We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Explicit constructions of NMDS self-dual codes

    Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to...

    Dongchun Han, Hanbin Zhang in Designs, Codes and Cryptography
    Article 12 July 2024
  2. Hierarchical adaptive evolution framework for privacy-preserving data publishing

    The growing need for data publication and the escalating concerns regarding data privacy have led to a surge in interest in Privacy-Preserving Data...

    Mingshan You, Yong-Feng Ge, ... Georgios Kambourakis in World Wide Web
    Article Open access 12 July 2024
  3. HyperMatch: long-form text matching via hypergraph convolutional networks

    Semantic text matching plays a vital role in diverse domains, such as information retrieval, question answering, and recommendation. However, longer...

    Junwen Duan, Mingyi Jia, ... Jianxin Wang in Knowledge and Information Systems
    Article 12 July 2024
  4. Anomaly analytics in data-driven machine learning applications

    Machine learning is used widely to create a range of prediction or classification models. The quality of the machine learning (ML) models depends not...

    Article Open access 12 July 2024
  5. Progress on half a century of process modelling research in steelmaking: a review

    Process modelling in steelmaking started from mid-sixties and witnessed rapid growth and wide spread applications during the last fifty years or so....

    Dipak Mazumdar in CSI Transactions on ICT
    Article 12 July 2024
  6. M2AST:MLP-mixer-based adaptive spatial-temporal graph learning for human motion prediction

    Human motion prediction is a challenging task in human-centric computer vision, involving forecasting future poses based on historical sequences....

    Junyi Tang, Simin An, ... ** Chen in Multimedia Systems
    Article 12 July 2024
  7. Temporal analysis of computational economics: a topic modeling approach

    This study offers a comprehensive investigation into the thematic evolution within computational economics over the past two decades, leveraging...

    Malvika Mishra, Santosh Kumar Vishwakarma, ... S. Anjana in International Journal of Data Science and Analytics
    Article Open access 11 July 2024
  8. Global adaptive histogram feature network for automatic segmentation of infection regions in CT images

    Accurate and timely diagnosis of COVID-like virus is of paramount importance for lifesaving. In this work, deep learning techniques are applied to...

    **nren Min, Yang Liu, ... Mingyang Zhong in Multimedia Systems
    Article 11 July 2024
  9. Assessing the cooling impact of the urban park during pre- and post-cyclone using Landsat images

    Cities are far warmer than their surroundings. Using vegetation is one of the best techniques to mitigate the effects of urban heat islands (UHI)....

    Sudeshna Haldar, Priyanka Dey in Spatial Information Research
    Article 10 July 2024
  10. Examining ALS: reformed PCA and random forest for effective detection of ALS

    ALS (Amyotrophic Lateral Sclerosis) is a fatal neurodegenerative disease of the human motor system. It is a group of progressive diseases that...

    Abdullah Alqahtani, Shtwai Alsubai, ... Ashit Kumar Dutta in Journal of Big Data
    Article Open access 10 July 2024
  11. Data reduction in big data: a survey of methods, challenges and future directions

    Data reduction plays a pivotal role in managing and analyzing big data, which is characterized by its volume, velocity, variety, veracity, value,...

    Tala Talaei Khoei, Aditi Singh in International Journal of Data Science and Analytics
    Article 10 July 2024
  12. Unveiling the impact of employee-customer familiarity on customer purchase intentions: an empirical investigation within the realm of web-based date analytics

    This research delves into the intricate dynamics of employee-customer familiarity and its profound influence on customer purchase intentions within...

    Bingfeng Li, **aoting **e, ... Shilei Tan in World Wide Web
    Article 10 July 2024
  13. FlexpushdownDB: rethinking computation pushdown for cloud OLAP DBMSs

    Modern cloud-native OLAP databases adopt a storage-disaggregation architecture that separates the management of computation and storage. A major...

    Yifei Yang, **angyao Yu, ... Michael Stonebraker in The VLDB Journal
    Article 10 July 2024
  14. MIM: A multiple integration model for intrusion detection on imbalanced samples

    The quantity of normal samples is commonly significantly greater than that of malicious samples, resulting in an imbalance in network security data....

    Zhiqiang Zhang, Le Wang, ... Yanchun Zhang in World Wide Web
    Article 10 July 2024
  15. Emotion AWARE: an artificial intelligence framework for adaptable, robust, explainable, and multi-granular emotion analysis

    Emotions are fundamental to human behaviour. How we feel, individually and collectively, determines how humanity evolves and advances into our shared...

    Gihan Gamage, Daswin De Silva, ... Milos Manic in Journal of Big Data
    Article Open access 10 July 2024
  16. Survey-based analysis of cybersecurity awareness of Turkish seafarers

    In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...

    Ivar Moen, Aybars Oruc, ... Georgios Kavallieratos in International Journal of Information Security
    Article Open access 10 July 2024
  17. Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph

    Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....

    Peng Su, **gyuan Hu in Multimedia Systems
    Article 10 July 2024
  18. New spence difference sets

    James A. Davis, John Polhill, ... Jordan Webster in Designs, Codes and Cryptography
    Article Open access 10 July 2024
  19. Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm

    A novel quantum-safe key encapsulation algorithm, called Multivariate Polynomial Public Key (MPPK), was recently proposed by Kuang, Perepechaenko,...

    Randy Kuang, Maria Perepechaenko, ... Michel Barbeau in EURASIP Journal on Information Security
    Article Open access 09 July 2024
Did you find what you were looking for? Share feedback.