In the massive Machine-Type Communication (mMTC), the exponential growth of Internet of Things (IoT) devices over Low Power Wide Area Networks (LPWANs) presents substantial issues regarding energy efficiency and stabi...
详细信息
Container orchestration systems, such as Kubernetes, streamline containerized application deployment. As more and more applications are being deployed in Kubernetes, there is an increasing need for rescheduling - relo...
详细信息
The integration of different learning paradigms has long been a focus of machine learning research, aimed at overcoming the inherent limitations of individual methods. Fuzzy rule-based models excel in interpretability...
详细信息
This work aims to promote Chinese opera research in both musical and speech domains, with a primary focus on overcoming the data limitations. We introduce KunquDB, https://***/KunquDB, a relatively large-scale, well-a...
详细信息
In today's world, cyber-attacks are on the rise, and PDF files are commonly used as a means of attack. One common type of attack through PDF files is the covert embedding of dangerous malware and tricking users in...
详细信息
With the growth of location-based services, the accumulation of large amounts of trajectory data comes with the challenge of missing data. Existing trajectory imputation methods rely on deterministic models that canno...
详细信息
With the continuous growth in food demand and the escalating importance of crop health, the challenges posed by the high costs and low efficiency of traditional wheat leaf disease detection methods have become increas...
详细信息
Decompilation aims to convert binary code to high-level source code, but traditional tools like Ghidra often produce results that are difficult to read and execute. Motivated by the advancements in Large Language Mode...
详细信息
The widespread adoption of electronic health records has generated a vast amount of patient-related data, mostly presented in the form of unstructured text, which could be used for document retrieval. However, queryin...
详细信息
To build an intelligent intrusion detection system, it is essential to have a suitable and high-quality dataset with a sufficiently large quantity to simulate real-world scenarios. The NSL-KDD dataset is an improved v...
详细信息
暂无评论