We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. PointDMIG: a dynamic motion-informed graph neural network for 3D action recognition

    Point cloud contains rich spatial information, providing effective supplementary clues for action recognition. Existing action recognition algorithms...

    Yao Du, Zhenjie Hou, ... **nwen Zhou in Multimedia Systems
    Article 27 June 2024
  2. Security analysis of the ISO standard \(\textsf{OFB}\)-\(\textsf{DRBG}\)

    Deterministic random bit generators (DRBGs) are essential tools in modern cryptography for generating secure and unpredictable random numbers. The...

    Woohyuk Chung, Hwigyeom Kim, ... Yeongmin Lee in Designs, Codes and Cryptography
    Article Open access 27 June 2024
  3. A survey of compositional inverses of permutation polynomials over finite fields

    In this paper, we survey on the recent results and methods in the study of compositional inverses of permutation polynomials over finite fields. In...

    Article 27 June 2024
  4. Constructions for t-designs and s-resolvable t-designs

    The purpose of the present paper is to introduce recursive methods for constructing simple t -designs, s -resolvable t -designs, and large sets of t -desi...

    Article Open access 27 June 2024
  5. Finding orientations of supersingular elliptic curves and quaternion orders

    An oriented supersingular elliptic curve is a curve which is enhanced with the information of an endomorphism. Computing the full endomorphism ring...

    Sarah Arpin, James Clements, ... Benjamin Wesolowski in Designs, Codes and Cryptography
    Article Open access 26 June 2024
  6. DMFNet: deep matrix factorization network for image compressed sensing

    Due to its outstanding performance in image processing, deep learning (DL) is successfully utilized in compressed sensing (CS) reconstruction....

    Hengyou Wang, Haocheng Li, **ang Jiang in Multimedia Systems
    Article 26 June 2024
  7. Acnn: arbitrary trace attacks based on leakage area detection

    Deep Learning-based Side-Channel Analysis (DL-SCA) has emerged as a powerful method in the field of side-channel analysis. Current works on DL-SCA...

    Article 26 June 2024
  8. Multi-branch feature fusion and refinement network for salient object detection

    With the development of convolutional neural networks (CNNs), salient object detection methods have made great progress in performance. Most methods...

    **yu Yang, Yanjiao Shi, ... Liu Cui in Multimedia Systems
    Article 26 June 2024
  9. Impact Assessment as a Legal Design Pattern—A “Timeless Way” of Managing Future Risks?

    Impact assessments are increasingly employed and debated as instruments for mitigating the fundamental rights risks associated with artificial...

    Alina Wernick in Digital Society
    Article Open access 26 June 2024
  10. Elektronische Bewahrung und Archivierung gemäß eIDAS

    Steffen Schwalm, Ulrike Korte, ... Tomasz Kusber in Datenschutz und Datensicherheit - DuD
    Article 26 June 2024
  11. Sichere digitale Wahlen mit dem Online-Ausweis

    Tim Bräunig, Matthijs Schippers, ... Nicole Stautz in Datenschutz und Datensicherheit - DuD
    Article 26 June 2024
  12. Sicherheit trifft Innovation: Europas Weg mit eIDAS 2

    Lilly Schmidt, Konstantin Schaarschmidt in Datenschutz und Datensicherheit - DuD
    Article 26 June 2024
  13. Live-Ortung von Beschäftigten in der agilen Personaleinsatzplanung

    Volker Johannhörster, Matthias Kohn, ... Ulrich Waldmann in Datenschutz und Datensicherheit - DuD
    Article 26 June 2024
Did you find what you were looking for? Share feedback.