We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 7,823 results
  1. Data Dissemination in Opportunistic Networks

    Data dissemination is the main research and implementation challenge in opportunistic networks. It addresses the question of how to forward data in a...
    Anna Förster, Pietro Manzoni, ... Asanga Udugama in Opportunistic Networks
    Chapter 2024
  2. Secure data dissemination and routing in Internet of Things

    In recent years, the widespread adoption of Internet of Things applications has significantly enhanced user experiences, productivity, and security...

    S. Gangadharaiah, Lokesh B. Bhajantri in International Journal of Information Technology
    Article 28 April 2024
  3. Filtering Safe Temporal Motifs in Dynamic Graphs for Dissemination Purposes

    In this paper, we address the challenges posed by dynamic networks in various domains, such as bioinformatics, social network analysis, and computer...
    Carolina Jerônimo, Simon Malinowski, ... Silvio Jamil F. Guimarães in Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
    Conference paper 2024
  4. International Principles for the Publication and Dissemination of Scientific Data

    Abstract

    The paper considers the essence, advantages, and problems of a new and popular approach to the dissemination of scientific data, which were...

    A. O. Erkimbaev, V. Yu. Zitserman, ... A. V. Kosinov in Scientific and Technical Information Processing
    Article 01 June 2022
  5. Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code

    Abstract

    This article analyzes the existing methods for searching for software vulnerabilities. For methods using deep learning models on a graph...

    G. S. Kubrin, D. P. Zegzhda in Automatic Control and Computer Sciences
    Article 01 December 2023
  6. What Boosts Fake News Dissemination on Social Media? A Causal Inference View

    There has been an upward trend of fake news propagation on social media. To solve the fake news propagation problem, it is crucial to understand...
    Yichuan Li, Kyumin Lee, ... Ruocheng Guo in Advances in Knowledge Discovery and Data Mining
    Conference paper 2023
  7. PolitiKweli: A Swahili-English Code-Switched Twitter Political Misinformation Classification Dataset

    In the age of freedom of speech, users of the various social media platforms post millions of unverified messages, resulting in misinformation....
    Cynthia Amol, Lilian Wanzare, James Obuhuma in Speech and Language Technologies for Low-Resource Languages
    Conference paper 2024
  8. What makes a code review useful to OpenDev developers? An empirical investigation

    Context

    Due to the association of significant efforts, even a minor improvement in the effectiveness of Code Reviews(CR) can incur significant savings...

    Asif Kamal Turzo, Amiangshu Bosu in Empirical Software Engineering
    Article 22 November 2023
  9. Metrics for Code Smells of ML Pipelines

    ML pipelines, as key components of ML systems, shall be developed following quality assurance techniques. Unfortunately, it is often the case in...
    Dolors Costal, Cristina Gómez, Silverio Martínez-Fernández in Product-Focused Software Process Improvement
    Conference paper 2024
  10. A fake threshold visual cryptography of QR code

    Visual cryptography (VC) is a technique that can encrypt images without complicated calculation. As the image, the quick response (QR) code can also...

    Tao Liu, Bin Yan, ... Jeng-Shyang Pan in Multimedia Tools and Applications
    Article 30 April 2022
  11. A novel method using LSTM-RNN to generate smart contracts code templates for improved usability

    Recently, the development of blockchain technology has given us an opportunity to improve the security and trustworthiness of multimedia. With the...

    Zhihao Hao, Bob Zhang, ... Cheng-Zhong Xu in Multimedia Tools and Applications
    Article 06 April 2023
  12. Code of Conduct for Web 3.0

    The previous chapters introduced what technologies are used in the Web 3.0 era, and in addition introduced the application scenarios of these...
    Chapter 2024
  13. Secure Data Storage in Cloud Computing Using Code Based McEliece and NTRU Cryptosystems

    Information must be kept private and secure because it is shared when people communicate online, making data protection essential. Data sharing is a...

    Geetha Rani E, Chetana Tukkoji in SN Computer Science
    Article 04 April 2024
  14. A data distribution scheme for VANET based on fountain code

    Data dissemination is one of the applications used to provide infotainment to the end-users in vehicular ad hoc networks (VANET). During this...

    Jianhang Liu, Jiebing Wang, ... Xuerong Cui in The Journal of Supercomputing
    Article 11 May 2022
  15. A Software Vulnerability Prediction Model Using Traceable Code Patterns and Software Metrics

    The goal of this research is to build a vulnerability prediction model to assist developers in evaluating the security of software systems during the...

    Kazi Zakia Sultana, Charles B. Boyd, Byron J. Williams in SN Computer Science
    Article 09 August 2023
  16. Dissemination of Misinformation About COVID-19 on TikTok: A Multimodal Analysis

    TikTok, a globally popular social media platform, that gained even more popularity amongst different age groups since the outbreak of COVID-19, has...
    Kesha A. Patel, Nirmalya Thakur in HCI International 2024 Posters
    Conference paper 2024
  17. A Mask-Based Logic Rules Dissemination Method for Sentiment Classifiers

    Disseminating and incorporating logic rules inspired by domain knowledge in Deep Neural Networks (DNNs) is desirable to make their output causally...
    Shashank Gupta, Mohamed Reda Bouadjenek, Antonio Robles-Kelly in Advances in Information Retrieval
    Conference paper 2023
  18. Asymptotically Optimal Message Dissemination with Applications to Blockchains

    Messages in large-scale networks such as blockchain systems are typically disseminated using flooding protocols, in which parties send the message to...
    Chen-Da Liu-Zhang, Christian Matt, Søren Eller Thomsen in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  19. Social media text analytics of Malayalam–English code-mixed using deep learning

    Zigzag conversational patterns of contents in social media are often perceived as noisy or informal text. Unrestricted usage of vocabulary in social...

    S. Thara, Prabaharan Poornachandran in Journal of Big Data
    Article Open access 26 April 2022
  20. SUDV: Malicious fog node management framework for software update dissemination in connected vehicles

    Modern vehicles are developed with increasing levels of automation and connectivity. To improve the driving experience, the software requires...

    Nadia Kalsoom, Asad Waqar Malik, ... Arsalan Ahmad in The Journal of Supercomputing
    Article 28 September 2022
Did you find what you were looking for? Share feedback.