Results 281 to 290 of about 850,549 (316)
Some of the next articles are maybe not open access.
D-Bot: Database Diagnosis System using Large Language Models
Proceedings of the VLDB Endowment, 2023Database administrators (DBAs) play an important role in managing database systems. However, it is hard and tedious for DBAs to manage vast database instances and give timely response (waiting for hours is intolerable in many online cases). In addition,
Xuanhe Zhou +8 more
semanticscholar +1 more source
SG-Bot: Object Rearrangement via Coarse-to-Fine Robotic Imagination on Scene Graphs
IEEE International Conference on Robotics and Automation, 2023Object rearrangement is pivotal in robotic-environment interactions, representing a significant capability in embodied AI. In this paper, we present SG-Bot, a novel rearrangement framework that utilizes a coarse-to-fine scheme with a scene graph as the ...
Guangyao Zhai +7 more
semanticscholar +1 more source
ACM SIGPLAN Notices, 2006
Embedded application developers create applications for a wide range of devices with different resource constraints. Developers want to maximize the use of the limited resources available on the device while still not exceeding the capabilities of the device. To do this, the developer must be able to scale his software for different platforms.
Raju Pandey, Jeffrey Wu
openaire +1 more source
Embedded application developers create applications for a wide range of devices with different resource constraints. Developers want to maximize the use of the limited resources available on the device while still not exceeding the capabilities of the device. To do this, the developer must be able to scale his software for different platforms.
Raju Pandey, Jeffrey Wu
openaire +1 more source
Future generations computer systems, 2020
Identifying cyber attacks traffic is very important for the Internet of things (IoT) security in smart city. Recently, the research community in the field of IoT Security endeavor hard to build anomaly, intrusion and cyber attacks traffic identification ...
M. Shafiq +4 more
semanticscholar +1 more source
Identifying cyber attacks traffic is very important for the Internet of things (IoT) security in smart city. Recently, the research community in the field of IoT Security endeavor hard to build anomaly, intrusion and cyber attacks traffic identification ...
M. Shafiq +4 more
semanticscholar +1 more source
LHRS-Bot: Empowering Remote Sensing with VGI-Enhanced Large Multimodal Language Model
European Conference on Computer VisionThe revolutionary capabilities of large language models (LLMs) have paved the way for multimodal large language models (MLLMs) and fostered diverse applications across various specialized domains.
Dilxat Muhtar +4 more
semanticscholar +1 more source
Deep Learning Based Social Bot Detection on Twitter
IEEE Transactions on Information Forensics and Security, 2023While social bots can be used for various good causes, they can also be utilized to manipulate people and spread malware. Therefore, it is crucial to detect bots running on social media platforms.
Efe Arin, Mucahid Kutlu
semanticscholar +1 more source
Annual Meeting of the Association for Computational Linguistics
Social media bot detection has always been an arms race between advancements in machine learning bot detectors and adversarial bot strategies to evade detection.
Shangbin Feng +5 more
semanticscholar +1 more source
Social media bot detection has always been an arms race between advancements in machine learning bot detectors and adversarial bot strategies to evade detection.
Shangbin Feng +5 more
semanticscholar +1 more source
SEBot: Structural Entropy Guided Multi-View Contrastive learning for Social Bot Detection
Knowledge Discovery and Data MiningRecent advancements in social bot detection have been driven by the adoption of Graph Neural Networks. The social graph, constructed from social network interactions, contains benign and bot accounts that influence each other.
Yingguang Yang +6 more
semanticscholar +1 more source
A Review and Analysis of the Bot-IoT Dataset
International Symposium on Service Oriented Software Engineering, 2021Machine learning is rapidly changing the cybersecu-rity landscape. The use of predictive models to detect malicious activity and identify inscrutable attack patterns is providing levels of automation that are desperately needed to level the playing field
Jared M. Peterson +2 more
semanticscholar +1 more source
Artificial Chemist: An Autonomous Quantum Dot Synthesis Bot
Advances in Materials, 2020The optimal synthesis of advanced nanomaterials with numerous reaction parameters, stages, and routes, poses one of the most complex challenges of modern colloidal science, and current strategies often fail to meet the demands of these combinatorially ...
Robert W. Epps +7 more
semanticscholar +1 more source

