We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 10,000 results
  1. AI Ethics, the Neuralink Enigma, and Statistical Inference as the Anticlimax of Machiavelli’s Prince

    Elon Musk’s Neuralink, one more company hopes to dominate the brain-computer interface (BCI) market, has implanted a brain-reading device into a...

    Antonio Araújo in Digital Society
    Article 05 July 2024
  2. Around LCD group codes

    Javier de la Cruz, Wolfgang Willems in Designs, Codes and Cryptography
    Article 05 July 2024
  3. Trust management in the internet of vehicles: a systematic literature review of blockchain integration

    The Internet of Vehicles (IoV) promises to revolutionize transportation in smart cities, but its interconnectedness raises critical security and...

    Shirin Abbasi, Navid Khaledian, Amir Masoud Rahmani in International Journal of Information Security
    Article 05 July 2024
  4. Vectorial negabent concepts: similarities, differences, and generalizations

    In Pasalic et al. (IEEE Trans Inf Theory 69:2702–2712, 2023), and in Anbar and Meidl (Cryptogr Commun 10:235–249, 2018), two different vectorial...

    Nurdagül Anbar, Sadmir Kudin, ... Alexandr Polujan in Designs, Codes and Cryptography
    Article Open access 05 July 2024
  5. Blind quality evaluator for multi-exposure fusion image via joint sparse features and complex-wavelet statistical characteristics

    Multi-Exposure Fusion (MEF) technique aims to fuse multiple images taken from the same scene at different exposure levels into an image with more...

    Benquan Yang, Yueli Cui, ... Junhao Lin in Multimedia Systems
    Article 05 July 2024
  6. Context-aware adaptive network for UDA semantic segmentation

    Unsupervised Domain Adaptation (UDA) plays a pivotal role in enhancing the segmentation performance of models in the target domain by mitigating the...

    Yu Yuan, **long Shi, ... Yunhan Sun in Multimedia Systems
    Article 05 July 2024
  7. Deep contrastive multi-view clustering with doubly enhanced commonality

    Recently, deep multi-view clustering leveraging autoencoders has garnered significant attention due to its ability to simultaneously enhance feature...

    Zhiyuan Yang, Changming Zhu, Zishi Li in Multimedia Systems
    Article 04 July 2024
  8. Quality evaluation methods of handwritten Chinese characters: a comprehensive survey

    Quality evaluation of handwritten Chinese characters aims to automatically quantify and assess handwritten Chinese characters through computer vision...

    Weiran Chen, Jiaqi Su, ... Chun** Liu in Multimedia Systems
    Article 04 July 2024
  9. Expediting the design and development of secure cloud-based mobile apps

    The adoption and popularity of mobile devices by end-users is partially driven by the increasing development and availability of mobile applications...

    Francisco T. Chimuco, Joāo B. F. Sequeiros, ... Pedro R. M. Inácio in International Journal of Information Security
    Article Open access 04 July 2024
  10. Some self-dual codes and isodual codes constructed by matrix product codes

    In 2020, Cao et al. proved that any repeated-root constacyclic code is monomially equivalent to a matrix product code of simple-root constacyclic...

    Xu Pan, Hao Chen, Hongwei Liu in Designs, Codes and Cryptography
    Article 04 July 2024
  11. FEF-Net: feature enhanced fusion network with crossmodal attention for multimodal humor prediction

    Humor segment prediction in video involves the comprehension and analysis of humor. Traditional humor prediction has been text-based; however, with...

    Peng Gao, Chuanqi Tao, Donghai Guan in Multimedia Systems
    Article 04 July 2024
  12. Digital Health Empowerment, Autonomy, and the Capability Approach: Reply to de Proost and Grey

    De Proost & Grey criticize Nickel et al.’s article “Justice and empowerment through digital health: ethical challenges and opportunities,” arguing...

    Philip J. Nickel, Iris Loosman, ... Anna Vinnikova in Digital Society
    Article Open access 03 July 2024
  13. Safety and Privacy in Immersive Extended Reality: An Analysis and Policy Recommendations

    Extended reality (XR) technologies have experienced cycles of development—“summers” and “winters”—for decades, but their overall trajectory is one of...

    Emmie Hine, Isadora Neroni Rezende, ... Luciano Floridi in Digital Society
    Article Open access 03 July 2024
  14. A channel-gained single-model network with variable rate for multispectral image compression in UAV air-to-ground remote sensing

    Unmanned aerial vehicle (UAV) air-to-ground remote sensing technology, has the advantages of long flight duration, real-time image transmission, wide...

    Wei Wang, Daiyin Zhu, Kedi Hu in Multimedia Systems
    Article 02 July 2024
  15. Some constacyclic BCH codes with good parameters

    BCH codes as a subclass of constacyclic BCH codes have been widely studied, while the results on the parameters of BCH codes over finite fields are...

    ** Li, Huilian Zhu, Shan Huang in Designs, Codes and Cryptography
    Article 02 July 2024
  16. Multi-party codebook distribution strategy based on secret sharing

    The paper addresses the issue of secure distribution of codebooks in the field of information security, particularly in the domain of covert...

    Wei She, Haige Feng, ... Wei Liu in International Journal of Information Security
    Article 02 July 2024
  17. In Search of Living Law: How Should We Design for (Digital) Legal Interaction?

    In his work on human-centric design, urban theorist Christopher Alexander elaborated design patterns as a way to conceptualise and practice urban...

    Riikka Koulu in Digital Society
    Article Open access 01 July 2024
  18. Establishing the connection between speech-language pathologists and technology developers in designing novel textile-based AAC (TAAC) technologies

    Augmentative and alternative communication (AAC) methods aim to enable a variety of interactions and participation for those with complex...

    Tanja A. Vihriälä, Lotta Lintula, ... Johanna Virkki in Universal Access in the Information Society
    Article Open access 28 June 2024
  19. Gaming the system: tetromino-based covert channel and its impact on mobile security

    Trojan droppers consistently emerge as challenging malware threats, particularly within the Android ecosystem. Traditional malware detection...

    Efstratios Vasilellis, Vasileios Botsos, ... Dimitris Gritzalis in International Journal of Information Security
    Article 28 June 2024
Did you find what you were looking for? Share feedback.