Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 580-583.
• Interdiscipline & Application • Previous Articles Next Articles
HOU Yu-chen, WU Wei
CLC Number:
[1]HUISKES M J,THOMEE B,LEW M S.New trends and ideas in visual concept detection[C]∥Proc of the 11th ACM Confe-rence on Multimedia Information Retrieval.Philadelphia,PA,USA:ACM,2010:527-536. [2]单言虎,张彰,黄凯奇.人的视觉行为识别研究回顾、现状及展望[J].计算机研究与发展,2016,53(1):93-112. [3]GUO G,LAI A.A survey on still image based human action re-cognition[J].Pattern Recognition,2014,47(10):3343-3361. [4]SONG X,ZHOU H,LIU G.Human behavior recognition based on multi-feature fusion of image[J/OL].http://doi.org/10.1007/s10586-018-2073-7. [5]MUHAMMED M A E,AHMED A A,KHALID T A.Benchmark analysis of popular ImageNet classification deep CNNarchitectures[C]∥Smart Technologies For Smart Nation (SmartTecCon).IEEE,2017:902-907. [6]HUANG G,HU H.c-RNN:A Fine-Grained Language Model for Image Captioning[J].Neural Processing Letters,2019,49(2):683-691. [7]LIU Z,LI X,LUO P,et al.Deep learning markov random field for semanticsegmentation[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2018,40(8):1814-1828. [8]QIN X,HE S,ZHANG Z,et al.ByLabel:A Boundary Based Semi-Automatic Image Annotation Tool[C]∥2018 IEEE Winter Conference on Applications of Computer Vision (WACV).IEEE,2018:1804-1813. [9]BERNAL J,HISTACE A,MASANA M,et al.GTCreator:aflexible annotation tool for image-based datasets[J].International Journal of Computer Assisted Radiology and Surgery,2018:1-11. [10]MA Y,LIU X,LIU Y,et al.A Tale of Two Fashions:An Empirical Study on the Performance of Native Apps and Web Apps on Android[J].IEEE Transactions on Mobile Computing,2018,17(5):990-1003. [11]ZHANG P,WEI Z,LI Y,et al.Automatic Image Annotation Based on Multi-Auxiliary Information[J].IEEE Access,2017,5(99):18402-18411. [12]江志刚.基于SSM框架的网上题目录入答题系统设计[J].无线互联科技,2017(20):62-63. [13]任玉刚.Android开发艺术探索[M].北京:电子工业出版社,2015:414-441. [14]SINGER Y,MITTAL M.Pricing Mechanisms for Crowdsourcing Markets[C]∥International Conference on World Wide Web.2014:1157-1166. [15]SINGER Y.How to win friends and influence people,truthfully:influence maximization mechanisms for social networks[C]∥WSDM.2012:733-742. [16]DOBZINSKI S,PAPADIMITRIOU C,SINGER Y.Mechanisms for complement-free procurement[C]∥EC.2011:273-282. [17]余豪士,匡芳君.基于Python的反反爬虫技术分析与应用[J].智能计算机与应用,2018,8(4):112-115. [18]周练.Word2vec的工作原理及应用探究[J].科技情报开发与经济,2015,25(2):145-148. [19]FAUZI M A.Word2Vec Model for Sentiment Analysis of Pro-duct Reviews In Indonesian Language[J].International Journal of Electrical & Computer Engineering,2018,7(1):244-252. |
[1] | FU Yan-ming, ZHU Jie-fu, JIANG Kan, HUANG Bao-hua, MENG Qing-wen, ZHOU Xing. Incentive Mechanism Based on Multi-constrained Worker Selection in Mobile Crowdsourcing [J]. Computer Science, 2022, 49(9): 275-282. |
[2] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
[3] | WANG Yi, LI Zheng-hao, CHEN Xing. Recommendation of Android Application Services via User Scenarios [J]. Computer Science, 2022, 49(6A): 267-271. |
[4] | YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang. Android Malware Detection Method Based on Heterogeneous Model Fusion [J]. Computer Science, 2022, 49(6A): 508-515. |
[5] | HAN Hong-qi, RAN Ya-xin, ZHANG Yun-liang, GUI Jie, GAO Xiong, YI Meng-lin. Study on Cross-media Information Retrieval Based on Common Subspace Classification Learning [J]. Computer Science, 2022, 49(5): 33-42. |
[6] | CHEN Dan-hong, PENG Zhang-lin, WAN De-quan, YANG Shan-lin. Identification and Segmentation of User Value in Crowdsourcing Platforms:An Improved RFMModel [J]. Computer Science, 2022, 49(4): 37-42. |
[7] | SHEN Biao, SHEN Li-wei, LI Yi. Dynamic Task Scheduling Method for Space Crowdsourcing [J]. Computer Science, 2022, 49(2): 231-240. |
[8] | LI Yu-qiang, ZHANG Wei-jiang, HUANG Yu, LI Lin, LIU Ai-hua. Improved Topic Sentiment Model with Word Embedding Based on Gaussian Distribution [J]. Computer Science, 2022, 49(2): 256-264. |
[9] | LIU Kai, ZHANG Hong-jun, CHEN Fei-qiong. Name Entity Recognition for Military Based on Domain Adaptive Embedding [J]. Computer Science, 2022, 49(1): 292-297. |
[10] | LI Zhao-qi, LI Ta. Query-by-Example with Acoustic Word Embeddings Using wav2vec Pretraining [J]. Computer Science, 2022, 49(1): 59-64. |
[11] | YU Sheng, LI Bin, SUN Xiao-bing, BO Li-li, ZHOU Cheng. Approach for Knowledge-driven Similar Bug Report Recommendation [J]. Computer Science, 2021, 48(5): 91-98. |
[12] | ZHANG Shao-jie, LU Xu-dong, GUO Wei, WANG Shi-peng, HE Wei. Prevention of Dishonest Behavior in Supply-Demand Matching [J]. Computer Science, 2021, 48(4): 303-308. |
[13] | ZHAO Yang, NI Zhi-wei, ZHU Xu-hui, LIU Hao, RAN Jia-min. Multi-worker and Multi-task Path Planning Based on Improved Lion Evolutionary Algorithm forSpatial Crowdsourcing Platform [J]. Computer Science, 2021, 48(11A): 30-38. |
[14] | LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27. |
[15] | ZHANG Yu-shuai, ZHAO Huan, LI Bo. Semantic Slot Filling Based on BERT and BiLSTM [J]. Computer Science, 2021, 48(1): 247-252. |
|