Results 21 to 30 of about 6,869,870 (334)

Augmenting Dialogue Response Generation With Unstructured Textual Knowledge

open access: yesIEEE Access, 2019
The dialogue response generation is a challenging task in chatbot applications. Recently neural-network-based dialogue models, including the sequence-to-sequence model and the RNN language models, are able to generate fluent and grammatically compliant ...
Yanmeng Wang   +3 more
doaj   +1 more source

A survey of software development practices in the New Zealand software industry [PDF]

open access: yes, 2000
We report on the software development techniques used in the New Zealand software industry, paying particular attention to requirements gathering. We surveyed a selection of software companies with a general questionnaire and then conducted in-depth ...
Groves, Lindsay   +4 more
core   +2 more sources

Random Blur Data Augmentation for Scene Text Recognition

open access: yesIEEE Access, 2021
In this paper, we propose to apply data augmentation approaches that provide more diverse training images, thus helping train more robust deep models for the Scene Text Recognition (STR) task.
Deguo Mu, Wei Sun, Guoliang Xu, Wei Li
doaj   +1 more source

A MODULAR MOBILE MAPPING PLATFORM FOR COMPLEX INDOOR AND OUTDOOR ENVIRONMENTS [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2020
In this work we present the development of a prototype, mobile mapping platform with modular design and architecture that can be suitably modified to address effectively both outdoors and indoors environments.
I. Kalisperakis   +6 more
doaj   +1 more source

Mixture-Model-Based Graph for Privacy-Preserving Semi-Supervised Learning

open access: yesIEEE Access, 2020
Privacy has become a major concern in data mining as it is utilized in many important applications. Distributed privacy-preserving data mining (DPPDM) is one of the techniques to address this concern, which focuses on protecting private information of ...
Zhi Li, Liqun Yang, Zhoujun Li
doaj   +1 more source

Privacy Model: Detect Privacy Leakage for Chinese Browser Extensions

open access: yesIEEE Access, 2021
The wide use of browser extensions brings the privacy leakage problem. The previous works detected private data transmission to find privacy leakage in Chrome or Firefox, but the real challenge is to determine whether the transmission is reasonable ...
Yufei Zhao   +4 more
doaj   +1 more source

Duplicate Question Detection With Deep Learning in Stack Overflow

open access: yesIEEE Access, 2020
Stack Overflow is a popular Community-based Question Answer (CQA) website focused on software programming and has attracted more and more users in recent years. However, duplicate questions frequently appear in Stack Overflow and they are manually marked
Liting Wang, Li Zhang, Jing Jiang
doaj   +1 more source

Trustworthy Software Development [PDF]

open access: yes, 2013
This paper presents an overview on how existing development methodologies and practices support the creation of trustworthy software. Trustworthy software is key for a successful and trusted usage of software, specifically in the Cloud. To better understand what trustworthy software applications actually mean, the concepts of trustworthiness and trust ...
Paulus, Sachar   +2 more
openaire   +2 more sources

TBTK: A quantum mechanics software development kit [PDF]

open access: yes, 2019
TBTK is a software development kit for quantum mechanical calculations and is designed to enable the development of applications that investigate problems formulated on second-quantized form.
Björnson, Kristofer
core   +2 more sources

GPU Acceleration of Melody Accurate Matching in Query-by-Humming

open access: yesThe Scientific World Journal, 2014
With the increasing scale of the melody database, the query-by-humming system faces the trade-offs between response speed and retrieval accuracy. Melody accurate matching is the key factor to restrict the response speed.
Limin Xiao   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy