![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
909 Result(s)
-
Chapter and Conference Paper
Quality-of-Service Degradation in Distributed Instrumentation Systems Through Poisoning of 5G Beamforming Algorithms
Instrumentation systems are essential in many critical applications such as air defense and natural disaster prediction and control. In these systems, the Quality-of-Service, measurement capacity, resilience, ...
-
Chapter and Conference Paper
Spatial-Slice Feature Learning Using Visual Transformer and Essential Slices Selection Module for COVID-19 Detection of CT Scans in the Wild
Computed tomography (CT) imaging could be convenient for diagnosing various diseases. However, the CT images could be diverse since their resolution and number of slices are determined by the machine and its s...
-
Chapter and Conference Paper
The Combination of Background Subtraction and Convolutional Neural Network for Product Recognition
Multi-class retail product recognition is an important Computer Vision application for the retail industry. Track 4 of the AICITY challenge is introduced for the retail industry. This track focuses on the accu...
-
Chapter and Conference Paper
Modelling Cycles in Brain Networks with the Hodge Laplacian
Cycles or loops in a network embed higher-order interactions beyond pairwise relations. The cycles are essential for the parallel processing of information and enable feedback loops. Despite the fundamental im...
-
Chapter and Conference Paper
Don’t Wait Until the Accident Happens: Few-Shot Classification Framework for Car Accident Inspection in a Real World
Car accident inspection is a binary classification task to recognize whether a given car image includes a damaged surface or not. While the prior studies utilized various computer vision algorithms under the f...
-
Chapter and Conference Paper
Gaze-Contingent Screen Magnification Control: A Preliminary Study
People with low vision often use screen magnification software. Screen magnification requires continuous control of the onscreen content by moving the focus of magnification with the mouse or the trackpad. In ...
-
Chapter and Conference Paper
Semantic Modeling of Programming Practices with Local Knowledge Graphs: The Effects of Question Complexity on Student Performance
Questions are one of the most essential assessment components in education. Although the delivery of questions has been revolutionized by technologies like intelligent tutoring systems (ITS), questions generat...
-
Chapter and Conference Paper
Programming Question Generation by a Semantic Network: A Preliminary User Study with Experienced Instructors
Questions are widely used in various instructional designs in education. Creating questions can be challenging and time-consuming. It requires not only the expertise of the learning content but also the experi...
-
Chapter and Conference Paper
Augmentation of rPPG Benchmark Datasets: Learning to Remove and Embed rPPG Signals via Double Cycle Consistent Learning from Unpaired Facial Videos
Remote estimation of human physiological condition has attracted urgent attention during the pandemic of COVID-19. In this paper, we focus on the estimation of remote photoplethysmography (rPPG) from facial vi...
-
Chapter and Conference Paper
An Incentive Dispatch Algorithm for Utilization-Perfect EV Charging Management
Due to the rapid growth of electric vehicles (EVs), the charging scheduling of EVs has become highly important. In order to reduce the total operating cost, how to arrange the charging of each EV becomes the m...
-
Chapter and Conference Paper
Gaussian Mixture Model-Based Registration Network for Point Clouds with Partial Overlap
Mainstream methods of point cloud registration can be divided into two categories: strict point-level correspondence, which is commonly used but incompatible with real-world data; and statistical calculations,...
-
Chapter and Conference Paper
A Note on the Post-quantum Security of (Ring) Signatures
This work revisits the security of classical signatures and ring signatures in a quantum world. For (ordinary) signatures, we focus on the arguably preferable security notion of blind-unforgeability recently prop...
-
Chapter and Conference Paper
Collusion-Resistant Functional Encryption for RAMs
In recent years, functional encryption (FE) has established itself as one of the fundamental primitives in cryptography. The choice of model of computation to represent the functions associated with the functi...
-
Chapter and Conference Paper
Constant-Round Blind Classical Verification of Quantum Sampling
In a recent breakthrough, Mahadev constructed a classical verification of quantum computation (CVQC) protocol for a classical client to delegate decision problems in
-
Chapter and Conference Paper
A Heuristic Repair Algorithm for the Maximum Stable Marriage Problem with Ties and Incomplete Lists
This paper proposes a heuristic repair algorithm to find a maximum weakly stable matching for the stable marriage problem with ties and incomplete lists. Our algorithm is designed including a well-known Gale-S...
-
Chapter and Conference Paper
Regarding the Virtual Reality Environment Design and Evaluation Based on STEAM Learning
This study aims to design a STEAM virtual reality (VR) learning environment for engineering students, as well as evaluate the practicability of the learning environment. This study adopted Fuzzy Delphi Method ...
-
Chapter and Conference Paper
Lattice Paths for Persistent Diagrams
Persistent homology has undergone significant development in recent years. However, one outstanding challenge is to build a coherent statistical inference procedure on persistent diagrams. In this paper, we fi...
-
Chapter and Conference Paper
Oral Practice Language Learning Companion Implementation on Voice Assistant Platform
Oral practice for language learning usually needs to find partners or teachers to accompany, no matter how patient they are, it’s not easy to stay for a long-time conversation practice. This study tries to imp...
-
Chapter and Conference Paper
Labeling Chest X-Ray Reports Using Deep Learning
One of the primary challenges in the development of Chest X-Ray (CXR) interpretation models has been the lack of large datasets with multilabel image annotations extracted from radiology reports. This paper pr...
-
Chapter and Conference Paper
Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V Processor
In ICISC 2020, 64-bit PIPO lightweight block cipher was presented. The main design goals of PIPO are the implementation-friendly and the ease of designing side-channel protection techniques. Until now, the per...