Search
Search Results
-
Data Dissemination in Opportunistic Networks
Data dissemination is the main research and implementation challenge in opportunistic networks. It addresses the question of how to forward data in a... -
Secure data dissemination and routing in Internet of Things
In recent years, the widespread adoption of Internet of Things applications has significantly enhanced user experiences, productivity, and security...
-
Filtering Safe Temporal Motifs in Dynamic Graphs for Dissemination Purposes
In this paper, we address the challenges posed by dynamic networks in various domains, such as bioinformatics, social network analysis, and computer... -
International Principles for the Publication and Dissemination of Scientific Data
AbstractThe paper considers the essence, advantages, and problems of a new and popular approach to the dissemination of scientific data, which were...
-
Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code
AbstractThis article analyzes the existing methods for searching for software vulnerabilities. For methods using deep learning models on a graph...
-
What Boosts Fake News Dissemination on Social Media? A Causal Inference View
There has been an upward trend of fake news propagation on social media. To solve the fake news propagation problem, it is crucial to understand... -
PolitiKweli: A Swahili-English Code-Switched Twitter Political Misinformation Classification Dataset
In the age of freedom of speech, users of the various social media platforms post millions of unverified messages, resulting in misinformation.... -
What makes a code review useful to OpenDev developers? An empirical investigation
ContextDue to the association of significant efforts, even a minor improvement in the effectiveness of Code Reviews(CR) can incur significant savings...
-
Metrics for Code Smells of ML Pipelines
ML pipelines, as key components of ML systems, shall be developed following quality assurance techniques. Unfortunately, it is often the case in... -
A fake threshold visual cryptography of QR code
Visual cryptography (VC) is a technique that can encrypt images without complicated calculation. As the image, the quick response (QR) code can also...
-
A novel method using LSTM-RNN to generate smart contracts code templates for improved usability
Recently, the development of blockchain technology has given us an opportunity to improve the security and trustworthiness of multimedia. With the...
-
Code of Conduct for Web 3.0
The previous chapters introduced what technologies are used in the Web 3.0 era, and in addition introduced the application scenarios of these... -
Secure Data Storage in Cloud Computing Using Code Based McEliece and NTRU Cryptosystems
Information must be kept private and secure because it is shared when people communicate online, making data protection essential. Data sharing is a...
-
A data distribution scheme for VANET based on fountain code
Data dissemination is one of the applications used to provide infotainment to the end-users in vehicular ad hoc networks (VANET). During this...
-
A Software Vulnerability Prediction Model Using Traceable Code Patterns and Software Metrics
The goal of this research is to build a vulnerability prediction model to assist developers in evaluating the security of software systems during the...
-
Dissemination of Misinformation About COVID-19 on TikTok: A Multimodal Analysis
TikTok, a globally popular social media platform, that gained even more popularity amongst different age groups since the outbreak of COVID-19, has... -
A Mask-Based Logic Rules Dissemination Method for Sentiment Classifiers
Disseminating and incorporating logic rules inspired by domain knowledge in Deep Neural Networks (DNNs) is desirable to make their output causally... -
Asymptotically Optimal Message Dissemination with Applications to Blockchains
Messages in large-scale networks such as blockchain systems are typically disseminated using flooding protocols, in which parties send the message to... -
Social media text analytics of Malayalam–English code-mixed using deep learning
Zigzag conversational patterns of contents in social media are often perceived as noisy or informal text. Unrestricted usage of vocabulary in social...
-
SUDV: Malicious fog node management framework for software update dissemination in connected vehicles
Modern vehicles are developed with increasing levels of automation and connectivity. To improve the driving experience, the software requires...