We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 10,000 results
  1. Nominal Marker “de” in Modern Chinese and Its Role of Marking Presupposition

    Based on the studies on the nominalization marker “de” in modern Chinese, the notion of the presupposition, and the theory of systematic functional...
    Conference paper 2021
  2. Separators in Continuous Petri Nets

    Leroux has proved that unreachability in Petri nets can be witnessed by a Presburger separator, i.e. if a marking...
    Conference paper Open access 2022
  3. Packet Filtering Mechanism to Defend Against DDoS Attack in Blockchain Network

    With the tremendous increase in the Blockchain network scale, and Cryptocurrency network, the Distributed Denial of Service (DDoS) attacks create...
    N. Sundareswaran, S. Sasirekha in Evolutionary Computing and Mobile Sustainable Networks
    Conference paper 2022
  4. Blocksequences of k-local Words

    The locality of words is a relatively young structural complexity measure, introduced by Day et al. in 2017 in order to define classes of patterns...
    Pamela Fleischmann, Lukas Haschke, ... Judith Wiedenbeck in SOFSEM 2021: Theory and Practice of Computer Science
    Conference paper 2021
  5. Automated Reporting of Code Quality Issues in Student Submissions

    Despite its importance in industry, code quality is often overlooked in academia. A number of automated tools to report code quality have been...
    Oscar Karnalim, Simon, ... Billy Susanto Panca in Towards a Collaborative Society Through Creative Learning
    Conference paper 2023
  6. The Use of Binary Scales in Rubrics to Evaluate Computer Science Assessments

    Creating a rubric for project based assessment in ICT modules is a complex process and can be quite subjective if the wrong scales are used for...
    Jacqui Muller, Japie J. Greeff in ICT Education
    Conference paper 2022
  7. Two-step learning for crowdsourcing data classification

    Crowdsourcing learning (Bonald and Combes 2016 ; Dawid and Skene, J R Stat Soc: Series C (Appl Stat), 28(1):20–28 1979 ; Karger et al. 2011 ; Li et al,...

    Hao Yu, Jiaye Li, ... Lei Zhu in Multimedia Tools and Applications
    Article 09 July 2022
  8. Application of Formative Assessment Model in College English Course Assisted by Digital Platforms---Taking HFUT as an Example

    With the help of internet and digital technology, online and blended teaching in institutions of higher learning in China are becoming a reality and...
    Conference paper 2023
  9. Enhancing Indian sign language recognition through data augmentation and visual transformer

    This paper introduces a novel approach to Indian Sign Language Recognition (ISLR) by integrating Keras, Visual Transformers (ViT), and sophisticated...

    Venus Singla, Seema Bawa, Jasmeet Singh in Neural Computing and Applications
    Article 13 May 2024
  10. A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development

    The rise in frequency and volume of Distributed Denial of Service (DDoS) attacks has made it a destructive weapon of attackers which can disrupt the...

    Amandeep Verma, Rahul Saha, ... Tai-Hoon-Kim in Multimedia Tools and Applications
    Article 06 May 2022
  11. Multimedia datasets for anomaly detection: a review

    Multimedia anomaly datasets play a crucial role in automated surveillance. They have a wide range of applications expanding from outlier objects/...

    Pratibha Kumari, Anterpreet Kaur Bedi, Mukesh Saini in Multimedia Tools and Applications
    Article 13 December 2023
  12. Localization-based waiter robot for dynamic environment using Internet of Things

    In response to the growing demand for robotic service providers in the hospitality industry, this work presents a cost-effective IoT-based waiter...

    Muhammad Waqas Qaisar, Muhammad Mudassir Shakeel, ... Ahmed Zubair Jan in International Journal of Information Technology
    Article 12 February 2024
  13. OLive-M: A SecANet  Use Case for Model-Based Obstruction Solving

    The OLive-M approach in this chapter and the OLive-L approach in Chapter 5 will illustrate how the SecANet approach presented in Chapter 3 can be...
    Chapter Open access 2022
  14. Summarizing Key Insights

    In the unfolding narrative of technological evolution, Generative AI emerges as a pivotal chapter, marking the confluence of computational precision...
    Chapter 2024
  15. An End-to-End Practical System for Road Marking Detection

    Road marking is a special kind of symbol on the road surface, used to regulate the behavior of traffic participants. According to our survey, it...
    Chaonan Gu, **aoyu Wu, ... Lei Yang in Image and Graphics
    Conference paper 2019
  16. AIoT-CitySense: AI and IoT-Driven City-Scale Sensing for Roadside Infrastructure Maintenance

    The transformation of cities into smarter and more efficient environments relies on proactive and timely detection and maintenance of city-wide...

    Abdur Rahim Mohammad Forkan, Yong-Bin Kang, ... Prem Prakash Jayaraman in Data Science and Engineering
    Article Open access 19 December 2023
  17. Enhancing ASD classification through hybrid attention-based learning of facial features

    Autism spectrum disorder (ASD) is a multifaceted neurological developmental condition that manifests in diverse ways. It addresses the need for early...

    Inzamam Shahzad, Saif Ur Rehman Khan, ... ** Liu in Signal, Image and Video Processing
    Article 21 April 2024
  18. Nonlinear Instabilities in TCP-RED

    With the growing size and popularity of the Internet, congestion control has emerged as an important problem. Poor management of congestion can...
    Priya Ranjan, Eyad H. Abed, Richard J. La in Complex Dynamics in Communication Networks
    Chapter
  19. Label-free retraining for improved ground plane segmentation

    Due to increased potential applications of unmanned aerial vehicles over urban areas, algorithms for the safe landing of these devices have become...

    Furkan Eren Uzyıldırım, Mustafa Özuysal in Signal, Image and Video Processing
    Article 30 December 2022
  20. Watermarkable Public Key Encryption with Efficient Extraction Under Standard Assumptions

    The current state of the art in watermarked public-key encryption schemes under standard cryptographic assumptions suggests that extracting the...
    Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari in Security and Cryptography for Networks
    Conference paper 2022
Did you find what you were looking for? Share feedback.