于 2025-3-30 16:06:36

http://reply.papertrans.cn/15/1485/148412/148412_52.png

拾落穗 发表于 2025-3-30 17:02:35

City Diplomacy: A Strategic Choice,esults showed that both the robot and the virtual human performed satisfactorily in their social interactions though the performances varied slightly.We also found a trade-off between the attributes and the performances of the agents. The results will help develop intelligent social agents of differ

aspersion 发表于 2025-3-30 23:39:31

Borworn Papasratorn,Nipon Charoenkitkarn,Vithida CProceedings of the 6th International Conference on Advances in Information Technology, IAIT 2013

垫子 发表于 2025-3-31 01:28:37

http://reply.papertrans.cn/15/1485/148412/148412_55.png

mediocrity 发表于 2025-3-31 08:16:28

https://doi.org/10.1007/978-3-319-11233-6rms of frequency and regularity to determine significant of patterns under user-given support and regularity thresholds. However, it is well-known that setting of thresholds to discover the most interesting results is a very difficult task and it is more reasonable to avoid specifying the suitable t

冲突 发表于 2025-3-31 09:22:10

https://doi.org/10.1007/978-981-99-8699-6continue to be a major provider of information in the future. In recent years, however there has been a significant change: information about natural disasters has increasingly been disseminated on a large scale on social media platforms. These media are typically faster but may be less reliable. Th

努力赶上 发表于 2025-3-31 16:32:29

https://doi.org/10.1007/978-94-011-3700-3twork-bandwidth saturation and public cloud data-out overspends. Client-side cloud caching is a solution. This paper presents the core mechanism of the cloud caching, called i-Cloud cache replacement policy. Simulation results showed that 1) i-Cloud could deliver stable performances and outperformed

elastic 发表于 2025-3-31 19:11:03

Physical and Chemical Contaminations such as security, privacy etc. This paper interests in the video steganography method, where the image is hidden in a video file. The approach uses the intensity features together with the lifting multiple discrete wavelet transform. The approach contains two steps. First, we bring the secret imag

娘娘腔 发表于 2025-4-1 00:20:29

Citrus Oils, Aromas, and EssencesIt is well known that in this IFOC scheme, the induction machine parameters change widely during the operation of the drive especially the value of rotor time constant which varies with rotor temperature and flux level of the machine. Therefore, the quality of the drive system decreases if no means
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Advances in Information Technology; 6th International Co Borworn Papasratorn,Nipon Charoenkitkarn,Vithida C Conference proceedings 2013 Spr