We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 121-140 of 1,971 results
  1. A Quantitative Analysis Method of Itemized Requirement Traceability for Aircraft Development

    In order to adapt to the refined management of requirements traceability in the application mode of itemized requirements management, the paper...
    Dong Liang, Liu Kanwang, ... Dai **gli in Complex Systems Design & Management
    Conference paper 2021
  2. Dedicated Encoding-Streams Based Spatio-Temporal Framework for Dynamic Person-Independent Facial Expression Recognition

    The facial expression recognition (FER) task is widely considered in the modern human-machine platforms (human support robots) and the self-service...
    Mohamed Kas, Yassine Ruichek, ... Rochdi Messoussi in Computer Vision Systems
    Conference paper 2023
  3. Perspectives and Conclusion

    In this book, we started by describing the components of financial opinions as well as opinion sources in the financial domain. Then, we surveyed...
    Chung-Chi Chen, Hen-Hsen Huang, Hsin-Hsi Chen in From Opinion Mining to Financial Argument Mining
    Chapter Open access 2021
  4. A Variant with the Variable-Sharing Property of Brady’s 4-Valued Implicative Expansion BN4 of Anderson and Belnap’s Logic FDE

    A logic L has the “variable-sharing property” (VSP) if in all L-theorems of conditional form antecedent and consequent share at least a propositional...
    Gemma Robles in Logic and Argumentation
    Conference paper 2021
  5. Artificial general intelligence-based rational behavior detection using cognitive correlates for tracking online harms

    Expert systems possess human-like expertise for data analyzing as well as for decision-making. These systems are suitable in a situation, where a...

    Shahid Naseem, Adi Alhudhaif, ... Gwanggil Jeon in Personal and Ubiquitous Computing
    Article 21 January 2022
  6. A Method of Detecting Sensitive Information of Enterprise Asset Training Education Based on Machine Learning

    Enterprises inevitably involve sensitive information when organizing asset training and education activities. To ensure information security, a...
    Yihai Zhang, Chengliang Zhang, ... Jun Liu in e-Learning, e-Education, and Online Training
    Conference paper 2024
  7. Mobile App for Automation of Observational Instrument for Continuous Emotional Evaluation

    Emotions are psychophysiological expressions that are shown before a stimulus or situation, and their research in user experience environments has...
    Carlos Vicente-Tene, Pablo Torres-Carrión, Carina González in Applied Technologies
    Conference paper 2021
  8. Security Risk Estimation and Management in Autonomous Driving Vehicles

    Autonomous vehicles (AV) are intelligent information systems that perceive, collect, generate and disseminate information to improve knowledge to act...
    Abasi-amefon O. Affia, Raimundas Matulevičius, Rando Tõnisson in Intelligent Information Systems
    Conference paper Open access 2021
  9. Competences for Digital Transformation in Companies – An Analysis of Job Advertisements in Germany

    Digital transformation (DT) offers major improvement of a business by significantly changing its characteristics through the combination of...
    Frieda Ernst, Mana Ghofrani, ... Fynn-Hendrik Paul in Digital Economy. Emerging Technologies and Business Innovation
    Conference paper 2023
  10. Image and Perception of Royal Heritage and Eco-space of the Medium Towns in India: Reflection from Burdwan Royal Heritage Site

    With the rampant and rapid growth of urbanization of the develo** countries like India, especially from the last decade of the twentieth century,...
    Koyel Sarkar, Sanat Kumar Guchhait in Advanced Remote Sensing for Urban and Landscape Ecology
    Chapter 2023
  11. Source-Code-to-Object-Code Traceability Analysis for Airborne Software: A Case for Tool Support

    Industrial practise frequently warrants small, not so common verification activities, where dedicated tool support can significantly ease the...
    Chapter 2023
  12. Making System Calls

    So far, we have been learning the basics of assembly language itself—how to move, store, add, subtract, compare, branch, etc. Now that we have the...
    Jonathan Bartlett in Learn to Program with Assembly
    Chapter 2021
  13. Research on the Decision-Making Process of Civil Servant Resisting Open Data Based on Perceived Risks

    Based on the cognition of stakeholders, this paper reveals the decision-making process of civil servants resisting open data based on perceived...
    Conference paper 2021
  14. Taxonomy of competence models based on an integrative literature review

    An individual competence is one of the main human resources, which enables a person to operate in everyday life. A competence profile, formally...

    Nargiza Mikhridinova, Carsten Wolff, Wim Van Petegem in Education and Information Technologies
    Article Open access 19 February 2024
  15. AHP-MOORA Approach for Industrial Robot Selection in Car Paint: An Industrial Case Study

    Industrial robots are crucial elements of advanced manufacturing technologies because they allow manufacturing companies to generate high-quality...
    Ashish Yadav, Anand Jaiswal, Teena Singh in Advancements in Smart Computing and Information Security
    Conference paper 2024
  16. Combining Loop Shuffling and Code PolyMorphism for Enhanced AES Side-Channel Security

    Combining countermeasures against side-channel attacks represents a promising approach to defend against powerful attackers. Existing works on this...
    Nicolas Belleville, Loïc Masure in Constructive Side-Channel Analysis and Secure Design
    Conference paper 2024
  17. Attacklets to Test Anomaly Detectors for Critical Infrastructure

    Critical Infrastructure (CI), such as electric power generation and water treatment plants, are susceptible to attacks that lead the underlying...
    Salimah Liyakkathali, Gayathri Sugumar, Aditya Mathur in Applied Cryptography and Network Security Workshops
    Conference paper 2021
  18. Research on Information Fusion Method of English Teaching Reform Based on Reinforcement Learning

    The information of English teaching reform has such attributes as different time and space, heterogeneous form, etc., which brings difficulties to...
    Conference paper 2024
  19. [m]allotROPism: a metamorphic engine for malicious software variation development

    For decades, code transformations have been a vital open problem in the field of system security, especially for cases like malware mutation engines...

    Christos Lyvas, Christoforos Ntantogian, Christos Xenakis in International Journal of Information Security
    Article 03 March 2021
Did you find what you were looking for? Share feedback.