32,331 results
Search Results
2. Short Paper: DeFi Deception—Uncovering the Prevalence of Rugpulls in Cryptocurrency Projects
3. Short Paper: Estimating Patch Propagation Times Across Blockchain Forks
4. Deep Learning Models for Aspect-Based Sentiment Analysis Task: A Survey Paper
5. Machine Learning Based Malware Identification and Classification in PDF: A Review Paper
6. Clinical Event Knowledge Graphs: Enriching Healthcare Event Data with Entities and Clinical Concepts - Research Paper
7. Hypergraphs for Frailty Analysis Research Paper
8. Position Paper: Strengthening Applets on Legacy SIM Cards with Singularization, a New Moving Target Defense Strategy
9. Companion Paper: Deep Saliency Map Generators for Multispectral Video Classification
10. Energy Efficiency Impact of Processing in Memory: A Comprehensive Review of Workloads on the UPMEM Architecture
11. Anxiety Among Migrants - Questions for Agent Simulation
12. Two Steps Forward and One Behind: Rethinking Time Series Forecasting with Deep Learning
13. CardiacSeg: Customized Pre-training Volumetric Transformer with Scaling Pyramid for 3D Cardiac Segmentation
14. Proposal of Principles of DeFi Disclosure and Regulation
15. Price Forecasting of Potato Using ARIMA Model on Cloud Platform
16. Identification of Software Design Pattern and Deployment Strategies for AWS RDS Using Pattern for Relational Database
17. Automatic Plant Watering System for Smart Water Management
18. A Bird’s Eye View of Microservice Architecture from the Lens of Cloud Computing
19. Edge Detection Using Watershed Algorithm for Polycystic Ovary Image Analysis: A Comprehensive Study
20. Decentralized Disruptive Crypto Landscape: How Digital Currencies Are Shaking up Finance?
21. Exploring the Effectiveness of On-Page SEO for Webpage Ranking: A Critical Study
22. Network Traffic Classification: Solution to Detect Intruder
23. Revealing Insights into Criminal Behaviour: Exploring Patterns and Trends Through Machine Learning Predictive Models
24. Taxonomy of Image Encryption Techniques - A Survey
25. CyTIE: Cyber Threat Intelligence Extraction with Named Entity Recognition
26. A Novel Framework to Detect Business Email Compromise Through Unconsented Email Autoforwards
27. Quantum Fourier Transform in Image Processing
28. Implementing a Jenkins Plugin to Visualize Continuous Integration Pipelines
29. An Open-Source Model for Estimating the Need to Expansion in Local Charging Infrastructures
30. Applications and Associated Challenges in Deployment of Software Defined Networking (SDN)
31. Performance Analysis for Web Scraping Tools: Case Studies on Beautifulsoup, Scrapy, Htmlunit and Jsoup
32. Formation of a Speech Database in the Karakalpak Language for Speech Synthesis Systems
33. Original Entry Point Detection Based on Graph Similarity
34. Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code
35. A Novel Bayes’ Theorem for Upper Probabilities
36. Continuous Integration, Delivery and Deployment: A Systematic Review of Approaches, Tools, Challenges and Practices
37. Optimized BERT Model for Question Answering System on Mobile Platform
38. The Impact of Tamil Python Programming in Wikisource
39. An Approach to Cluster Scenarios According to Their Similarity Using Natural Language Processing
40. Prompt Engineering, An Alternative for Video Game Development?
41. Design Thinking: Empowering Innovation and Transformation in Industry 4.0 - Lessons Learned from Early Adoption in SMEs
42. Workshop on Cybersecurity of Critical Infrastructures
43. Developing with Compliance in Mind: Addressing Data Protection Law, Cybersecurity Regulation, and AI Regulation During Software Development
44. A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs
45. On Elementary Second Order Cellular Automata
46. QuMaDe: Quick Foreground Mask and Monocular Depth Data Generation
47. Smart Parking System Using Arduino and IR Sensor
48. A Systematic Study of Super-Resolution Generative Adversarial Networks: Review
49. Sentiment Analysis: Indian Languages Perspective
50. An Osprey Optimization Based Efficient Controlling of Nuclear Energy-Based Power System
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.