Search results

(221 - 240 of 265)

Pages

Business Rules Interoperation
A semi-automated security assessment framework for wearable health monitoring devices
Characteristics of mental representations in novices and experts in Java
TelePhysio+
Contextualized embeddings encode knowledge of English verb-noun combination idiomaticity
Graph-based IoT malware family classification
On the evaluation of adversarial vulnerabilities of deep neural networks
Preserving consumer DNA privacy for finding relatives in a malicious two party computation
A multi-sense context-agnostic definition generation model evaluated on multiple languages
How the visual design of video game antagonists affects perception of morality
An anomaly detection framework for DNS-over-HTTPS (DoH) tunnel using time-series analysis
Prototype Eclipse OMR port performance evaluation on AArch64
Cold object identification and segregation via application profiling
WebAssembly in Node.js
Achieving continuous privacy-preserving histogram query in smart grid communications
Game-theoretic defensive approaches for forensic investigators against anti-forensics
Membership inference attacks on machine learning models
Just-In-Time compiler performance evaluation on the AArch64 platform
Bursty topic detection using acceleration and user influence
Achieving communication-efficient privacy-preserving range query in fog-based IoT

Pages

Zircon - This is a contributing Drupal Theme
Design by WeebPal.