|
|
|
Valeria Mercuri, Martina Saletta and Claudio Ferretti
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential...
ver más
|
|
|
|
|
|
|
Claudio Ferretti and Martina Saletta
State-of-the-art neural networks build an internal model of the training data, tailored to a given classification task. The study of such a model is of interest, and therefore, research on explainable artificial intelligence (XAI) aims at investigating i...
ver más
|
|
|
|
|
|
|
Yannik Steiniger, Dieter Kraus and Tobias Meisen
The training of a deep learning model requires a large amount of data. In case of sidescan sonar images, the number of snippets from objects of interest is limited. Generative adversarial networks (GAN) have shown to be able to generate photo-realistic i...
ver más
|
|
|
|
|
|
|
Bin Li and Jianmin Yao
Bilingual web pages are widely used to mine translations of unknown terms. This study focused on an effective solution for obtaining relevant web pages, extracting translations with correct lexical boundaries, and ranking the translation candidates. This...
ver más
|
|
|
|
|
|
|
Dr. Yousef Ibrahim Daradkeh,Dmitri Namiot,Manfred Schneps-Schneppe
Pág. pp. 13 - 17
This paper describes a new model for delivering hyper-local data to mobile subscribers. Our model uses any exiting or especially created Wi-Fi hot spot as presence sensor that can open access for some user-generated content. In our approach we can descri...
ver más
|
|
|
|
|
|
|
Hugo Pardo Kuklinski,Joel Brandt,Juan Pablo Puerta
Pág. pp. 54 - 61
More recently, synergy between novel technology and new usage patterns has enabled the convergence of mobile devices and Web 2.0 applications. This synthesis is embodied in a new conceptual and profitable space called mobile Web 2.0, where an always on e...
ver más
|
|
|
|