Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Xinjue Wang"'
Autor:
Xinjue Wang
Publikováno v:
BCP Business & Management. 44:793-799
As the internet develops, ride-hailing applications have become an integral part of people’s life. Carpooling is one of plenty forms of service that the ride-hailing platform usually provides. As a service in which users share the cost evenly, choo
Autor:
Xinjue Wang, Yumeng Chen, Shuting Liu, Wenjie Fu, Yunqi Zhuang, Jie Xu, Yonggen Lou, Ian T. Baldwin, Ran Li
Publikováno v:
New Phytologist. 238:2144-2158
Autor:
Suhua Li, Gaochen Jin, Wenjie Fu, Xinjue Wang, Jiajin Song, Yonggen Lou, Ran Li, Guillermo Hugo Jimenez-Aleman
Publikováno v:
Plant, Cell & Environment. 45:262-272
The phytohormone jasmonic acid (JA) plays a core role in plant defense against herbivores. When attacked by herbivores, JA and its bioactive derivatives are accumulated at the damage site, and subsequently perceived by the jasmonate co-receptors COI1
Publikováno v:
Aalto University
Graph convolutional networks (GCNs) can successfully learn the graph signal representation by graph convolution. The graph convolution depends on the graph filter, which contains the topological dependency of data and propagates data features. Howeve
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7dd6a33badc11b6e7159c8d6a6c82867
https://aaltodoc.aalto.fi/handle/123456789/117787
https://aaltodoc.aalto.fi/handle/123456789/117787
Publikováno v:
Plant Molecular Biology
Jasmonate-induced accumulation of anti-herbivore compounds mediates rice resistance to the leaf folder Cnaphalocrocis medinalis. The rice leaf folder (LF), Cnaphalocrocis medinalis, is one of the most destructive insect pests in the paddy field. LF l
Publikováno v:
The New phytologistReferences. 230(4)
Phytohormone, particularly jasmonate (JA) and salicylate (SA) signaling, plays a central role in plant responses to herbivore and pathogen attack. Generally, SA mediates resistance responses against biotrophic pathogens and phloem-feeding insects, wh
Autor:
Xinjue Wang, Jie Chen
Publikováno v:
ICSPCC
Distributed PCA aims to implement dimension reduction for data stored on multiple agents. The conventional distributed PCA encounters the bottleneck of computation when the dimension of 10-cal data is large. In this work, we propose a distributed PCA
Publikováno v:
IEEE Transactions on Plasma Science. 45:310-317
In this paper, the dielectric barrier discharge (DBD) is generated in argon/oxygen gas mixtures with various of oxygen content and is employed to treat Polyethylene terephthalate (PET) surface. The effects of oxygen content in the argon/oxygen feedin
Publikováno v:
Wang, X, Deng, K, Li, J, Xu Yu, J, Jensen, C S & Yang, X 2020, ' Efficient targeted influence minimization in big social networks ', World Wide Web, vol. 23, no. 4, pp. 2323-2340 . https://doi.org/10.1007/s11280-019-00748-z
Wang, X, Deng, K, Li, J, Yu, J X, Jensen, C S & Yang, X 2020, ' Efficient targeted influence minimization in big social networks ', World Wide Web, vol. 23, pp. 2323-2340 . https://doi.org/10.1007/s11280-019-00748-z
Wang, X, Deng, K, Li, J, Yu, J X, Jensen, C S & Yang, X 2020, ' Efficient targeted influence minimization in big social networks ', World Wide Web, vol. 23, pp. 2323-2340 . https://doi.org/10.1007/s11280-019-00748-z
An online social network can be used for the diffusion of malicious information like derogatory rumors, disinformation, hate speech, revenge pornography, etc. This motivates the study of influence minimization that aim to prevent the spread of malici
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::09502e5b074be1bd26cb267bf8572149
https://vbn.aau.dk/da/publications/50adbf6e-1bc0-4412-809a-a433882e4006
https://vbn.aau.dk/da/publications/50adbf6e-1bc0-4412-809a-a433882e4006
Publikováno v:
Information Systems. 92:101522
To meet the requirement of social influence analytics in various applications, the problem of influence maximization has been studied in recent years. The aim is to find a limited number of nodes (i.e., users) which can activate (i.e. influence) the