Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3393527acmotherconferencesBook PagePublication Pagesacm-turcConference Proceedingsconference-collections
ACM TURC '20: Proceedings of the ACM Turing Celebration Conference - China
ACM2020 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ACM TURC'20: ACM Turing Celebration Conference - China Hefei China May 22 - 24, 2020
ISBN:
978-1-4503-7534-4
Published:
26 October 2020
In-Cooperation:
Baidu Research
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 25 Dec 2024Bibliometrics
Abstract

No abstract available.

research-article
Web Security Education in A Multidisciplinary Learning Context

Web security research and education are attracting much more attentions from industry and academia. In this paper, we report our teaching and learning experiences of a course entitled Web Security and Countermeasures (WebSC) in a multidisciplinary ...

research-article
Quality-Driven and Abstraction-Oriented Software Construction Course Design: To Fill the Gap between Programming and Software Engineering Courses

Traditional Computer Science (CS) and Software Engineering (SE) curricula pay great attention to the training of programming skills and software engineering competence. In practice we find a large "gap" between the two perspectives: even for those ...

research-article
Online Judge for FPGA-based Lab Projects in Computer Organization Course

While online judge systems are widely used in programming related courses, they are rarely used in hardware-related courses such as the computer organization course requiring the digital circuit design. With the widely available FPGA hardware, students ...

research-article
Research on Copyright Protection Method of Big Data Based on Nash Equilibrium and Constraint Optimization

Data watermarking technology is an effective means to protect the copyright of big data. In order to embed robust and highly available data watermarks, firstly, based on the game theory, a Nash equilibrium model between watermark robustness and data ...

research-article
Privacy Preserving on Updated Parameters in Federated Learning

Federated learning provides a framework in which many participants join together to train a deep learning model. Although data is not directly transmitted in federated learning in order to protect privacy, recent researches show that transmitted ...

research-article
Improving Multi-set Query Processing Via a Learned Oracle

Multi-set query is a fundamental problem in computer systems and applications. Most traditional solutions for multi-set query are based on hash tables or bloom filters. However, when the sizes of multi-sets are large, these solutions cannot achieve ...

research-article
Privacy-preserving collaborative machine learning on genomic data using TensorFlow

Machine learning (ML) methods have been widely used in genomic studies. However, genomic data are often held by different stakeholders (e.g. hospitals, universities, and healthcare companies) who consider the data as sensitive information, even though ...

research-article
Information Exchange in Public-Culture Service Domain Bason on CIEM

This paper proposes a novel framework for information exchange in public-culture service domain, which leverages: (i) a widely available translation language (i.e., eXtensible Markup Language (XML)), and (ii) a consistent implementation methodology ...

research-article
Central-Eye: Gaze Tracking Research on Visual Rendering Method in Industrial Virtual Reality Scene

With development of computing technology, virtual reality devices are widely used in Internet-enabled industrial platforms. The problem of virtual reality stuns caused by the increase in visual frequency and real-world scenarios in industrial ...

research-article
WiTransfer: A Cross-scene Transfer Activity Recognition System Using WiFi

In recent years, many researchers have begun to use commercial WiFi for pioneering work such as indoor positioning, human activity recognition, and WiFi imaging. Nevertheless, these tasks are generally not available across scenes. In order to solve this ...

research-article
How do early programmers benefit from SPOC blended teaching: a data-driven analysis

This study conducts a data-driven statistic analysis for comparatively examining early programmers' academic performance and learning behavior between a SPOC blended teaching class and a traditional teaching class in an introductory C programming ...

research-article
Multi-Domain Global Correlation Degree Branching Entropy Method for Microblog Text Word Segmentation

Word segmentation is a basic topic in the field of natural language processing, and improving the accuracy of word segmentation is a key problem. With the popularity of microblog, accurate word segmentation for microblog text has become a hot spot. ...

research-article
Delay-sensitive Trajectory Designing for UAV-enabled Data Collection in Internet of Things

In this paper, we consider a data collection problem using an unmanned aerial vehicle (UAV) where the Internet of Things (IoT) is damaged. Different from the previous work, this paper is concerned with the communication delay of collected information ...

research-article
RF-Track: Real-Time Tracking of RFID Tags with Stationary Antennas

Passive wireless localization and track technologies have attracted much attention in academia recently. Although some schemes can locate tags with a centimeter accuracy, they usually require complex deployment or lack of real-time positioning ...

