Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Tom Johnsten"'
Publikováno v:
2021 IEEE International Conference on Big Data (Big Data).
Autor:
Boisy Pitre, Xu Yuan, Sytske K. Kimball, Li Chen, Paul J. Darby, Eric D. Rappin, Tom Johnsten, Lu Peng, Nian-Feng Tzeng, Yihe Zhang, David Bourrie
Publikováno v:
Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track ISBN: 9783030865160
ECML/PKDD (5)
ECML/PKDD (5)
Flexible fine-grained weather forecasting is a problem of national importance due to its stark impacts on economic development and human livelihoods. It remains challenging for such forecasting, given the limitation of currently employed statistical
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ba0eb9cbc48eadecb2a14bdfdf7baac3
https://doi.org/10.1007/978-3-030-86517-7_10
https://doi.org/10.1007/978-3-030-86517-7_10
Publikováno v:
IEEE BigData
Optimal inventory management always requires the right number and types of parts to be available at the right time at the right place. However, this has become even more critical in the age of prescriptive maintenance, which seeks to predict an impen
Publikováno v:
IEEE BigData
Detecting anomalies, in many cases, is only the first step. Often, it is merely the first step in a process that seeks to recover from an anomalous situation so that the system is back to a normal state. Manual analysis is a possible approach; howeve
Publikováno v:
Data-Enabled Discovery and Applications. 4
The concept of equipment maintenance is older than the industrial revolution. The mode, medium, and timing of maintenance during equipment life cycle have evolved from reactive maintenance to predictive maintenance to prescriptive maintenance. Prescr
Publikováno v:
Computer Security – ESORICS 2020 ISBN: 9783030589509
ESORICS (1)
ESORICS (1)
In this paper, we conduct a systematic study for the very first time on the poisoning attack to neural collaborative filtering-based recommender systems, exploring both availability and target attacks with their respective goals of distorting recomme
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f29baa19da09e034583214bb1bd0cd3d
https://doi.org/10.1007/978-3-030-58951-6_23
https://doi.org/10.1007/978-3-030-58951-6_23
Publikováno v:
IEEE BigData
The concept of equipment maintenance is as old, if not older, as industrial revolution. However, the mode, medium and timing of maintenance during equipment life cycle have evolved from reactive maintenance to prescriptive maintenance. Reactive maint
Publikováno v:
CogMI
Action rule mining develops rules that describe which attributes should be changed in order to move an object from an undesired state to a desired state, with the understanding that some attributes cannot be changed. While such rules can be very usef
Publikováno v:
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology. :154851292110438
Robotic systems are no longer simply built and designed to perform sequential repetitive tasks primarily in a static manufacturing environment. Systems such as autonomous vehicles make use of intricate machine learning algorithms to adapt their behav
Publikováno v:
MALWARE
With computer software becoming more important and prolific in today’s world, malicious software (malware) continues to be one of its greatest security threats. Alongside this trend, smartphones and mobile devices have become the prominent method f