We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Deep contrastive multi-view clustering with doubly enhanced commonality

    Recently, deep multi-view clustering leveraging autoencoders has garnered significant attention due to its ability to simultaneously enhance feature...

    Zhiyuan Yang, Changming Zhu, Zishi Li in Multimedia Systems
    Article 04 July 2024
  2. Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunication

    The study of continuous natural or industrial phenomena in time and space requires the emergence of new wireless sensor networks. A virtual sensor...

    Adda Boualem, Marwane Ayaida, ... Hichem Sedjelmaci in Cluster Computing
    Article 04 July 2024
  3. Quality evaluation methods of handwritten Chinese characters: a comprehensive survey

    Quality evaluation of handwritten Chinese characters aims to automatically quantify and assess handwritten Chinese characters through computer vision...

    Weiran Chen, Jiaqi Su, ... Chun** Liu in Multimedia Systems
    Article 04 July 2024
  4. Expediting the design and development of secure cloud-based mobile apps

    The adoption and popularity of mobile devices by end-users is partially driven by the increasing development and availability of mobile applications...

    Francisco T. Chimuco, Joāo B. F. Sequeiros, ... Pedro R. M. Inácio in International Journal of Information Security
    Article Open access 04 July 2024
  5. PULSE: Proactive uncovering of latent severe anomalous events in IIoT using LSTM-RF model

    In the IIoT, billions of devices continually provide information that is extremely diverse, variable, and large-scale and presents significant...

    Sangeeta Sharma, Priyanka Verma, ... Rakesh Porika in Cluster Computing
    Article 04 July 2024
  6. FEF-Net: feature enhanced fusion network with crossmodal attention for multimodal humor prediction

    Humor segment prediction in video involves the comprehension and analysis of humor. Traditional humor prediction has been text-based; however, with...

    Peng Gao, Chuanqi Tao, Donghai Guan in Multimedia Systems
    Article 04 July 2024
  7. Exploring behaviours of RESTful APIs in an industrial setting

    A common way of exposing functionality in contemporary systems is by providing a Web-API based on the REST API architectural guidelines. To describe...

    Stefan Karlsson, Robbert Jongeling, ... Daniel Sundmark in Software Quality Journal
    Article Open access 03 July 2024
  8. Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features

    Phishing attacks are the biggest cybersecurity threats in the digital world. Attackers exploit users by impersonating real, authentic websites to...

    Yahya Tashtoush, Moayyad Alajlouni, ... Omar Darwish in Cluster Computing
    Article 03 July 2024
  9. A comparative study of software defect binomial classification prediction models based on machine learning

    As information technology continues to advance, software applications are becoming increasingly critical. However, the growing size and complexity of...

    Hongwei Tao, **aoxu Niu, ... Yang **an in Software Quality Journal
    Article 03 July 2024
  10. Integrated multi-view modeling for reliable machine learning-intensive software engineering

    Development of machine learning (ML) systems differs from traditional approaches. The probabilistic nature of ML leads to a more experimentative...

    Jati H. Husen, Hironori Washizaki, ... Hironori Takeuchi in Software Quality Journal
    Article Open access 03 July 2024
  11. Empowering e-learning approach by the use of federated edge computing

    Federated learning (FL) is a decentralized approach to training machine learning model. In the traditional architecture, the training requires...

    Nouha Arfaoui, Amel Ksibi, ... Ridha Ejbali in Cluster Computing
    Article 03 July 2024
  12. Efficient base station deployment in specialized regions with splitting particle swarm optimization algorithm

    Signal coverage quality and intensity distribution in complex environments pose a critical challenge, particularly evident in high-density personnel...

    Jiaying Shen, Donglin Zhu, ... Shi Cheng in World Wide Web
    Article 02 July 2024
  13. A channel-gained single-model network with variable rate for multispectral image compression in UAV air-to-ground remote sensing

    Unmanned aerial vehicle (UAV) air-to-ground remote sensing technology, has the advantages of long flight duration, real-time image transmission, wide...

    Wei Wang, Daiyin Zhu, Kedi Hu in Multimedia Systems
    Article 02 July 2024
  14. Bridging distribution gaps: invariant pattern discovery for dynamic graph learning

    Temporal graph networks (TGNs) have been proposed to facilitate learning on dynamic graphs which are composed of interaction events among nodes....

    Yucheng **, Maoyi Wang, ... Haoran Chen in World Wide Web
    Article 02 July 2024
  15. Metaheuristic algorithms and their applications in wireless sensor networks: review, open issues, and challenges

    Metaheuristic algorithms have wide applicability, particularly in wireless sensor networks (WSNs), due to their superior skill in solving and...

    Essam H. Houssein, Mohammed R. Saad, ... Hassan Shaban in Cluster Computing
    Article Open access 02 July 2024
  16. Service selection based on blockchain smart contracts in cloud-edge environment

    The rapid integration of cloud computing and edge computing has brought the cloud-edge environment into the spotlight in information technology....

    Yingying Ning, **g Li, ... Chuanxi Liu in Cluster Computing
    Article 02 July 2024
  17. Blockchain enabled secure pharmaceutical supply chain framework with traceability: an efficient searchable pharmachain approach

    The complex networks of manufacturers, suppliers, retailers, and customers that make up today’s pharmaceutical supply chain span worldwide. As it is,...

    Rahul Mishra, Dharavath Ramesh, ... Bhaskar Mondal in Cluster Computing
    Article 02 July 2024
  18. An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing

    Nowadays, the need for cloud computing has increased due to the exponential growth in information transmission. Cybercriminals are persistent in...

    Pranav Shrivastava, Bashir Alam, Mansaf Alam in Cluster Computing
    Article 02 July 2024
  19. Multi-party codebook distribution strategy based on secret sharing

    The paper addresses the issue of secure distribution of codebooks in the field of information security, particularly in the domain of covert...

    Wei She, Haige Feng, ... Wei Liu in International Journal of Information Security
    Article 02 July 2024
Did you find what you were looking for? Share feedback.