找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Advances in Information Technology; 6th International Co Borworn Papasratorn,Nipon Charoenkitkarn,Vithida C Conference proceedings 2013 Spr

[复制链接]
楼主: 拐杖
发表于 2025-3-30 11:35:51 | 显示全部楼层
发表于 2025-3-30 16:06:36 | 显示全部楼层
发表于 2025-3-30 17:02:35 | 显示全部楼层
City Diplomacy: A Strategic Choice,esults showed that both the robot and the virtual human performed satisfactorily in their social interactions though the performances varied slightly.We also found a trade-off between the attributes and the performances of the agents. The results will help develop intelligent social agents of differ
发表于 2025-3-30 23:39:31 | 显示全部楼层
Borworn Papasratorn,Nipon Charoenkitkarn,Vithida CProceedings of the 6th International Conference on Advances in Information Technology, IAIT 2013
发表于 2025-3-31 01:28:37 | 显示全部楼层
发表于 2025-3-31 08:16:28 | 显示全部楼层
https://doi.org/10.1007/978-3-319-11233-6rms of frequency and regularity to determine significant of patterns under user-given support and regularity thresholds. However, it is well-known that setting of thresholds to discover the most interesting results is a very difficult task and it is more reasonable to avoid specifying the suitable t
发表于 2025-3-31 09:22:10 | 显示全部楼层
https://doi.org/10.1007/978-981-99-8699-6continue to be a major provider of information in the future. In recent years, however there has been a significant change: information about natural disasters has increasingly been disseminated on a large scale on social media platforms. These media are typically faster but may be less reliable. Th
发表于 2025-3-31 16:32:29 | 显示全部楼层
https://doi.org/10.1007/978-94-011-3700-3twork-bandwidth saturation and public cloud data-out overspends. Client-side cloud caching is a solution. This paper presents the core mechanism of the cloud caching, called i-Cloud cache replacement policy. Simulation results showed that 1) i-Cloud could deliver stable performances and outperformed
发表于 2025-3-31 19:11:03 | 显示全部楼层
Physical and Chemical Contaminations such as security, privacy etc. This paper interests in the video steganography method, where the image is hidden in a video file. The approach uses the intensity features together with the lifting multiple discrete wavelet transform. The approach contains two steps. First, we bring the secret imag
发表于 2025-4-1 00:20:29 | 显示全部楼层
Citrus Oils, Aromas, and EssencesIt is well known that in this IFOC scheme, the induction machine parameters change widely during the operation of the drive especially the value of rotor time constant which varies with rotor temperature and flux level of the machine. Therefore, the quality of the drive system decreases if no means
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-17 23:47
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表