We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 9,972 results
  1. Research on Authorization Model of Attribute Access Control Based on Knowledge Graph

    Knowledge graph is an extended graphical data structure tool that can store interrelated data and visually display the relationships between...
    Li Ma, Qidi Lao, ... Zhaoxiong Bu in Ubiquitous Security
    Conference paper 2024
  2. Bringing AIED, Public Policy and GDPR to Promote Educational Opportunities in Brazil

    This article explores the intersection between Artificial Intelligence in Education (AIED), public policies, and the General Data Protection...
    Conference paper 2024
  3. Improving patient centric data retrieval and cyber security in healthcare: privacy preserving solutions for a secure future

    The healthcare industry is increasingly reliant on access to large volumes of patient data, which is critical for improving patient outcomes,...

    S. Arunprasath, Suresh Annamalai in Multimedia Tools and Applications
    Article 31 January 2024
  4. Technical Implementation Framework of AI Governance Policies for Cross-Modal Privacy Protection

    AI governance has been increasingly preeminent in digital world which presents a practical challenge of combining technical digital implementation...
    Yuxiao Lei, Yucong Duan, Mengmeng Song in Collaborative Computing: Networking, Applications and Worksharing
    Conference paper 2021
  5. Exploring Brazilian Teachers’ Perceptions and a priori Needs to Design Smart Classrooms

    Smart classrooms offer innovative opportunities to enhance teaching and learning. However, most existing research in this field predominantly focuses...

    Andreza Ferreira, Danielli Araújo Lima, ... Seiji Isotani in International Journal of Artificial Intelligence in Education
    Article 12 July 2024
  6. How scientific research incorporates policy: an examination using the case of China’s science and technology evaluation system

    Governments typically formulate sets of policies to guide the direction of scientific research. And the possible effects of these policies on...

    Yashan Li, **ge Mao, ... Ying Huang in Scientometrics
    Article 05 January 2022
  7. Malleable and Adaptive Ad-Hoc File System for Data Intensive Workloads in HPC Applications

    Advancement in storage technologies, such as NVMe and persistent memory, enables the acceleration of I/O operations in HPC systems. However, relying...
    Genaro Sanchez-Gallegos, Javier Garcia-Blas, ... Jesus Carretero in High Performance Computing
    Conference paper 2023
  8. Distributional offline continuous-time reinforcement learning with neural physics-informed PDEs (SciPhy RL for DOCTR-L)

    This paper addresses distributional offline continuous-time reinforcement learning (DOCTR-L) with stochastic policies for high-dimensional optimal...

    Article 15 December 2023
  9. Security on Top of Security: Detecting Malicious Firewall Policy Changes via K-Means Clustering

    As a company grows, so does its infrastructure—especially its information technology (IT) infrastructure. Maintaining a transparent and manageable...
    Mads Solberg Collingwood Pyke, Weizhi Meng, Brooke Lampe in Machine Learning for Cyber Security
    Conference paper 2024
  10. A survey of automated data augmentation algorithms for deep learning-based image classification tasks

    In recent years, one of the most popular techniques in the computer vision community has been the deep learning technique. As a data-driven...

    Zihan Yang, Richard O. Sinnott, ... Qiuhong Ke in Knowledge and Information Systems
    Article Open access 17 March 2023
  11. SCRUB: a novel energy-efficient virtual machines selection and migration scheme in cloud data centers

    The extensive deployment of large cloud data centers has led to substantial energy consumption. Energy conservation is a critical concern for cloud...

    Mohammad Yekta, Hadi Shahriar Shahhoseini in Cluster Computing
    Article 18 June 2024
  12. Windows Registry Forensics Part 2

    In Chapter 5 , you were provided a general introduction to the Windows Registry and to specific keys that are...
    Chuck Easttom, William Butler, ... Zehra Naseer in Windows Forensics
    Chapter 2024
  13. Electronic Simple European Network Services (e-SENS) Social Media Analysis for Interoperability on Twitter

    Over the last two decades, research on e-Government found that e-government is a strategy to increase the effectiveness of public service policies...
    Wahdania Suardi, Achmad Nurmandi, ... Zarina Zulkifli in HCI International 2023 Posters
    Conference paper 2023
  14. Synthetic Individual Income Tax Data: Methodology, Utility, and Privacy Implications

    The United States Internal Revenue Service Statistics of Income (SOI) Division possesses invaluable administrative tax data from individual income...
    Claire McKay Bowen, Victoria Bryant, ... Noah Zwiefel in Privacy in Statistical Databases
    Conference paper 2022
  15. Additional Essential ECRM Program Elements

    The ECRM Program and Cybersecurity Strategy topics and related documentation covered in this chapter are education and training, automation and...
    Chapter 2024
  16. Platform-independent and curriculum-oriented intelligent assistant for higher education

    Miscommunication between instructors and students is a significant obstacle to post-secondary learning. Students may skip office hours due to...

    Ramteja Sajja, Yusuf Sermet, ... Ibrahim Demir in International Journal of Educational Technology in Higher Education
    Article Open access 24 July 2023
  17. The many publics of science: using altmetrics to identify common communication channels by scientific field

    Altmetrics have led to new quantitative studies of science through social media interactions. However, there are no models of science communication...

    Daniel Torres-Salinas, Domingo Docampo, ... Nicolas Robinson-Garcia in Scientometrics
    Article 20 June 2024
  18. Scalability and performance analysis of BDPS in clouds

    The increasing demand for big data processing leads to commercial off-the-shelf (COTS) and cloud-based big data analytics services. Giant cloud...

    Yuegang Li, Dongyang Ou, ... Christophe Cérin in Computing
    Article 14 February 2022
  19. Sentiment analysis of tweets on social security and medicare

    The field of politics can be greatly aided through the use of natural language processing techniques on places like social media. Twitter hosts...

    Unmesh Kumar Chakravarty, Shaikh Arifuzzaman in Social Network Analysis and Mining
    Article 17 April 2024
Did you find what you were looking for? Share feedback.