default search action
FICC 2023: San Francisco, CA, USA
- Kohei Arai:
Advances in Information and Communication - Proceedings of the 2023 Future of Information and Communication Conference (FICC), Volume 2, San Francisco, CA, USA, 2-3 March 2023. Lecture Notes in Networks and Systems 652, Springer 2023, ISBN 978-3-031-28072-6 - Seonglim Lee, Jaehye Suk, Jinu Jung, Lu Tan, Xinyu Wang:
The Disabled's Learning Aspiration and E-Learning Participation. 1-10 - Gcinizwe Dlamini, Swati Megha, Sirojiddin Komolov:
Are CK Metrics Enough to Detect Design Patterns? 11-24 - Jalal Omer Atoum:
Detecting Cyberbullying from Tweets Through Machine Learning Techniques with Sentiment Analysis. 25-38 - Daniel Prado Cussi, V. E. Machaca Arceda:
DNA Genome Classification with Machine Learning and Image Descriptors. 39-58 - Jose Luis Gutierrez-Garcia, Eddy Sánchez-Delacruz, Maria del Pilar Pozos Parra:
A Review of Intrusion Detection Systems Using Machine Learning: Attacks, Algorithms and Challenges. 59-78 - Yatheendra Pravan Kidambi Murali, Carl Vogel, Khurshid Ahmad:
Head Orientation of Public Speakers: Variation with Emotion, Profession and Age. 79-95 - Kamil Samara:
Using Machine Learning to Identify Top Antecedents Affecting Crime in US Communities. 96-101 - Avery Leider, Gio Giorgio Abou Jaoude, Pauline Mosley:
Hybrid Quantum Machine Learning Classifier with Classical Neural Network Transfer Learning. 102-116 - Ryotaro Kamimura:
Repeated Potentiality Augmentation for Multi-layered Neural Networks. 117-134 - Shih Ping Lin, Sheng-De Wang:
SGAS-es: Avoiding Performance Collapse by Sequential Greedy Architecture Search with the Early Stopping Indicator. 135-154 - Nazneen Mansoor, Alexander Iliev:
Artificial Intelligence in Forensic Science. 155-163 - Valeriya Zanina, Gcinizwe Dlamini, Vadim Palyonov:
Deep Learning Based Approach for Human Intention Estimation in Lower-Back Exoskeleton. 164-182 - Anh-Duy Pham, Anastassia Küstenmacher, Paul G. Ploeger:
TSEM: Temporally-Weighted Spatiotemporal Explainable Neural Network for Multivariate Time Series. 183-204 - Alexander I. Iliev, Malvika Panwar:
AI in Cryptocurrency. 205-217 - Sana Mohsin Babbar, Lau Chee Yong:
Short Term Solar Power Forecasting Using Deep Neural Networks. 218-232 - Fatemeh Davoudi Kakhki, Armin Moghadam:
Convolutional Neural Networks for Fault Diagnosis and Condition Monitoring of Induction Motors. 233-241 - Alexander I. Iliev, Amruth Anand:
Huber Loss and Neural Networks Application in Property Price Prediction. 242-256 - Alexander I. Iliev, Ankitha Raksha:
Text Regression Analysis for Predictive Intervals Using Gradient Boosting. 257-269 - Magdalena Stachon, Marcin Pietron:
Chosen Methods of Improving Small Object Recognition with Weak Recognizable Features. 270-285 - Yassine Zouhair, Mustapha Belaïssaoui, Younous El Mrini:
Factors Affecting the Adoption of Information Technology in the Context of Moroccan Smes. 286-296 - Bernhard Heiden, Ronja Krimm, Bianca Tonino-Heiden, Volodymyr Alieksieiev:
Aspects of the Central and Decentral Production Parameter Space, Its Meta-Order and Industrial Application Simulation Example. 297-309 - J. David Patón-Romero, Sunniva Block, Claudia P. Ayala, Letizia Jaccheri:
Gender Equality in Information Technology Processes: A Systematic Mapping Study. 310-327 - Maher Heal, Kia Dashtipour, Mandar Gogate:
The P vs. NP Problem and Attempts to Settle It via Perfect Graphs State-of-the-Art Approach. 328-340 - Mohammed Bergui, Nikola S. Nikolov, Said Najah:
Hadoop Dataset for Job Estimation in the Cloud with Limited Bandwidth. 341-348 - Kehinde Sotonwa, Johnson Adeyiga, Michael Adenibuyan, Moyinoluwa Dosunmu:
Survey of Schema Languages: On a Software Complexity Metric. 349-361 - F. W. Roush:
Bohmian Quantum Field Theory and Quantum Computing. 362-371 - Michael Sobolewski:
Service-Oriented Multidisciplinary Computing: From Code Providers to Transdisciplines. 372-384 - Xuan Jiang, Laurence Lu, Linyue Song:
Incompressible Fluid Simulation Parallelization with OpenMP, MPI and CUDA. 385-395 - Vinitha Hannah Subburaj, Nickolas Gallegos, Anitha Sarah Subburaj, Alexis Sopha, Joshua Macfie:
Predictive Analysis of Solar Energy Production Using Neural Networks. 396-415 - Mustafa Ayad, Jessica MacKay, Tyrone Clarke:
