Skip to main content

previous disabled Page of 186
and
  1. No Access

    Chapter and Conference Paper

    Beneath the [MASK]: An Analysis of Structural Query Tokens in ColBERT

    ColBERT is a highly effective and interpretable retrieval model based on token embeddings. For scoring, the model adds cosine similarities between the most similar pairs of query and document token embeddings....

    Ben Giacalone, Greg Paiement, Quinn Tucker in Advances in Information Retrieval (2024)

  2. No Access

    Chapter and Conference Paper

    Advancing Multimedia Retrieval in Medical, Social Media and Content Recommendation Applications with ImageCLEF 2024

    The ImageCLEF evaluation campaign was integrated with CLEF (Conference and Labs of the Evaluation Forum) for more than 20 years and represents a Multimedia Retrieval challenge aimed at evaluating the technolog...

    Bogdan Ionescu, Henning Müller, Ana Maria Drăgulinescu in Advances in Information Retrieval (2024)

  3. No Access

    Chapter and Conference Paper

    A Novel Steganography Scheme Using Logistic Map, BRISK Descriptor, and K-Means Clustering

    This paper introduces a novel steganography method for embedding and extracting a secret message from an image file using three stages. In the first stage, Binary Robust Invariant Scalable Keypoints (BRISK) an...

    Hassan Jameel Azooz, Khawla Ben Salah, Monji Kherallah in Image and Video Technology (2024)

  4. No Access

    Chapter and Conference Paper

    Dynamic Communities: A Novel Recommendation Approach for Individuals and Groups

    As user preferences rapidly and continually evolve, it becomes crucial to incorporate these temporal dynamics in the design of recommender systems. This paper proposes a novel dynamic and overlap** community...

    Sabrine Ben Abdrabbah, Sabrine Mallek, Nahla Ben Amor in Agents and Artificial Intelligence (2024)

  5. No Access

    Chapter and Conference Paper

    Evolutionary Graph-Clustering vs Evolutionary Cluster-Detection Approaches for Community Identification in PPI Networks

    Community detection in protein-protein interaction networks (PPIs) is an active area of research, and many studies have applied Genetic Algorithms (GAs) to this problem. This paper summarizes the different GA ...

    Marwa Ben M’Barek, Sana Ben Hmida in Advances in Information Systems, Artificia… (2024)

  6. No Access

    Chapter and Conference Paper

    Modeling Distributed and Flexible PHM Framework Based on the Belief Function Theory

    This paper explores the integration of the belief function theory within the domain of Prognostics and Health Management (PHM), offering a novel approach to decision-making under conditions of uncertainty and ...

    Safa Ben Ayed, Malika Ben Khalifa in Artificial Intelligence Applications and I… (2024)

  7. No Access

    Chapter and Conference Paper

    Fusion-Based Approach to Enhance Markerless Motion Capture Accuracy for On-Site Analysis

    Markerless motion capture systems offer the advantage of non-intrusive and on-site motion analysis, but they often suffer from limited accuracy compared to marker-based systems. In this paper, we propose a nov...

    Abderrahman Ben Abdeljelil, Mohamed Hédi Bedoui in Image and Video Technology (2024)

  8. No Access

    Chapter and Conference Paper

    The Virtual Environment as a Setting for Culture Heritage Mediation

    The fully immersive virtual reality experience leads to living new cognitive and scientific experiences giving an additional dimension and value to the public. New paths of reflection around valorization and m...

    Ben Maallem Héla in HCI International 2023 – Late Breaking Posters (2024)

  9. No Access

    Chapter and Conference Paper

    Rule-Enhanced Pharmaceutical Instructions Information Extraction Based on Deep Learning

    Pharmaceutical instructions information extraction is to transform the core content of drug manuals into formatted data, including entity recognition and relationship extraction, which is an essential value fo...

    **aodan Lv, Ben Teng, Haitao Zhang, Bo An in Health Information Processing. Evaluation … (2024)

  10. No Access

    Chapter and Conference Paper

    Bi-stream Multiscale Hamhead Networks with Contrastive Learning for Image Forgery Localization

    The purpose of image forgery localization task is to localize and segment forgery regions from a forgery image. Traditional forgery localization methods usually rely on specific manipulation traces, while cont...

