UM

Browse/Search Results:  1-10 of 94 Help

Filters        
Selected(0)Clear Items/Page:    Sort:
Longitudinal ambient mobile sensor monitoring for TCM-oriented healthcare assessments: Framework, challenges and applications Conference paper
26th International World Wide Web Conference 2017, WWW 2017 Companion
Authors:  Fong S.;  Zhuang Y.;  Hu S.;  Song W.;  Liu L.;  Moutinho L.A.
Favorite  |  View/Download:10/0  |  Submit date:2019/02/13
Data mining  Healthcare application  Mobile apps  
Nonlinear Attitude Observer on SO(3) Based on Single Body-Vector Measurements Conference paper
2018 IEEE Conference on Control Technology and Applications, CCTA 2018
Authors:  Reis J.;  Batista P.;  Oliveira P.;  Silvestre C.
Favorite  |  View/Download:9/0  |  Submit date:2019/02/12
Attitude Observer  Local Exponential Stability  Single Body-Vector  Topological Constraints  
Counting passengers in public buses by sensing carbon dioxide concentration: System design and implementation Conference paper
ACM International Conference Proceeding Series
Authors:  Li T.;  Fong S.
Favorite  |  View/Download:9/0  |  Submit date:2019/02/13
Carbon dioxide sensor  Occupancy  
An efficient ride-sharing framework for maximizing shared Routes Conference paper
Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018
Authors:  Ta N.;  Li G.;  Zhao T.;  Feng J.;  Ma H.;  Gong Z.
Favorite  |  View/Download:7/0  |  Submit date:2019/02/12
Bigraph matching  Join based sharing  Ride sharing  Search based sharing  Shared route percentage  
A PageRank Algorithm based on Asynchronous Gauss-Seidel Iterations Conference paper
Proceedings of the American Control Conference
Authors:  Silvestre D.;  Hespanha J.;  Silvestre C.
Favorite  |  View/Download:5/0  |  Submit date:2019/02/12
Random Forest model for quality control of high resolution mass spectra from SILAC labeling experiments Conference paper
ICNC-FSKD 2017 - 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery
Authors:  Chen L.;  Li T.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/13
On the strategy and behavior of bitcoin mining with N-attackers Conference paper
ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security
Authors:  Liu H.;  Du R.;  Ruan N.;  Jia W.
Favorite  |  View/Download:5/0  |  Submit date:2019/04/04
Bitcoin  Mining  N-attackers  Selfish mining  
Fuzzy non-local image guided filter and averaging Conference paper
2017 International Conference on Fuzzy Theory and Its Applications, iFUZZY 2017
Authors:  Guo L.;  Chen L.;  Li T.;  Chen C.L.P.
Favorite  |  View/Download:4/0  |  Submit date:2019/02/13
fuzzy sets  Guided filter  non-local model and modified non-local weight  
Shadowed set-based rough-fuzzy clustering using random feature mapping Conference paper
2017 International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2017
Authors:  Kong L.;  Chen L.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/13
c-Means algorithm  Fuzzy sets  Random Fourier Features  Rough sets  Shadowed sets  
How to build a Chatbot: Chatbot framework and its capabilities Conference paper
ACM International Conference Proceeding Series
Authors:  Wei C.;  Yu Z.;  Fong S.
Favorite  |  View/Download:6/0  |  Submit date:2019/02/13
Artificial intelligence  Chatbot  Human robot interaction  Natural language processing  Natural language understanding