We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 2,372 results
  1. Locally optimum watermark decoder based on fast quaternion generic polar complex exponential transform

    Digital image watermarking, as an important image content security protection technology, has higher research value. It is well-known that...

    Si-yu Zhang, Chun-peng Wang, ... Shi-qing Gao in Multimedia Tools and Applications
    Article 02 December 2023
  2. A systematic decision-making framework for tackling quantum software engineering challenges

    Quantum computing systems harness the power of quantum mechanics to execute computationally demanding tasks more effectively than their classical...

    Muhammad Azeem Akbar, Arif Ali Khan, Saima Rafi in Automated Software Engineering
    Article Open access 26 July 2023
  3. Decision Tree Learning

    Given a training set, Decision Trees (DTs) [Quinlan, 1986] are predictive models represented as trees where each vertex represents a feature, or...
    Leonardo Vanneschi, Sara Silva in Lectures on Intelligent Systems
    Chapter 2023
  4. Detecting and approximating decision boundaries in low-dimensional spaces

    A method for detecting and approximating fault lines or surfaces, respectively, or decision curves in two and three dimensions with guaranteed...

    Matthias Grajewski, Andreas Kleefeld in Numerical Algorithms
    Article Open access 14 August 2023
  5. Decision-support system for safety and security assessment and management in smart cities

    Counter-terrorism measures and preparedness play a critical role in securing mass gatherings, soft targets, and critical infrastructures within urban...

    Javier González-Villa, Arturo Cuesta, ... Deniz Cetinkaya in Multimedia Tools and Applications
    Article Open access 23 June 2023
  6. Non-linear statistical image watermark detector

    Invisibility, robustness and payload are three indispensable and contradictory properties for any image watermarking systems. Recently, to achieve...

    **angyang Wang, Runtong Ma, ... Hongying Yang in Applied Intelligence
    Article 26 October 2023
  7. Sparse oblique decision trees: a tool to understand and manipulate neural net features

    The widespread deployment of deep nets in practical applications has lead to a growing desire to understand how and why such black-box methods...

    Suryabhan Singh Hada, Miguel Á. Carreira-Perpiñán, Arman Zharmagambetov in Data Mining and Knowledge Discovery
    Article 09 January 2023
  8. NSIWD: new statistical image watermark detector

    For any image watermarking algorithm, how to achieve the trade-off among robustness, imperceptibility, and watermark capacity is a challenging...

    **angyang Wang, Yupan Lin, ... Panpan Niu in Pattern Analysis and Applications
    Article 18 April 2023
  9. Trilevel Multi-criteria Decision Analysis Based on Three-Way Decision

    Based on the principles of three-way decision as thinking in threes, this paper proposes a framework of trilevel multi-criteria decision analysis...
    Chengjun Shi, Yiyu Yao in Intelligence Science III
    Conference paper 2021
  10. Locally optimum watermark decoder in NSST domain using RSS-based Cauchy distribution

    It is important to consider the tradeoff between imperceptibility and robustness requirements in develo** an image-watermarking technique, some...

    Pan-pan Niu, **n Shen, ... **ang-yang Wang in Multimedia Tools and Applications
    Article 31 August 2020
  11. Compact In-Memory Representation of Decision Trees in GPU-Accelerated Evolutionary Induction

    Decision trees (DTs) are popular techniques in the field of explainable machine learning. Traditionally, DTs are induced using a top-down greedy...
    Krzysztof Jurczuk, Marcin Czajkowski, Marek Kretowski in Parallel Processing and Applied Mathematics
    Conference paper 2023
  12. Locally refined quad meshing for linear elasticity problems based on convolutional neural networks

    In this paper we propose a method to generate suitably refined finite element meshes using neural networks. As a model problem we consider a linear...

    Chiu Ling Chan, Felix Scholz, Thomas Takacs in Engineering with Computers
    Article Open access 28 June 2022
  13. Triangle Attack: A Query-Efficient Decision-Based Adversarial Attack

    Decision-based attack poses a severe threat to real-world applications since it regards the target model as a black box and only accesses the hard...
    **aosen Wang, Zeliang Zhang, ... Wei Liu in Computer Vision – ECCV 2022
    Conference paper 2022
  14. Auxiliary criterion conversion via spatiotemporal semantic encoding and feature entropy for action recognition

    Video-based action recognition in realistic scenes is a core technology for human–computer interaction and smart surveillance. Although the...

    **aoyan Meng, Guoliang Zhang, ... **angyin Zhang in The Visual Computer
    Article 02 August 2020
  15. UDTCWT difference domain statistical decoder using vector-based Weibull PDF

    Invisibility, data payload and robustness are widely regarded as the three main attributes that are critical to any digital image watermarking...

    **angyang Wang, Yixuan Shen, ... Hongying Yang in Multimedia Tools and Applications
    Article 20 May 2022
  16. Hybrid metaheuristics for selective inference task offloading under time and energy constraints for real-time IoT sensing systems

    The recent widespread of AI-powered real-time applications necessitates the use of edge computing for inference task offloading. Power constrained...

    Abdelkarim Ben Sada, Amar Khelloufi, ... Sahraoui Dhelim in Cluster Computing
    Article Open access 19 June 2024
  17. On probability-raising causality in Markov decision processes

    The purpose of this paper is to introduce a notion of causality in Markov decision processes based on the probability-raising principle and to...
    Christel Baier, Florian Funke, ... Robin Ziemek in Foundations of Software Science and Computation Structures
    Conference paper Open access 2022
  18. Autonomous learning for fuzzy systems: a review

    As one of the three pillars in computational intelligence, fuzzy systems are a powerful mathematical tool widely used for modelling nonlinear...

    **aowei Gu, Jungong Han, ... Plamen P. Angelov in Artificial Intelligence Review
    Article Open access 15 December 2022
  19. Adding Decision Management to Robotic Process Automation

    Robotic Process Automation promises to release employees from repetitive and monotonous work, providing space for creative and innovative tasks. RPA...
    Maximilian Völker, Simon Siegert, Mathias Weske in Business Process Management: Blockchain and Robotic Process Automation Forum
    Conference paper 2021
  20. RDWT domain statistical watermark detector using FRHFMs magnitudes and bivariate Cauchy-Rayleigh distribution

    Imperceptibility, robustness and data payload, which are complimentary to each other, are widely considered as the three main properties vital for...

    Pan-pan Niu, Fei Wang, ... **ang-yang Wang in Multimedia Tools and Applications
    Article 14 March 2022
Did you find what you were looking for? Share feedback.