We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Explicit constructions of NMDS self-dual codes

    Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to...

    Dongchun Han, Hanbin Zhang in Designs, Codes and Cryptography
    Article 12 July 2024
  2. M2AST:MLP-mixer-based adaptive spatial-temporal graph learning for human motion prediction

    Human motion prediction is a challenging task in human-centric computer vision, involving forecasting future poses based on historical sequences....

    Junyi Tang, Simin An, ... ** Chen in Multimedia Systems
    Article 12 July 2024
  3. Exploring the potential of Easy Language for enhancing website sustainability

    Sustainable design principles have become increasingly important in website development, mainly focusing on reducing carbon emissions and energy...

    Mariona González-Sordé in Universal Access in the Information Society
    Article Open access 11 July 2024
  4. Global adaptive histogram feature network for automatic segmentation of infection regions in CT images

    Accurate and timely diagnosis of COVID-like virus is of paramount importance for lifesaving. In this work, deep learning techniques are applied to...

    **nren Min, Yang Liu, ... Mingyang Zhong in Multimedia Systems
    Article 11 July 2024
  5. MyBioethics: How Ed-Tech Enables Discovery-Driven Empirical Bioethics Research

    Digital tools have granted new opportunities to engage people with bioethical discussion and rehearsed decision-making. The ongoing development of...

    Joel Janhonen, Mikko Värttö, Heikki Saxén in Digital Society
    Article Open access 10 July 2024
  6. Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph

    Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....

    Peng Su, **gyuan Hu in Multimedia Systems
    Article 10 July 2024
  7. New spence difference sets

    James A. Davis, John Polhill, ... Jordan Webster in Designs, Codes and Cryptography
    Article Open access 10 July 2024
  8. Survey-based analysis of cybersecurity awareness of Turkish seafarers

    In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...

    Ivar Moen, Aybars Oruc, ... Georgios Kavallieratos in International Journal of Information Security
    Article Open access 10 July 2024
  9. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
  10. Using the ACE framework to enforce access and usage control with notifications of revoked access rights

    The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...

    Marco Rasori, Andrea Saracino, ... Marco Tiloca in International Journal of Information Security
    Article Open access 08 July 2024
  11. A three-stage quality evaluation method for experience products: taking animation as an example

    The diversity and dynamics of quality index information bring challenges to quality assessment of experience products. This paper proposes a...

    Qianqian Chen, Zhongjun Tang, ... **g Wang in Multimedia Systems
    Article 08 July 2024
  12. Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system

    Software can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires...

    Süleyman Muhammed Arıkan, Aynur Koçak, Mustafa Alkan in International Journal of Information Security
    Article Open access 08 July 2024
  13. Accurate entropy modeling in learned image compression with joint enchanced SwinT and CNN

    Recently, learned image compression (LIC) has shown significant research potential. Most existing LIC methods are CNN-based or transformer-based or...

    Dongjian Yang, **aopeng Fan, ... Debin Zhao in Multimedia Systems
    Article 07 July 2024
  14. A multi-scale no-reference video quality assessment method based on transformer

    Video quality assessment is essential for optimizing user experience, enhancing network efficiency, supporting video production and editing,...

    Yingan Cui, Zonghua Yu, ... Junhuai Li in Multimedia Systems
    Article 06 July 2024
  15. ViCLEVR: a visual reasoning dataset and hybrid multimodal fusion model for visual question answering in Vietnamese

    In recent years, visual question answering (VQA) has gained significant attention for its diverse applications, including intelligent car assistance,...

    Khiem Vinh Tran, Hao Phu Phan, ... Ngan Luu Thuy Nguyen in Multimedia Systems
    Article 06 July 2024
  16. Deep learning based features extraction for facial gender classification using ensemble of machine learning technique

    Accurate and efficient gender recognition is an essential for many applications such as surveillance, security, and biometrics. Recently, deep...

    Fazal Waris, Feipeng Da, Shanghuan Liu in Multimedia Systems
    Article 06 July 2024
  17. AI Ethics, the Neuralink Enigma, and Statistical Inference as the Anticlimax of Machiavelli’s Prince

    Elon Musk’s Neuralink, one more company hopes to dominate the brain-computer interface (BCI) market, has implanted a brain-reading device into a...

    Antonio Araújo in Digital Society
    Article 05 July 2024
  18. Around LCD group codes

    Javier de la Cruz, Wolfgang Willems in Designs, Codes and Cryptography
    Article 05 July 2024
  19. Vectorial negabent concepts: similarities, differences, and generalizations

    In Pasalic et al. (IEEE Trans Inf Theory 69:2702–2712, 2023), and in Anbar and Meidl (Cryptogr Commun 10:235–249, 2018), two different vectorial...

    Nurdagül Anbar, Sadmir Kudin, ... Alexandr Polujan in Designs, Codes and Cryptography
    Article Open access 05 July 2024
Did you find what you were looking for? Share feedback.