We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 10,000 results
  1. End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks

    Proprietary communication technologies for time-critical communication in industrial environments are being gradually replaced by Time-sensitive...

    Gourav Prateek Sharma, Wouter Tavernier, ... Ingrid Moerman in Journal of Network and Systems Management
    Article Open access 08 July 2024
  2. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
  3. Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system

    Software can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires...

    Süleyman Muhammed Arıkan, Aynur Koçak, Mustafa Alkan in International Journal of Information Security
    Article Open access 08 July 2024
  4. IAFPN: interlayer enhancement and multilayer fusion network for object detection

    Feature pyramid network (FPN) improves object detection performance by means of top-down multilevel feature fusion. However, the current FPN-based...

    Zhicheng Li, Chao Yang, Longyu Jiang in Machine Vision and Applications
    Article 08 July 2024
  5. Non-uniform magnetic fields for collective behavior of self-assembled magnetic pillars

    Programmable and self-assembled magnetic pillars are essential to expanding the application domain of magnetic microparticle collectives. Typically,...

    Juan J. Huaroto, Franco N. Piñan Basualdo, ... Sarthak Misra in Swarm Intelligence
    Article Open access 07 July 2024
  6. GOA-net: generic occlusion aware networks for visual tracking

    Occlusion is a frequent phenomenon that hinders the task of visual object tracking. Since occlusion can be from any object and in any shape, data...

    Mohana Murali Dasari, Rama Krishna Gorthi in Machine Vision and Applications
    Article 07 July 2024
  7. Online camera auto-calibration appliable to road surveillance

    Camera calibration is an essential prerequisite for road surveillance applications, which determines the accuracy of obtaining three-dimensional...

    Shusen Guo, **anwen Yu, ... Jiafu Wang in Machine Vision and Applications
    Article 05 July 2024
  8. Exploring AI-driven approaches for unstructured document analysis and future horizons

    In the current industrial landscape, a significant number of sectors are grappling with the challenges posed by unstructured data, which incurs...

    Supriya V. Mahadevkar, Shruti Patil, ... Tanupriya Choudhury in Journal of Big Data
    Article Open access 05 July 2024
  9. Trust management in the internet of vehicles: a systematic literature review of blockchain integration

    The Internet of Vehicles (IoV) promises to revolutionize transportation in smart cities, but its interconnectedness raises critical security and...

    Shirin Abbasi, Navid Khaledian, Amir Masoud Rahmani in International Journal of Information Security
    Article 05 July 2024
  10. Expediting the design and development of secure cloud-based mobile apps

    The adoption and popularity of mobile devices by end-users is partially driven by the increasing development and availability of mobile applications...

    Francisco T. Chimuco, Joāo B. F. Sequeiros, ... Pedro R. M. Inácio in International Journal of Information Security
    Article Open access 04 July 2024
  11. Tree-managed network ensembles for video prediction

    This paper presents an innovative approach that leverages a tree structure to effectively manage a large ensemble of neural networks for tackling...

    Everett Fall, Kai-Wei Chang, Liang-Gee Chen in Machine Vision and Applications
    Article 04 July 2024
  12. Poly-cam: high resolution class activation map for convolutional neural networks

    The demand for explainable AI continues to rise alongside advancements in deep learning technology. Existing methods such as convolutional neural...

    Alexandre Englebert, Olivier Cornu, Christophe De Vleeschouwer in Machine Vision and Applications
    Article 03 July 2024
  13. New custom rating for improving recommendation system performance

    Recommendation system is currently attracting the interest of many explorers. Various new businesses have surfaced with the rise of online marketing...

    Tora Fahrudin, Dedy Rahman Wijaya in Journal of Big Data
    Article Open access 02 July 2024
  14. Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes

    Chameleon-hash functions, introduced by Krawczyk and Rabin (NDSS’00), are trapdoor collision-resistant hash functions parametrized by a public key....

    David Derler, Kai Samelin, Daniel Slamanig in Journal of Cryptology
    Article Open access 02 July 2024
  15. Multi-party codebook distribution strategy based on secret sharing

    The paper addresses the issue of secure distribution of codebooks in the field of information security, particularly in the domain of covert...

    Wei She, Haige Feng, ... Wei Liu in International Journal of Information Security
    Article 02 July 2024
  16. Several families of q-ary cyclic codes with length \(q^m-1\)

    It is very hard to construct an infinite family of cyclic codes of rate close to one half whose minimum distances have a good bound. Tang-Ding codes...

    ** Li, Huan Zhu, Shan Huang in Cryptography and Communications
    Article 01 July 2024
  17. The viability of domain constrained coalition formation for robotic collectives

    Applications, such as military and disaster response, can benefit from robotic collectives’ ability to perform multiple cooperative tasks (e.g.,...

    Grace Diehl, Julie A. Adams in Swarm Intelligence
    Article 01 July 2024
  18. Towards scanning electron microscopy image denoising: a state-of-the-art overview, benchmark, taxonomies, and future direction

    Scanning electron microscope (SEM) enables imaging of micro-nano scale objects. It is an analytical tool widely used in the material, earth and life...

    Sheikh Shah Mohammad Motiur Rahman, Michel Salomon, Sounkalo Dembélé in Machine Vision and Applications
    Article 01 July 2024
  19. Adversarial defence by learning differentiated feature representation in deep ensemble

    Deep learning models have been shown to be vulnerable to critical attacks under adversarial conditions. Attackers are able to generate powerful...

    ** Chen, Huang Wei, ... Zhizhong Zhou in Machine Vision and Applications
    Article 01 July 2024
  20. Minimizing cache usage with fixed-priority and earliest deadline first scheduling

    Cache partitioning is a technique to reduce interference among tasks running on the processors with shared caches. To make this technique effective,...

    Binqi Sun, Tomasz Kloda, ... Marco Caccamo in Real-Time Systems
    Article Open access 28 June 2024
Did you find what you were looking for? Share feedback.