Results 11 to 20 of about 160,535 (190)
SFA: Small Faces Attention Face Detector
Tremendous strides have been made in face detection thanks to convolutional neural network. However, the performance of previous face detectors deteriorates dramatically as the face scale shrinks.
Shi Luo +3 more
doaj +1 more source
Understanding socialbot behavior on end hosts
Server-side socialbot detection approaches can identify malicious accounts and spams in online social networks. However, they cannot detect socialbot processes, residing on user hosts, which control these accounts. Therefore, new approaches are needed to
Yukun He +4 more
doaj +1 more source
GroupFound: An effective approach to detect suspicious accounts in online social networks
Online social networks are an important part of people’s life and also become the platform where spammers use suspicious accounts to spread malicious URLs.
Bo Feng +4 more
doaj +1 more source
Differential expressions of genes are widely evaluated for the diagnosis and prognosis correlations with diseases. But limited studies investigate how transcriptional regulations are quantitatively altered in diseases.
Meiyu Duan +8 more
doaj +1 more source
The neurological disorder mild cognitive impairment (MCI) demonstrates minor impacts on the patient's daily activities and may be ignored as the status of normal aging.
Jialiang Li +8 more
doaj +1 more source
We calculate the gluonic massive operator matrix elements in the unpolarized and polarized cases, A gg,Q (x, μ 2) and ∆A gg,Q (x, μ 2), at three-loop order for a single mass.
J. Ablinger +7 more
doaj +1 more source
Symbolic Computation Software Composability [PDF]
We present three examples of the composition of Computer Algebra Systems to illustrate the progress on a composability infrastructure as part of the SCIEnce (Symbolic Computation Infrastructure for Europe) project1. One of the major results of the project so far is an OpenMath based protocol called SCSCP (Symbolic Computation Software Composability ...
Freundt, S. +4 more
openaire +1 more source
Computations for symbolic substitutions [PDF]
We provide a survey of results from symbolic dynamics and algebraic topology relating to Grout, a new user-friendly program developed to calculate combinatorial properties and topological invariants of a large class of symbolic substitutions. We study their subshifts (and related spaces) with an emphasis on examples of computations.
Balchin, Scott, Rust, Dan
openaire +3 more sources
Constrained Consistency Modeling for Attributed Network Embedding
Network embedding has emerged as a fundamental approach to network analysis tasks. Its main purpose is to learn a suitable mapping function to convert nodes in networks into a low-dimensional representations.
Xuan Zang +3 more
doaj +1 more source
The OCS-SVM: An Objective-Cost-Sensitive SVM With Sample-Based Misclassification Cost Invariance
Studies on the traditional support vector machine (SVM) implicitly assume that the costs of different types of mistakes are the same and minimize the error rate.
Shuang Yu +3 more
doaj +1 more source

