![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
2,690 Result(s)
-
Chapter and Conference Paper
Beneath the [MASK]: An Analysis of Structural Query Tokens in ColBERT
ColBERT is a highly effective and interpretable retrieval model based on token embeddings. For scoring, the model adds cosine similarities between the most similar pairs of query and document token embeddings....
-
Chapter and Conference Paper
Advancing Multimedia Retrieval in Medical, Social Media and Content Recommendation Applications with ImageCLEF 2024
The ImageCLEF evaluation campaign was integrated with CLEF (Conference and Labs of the Evaluation Forum) for more than 20 years and represents a Multimedia Retrieval challenge aimed at evaluating the technolog...
-
Chapter and Conference Paper
A Novel Steganography Scheme Using Logistic Map, BRISK Descriptor, and K-Means Clustering
This paper introduces a novel steganography method for embedding and extracting a secret message from an image file using three stages. In the first stage, Binary Robust Invariant Scalable Keypoints (BRISK) an...
-
Chapter and Conference Paper
Dynamic Communities: A Novel Recommendation Approach for Individuals and Groups
As user preferences rapidly and continually evolve, it becomes crucial to incorporate these temporal dynamics in the design of recommender systems. This paper proposes a novel dynamic and overlap** community...
-
Chapter and Conference Paper
Evolutionary Graph-Clustering vs Evolutionary Cluster-Detection Approaches for Community Identification in PPI Networks
Community detection in protein-protein interaction networks (PPIs) is an active area of research, and many studies have applied Genetic Algorithms (GAs) to this problem. This paper summarizes the different GA ...
-
Chapter and Conference Paper
Modeling Distributed and Flexible PHM Framework Based on the Belief Function Theory
This paper explores the integration of the belief function theory within the domain of Prognostics and Health Management (PHM), offering a novel approach to decision-making under conditions of uncertainty and ...
-
Chapter and Conference Paper
Fusion-Based Approach to Enhance Markerless Motion Capture Accuracy for On-Site Analysis
Markerless motion capture systems offer the advantage of non-intrusive and on-site motion analysis, but they often suffer from limited accuracy compared to marker-based systems. In this paper, we propose a nov...
-
Chapter and Conference Paper
The Virtual Environment as a Setting for Culture Heritage Mediation
The fully immersive virtual reality experience leads to living new cognitive and scientific experiences giving an additional dimension and value to the public. New paths of reflection around valorization and m...
-
Chapter and Conference Paper
Rule-Enhanced Pharmaceutical Instructions Information Extraction Based on Deep Learning
Pharmaceutical instructions information extraction is to transform the core content of drug manuals into formatted data, including entity recognition and relationship extraction, which is an essential value fo...
-
Chapter and Conference Paper
Bi-stream Multiscale Hamhead Networks with Contrastive Learning for Image Forgery Localization
The purpose of image forgery localization task is to localize and segment forgery regions from a forgery image. Traditional forgery localization methods usually rely on specific manipulation traces, while cont...
-
Chapter and Conference Paper
Challenges in Building a Digital Business Ecosystem in the Maritime Domain
The Marispace-X project aims to create a digital ecosystem of providers and users of data from the oceans. For this purpose, different use cases (munitions detection, biological climate protection, the constru...
-
Chapter and Conference Paper
Elite Rugby League Players’ Signature Movement Patterns and Position Prediction
Although sports on-field activities occur sequentially, traditional performance indicators quantify players’ activities without regard to their sequential nature. Nowadays, movement patterns are used to sequen...
-
Chapter and Conference Paper
Hierarchical Compositionality in Hyperbolic Space for Robust Medical Image Segmentation
Deep learning based medical image segmentation models need to be robust to domain shifts and image distortion for the safe translation of these models into clinical practice. The most popular methods for impro...
-
Chapter and Conference Paper
UI/UX for Aerospace Qualification Business Processes
To assure the safety and efficiency of components used in aviation industry, the area of aerospace business process validation relies on stringent protocols. The qualification process is multifaceted as it ent...
-
Chapter and Conference Paper
A Real-Time Deep UAV Detection Framework Based on a YOLOv8 Perception Module
Unmanned Aerial Vehicles (UAVs) or drones are currently gaining a lot of popularity due to the versatility of this technology and its ability to perform multiple tasks in various industries. However, arbitrary...
-
Chapter and Conference Paper
Deep Layout Analysis of Multi-lingual and Composite Documents
It is crucial to accurately analyze the layout to convert document images to high-quality text. With the emergence of publicly available, large ground-truth datasets, deep-learning models have demonstrated the...
-
Chapter and Conference Paper
Design of Information System Management Equipment for Spacecraft Based on System Fault Reconstruction Method
Based on system fault reconstruction method, the health detection and diagnosis of information system management equipment is realized by the other equipment of the system. The architecture and software system...
-
Chapter and Conference Paper
On Language-Based Opacity Verification Problem in Discrete Event Systems Under Orwellian Observation
Opacity is an important information flow property that is concerned with the secret leakage of a system to a malicious observer called an “intruder”. Usually, opacity analyses are made under static or dynamic ...
-
Chapter and Conference Paper
The Key Lattice Framework for Concurrent Group Messaging
Today, two-party secure messaging is well-understood and widely adopted, e.g., Signal and WhatsApp. Multiparty protocols for secure group messaging are less mature and many protocols with different tradeoffs ...
-
Chapter and Conference Paper
A Method to Align Business Capability Maps and Enterprise Data Models
The business capability map has gained close attention from organizations as an essential tool for communication between business and IT. However, its integration with the enterprise data model is hampered by ...