We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Explicit constructions of NMDS self-dual codes

    Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to...

    Dongchun Han, Hanbin Zhang in Designs, Codes and Cryptography
    Article 12 July 2024
  2. M2AST:MLP-mixer-based adaptive spatial-temporal graph learning for human motion prediction

    Human motion prediction is a challenging task in human-centric computer vision, involving forecasting future poses based on historical sequences....

    Junyi Tang, Simin An, ... ** Chen in Multimedia Systems
    Article 12 July 2024
  3. Correction: ChatGPT is bullshit

    Michael Townsen Hicks, James Humphries, Joe Slater in Ethics and Information Technology
    Article Open access 11 July 2024
  4. Global adaptive histogram feature network for automatic segmentation of infection regions in CT images

    Accurate and timely diagnosis of COVID-like virus is of paramount importance for lifesaving. In this work, deep learning techniques are applied to...

    **nren Min, Yang Liu, ... Mingyang Zhong in Multimedia Systems
    Article 11 July 2024
  5. Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph

    Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....

    Peng Su, **gyuan Hu in Multimedia Systems
    Article 10 July 2024
  6. New spence difference sets

    James A. Davis, John Polhill, ... Jordan Webster in Designs, Codes and Cryptography
    Article Open access 10 July 2024
  7. Survey-based analysis of cybersecurity awareness of Turkish seafarers

    In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...

    Ivar Moen, Aybars Oruc, ... Georgios Kavallieratos in International Journal of Information Security
    Article Open access 10 July 2024
  8. Impact of linkage level on inferences from big data analyses in health and medical research: an empirical study

    Background

    Linkage errors that occur according to linkage levels can adversely affect the accuracy and reliability of analysis results. This study...

    Bora Lee, Young-Kyun Lee, ... Jean-Kyung Bak in BMC Medical Informatics and Decision Making
    Article Open access 09 July 2024
  9. Improve the efficiency and accuracy of ophthalmologists’ clinical decision-making based on AI technology

    Background

    As global aging intensifies, the prevalence of ocular fundus diseases continues to rise. In China, the tense doctor-patient ratio poses...

    Yingxuan Guo, Changke Huang, ... Yiqi Chen in BMC Medical Informatics and Decision Making
    Article Open access 09 July 2024
  10. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
  11. Digital Sustainability for Energy-Efficient Behaviours: A User Representation and Touchpoint Model

    In response to climate change, nations have been tasked with reducing energy consumption and lessening their carbon footprint through targeted...

    Stephen McCarthy, Titiana Ertiö, ... Nina Kahma in Information Systems Frontiers
    Article Open access 08 July 2024
  12. Using the ACE framework to enforce access and usage control with notifications of revoked access rights

    The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...

    Marco Rasori, Andrea Saracino, ... Marco Tiloca in International Journal of Information Security
    Article Open access 08 July 2024
  13. A three-stage quality evaluation method for experience products: taking animation as an example

    The diversity and dynamics of quality index information bring challenges to quality assessment of experience products. This paper proposes a...

    Qianqian Chen, Zhongjun Tang, ... **g Wang in Multimedia Systems
    Article 08 July 2024
  14. Virtual Experiences, Real Memories? A Study on Information Recall and Recognition in the Metaverse

    There are high expectations towards extended reality (XR), namely the “metaverse”. However, human performance in the metaverse has been called into...

    Nannan **, Juan Chen, ... Juho Hamari in Information Systems Frontiers
    Article Open access 08 July 2024
  15. Optimization of vision transformer-based detection of lung diseases from chest X-ray images

    Background

    Recent advances in Vision Transformer (ViT)-based deep learning have significantly improved the accuracy of lung disease prediction from...

    **sol Ko, Soyeon Park, Hyun Goo Woo in BMC Medical Informatics and Decision Making
    Article Open access 08 July 2024
  16. A Taxonomy of Home Automation: Expert Perspectives on the Future of Smarter Homes

    Recent advancements in digital technologies, including artificial intelligence (AI), Internet of Things (IoT), and information and communication...

    Shabnam FakhrHosseini, Chaiwoo Lee, ... Joseph Coughlin in Information Systems Frontiers
    Article Open access 08 July 2024
  17. Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system

    Software can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires...

    Süleyman Muhammed Arıkan, Aynur Koçak, Mustafa Alkan in International Journal of Information Security
    Article Open access 08 July 2024
  18. Accurate entropy modeling in learned image compression with joint enchanced SwinT and CNN

    Recently, learned image compression (LIC) has shown significant research potential. Most existing LIC methods are CNN-based or transformer-based or...

    Dongjian Yang, **aopeng Fan, ... Debin Zhao in Multimedia Systems
    Article 07 July 2024
  19. A multi-scale no-reference video quality assessment method based on transformer

    Video quality assessment is essential for optimizing user experience, enhancing network efficiency, supporting video production and editing,...

    Yingan Cui, Zonghua Yu, ... Junhuai Li in Multimedia Systems
    Article 06 July 2024
  20. ViCLEVR: a visual reasoning dataset and hybrid multimodal fusion model for visual question answering in Vietnamese

    In recent years, visual question answering (VQA) has gained significant attention for its diverse applications, including intelligent car assistance,...

    Khiem Vinh Tran, Hao Phu Phan, ... Ngan Luu Thuy Nguyen in Multimedia Systems
    Article 06 July 2024
Did you find what you were looking for? Share feedback.