Search
Search Results
-
E3C: a tool for evaluating communication and computation costs in authentication and key exchange protocol
Today, with the advancement of blockchain and Internet of Things (IoT) technologies, there is a growing need for authentication protocols and key...
-
European Clinical Case Corpus
Interpreting information in medical documents has become one of the most relevant application areas for language technologies. However, despite the... -
Combining Contrastive Learning and Knowledge Graph Embeddings to Develop Medical Word Embeddings for the Italian Language
Word embeddings play a significant role in today’s Natural Language Processing tasks and applications. However, there is a significant gap in the... -
Understanding Avoidance Behaviors of Users for Conversational AI
In order to provide better customer services to its rapidly growing users shop** online, retailers harness AI chatbots to solve issues around... -
SOS-FCI: a secure offloading scheme in fog–cloud-based IoT
The Internet of Things (IoT) is growing and has significantly impacted today's life. Although the IoT plays an essential role in human life, it has...
-
Integrating Machine Learning and Cognitive Modeling of Decision Making
Modeling human decision making plays a fundamental role in the design of intelligent systems capable of rich interactions and effective teamwork. In... -
Local AdaGrad-type algorithm for stochastic convex-concave optimization
Large scale convex-concave minimax problems arise in numerous applications, including game theory, robust training, and training of generative...
-
Combining audio and visual displays to highlight temporal and spatial seismic patterns
Data visualization, and to a lesser extent data sonification, are classic tools to the scientific community. However, these two approaches are very...
-
Assembly programming
In this chapter, we discuss writing programs using the assembly instructions for the simple processor introduced in the previous chapter. The... -
FPGA Implementation of Optimized Karhunen–Loeve Transform for Image Processing Applications
The various transformation techniques play vital role in the field of Digital Image Processing. In this paper, we propose FPGA implementation of...
-
IoT Resources Ranking: Decision Making Under Uncertainty Combining Machine Learning and Fuzzy Logic
The Internet of Things (IoT) is characterized by a broad range of resources connected to the Internet, requesting and providing services... -
Polar-coded forward error correction for MLC NAND flash memory
With the ever-growing storage density, high-speed, and low-cost data access, flash memory has inevitably become popular. Multi-level cell (MLC) NAND...
-
Big Data Management: What to Keep from the Past to Face Future Challenges?
The emergence of new hardware architectures, and the continuous production of data open new challenges for data management. It is no longer pertinent...
-
Categorizing Search Results Using WordNet and Wikipedia
Terms used in search queries often have multiple meanings and usages. Consequently, search results corresponding to different meanings or usages may... -
Business Intelligence as a Service - Strategic Tool for Competitiveness
Today, more than ever, organizations face daily environmental changes. The source of change may be a new regulatory law, competitor, business model,... -
Dynamic Reasoning for Description Logic Terminologies
The Semantic Web presents the challenge of designing agents capable of continuously updating their knowledge bases. Semantic Web ontologies are... -
Tools for Email Based Recommendation in Enterprise
Even in Web 2.0 era, email is still the most popular application on the internet. Beset by many problems, such as spam or information overload, yet... -
Ach wie gut, dass niemand weiß, dass ich Rumpelstilzchen heiß oder Wie bleibe ich anonym?
Kryptographie hat es per definitionem mit Verheimlichung zu tun. Wird eine Nachricht verschlüsselt, so wird der Inhalt dieser Nachricht verborgen.... -
Strategic Behaviour in Continuous Double Auction
We analyze with a bottom-up approach the competition between artificial intelligent agents in Continuous Double Auction markets in terms of... -
Mining Hierarchies of Models: From Abstract Views to Concrete Specifications
Process mining techniques have been receiving great attention in the literature for their ability to automatically support process (re)design. The...