research-article
Temperature-sensitive Fingerprinting on ECU Clock Offset for CAN Intrusion Detection and Source Identification

The Controller Area Network (CAN) is the most widely used standard for reliable in-vehicle communications, whereas the lack of security authentication of CAN protocols makes it exposure to targeted attacks. At present, there have been two main streams ...

research-article
Ada3D: Real-Time 3D Reconstruction with Compression Rate Adaptation

Augmented reality, so called AR, is recently the subject of attention by researchers from different fields and is developing rapidly. However, some attractive AR applications do not have mature technical basis yet, such as holographic conference and ...

research-article
Developing (Almost) Free Distributed System Labs Using Container-based Technique

Developing successful labs is essential to advanced CS courses. As the fast development on novel programming models and system frameworks, our CSE education calls for a collaborative, community-sourced design effort that maximizes the benefit from ...

research-article
An Adaptive and Robust Model for WiFi-based Localization

The fluctuation of received signal strength (RSS) caused by environmental changing and heterogeneous devices severely degenerates the performance of WiFi fingerprint-based positioning methods. Deep Domain Adaptation (DDA) in transfer learning has proven ...

research-article
WiFi Based Passive Action Recognition with Fully-connected Network

With increasing demands for device-free action recognition, researchers have recently made significant efforts to explore the Wi-Fi sensing technology. It utilizes ubiquitous wireless signals to infer human activities without the need for carrying any ...

research-article
Extracting Chinese Domain-specific Open Entity and Relation by Using Learning Patterns

Nowadays, Chinese domain-specific relation extraction faces a major challenge, that is the lack of annotation data. To cope with this challenge, the distant supervision which can automatically label large-scale training data was proposed. However, the ...

research-article
X-YOLO: A deep learning based toolset with multiple optimization strategies for contraband detection

Observing X-ray images manually is a common method for detecting contraband in packages. Long-term continuous observation is prone to visual fatigue, leading to problems of missed detection and false detection. Motivated by aiding operators in ...

research-article
A MOOC Courses Recommendation System Based on Learning Behaviours

MOOC1 courses recommendation is an important and challenging task, especially in an era with a quick development of Internet which consists of gigantic and diverse education resources. Its challenge is due to its massive amount of education information ...

research-article
Using Pupil Light Reflex for Fast Biometric Authentication

The prevalence of using biometric for user authentication has attracted much attention. On the other hand, mobile devices such as smart glasses and VR headsets have gained great popularity among recent years. It is desirable to integrate authentication ...

research-article
Conscious Knowledge Based Question Answering

A model of consciousness proposed by neuroscientists in 1989 is called the theater model, which uses theater as an analogy to describe "what is consciousness". This paper simplifies the problem of question answering and uses theater model to simulate ...

research-article
Adaptive Multi-stage Multi-strategy Word Representation Learning in HowNet

Multi-stage and multi-strategy word representation learning (M2WRL) model with sense and sememe in HowNet outperforms most single-stage and single-strategy models in effectiveness and efficiency. However, fixed stages and using order among strategies ...

research-article
A Novel Smartphone Identity Authentication Mechanism

Identity authentication plays an important role in maintaining social security. With the rapid growth of population, an important issue is put in front of people. How to identify people more accurately and faster? This paper presents a novel behavioral ...

research-article
Pricing Adjustment System for Spatial-Temporal Load of Charging Station

Electric vehicles(EVs) have lately received great attention due to their low emission pollution and recyclability. However, the spatial-temporal charging load has made it challenging to popularize EVs. In the temporal aspect, the extra charging load ...

research-article
Context-aware Location Search on Maps

Location searching by keywords has immense demands in location-based services (LBSs). In this paper, we study the context-aware location search problem based on maps. Specifically, given a primary keyword and a set of contexts keywords as constraints, ...

research-article
KT-XL: A Knowledge Tracing Model for Predicting Learning Performance Based on Transformer-XL

With the development of artificial intelligence (AI) technology, online teaching systems have become intellectualized. Knowledge tracing is an important task of intelligent teaching system. The goal of knowledge tracing is to trace students' knowledge ...

research-article
SDMA: A SDN-based Architecture of Multi-modal AUVs Network

Underwater sensor networks would reap multiple benefits by extending the principles of software-defined networking (SDN) to it, such as programmable and reconfigurable network, enhanced network management and efficiency. However, there are several ...

Index Terms

  1. Proceedings of the ACM Turing Celebration Conference - China
        Index terms have been assigned to the content through auto-classification.

        Recommendations