Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2024JUST ACCEPTED
- ArticleJune 2024
Exploration of Narrative Design Method and Tool on Intelligent Cockpit Experience Design
AbstractTechnological innovation has a profound impact on people’s work and daily lives, introducing unprecedented challenges for societal development. Initially focused on meeting life’s necessities, design now encompasses the orchestration of ...
- ArticleJune 2024
Tangible Narrative - An Intelligent Cockpit Design Methodology for Designers to Experience
AbstractIntelligent cockpit is a complicated spatial scenario merging technology and design, with more complex scenarios and interactions that set it apart from typical automobiles. With the electrification and intellectualization of automobiles, user ...
- research-articleJuly 2024
PLS-based gene subset augmentation and tumor-specific gene identification
Computers in Biology and Medicine (CBIM), Volume 174, Issue Chttps://doi.org/10.1016/j.compbiomed.2024.108434AbstractIn the study of tumor disease pathogenesis, the identification of genes specifically expressed in disease states is pivotal, yet challenges arise from high-dimensional datasets with limited samples. Conventional gene (feature) selection methods ...
Highlights- Novel gene subset augmentation strategy utilizes various perturbation mechanisms, identifying differentially expressed gene subsets, surpassing traditional methods.
- Multiple gene measurement algorithm based on partial least squares ...
- research-articleApril 2024
EASE: An Effort-aware Extension of Unsupervised Key Class Identification Approaches
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 33, Issue 4Article No.: 84, Pages 1–43https://doi.org/10.1145/3635714Key class identification approaches aim at identifying the most important classes to help developers, especially newcomers, start the software comprehension process. So far, many supervised and unsupervised approaches have been proposed; however, they ...
-
- ArticleJuly 2023
Return Forecasting for Cryptocurrency Using Labeled Sequences and Reinforced Seq2Class Model
Advances and Trends in Artificial Intelligence. Theory and ApplicationsPages 239–246https://doi.org/10.1007/978-3-031-36822-6_21AbstractCryptocurrencies have been experiencing explosive growth in recent years, which attracts not only investors or traders but also researchers. Many models have been proposed for forecasting or predicting cryptocurrencies. In this paper, we propose a ...
- research-articleJuly 2023
Testing Automated Driving Systems by Breaking Many Laws Efficiently
ISSTA 2023: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 942–953https://doi.org/10.1145/3597926.3598108An automated driving system (ADS), as the brain of an autonomous vehicle (AV), should be tested thoroughly ahead of deployment. ADS must satisfy a complex set of rules to ensure road safety, e.g., the existing traffic laws and possibly future laws ...
- research-articleJune 2023
Specification-Based Autonomous Driving System Testing
IEEE Transactions on Software Engineering (ISOF), Volume 49, Issue 6Pages 3391–3410https://doi.org/10.1109/TSE.2023.3254142Autonomous vehicle (AV) systems must be comprehensively tested and evaluated before they can be deployed. High-fidelity simulators such as CARLA or LGSVL allow this to be done safely in very realistic and highly customizable environments. Existing testing ...
- research-articleJuly 2023
Identifying Key Classes for Initial Software Comprehension: Can We Do it Better?
ICSE '23: Proceedings of the 45th International Conference on Software EngineeringPages 1878–1889https://doi.org/10.1109/ICSE48619.2023.00160Key classes are excellent starting points for developers, especially newcomers, to comprehend an unknown software system. Though many unsupervised key class identification approaches have been proposed in the literature by representing software as ...
- research-articleMarch 2023
Pride: Prioritizing Documentation Effort Based on a PageRank-Like Algorithm and Simple Filtering Rules
IEEE Transactions on Software Engineering (ISOF), Volume 49, Issue 3Pages 1118–1151https://doi.org/10.1109/TSE.2022.3171469Code documentation can be helpful in many software quality assurance tasks. However, due to resource constraints (e.g., time, human resources, and budget), programmers often cannot document their work completely and timely. In the literature, two ...
- research-articleFebruary 2023
DMIS: dynamic mesh-based importance sampling for training physics-informed neural networks
AAAI'23/IAAI'23/EAAI'23: Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial IntelligenceArticle No.: 600, Pages 5375–5383https://doi.org/10.1609/aaai.v37i4.25669Modeling dynamics in the form of partial differential equations (PDEs) is an effectual way to understand real-world physics processes. For complex physics systems, analytical solutions are not available and numerical solutions are widely-used. However, ...
