We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 31 results
  1. E3C: a tool for evaluating communication and computation costs in authentication and key exchange protocol

    Today, with the advancement of blockchain and Internet of Things (IoT) technologies, there is a growing need for authentication protocols and key...

    Yashar Salami, Vahid Khajehvand, Esmaeil Zeinali in Iran Journal of Computer Science
    Article 18 March 2024
  2. European Clinical Case Corpus

    Interpreting information in medical documents has become one of the most relevant application areas for language technologies. However, despite the...
    Bernardo Magnini, Begoña Altuna, ... Roberto Zanoli in European Language Grid
    Chapter Open access 2023
  3. Combining Contrastive Learning and Knowledge Graph Embeddings to Develop Medical Word Embeddings for the Italian Language

    Word embeddings play a significant role in today’s Natural Language Processing tasks and applications. However, there is a significant gap in the...
    Denys Amore Bondarenko, Roger Ferrod, Luigi Di Caro in AIxIA 2023 – Advances in Artificial Intelligence
    Conference paper 2023
  4. Understanding Avoidance Behaviors of Users for Conversational AI

    In order to provide better customer services to its rapidly growing users shop** online, retailers harness AI chatbots to solve issues around...
    Siyuan Wu, Yatong Shu, ... Guochao Peng in Distributed, Ambient and Pervasive Interactions
    Conference paper 2023
  5. SOS-FCI: a secure offloading scheme in fog–cloud-based IoT

    The Internet of Things (IoT) is growing and has significantly impacted today's life. Although the IoT plays an essential role in human life, it has...

    Yashar Salami, Vahid Khajehvand, Esmaeil Zeinali in The Journal of Supercomputing
    Article 29 June 2023
  6. Integrating Machine Learning and Cognitive Modeling of Decision Making

    Modeling human decision making plays a fundamental role in the design of intelligent systems capable of rich interactions and effective teamwork. In...
    Taher Rahgooy, K. Brent Venable, Jennifer S. Trueblood in Computational Theory of Mind for Human-Machine Teams
    Conference paper 2022
  7. Local AdaGrad-type algorithm for stochastic convex-concave optimization

    Large scale convex-concave minimax problems arise in numerous applications, including game theory, robust training, and training of generative...

    Luofeng Liao, Li Shen, ... Dacheng Tao in Machine Learning
    Article 23 November 2022
  8. Combining audio and visual displays to highlight temporal and spatial seismic patterns

    Data visualization, and to a lesser extent data sonification, are classic tools to the scientific community. However, these two approaches are very...

    Arthur Paté, Gaspard Farge, ... Leif Karlstrom in Journal on Multimodal User Interfaces
    Article 27 July 2021
  9. Assembly programming

    In this chapter, we discuss writing programs using the assembly instructions for the simple processor introduced in the previous chapter. The...
    Jan Friso Groote, Rolf Morel, ... Adam Watkins in Logic Gates, Circuits, Processors, Compilers and Computers
    Chapter 2021
  10. FPGA Implementation of Optimized Karhunen–Loeve Transform for Image Processing Applications

    The various transformation techniques play vital role in the field of Digital Image Processing. In this paper, we propose FPGA implementation of...

    Satish S. Bhairannawar, Sayantam Sarkar, K. B. Raja in Journal of Real-Time Image Processing
    Article 05 May 2018
  11. IoT Resources Ranking: Decision Making Under Uncertainty Combining Machine Learning and Fuzzy Logic

    The Internet of Things (IoT) is characterized by a broad range of resources connected to the Internet, requesting and providing services...
    Renato Dilli, Amanda Argou, ... Adenauer Yamin in Fuzzy Information Processing
    Conference paper 2018
  12. Polar-coded forward error correction for MLC NAND flash memory

    With the ever-growing storage density, high-speed, and low-cost data access, flash memory has inevitably become popular. Multi-level cell (MLC) NAND...

    Haochuan Song, Jen-Chien Fu, ... Chuan Zhang in Science China Information Sciences
    Article 21 August 2018
  13. Big Data Management: What to Keep from the Past to Face Future Challenges?

    The emergence of new hardware architectures, and the continuous production of data open new challenges for data management. It is no longer pertinent...

    G. Vargas-Solar, J. L. Zechinelli-Martini, J. A. Espinosa-Oviedo in Data Science and Engineering
    Article Open access 10 August 2017
  14. Categorizing Search Results Using WordNet and Wikipedia

    Terms used in search queries often have multiple meanings and usages. Consequently, search results corresponding to different meanings or usages may...
    Reza Taghizadeh Hemayati, Weiyi Meng, Clement Yu in Web-Age Information Management
    Conference paper 2012
  15. Business Intelligence as a Service - Strategic Tool for Competitiveness

    Today, more than ever, organizations face daily environmental changes. The source of change may be a new regulatory law, competitor, business model,...
    José António Porfírio, João Correia dos Santos in ENTERprise Information Systems
    Conference paper 2011
  16. Dynamic Reasoning for Description Logic Terminologies

    The Semantic Web presents the challenge of designing agents capable of continuously updating their knowledge bases. Semantic Web ontologies are...
    Stanislav Ustymenko, Daniel G. Schwartz in Advances in Artificial Intelligence
    Conference paper 2010
  17. Tools for Email Based Recommendation in Enterprise

    Even in Web 2.0 era, email is still the most popular application on the internet. Beset by many problems, such as spam or information overload, yet...
    Michal Laclavík, Martin Šeleng, ... Ladislav Hluchý in ENTERprise Information Systems
    Conference paper 2010
  18. Ach wie gut, dass niemand weiß, dass ich Rumpelstilzchen heiß oder Wie bleibe ich anonym?

    Kryptographie hat es per definitionem mit Verheimlichung zu tun. Wird eine Nachricht verschlüsselt, so wird der Inhalt dieser Nachricht verborgen....
    Albrecht Beutelspacher in Kryptologie
    Chapter 2009
  19. Strategic Behaviour in Continuous Double Auction

    We analyze with a bottom-up approach the competition between artificial intelligent agents in Continuous Double Auction markets in terms of...
    Marta Posada, Cesáreo Hernández, Adolfo López-Paredes in Advances in Artificial Economics
    Chapter 2006
  20. Mining Hierarchies of Models: From Abstract Views to Concrete Specifications

    Process mining techniques have been receiving great attention in the literature for their ability to automatically support process (re)design. The...
    Gianluigi Greco, Antonella Guzzo, Luigi Pontieri in Business Process Management
    Conference paper 2005
Did you find what you were looking for? Share feedback.