Subscribe to Updates
Subscribe to get the latest content in real time.
Browsing: scholar
Authors: Antonis Maronikolakis、Ana Peleteiro Ramallo、Weiwei Cheng、Thomas Kober Paper: https://arxiv.org/abs/2408.08907 Evaluating Conversational Agents in the Fashion Domain: What Should I Wear…
Authors: Huy-Son Nguyen、Tuan-Nghia Bui、Long-Hai Nguyen、Hoang Manh-Hung、Cam-Van Thi Nguyen、Hoang-Quynh Le、Duc-Trong Le Paper: https://arxiv.org/abs/2408.08906 Introduction In the realm of e-commerce, recommendation systems…
Authors: Chengyu Song、Linru Ma、Jianming Zheng、Jinzhi Liao、Hongyu Kuang、Lin Yang Paper: https://arxiv.org/abs/2408.08902 Introduction Insider threats pose a significant challenge in cybersecurity, as…
Authors: Robert J. Moss Paper: https://arxiv.org/abs/2408.08899 Introduction Background Large Language Models (LLMs) have become integral in various applications, from educational…
Authors: Yiming Luo、Patrick Cheong-Iao、Shanton Chang Paper: https://arxiv.org/abs/2408.08894 Introduction In the digital age, the sheer volume of information available to learners…
Authors: Xin Wang、Xiaoyu Liu、Peng Huang、Pu Huang、Shu Hu、Hongtu Zhu Paper: https://arxiv.org/abs/2408.08881 Introduction Background Medical image segmentation is a critical task in…
Authors: Rasha Alshawi、Md Meftahul Ferdaus、Md Tamjidul Hoque、Kendall Niles、Ken Pathak、Steve Sloan、Mahdi Abdelguerfi Paper: https://arxiv.org/abs/2408.08879 Introduction Accurate detection and segmentation of defects…
Authors: Richard H. Moulton、Gary A. McCully、John D. Hastings Paper: https://arxiv.org/abs/2405.18753 Introduction In the rapidly evolving field of cybersecurity, the reliability…
Authors: Zhili Cheng、Zhitong Wang、Jinyi Hu、Shengding Hu、An Liu、Yuge Tu、Pengkai Li、Lei Shi、Zhiyuan Liu、Maosong Sun Paper: https://arxiv.org/abs/2404.18243 Introduction In recent years, advancements in…
Authors: Emanuele De Angelis、Maurizio Proietti、Francesca Toni Paper: https://arxiv.org/abs/2408.10126 Introduction Assumption-Based Argumentation (ABA) is a structured form of argumentation that has…