- research-articleJanuary 2023
LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous Vehicles
ASE '22: Proceedings of the 37th IEEE/ACM International Conference on Automated Software EngineeringArticle No.: 62, Pages 1–12https://doi.org/10.1145/3551349.3556897Autonomous driving systems (ADSs) must be tested thoroughly before they can be deployed in autonomous vehicles. High-fidelity simulators allow them to be tested against diverse scenarios, including those that are difficult to recreate in real-world ...
- research-articleJune 2022
An accurate cloud‐based indoor localization system with low latency
- Xiaoying Wang,
- Xiaodong Zhang,
- Chenxi Zu,
- Zijiang Yang,
- Guohua Bian,
- Yongbiao Zhang,
- Weiqi Ruan,
- Benquan Wu,
- Xiaoqi Wu,
- Lianxiong Yuan,
- Qingwu Wu,
- Qintai Yang
International Journal of Intelligent Systems (IJIS), Volume 37, Issue 8Pages 4794–4809https://doi.org/10.1002/int.22740AbstractIndoor positioning systems are becoming increasing popular recently. While most existing indoor positioning studies focus on improving accuracy, less attention is paid to the latency problem. The traditional fusion algorithm uses the received ...
- ArticleJune 2022
Research on Applicability of Automobile Instruments Character Size
Cross-Cultural Design. Product and Service Design, Mobility and Automotive Design, Cities, Urban Areas, and Intelligent Environments DesignPages 286–296https://doi.org/10.1007/978-3-031-06053-3_20AbstractThe purpose of study the influence of automobile instrument character size on the driver's information recognition efficiency and recognition load, explore the best applicable range of instrument characters, and provide guidelines and suggestions ...
- ArticleJune 2022
Research on Man-Machine Interface Design Based on Intelligent Vehicle
Cross-Cultural Design. Product and Service Design, Mobility and Automotive Design, Cities, Urban Areas, and Intelligent Environments DesignPages 276–285https://doi.org/10.1007/978-3-031-06053-3_19AbstractWith the rapid development of smart car technology and the rapid rise of automotive human-machine interface design, it is necessary to explore the direction of smart car human-machine interface design. The purpose of this paper is to propose ...
- research-articleJuly 2022
Explanation-guided fairness testing through genetic algorithm
ICSE '22: Proceedings of the 44th International Conference on Software EngineeringPages 871–882https://doi.org/10.1145/3510003.3510137The fairness characteristic is a critical attribute of trusted AI systems. A plethora of research has proposed diverse methods for individual fairness testing. However, they are suffering from three major limitations, i.e., low efficiency, low ...
- research-articleApril 2022
Diffusion bias-compensated recursive maximum correntropy criterion algorithm with noisy input
AbstractIn recent years, the distributed estimation problem based on the diffusion strategy has received more and more attention, where the node filters cooperate with other in-network node filters to estimate the unknown parameter vector. In ...
- ArticleOctober 2021
sVerify: Verifying Smart Contracts Through Lazy Annotation and Learning
Leveraging Applications of Formal Methods, Verification and ValidationPages 453–469https://doi.org/10.1007/978-3-030-89159-6_28AbstractSmart contracts have recently attracted much attention from industry as they aim to assure anonymous distributed secure transactions. It also becomes clear that they are not immune to code vulnerabilities. As smart contracts cannot be patched once ...
- research-articleAugust 2021
Detecting concurrency vulnerabilities based on partial orders of memory and thread events
ESEC/FSE 2021: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 280–291https://doi.org/10.1145/3468264.3468572Memory vulnerabilities are the main causes of software security problems. However, detecting vulnerabilities in multi-threaded programs is challenging because many vulnerabilities occur under specific executions, and it is hard to explore all possible ...
- research-articleAugust 2021
A new SBM-based global Malmquist productivity index and target setting
Computers and Industrial Engineering (CINE), Volume 158, Issue Chttps://doi.org/10.1016/j.cie.2021.107411Highlights- Demonstrate that ignoring the slacks sometimes leads to misleading results.
- ...
The global Malmquist productivity index is a tool for measuring productivity change. It has two advantages with respect to the conventional Malmquist productivity index: it is circular and the infeasibility of the mixed period models ...