Implementation of a Tag Playing Robot for Entertainment. 416-426 - John Karl B. Tumpalan, Reginald Neil C. Recario:
English-Filipino Speech Topic Tagger Using Automatic Speech Recognition Modeling and Topic Modeling. 427-445 - Thuc Kieu-Xuan, Duc-Cuong Quach:
A Novel Adaptive Fuzzy Logic Controller for DC-DC Buck Converters. 446-454 - Junyong You, Zheng Zhang:
Visual Mechanisms Inspired Efficient Transformers for Image and Video Quality Assessment. 455-473 - Ventsislav Nikolov:
A Neural Network Based Approach for Estimation of Real Estate Prices. 474-481 - Jennafer Shae Roberts, Laura N. Montoya:
Contextualizing Artificially Intelligent Morality: A Meta-ethnography of Theoretical, Political and Applied Ethics. 482-501 - Edward R. Sykes:
An Analysis of Current Fall Detection Systems and the Role of Smart Devices and Machine Learning in Future Systems. 502-520 - Nuril Kaunaini Rofiatunnajah, Ari Moesriami Barmawi:
Authentication Scheme Using Honey Sentences. 521-540 - Can Zhao, Xiaoxiao Wang, Zhengzhu Lu, Jiahui Wang, Dejun Wang, Bo Meng:
HSDVS-DPoS: A Secure and Heterogeneous DPoS Consensus Protocol Using Heterogeneous Strong Designated Verifier Signature. 541-562 - Ivaylo Chenchev:
Framework for Multi-factor Authentication with Dynamically Generated Passwords. 563-576 - Nor Azeala Mohd Yusof, Suriyani Ariffin:
Randomness Testing on Strict Key Avalanche Data Category on Confusion Properties of 3D-AES Block Cipher Cryptography Algorithm. 577-588 - Gao Ming:
A Proof of P ! = NP: New Symmetric Encryption Algorithm Against Any Linear Attacks and Differential Attacks. 589-601 - Grace LaMalva, Suzanna Schmeelk, Dristi Dinesh:
Python Cryptographic Secure Scripting Concerns: A Study of Three Vulnerabilities. 602-613 - Afolayan Ifeoluwa, Francis E. Idachaba:
Developing a GSM-GPS Based Tracking System: Vulnerable Nigerian School Children as a Case Study. 614-634 - Noha Moselhy, Ahmed Adel Mahmoud:
Standardization of Cybersecurity Concepts in Automotive Process Models: An Assessment Tool Proposal. 635-655 - Tahir M. Khan, James H. Jones Jr., Alex V. Mbazirra:
Factors Affecting the Persistence of Deleted Files on Digital Storage Devices. 656-673 - Fatima-Ezzahra El Orche, Marcel Hollenstein, Sarah Houdaigoui, David Naccache, Daria Pchelina, Peter B. Rønne, Peter Y. A. Ryan, Julien Weibel, Robert Weil:
Taphonomical Security: DNA Information with a Foreseeable Lifespan. 674-694 - Tanya Koohpayeh Araghi, David Megías, Andrea Rosales:
Evaluation and Analysis of Reversible Watermarking Techniques in WSN for Secure, Lightweight Design of IoT Applications: A Survey. 695-708 - George Hamilton, Medina Williams, Tahir M. Khan:
Securing Personally Identifiable Information (PII) in Personal Financial Statements. 709-728 - Emilia N. Mwim, Jabu Mtsweni, Bester Chimbo:
Conceptual Mapping of the Cybersecurity Culture to Human Factor Domain Framework. 729-742 - Swapnil Parekh, Pratyush Shukla, Devansh Shah:
Attacking Compressed Vision Transformers. 743-758 - Connor Hetzler, Zachary Chen, Tahir M. Khan:
Analysis of SSH Honeypot Effectiveness. 759-782 - Herwin Alayn Huillcen-Baca, Flor de Luz Palomino-Valdivia, Ivan Soria Solis, Mario Aquino Cruz, Juan Carlos Gutiérrez-Cáceres:
Human Violence Recognition in Video Surveillance in Real-Time. 783-795 - Hege Aalvik, Anh Nguyen-Duc, Daniela Soares Cruzes, Monica Iovan:
Establishing a Security Champion in Agile Software Teams: A Systematic Literature Review. 796-810 - Gordon King, Hans Wang:
HTTPA: HTTPS Attestable Protocol. 811-823 - Gordon King, Hans Wang:
HTTPA/2: A Trusted End-to-End Protocol for Web Services. 824-848 - Pasquale A. T. Zingo, Andrew P. Novocin:
Qualitative Analysis of Synthetic Computer Network Data Using UMAP. 849-861 - Pawel Woronow, Karol Jedrasiak, Krzysztof Daniec, Hubert Podgorski, Aleksander Nawrat:
Device for People Detection and Tracking Using Combined Color and Thermal Camera. 862-874 - Linus Leffler, Niclas Johansson Bräck, Workneh Yilma Ayele:
Robotic Process Automation for Reducing Food Wastage in Swedish Grocery Stores. 875-892 - Ankur Chattopadhyay, Nahom Beyene:
A Survey Study of Psybersecurity: An Emerging Topic and Research Area. 893-912
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.