Stories

  1. Article
    dashSVD: a multi-thread parallel truncated SVD solver beating existing methods
  2. Article
    A virtual physio to serve you at home.
  3. Article
    Choices of medical institutions and associated factors in older patients with multimorbidity in stabilization period in China: A study based on logistic regression and decision tree model
  4. Article
    Enhancing Contextual Language Learning Experience with Multimodal AI in Smart Glasses
  5. Article
    Automatic Generation of Commercial Scenes
  6. Article
    Cracking Multimedia's Cognitive Code
  7. Article
    English writing for second language learners: Home environment, strategies, and Success
  8. Article
    Interaction Proxy Manager
  9. Article
    This paper aims to provide an optimization model for the integrated energy systems operation.
  10. Article
    Understanding In-Situ Programming for Smart Home Automation
  11. Article
    Knowledge Graph Completion with Counterfactual Augmentation
  12. Article
    Efficiently Answering Path Queries on Evolving Graphs
  13. Article
    Rhyme in Early Chinese Daybook Manuscripts
  14. Article
    Experience and thoughts from an industrial perspective to make AI systems trustworthy
  15. Article
    An approximate algorithm design method for wireless charger deployment.
  16. Article
    Detecting and localizing network failures by throwing a Drift-Bottle
  17. Article
    Interactive drawing and editing of high-resolution 3D virtual portraits
  18. Article
    Interpretable rule learning for dementia
  19. Article
    DIP: unifying network layer innovations using shared L3 core functions
  20. Article
    ROS-SF
  21. Article
    Divergent trends in alpine greening explained
  22. Article
    CurML: A Curriculum Machine Learning Library
  23. Article
    NeRF-SR: High Quality Neural Radiance Fields using Supersampling
  24. Article
    Action spotting in soccer videos
  25. Article
    A data synthesis approach for human daily activities and trajectories.
  26. Article
    From “Here” to Persia: The Place of Authorship of Yishen Lun (Discourse on God)
  27. Article
    How can we identify countries with successful COVID-19 management?
  28. Article
    Model the probability of users noticing the movement inconsistency between avatars and users.
  29. Article
    Review on low carbon planning and operation of integrated energy systems
  30. Article
    Is another wave coming? Using math to understand surges in COVID-19 cases
  31. Article
    Why there's different understanding of China's new Legislation on the Overseas NGOs
  32. Article
    Deep learning-based point spread function deconvolution
  33. Article
    O&O: A DIY toolkit for designing and rapid prototyping olfactory interfaces
  34. Article
    Covid-19 pandemic and evaporation hydrodynamics
  35. Article
    Human motion capture using 6 inertial sensors
  36. Article
    Using CNN to separate ground-roll noise in seismic data
  37. Article
    P=NP and an algorithm for verifying it
  38. Article
    A comprehensive design, optimization and development methodology of a wasted heat recovery boiler using serrated fins and extensive surface in a bulky CCPP
  39. Article
    Remove the "ringing effect" of vibroseis data
  40. Article
    A Secondary Indexing Mechanism for LSM-based Storage Systems
  41. Article
    Multimodal Data Augmentation for Image Captioning using Diffusion Models
  42. Article
    Near-zero-power infrared relay based on microfluidic switch and metamaterial absorber
  43. Article
    Non-simultaneous (environment participated) quadrupole time for the Law of Entropy Degeneration
  44. Article
    Constructing Tree-based Index for Efficient and Effective Dense Retrieval
  45. Article
    Framing Strategies on Sino-US trade conflict in Chinese Media
  46. Article
    Experimental and Computational Investigations on Fretting Fatigue Crack Growth in Dovetail Joints
  47. Article
    Dynamic Transition Corridors and Control Strategy of a Rotor-Blown-Wing Tail-Sitter
  48. Article
    Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control