    Guo Li, Runjie Liu, Wenchao Cui, Yirong Wu in Pattern Recognition and Computer Vision (2024)

  11. No Access

    Chapter and Conference Paper

    Challenges in Building a Digital Business Ecosystem in the Maritime Domain

    The Marispace-X project aims to create a digital ecosystem of providers and users of data from the oceans. For this purpose, different use cases (munitions detection, biological climate protection, the constru...

    Ben Hellmanzik, Kurt Sandkuhl in Advances in Enterprise Engineering XVII (2024)

  12. No Access

    Chapter and Conference Paper

    Elite Rugby League Players’ Signature Movement Patterns and Position Prediction

    Although sports on-field activities occur sequentially, traditional performance indicators quantify players’ activities without regard to their sequential nature. Nowadays, movement patterns are used to sequen...

    Victor Elijah Adeyemo, Anna Palczewska in Machine Learning and Data Mining for Sport… (2024)

  13. No Access

    Chapter and Conference Paper

    Hierarchical Compositionality in Hyperbolic Space for Robust Medical Image Segmentation

    Deep learning based medical image segmentation models need to be robust to domain shifts and image distortion for the safe translation of these models into clinical practice. The most popular methods for impro...

    Ainkaran Santhirasekaram, Mathias Winkler in Domain Adaptation and Representation Trans… (2024)

  14. No Access

    Chapter and Conference Paper

    UI/UX for Aerospace Qualification Business Processes

    To assure the safety and efficiency of components used in aviation industry, the area of aerospace business process validation relies on stringent protocols. The qualification process is multifaceted as it ent...

    Kenechukwu Eyisi, Khuram Nawaz Khayam in Recent Trends in Image Processing and Patt… (2024)

  15. No Access

    Chapter and Conference Paper

    A Real-Time Deep UAV Detection Framework Based on a YOLOv8 Perception Module

    Unmanned Aerial Vehicles (UAVs) or drones are currently gaining a lot of popularity due to the versatility of this technology and its ability to perform multiple tasks in various industries. However, arbitrary...

    Wided Souid Miled, Moulay A. Akhloufi in Intelligent Systems and Pattern Recognition (2024)

  16. No Access

    Chapter and Conference Paper

    Deep Layout Analysis of Multi-lingual and Composite Documents

    It is crucial to accurately analyze the layout to convert document images to high-quality text. With the emergence of publicly available, large ground-truth datasets, deep-learning models have demonstrated the...

    Takwa Ben Aïcha Gader, Afef Kacem Echi in Intelligent Systems and Pattern Recognition (2024)

  17. No Access

    Chapter and Conference Paper

    Design of Information System Management Equipment for Spacecraft Based on System Fault Reconstruction Method

    Based on system fault reconstruction method, the health detection and diagnosis of information system management equipment is realized by the other equipment of the system. The architecture and software system...

    Sun Ben, Wang Wei, Liang **aofeng, Zhang xu in Computer Science and Education. Educationa… (2024)

  18. No Access

    Chapter

    Computational Methods to Infer Human Factors for Adaptation and Personalization Using Eye Tracking

    “The Eyes Are the Window to the Soul” is a commonly used phrase that refers to the intricate relationship between a person's eyes and their underlying thought processes and affective states. Indeed, researcher...

    Ben Steichen in A Human-Centered Perspective of Intelligen… (2024)

  19. No Access

    Chapter and Conference Paper

    On Language-Based Opacity Verification Problem in Discrete Event Systems Under Orwellian Observation

    Opacity is an important information flow property that is concerned with the secret leakage of a system to a malicious observer called an “intruder”. Usually, opacity analyses are made under static or dynamic ...

    Salwa Habbachi, Imene Ben Hafaiedh, Zhiwu Li in Verification and Evaluation of Computer an… (2024)

  20. No Access

    Chapter and Conference Paper

    The Key Lattice Framework for Concurrent Group Messaging

    Today, two-party secure messaging is well-understood and widely adopted, e.g., Signal and WhatsApp. Multiparty protocols for secure group messaging are less mature and many protocols with different tradeoffs ...

    Kelong Cong, Karim Eldefrawy, Nigel P. Smart in Applied Cryptography and Network Security (2024)

previous disabled Page of 186