The act of communicating with others during routine daily tasks is both
...
While network slicing has become a prevalent approach to service
differe...
The storage, management, and application of massive spatio-temporal data...
In this paper, we design a 3D map management scheme for edge-assisted mo...
In recent years, due to the widespread use of internet videos, physiolog...
In argumentative writing, writers must brainstorm hierarchical writing g...
The Collaborative Qualitative Analysis (CQA) process can be time-consumi...
While individual-level AI-assisted analysis has been fairly examined in ...
The sixth generation (6G) networks are expected to enable immersive
comm...
Acoustic-to-articulatory inversion (AAI) aims to estimate the parameters...
Machine learning (ML) enabled systems are emerging with recent breakthro...
In this paper, we present the Logically submissions to De-Factify 2 chal...
In this tutorial paper, we look into the evolution and prospect of netwo...
We propose new differential privacy solutions for when external
invarian...
This paper presents a novel approach for computing resource management o...
In this paper, we design a resource management scheme to support statefu...
Predicting clinical outcomes to anti-cancer drugs on a personalized basi...
In the literature of data privacy, differential privacy is the most popu...
The advances of modern localization techniques and the wide spread of mo...
We consider the following surveillance problem: Given a set P of n sites...
There has been a long-standing interest in computing diverse solutions t...
During the COVID-19 epidemic in China, millions of workers in tech compa...
This paper describes our participant system for the multi-modal fact
ver...
Many data applications have certain invariant constraints due to practic...
We study the problem of knowledge tracing (KT) where the goal is to trac...
Edge intelligence leverages computing resources on network edge to provi...
Terrestrial-satellite networks are envisioned to play a significant role...
In this paper, a novel QP variable convolutional neural network based in...
In the second part of this paper, we develop a centralized packet
transm...
In this two-part paper, we propose a novel medium access control (MAC)
p...
Mobile edge computing (MEC) is a promising technology to support
mission...
In this paper, we study unmanned aerial vehicle (UAV) assisted mobile ed...
Motivated by indoor localization by tripwire lasers, we study the proble...
Recently, streaming end-to-end automatic speech recognition (E2E-ASR) ha...
Low-light image enhancement is a promising solution to tackle the proble...
In this paper, the content service provision of information-centric vehi...
We consider the problem of finding patrol schedules for k robots to visi...
Early rumor detection (ERD) on social media platform is very challenging...
Due to increasing concerns of data privacy, databases are being encrypte...
In this paper, we design dynamic probabilistic caching for the scenario ...
The unprecedented growth of demand for charging electric vehicles (EVs) ...
Classic network utility maximization problems are usually solved assumin...
In the second part of this two-part paper, we extend the study of dynami...
This two-part paper investigates cache replacement schemes with the obje...
The scarcity and class imbalance of training data are known issues in cu...
We propose a new graph kernel for graph classification and comparison us...
Recent advances in computing have allowed for the possibility to collect...
With the popularity of portable wireless devices it is important to mode...
In this paper, we consider the problem of approximately aligning/matchin...
Micro-structured materials consisting of an array of microstructures are...