We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 9,972 results
  1. European Digital Sovereignty: A Layered Approach

    The paper uses a stack model to come to an estimation of the EU's digital capacities on the global stage. Digital capacities are hard to measure and...

    Haroon Sheikh in Digital Society
    Article Open access 18 November 2022
  2. Expected scalarised returns dominance: a new solution concept for multi-objective decision making

    In many real-world scenarios, the utility of a user is derived from a single execution of a policy. In this case, to apply multi-objective...

    Conor F. Hayes, Timothy Verstraeten, ... Patrick Mannion in Neural Computing and Applications
    Article Open access 05 July 2022
  3. A Review of Policy on Creative Industry for Sustainable Nation: A Malaysian Perspective

    The Malaysian Dasar Industri Kreatif Negara (DIKN), or the Malaysian National Creative Industry Policies, was launched in 2010 and created a list of...
    Syamsul Bahrin Zaibon, Asmidah Alwi, ... Shamsul Arrieya Ariffin in Computing and Informatics
    Conference paper 2024
  4. Polisma - A Framework for Learning Attribute-Based Access Control Policies

    Attribute-based access control (ABAC) is being widely adopted due to its flexibility and universality in capturing authorizations in terms of the...
    Amani Abu Jabal, Elisa Bertino, ... Dinesh Verma in Computer Security – ESORICS 2020
    Conference paper 2020
  5. Multi-view and multi-augmentation for self-supervised visual representation learning

    In the real world, the appearance of identical objects depends on factors as varied as resolution, angle, illumination conditions, and viewing...

    Van Nhiem Tran, Chi-En Huang, ... Jia-Ching Wang in Applied Intelligence
    Article 16 December 2023
  6. Difference rewards policy gradients

    Policy gradient methods have become one of the most popular classes of algorithms for multi-agent reinforcement learning. A key challenge, however,...

    Jacopo Castellini, Sam Devlin, ... Rahul Savani in Neural Computing and Applications
    Article Open access 11 November 2022
  7. AutoQNN: An End-to-End Framework for Automatically Quantizing Neural Networks

    Exploring the expected quantizing scheme with suitable mixed-precision policy is the key to compress deep neural networks (DNNs) in high efficiency...

    Cheng Gong, Ye Lu, ... Tao Li in Journal of Computer Science and Technology
    Article 01 March 2024
  8. Scheduling of Elastic Message Passing Applications on HPC Systems

    Elastic parallel applications that can change the number of processors while being executed promise improved application and system performance,...
    Debolina Halder Lina, Sheikh Ghafoor, Thomas Hines in Job Scheduling Strategies for Parallel Processing
    Conference paper 2023
  9. Short attribute-based signatures for arbitrary Turing machines from standard assumptions

    This paper presents the first attribute-based signature ( ABS ) scheme supporting signing policies representable by Turing machines ( TM ), based on well-s...

    Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay in Designs, Codes and Cryptography
    Article Open access 17 January 2023
  10. A big data study of language use and impact in radio broadcasting in China

    Broadcasting more educating and language-reviving contents are ways radio stations can help revitalize the use of the English language in the Hunan...

    Ruihua Zhang, **cheng Zhou, ... Jude Osamor in Journal of Cloud Computing
    Article Open access 03 March 2023
  11. Flexible Runtime Security Enforcement with Tagged C

    We introduce Tagged C, a novel C variant with built-in tag-based reference monitoring that can be enforced by hardware mechanisms such as the PIPE...
    Sean Anderson, Allison Naaktgeboren, Andrew Tolmach in Runtime Verification
    Conference paper 2023
  12. Simulation Model to Assess Household Water Saving Devices in Bogota City

    This paper examines the Bogotá River basin in the Andes of Colombia, which is in a vulnerable state. In the medium term, it would be difficult to...
    Andrés Chavarro, Mónica Castañeda, ... Isaac Dyner in Applied Informatics
    Conference paper 2024
  13. The integration of digital games in elementary schools: The principals’ point of view

    The goal of the current study was to examine the perceptions of elementary school principals regarding the value of integrating digital games in...

    Sofia Hodedatov, Orit Avidov-Ungar, Merav Hayak in Education and Information Technologies
    Article 05 March 2024
  14. Research on the Blockchain Technology Diffusion in China’s Supply-Chain Finance Industry

    The high level of risk in supply-chain finance can be overcome by the technical features of blockchain. To smooth the promotion and application of...
    Zhen Chen, Wenjie Yang in Knowledge and Systems Sciences
    Conference paper 2023
  15. Credit assignment in heterogeneous multi-agent reinforcement learning for fully cooperative tasks

    Credit assignment poses a significant challenge in heterogeneous multi-agent reinforcement learning (MARL) when tackling fully cooperative tasks....

    Kun Jiang, Wenzhang Liu, ... Changyin Sun in Applied Intelligence
    Article 26 October 2023
  16. Forecasting Model for the Number of Breeding Sows Based on Pig’s Months of Age Transfer and Improved Flower Pollination Algorithm-Back Propagation Neural Network

    Regulating the number of breeding sows (NBS) is crucial for pork supply–demand balance. Current forecasting methods for NBS fail to consider the...

    Haohao Song, Hongyu Zhang, ... Jiquan Wang in Applied Intelligence
    Article 30 April 2024
  17. AGRCNet: communicate by attentional graph relations in multi-agent reinforcement learning for traffic signal control

    Traffic signal control (TSC) can be described as a multi-agent cooperative game. To realize cooperation, multi-agent reinforcement learning (MARL) is...

    Tinghuai Ma, Kexing Peng, ... Yurong Qian in Neural Computing and Applications
    Article 30 July 2023
  18. Modeling and simulation of smart grid-aware edge computing federations

    Compute-intensive Internet of Things (IoTs) applications have led to the edge computing paradigm. Edge computing decentralizes the IT infrastructure...

    Román Cárdenas, Patricia Arroba, ... José M. Moya in Cluster Computing
    Article Open access 11 November 2022
  19. Technological Citizenship in Times of Digitization: An Integrative Framework

    This article introduces an integrative framework for technological citizenship, examining the impact of digitization and the active roles of citizens...

    Anne Marte Gardenier, Rinie van Est, Lambèr Royakkers in Digital Society
    Article Open access 13 May 2024
  20. The rise of “security and privacy”: bibliometric analysis of computer privacy research

    The study of security and computer privacy has become a significant focus in security and privacy research. To reflect a website's, service's, or...

    Auwal Shehu Ali, Zarul Fitri Zaaba, Manmeet Mahinderjit Singh in International Journal of Information Security
    Article 31 October 2023
Did you find what you were looking for? Share feedback.