Search alternatives:
augmentations » augmentation (Expand Search), argumentation (Expand Search), alimentation (Expand Search)
augmentations » augmentation (Expand Search), argumentation (Expand Search), alimentation (Expand Search)
-
81
Shuffled Linear Regression with Erroneous Observations
Published 2019Get full text
Get full text
Get full text
Get full text
conferenceObject -
82
Improving INS/GPS Integration for Mobile Robotics Applications
Published 2008Get full text
doctoralThesis -
83
A Micro-Economics Approach for Scheduling in CDMA Networks with End-to-End QoS Guarantees
Published 2007Get full text
Get full text
Get full text
Get full text
conferenceObject -
84
Local convexity preserving rational cubic spline curves
Published 1997“…An algorithm is presented which constructs a curve by interpolating the given data points. …”
Get full text
Get full text
article -
85
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
86
-
87
Axes-Based Encryption Key
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
88
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
Published 2007“…Database fragmentation allows reducing irrelevant data accesses by grouping data frequently accessed together in dedicated segments. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
89
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
90
-
91
Towards Multimedia Fragmentation
Published 2006“…Database fragmentation is a process for reducing irrelevant data accesses by grouping data frequently accessed together in dedicated segments. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
92
A Blockchain Model for Secure Communications in Internet of Vehicles
Published 2021Get full text
Get full text
Get full text
Get full text
conferenceObject -
93
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
conferenceObject -
94
Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS
Published 2018“…In the past decade, there has been an increasing need for semantic-aware data search and indexing in textual (structured and NoSQL) databases, as full-text search systems became available to non-experts where users have no knowledge about the data being searched and often formulate query keywords which are different from those used by the authors in indexing relevant documents, thus producing noisy and sometimes irrelevant results. …”
Get full text
Get full text
Get full text
Get full text
article -
95
-
96
Video features with impact on user quality of experience
Published 2021Get full text
Get full text
Get full text
Get full text
conferenceObject -
97
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…We use a semantic-aware inverted index to allow semantic-aware search, result selection, and result ranking functionality. The semantically augmented XML data tree is processed for structural node clustering, based on semantic query concepts (i.e., key-concepts), in order to identify and rank candidate answer sub-trees containing related occurrences of query key-concepts. …”
Get full text
Get full text
Get full text
Get full text
article -
98
Exploring Digital Competitiveness through Bayesian Belief Networks
Published 2025“…Three states were assigned to variables—low, medium, and high performance—and the tree augmented naive Bayes (TAN) algorithm was applied to model interdependencies. …”
Get full text
article -
99
Test time minimization for system-on-chip with test bus assignment and sizin
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
100
Automated systems for diagnosis of dysgraphia in children: a survey and novel framework
Published 2024“…This work discusses the data collection method, important handwriting features, and machine learning algorithms employed in the literature for the diagnosis of dysgraphia. …”