32,887 results
Search Results
2. Short Paper: DeFi Deception—Uncovering the Prevalence of Rugpulls in Cryptocurrency Projects
3. Short Paper: Estimating Patch Propagation Times Across Blockchain Forks
4. Deep Learning Models for Aspect-Based Sentiment Analysis Task: A Survey Paper
5. Machine Learning Based Malware Identification and Classification in PDF: A Review Paper
6. Clinical Event Knowledge Graphs: Enriching Healthcare Event Data with Entities and Clinical Concepts - Research Paper
7. Hypergraphs for Frailty Analysis Research Paper
8. Position Paper: Strengthening Applets on Legacy SIM Cards with Singularization, a New Moving Target Defense Strategy
9. Companion Paper: Deep Saliency Map Generators for Multispectral Video Classification
10. Energy Efficiency Impact of Processing in Memory: A Comprehensive Review of Workloads on the UPMEM Architecture
11. Anxiety Among Migrants - Questions for Agent Simulation
12. Two Steps Forward and One Behind: Rethinking Time Series Forecasting with Deep Learning
13. CardiacSeg: Customized Pre-training Volumetric Transformer with Scaling Pyramid for 3D Cardiac Segmentation
14. Proposal of Principles of DeFi Disclosure and Regulation
15. Synthetic Datasets for 6D Pose Estimation of Industrial Objects: Framework, Benchmark and Guidelines
16. On the Concept of Discovery Power of Enterprise Modeling Languages and Its Relation to Their Expressive Power
17. Rapid REST API Management in a DEMO Based Low Code Platform
18. Challenges in Building a Digital Business Ecosystem in the Maritime Domain
19. Price Forecasting of Potato Using ARIMA Model on Cloud Platform
20. Identification of Software Design Pattern and Deployment Strategies for AWS RDS Using Pattern for Relational Database
21. Automatic Plant Watering System for Smart Water Management
22. A Bird’s Eye View of Microservice Architecture from the Lens of Cloud Computing
23. Edge Detection Using Watershed Algorithm for Polycystic Ovary Image Analysis: A Comprehensive Study
24. Decentralized Disruptive Crypto Landscape: How Digital Currencies Are Shaking up Finance?
25. Exploring the Effectiveness of On-Page SEO for Webpage Ranking: A Critical Study
26. Network Traffic Classification: Solution to Detect Intruder
27. Revealing Insights into Criminal Behaviour: Exploring Patterns and Trends Through Machine Learning Predictive Models
28. Taxonomy of Image Encryption Techniques - A Survey
29. CyTIE: Cyber Threat Intelligence Extraction with Named Entity Recognition
30. A Novel Framework to Detect Business Email Compromise Through Unconsented Email Autoforwards
31. Quantum Fourier Transform in Image Processing
32. Implementing a Jenkins Plugin to Visualize Continuous Integration Pipelines
33. An Open-Source Model for Estimating the Need to Expansion in Local Charging Infrastructures
34. Applications and Associated Challenges in Deployment of Software Defined Networking (SDN)
35. Performance Analysis for Web Scraping Tools: Case Studies on Beautifulsoup, Scrapy, Htmlunit and Jsoup
36. Formation of a Speech Database in the Karakalpak Language for Speech Synthesis Systems
37. Original Entry Point Detection Based on Graph Similarity
38. Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code
39. A Novel Bayes’ Theorem for Upper Probabilities
40. Continuous Integration, Delivery and Deployment: A Systematic Review of Approaches, Tools, Challenges and Practices
41. Optimized BERT Model for Question Answering System on Mobile Platform
42. The Impact of Tamil Python Programming in Wikisource
43. An Approach to Cluster Scenarios According to Their Similarity Using Natural Language Processing
44. Prompt Engineering, An Alternative for Video Game Development?
45. Design Thinking: Empowering Innovation and Transformation in Industry 4.0 - Lessons Learned from Early Adoption in SMEs
46. Workshop on Cybersecurity of Critical Infrastructures
47. Developing with Compliance in Mind: Addressing Data Protection Law, Cybersecurity Regulation, and AI Regulation During Software Development
48. A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs
49. On Elementary Second Order Cellular Automata
50. QuMaDe: Quick Foreground Mask and Monocular Depth Data Generation
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.