We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 101-120 of 10,000 results
  1. Recent advances in 3D Gaussian splatting

    The emergence of 3D Gaussian splatting (3DGS) has greatly accelerated rendering in novel view synthesis. Unlike neural implicit representations like...

    Tong Wu, Yu-Jie Yuan, ... Lin Gao in Computational Visual Media
    Article Open access 08 July 2024
  2. Differences with high probability and impossible differentials for the KB-256 cipher

    In this paper differences with probability 1 were found for 6 and 7 rounds of KB-256 block cipher. Also using Biham’s et al. shrinking technique we...

    R. Astrakhantsev, A. Chuhno, ... I. Astrakhantseva in Journal of Computer Virology and Hacking Techniques
    Article 08 July 2024
  3. An experimental evaluation of Siamese Neural Networks for robot localization using omnidirectional imaging in indoor environments

    The objective of this paper is to address the localization problem using omnidirectional images captured by a catadioptric vision system mounted on...

    Juan José Cabrera, Vicente Román, ... Luis Payá in Artificial Intelligence Review
    Article Open access 08 July 2024
  4. Deep learning for lungs cancer detection: a review

    Although lung cancer has been recognized to be the deadliest type of cancer, a good prognosis and efficient treatment depend on early detection....

    Rabia Javed, Tahir Abbas, ... Riad Alharbey in Artificial Intelligence Review
    Article Open access 08 July 2024
  5. Centrality-based and similarity-based neighborhood extension in graph neural networks

    In recent years, Graph Neural Networks (GNNs) have become a key technique to address various graph-based machine learning tasks. Most of existing...

    Mohammadjavad Zohrabi, Saeed Saravani, Mostafa Haghir Chehreghani in The Journal of Supercomputing
    Article 08 July 2024
  6. DEKGCI: A double-ended recommendation model for integrating knowledge graph and user–item interaction graph

    User–item bipartite graphs and knowledge graphs are frequently employed in recommender systems due to their ability to provide rich information for...

    Ya**g Yang, Zeyu Zeng, ... Ruirui Shang in The Journal of Supercomputing
    Article 08 July 2024
  7. Efficient MST-based clustering with leader node selection and outlier edge cutting

    The clustering algorithm based on the minimum spanning tree (MST) can identify clusters of different shapes. However, the minimum spanning tree...

    Yuzhuo Yao, Yong Zheng, Wei Li in The Journal of Supercomputing
    Article 08 July 2024
  8. CSSLnO: Cat Swarm Sea Lion Optimization-based deep learning for fake news detection from social media

    Social media has effectively shortened the time for the distribution of information, which sometimes carry news when compared to traditional methods....

    Kanthi Kiran Sirra, Shashi Mogalla, Kandalam Basamma Madhuri in International Journal of Information Technology
    Article 07 July 2024
  9. Autonomous military systems beyond human control: putting an empirical perspective on value trade-offs for autonomous systems design in the military

    The question of human control is a key concern in autonomous military systems debates. Our research qualitatively and quantitatively investigates...

    Christine Boshuijzen-van Burken, Martijn de Vries, ... Aylin Munyasya in AI & SOCIETY
    Article Open access 07 July 2024
  10. Analysis of blockchain system based on \(BMAP/PH^{[b]}/1\) queueing model

    In this modern era, the security and safety of financial and personal digital data are crucial considerations. Blockchain technology offers a secure...

    Srinivas R. Chakravarthy, Serife Ozkar, Shruti Goel in The Journal of Supercomputing
    Article 07 July 2024
  11. A fast verifiable fully homomorphic encryption technique for secret computation on cloud data

    In the domain of cloud computing, safeguarding the confidentiality and integrity of outsourced sensitive data during computational processes is of...

    Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty in International Journal of Information Technology
    Article 07 July 2024
  12. Intentionality gap and preter-intentionality in generative artificial intelligence

    The emergence of generative artificial intelligence, such as large language models and text-to-image models, has had a profound impact on society....

    Roberto Redaelli in AI & SOCIETY
    Article Open access 07 July 2024
  13. Analyzing resilient attention management of expert operators using functional resonance analysis method

    Manufacturing worksites have developed to have a socio-technical aspect with complex interactions between human operators, automated machines, and...

    Naruki Yasue, Tetsuo Sawaragi in Cognition, Technology & Work
    Article Open access 06 July 2024
  14. Navigating in a space of game views

    Game-theoretic modeling entails selecting the particular elements of a complex strategic situation deemed most salient for strategic analysis....

    Michael P. Wellman, Katherine Mayo in Autonomous Agents and Multi-Agent Systems
    Article 06 July 2024
  15. Robot remote control using virtual reality headset: studying sense of agency with subjective distance estimates

    Mobile robots have many applications in the modern world. The autonomy of robots is increasing, but critical cases like search and rescue missions...

    Artem S. Yashin, Daniil S. Lavrov, ... Ignat A. Dubynin in Virtual Reality
    Article Open access 06 July 2024
  16. Subgraph matching-based reference placement for printed circuit board designs

    Reference placement is promising to handle the increasing complexity in printed circuit board (PCB) designs, which aims to find the isomorphism of...

    Ziran Zhu, Yilin Li, ... Yao-Wen Chang in The Journal of Supercomputing
    Article 06 July 2024
  17. A clarity and fairness aware framework for selecting workers in competitive crowdsourcing tasks

    Crowdsourcing is a powerful technique for accomplishing tasks that are difficult for machines but easy for humans. However, ensuring the quality of...

    Seyyed Javad Bozorg Zadeh Razavi, Haleh Amintoosi, Mohammad Allahbakhsh in Computing
    Article 06 July 2024
  18. Virtualism: how AI replaces reality

    This paper traces the shift from the age of realism to the age of virtualism we are currently witnessing. To do so, I draw on older theories...

    Jan Söffner in AI & SOCIETY
    Article Open access 06 July 2024
  19. Application of Histopathology Image Analysis Using Deep Learning Networks

    As the rise in cancer cases, there is an increasing demand to develop accurate and rapid diagnostic tools for early intervention. Pathologists are...

    Md Shamim Hossain, Leisa J. Armstrong, ... Pauline Zaenker in Human-Centric Intelligent Systems
    Article Open access 06 July 2024
Did you find what you were looking for? Share feedback.