Skip to main content

Page of 300
and
  1. No Access

    Article

    Large-scale response-aware online ANN search in dynamic datasets

    Similarity search is a key operation in content-based multimedia retrieval (CBMR) applications. Online CBMR applications, which are the focus of this work, perform a large number of search operations on dynami...

    Guilherme Andrade, Willian Barreiros Jr., Leonardo Rocha in Cluster Computing (2024)

  2. No Access

    Article

    Spatial de-correlation of generated keys from wireless channels using adversarial deep learning

    Physical-layer Key Generation (PKG) is the major candidate for use in secure wireless communications and Internet of Things (IoT) systems. Using Deep Learning (DL) and the Band Feature Map** (BFM) method lea...

    Amir Aliabadian, Mohammadreza Zahabi in International Journal of Information Secur… (2024)

  3. Article

    Open Access

    Learning de-biased regression trees and forests from complex samples

    Regression trees and forests are widely used due to their flexibility and predictive accuracy. Whereas typical tree induction assumes independently identically distributed (i.i.d.) data, in many applications t...

    Malte Nalenz, Julian Rodemann, Thomas Augustin in Machine Learning (2024)

  4. No Access

    Article

    Accessibility landmarks identification in web applications based on DOM elements classification

    Landmarks are defined in the ARIA—Accessible Rich Internet Applications specification, and are important regions of web applications that blind users access through keyboard shortcuts. However, ARIA landmarks ...

    Willian M. Watanabe, Guilherme de Lemos in Universal Access in the Information Society (2024)

  5. No Access

    Article

    Guiding image inpainting via structure and texture features with dual encoder

    Image inpainting techniques have made rapid progresses in recent years. Recent advancements focus mainly on generating realistic and semantically plausible structure and texture features in missing regions. Ho...

    **g Lian, Jiajun Zhang, Jizhao Liu, Zilong Dong, Huaikun Zhang in The Visual Computer (2024)

  6. Article

    Open Access

    Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective

    The negotiation of stakeholder values as a collaborative process throughout technology development has been studied extensively within the fields of Computer Supported Cooperative Work and Human-Computer Inter...

    Thea Riebe, Julian Bäumler in Computer Supported Cooperative Work (CSCW) (2024)

  7. Article

    Open Access

    Two-dimensional materials for future information technology: status and prospects

    Over the past 70 years, the semiconductor industry has undergone transformative changes, largely driven by the miniaturization of devices and the integration of innovative structures and materials. Two-dimensi...

    Hao Qiu, Zhihao Yu, Tiange Zhao, Qi Zhang in Science China Information Sciences (2024)

  8. No Access

    Article

    Beamforming design for covert broadcast communication with hidden adversary

    This paper explores covert broadcast communication in a challenging situation in which the transmitter, Alice, faces uncertainty regarding the position of the passive adversary, Willie. In this situation, cont...

    Weiyu Chen, Haiyang Ding, Shilian Wang, Junshan Luo in Science China Information Sciences (2024)

  9. No Access

    Article

    AAPF*: a safer autonomous vehicle path planning algorithm based on the improved A* algorithm and APF algorithm

    In this paper, we introduce the AAPF* algorithm, an innovative approach that synergistically integrates the A-star search algorithm (A*) with the artificial potential field (APF) method. This algorithm is desi...

    Yalian Yang, **nyu Luo, Wei Li, Changdong Liu, Qing Ye, Peng Liang in Cluster Computing (2024)

  10. Article

    Open Access

    A Novel Multi-camera Fusion Approach at Plant Scale: From 2D to 3D

    Non-invasive crop phenoty** is essential for crop modeling, which relies on image processing techniques. This research presents a plant-scale vision system that can acquire multispectral plant data in agricu...

    Edgar S. Correa, Francisco C. Calderon, Julian D. Colorado in SN Computer Science (2024)

  11. Article

    Open Access

    Deep learning implementation of image segmentation in agricultural applications: a comprehensive review

    Image segmentation is a crucial task in computer vision, which divides a digital image into multiple segments and objects. In agriculture, image segmentation is extensively used for crop and soil monitoring, p...

    Lian Lei, Qiliang Yang, Ling Yang, Tao Shen, Ruoxi Wang in Artificial Intelligence Review (2024)

  12. No Access

    Article

    Improving robot-to-human communication using flexible display technology as a robotic-skin-interface: a co-design study

    In the evolving field of industrial automation, operator awareness of robot actions and intentions is critical for safety and efficiency, especially when working in close proximity to robots. From the robot-to...

    Constantin Scholz, Hoang-Long Cao in International Journal of Intelligent Robot… (2024)

  13. Article

    Open Access

    Analysis and design framework for the development of indoor scene understanding assistive solutions for the person with visual impairment/blindness

    This paper discusses the challenges of the current state of computer vision-based indoor scene understanding assistive solutions for the person with visual impairment (P-VI)/blindness. It focuses on two main i...

    Moeen Valipoor, Angélica de Antonio, Julián Cabrera in Multimedia Systems (2024)

  14. Article

    Open Access

    A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems

    Due to growing network data dissemination in cloud, the elasticity, pay as you go options, globally accessible facilities, and security of networks have become increasingly important in today's world. Cloud se...

    R. Julian Menezes, P. Jesu Jayarin, A. Chandra Sekar in Journal of Cloud Computing (2024)

  15. No Access

    Article

    An improved metacognitive competency framework to inculcate analytical thinking among university students

    Enhancing students' analytical thinking skills holds great promise for bolstering a nation's economic growth, fostering a dynamic learning culture, and nurturing human capital development. It is especially cri...

    Lilian Anthonysamy, Poovilashini Sugendran in Education and Information Technologies (2024)

  16. No Access

    Article

    Real-time segmentation algorithm of unstructured road scenes based on improved BiSeNet

    In response to the fuzzy and complex boundaries of unstructured road scenes, as well as the high difficulty of segmentation, this paper uses BiSeNet as the benchmark model to improve the above situation and pr...

    Chunhui Bai, Lilian Zhang, Lutao Gao, Lin Peng in Journal of Real-Time Image Processing (2024)

  17. No Access

    Article

    ARIR: an intent recognition-based approach for API recommendation

    With the prevalence of service composition, how to recommend API services that meet the Mashup requirements for developers has become a challenging in the field of service computing. Existing works on Web serv...

    Buqing Cao, Siyuan Wang, **ang **e, Qian Peng, Yating Yi in Cluster Computing (2024)

  18. Article

    Open Access

    CoMadOut—a robust outlier detection algorithm based on CoMAD

    Unsupervised learning methods are well established in the area of anomaly detection and achieve state of the art performances on outlier datasets. Outliers play a significant role, since they bear the potentia...

    Andreas Lohrer, Daniyal Kazempour, Maximilian Hünemörder, Peer Kröger in Machine Learning (2024)

  19. Article

    Open Access

    A global scale comparison of risk aggregation in AI assessment frameworks

    AI applications bear inherent risks in various risk dimensions, such as insufficient reliability, robustness, fairness or data protection. It is well-known that trade-offs between these dimensions can arise, f...

    Anna Schmitz, Michael Mock, Rebekka Görge, Armin B. Cremers in AI and Ethics (2024)

  20. No Access

    Article

    Masked self-supervised ECG representation learning via multiview information bottleneck

    In recent years, self-supervised learning-based models have been widely used for electrocardiogram (ECG) representation learning. However, most of the models utilize contrastive learning that strongly depend o...

    Shunxiang Yang, Cheng Lian, Zhigang Zeng, Bingrong Xu in Neural Computing and Applications (2024)

Page of 300