351 results on '"Florence Sèdes"'
Search Results
2. Are Large Language Models the New Interface for Data Pipelines?
3. Génération de descripteurs d’images satellitaires à THRS
4. Real-Time Mitigation of Trust-Related Attacks in Social IoT.
5. An Hybridization of LSTM and Random Forest Model to Predict Road Situation.
6. Apache Spark Based Deep Learning for Social Transaction Analysis.
7. Applying PDCA to Security, Education, Training and Awareness Programs.
8. Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms.
9. A Survey of Middlewares for self-adaptation and context-aware in Cloud of Things environment.
10. From User Activity Traces to Navigation Graph for Software Enhancement: An Application of Graph Neural Network (GNN) on a Real-World Non-Attributed Graph.
11. A New Blockchain-Based trust management model.
12. Advances in Data Management in the Big Data Era.
13. Détection des attaques de confiance dans l'Internet des Objets Social.
14. QoC enhanced semantic IoT model.
15. Negative filtering of CCTV Content - forensic video analysis framework.
16. An Approach for CCTV Contents Filtering Based on Contextual Enrichment via Spatial and Temporal Metadata: Relevant Video Segments Recommended for CCTV Operators.
17. Visual-Based Eye Contact Detection in Multi-Person Interactions.
18. Clustering for Traceability Managing in System Specifications.
19. Deep Learning for Trust-Related Attacks Detection in Social Internet of Things.
20. Audiovisual Annotation Procedure for Multi-view Field Recordings.
21. Trust Evaluation Model for Attack Detection in Social Internet of Things.
22. Management of Mobile Objects Location for Video Content Filtering.
23. DiEvent: Towards an Automated Framework for Analyzing Dining Events.
24. Industrial Requirements Classification for Redundancy and Inconsistency Detection in SEMIOS.
25. Spatio-Temporal Metadata Querying for CCTV Video Retrieval: Application in Forensic.
26. Modeling metadata of CCTV systems and Indoor Location Sensors for automatic filtering of relevant video content.
27. Using k-Means for Redundancy and Inconsistency Detection: Application to Industrial Requirements.
28. Toulouse campus surveillance dataset: scenarios, soundtracks, synchronized videos with overlapping and disjoint views.
29. La qualité de l'information dans les réseaux sociaux en ligne : une approche non supervisée et rapide de détection de spam.
30. Information Quality in Social Networks: A Collaborative Method for Detecting Spam Tweets in Trending Topics.
31. Information Quality in Online Social Networks: A Fast Unsupervised Social Spam Detection Method for Trending Topics.
32. Information Quality in Social Networks: Predicting Spammy Naming Patterns for Retrieving Twitter Spam Accounts.
33. Towards Generating Spam Queries for Retrieving Spam Accounts in Large-Scale Twitter Data.
34. A Topic-Based Hidden Markov Model for Real-Time Spam Tweets Filtering.
35. Une méthode collaborative pour identifier les spams: contribution à la qualité de l'information dans les réseaux sociaux.
36. Toward a combinatorial analysis and parametric study to build time-aware social profile.
37. Evaluating Seed Selection for Information Diffusion in Mobile Social Networks.
38. Proposition d'un modèle d'évaluation de la confiance pour la détection des attaques dans l'Internet des Objets Social.
39. Mobile objects in indoor environment: Trajectories reconstruction.
40. Querying indoor spatio-temporal data by hybrid trajectories.
41. Taking into account the evolution of users social profile: Experiments on Twitter and some learned lessons.
42. Trust Management in Social Internet of Things: A Survey.
43. Learner's Profile Hierarchization in an Interoperable Education System.
44. Expertise and Trust -Aware Social Web Service Recommendation.
45. Leveraging time for spammers detection on Twitter.
46. Enrichissement du profil utilisateur à partir de son réseau social dans un contexte dynamique : application d'une méthode de pondération temporelle.
47. Détection des intérêts d'un utilisateur par l'exploitation du comportement d'annotation de son réseau égocentrique.
48. A Case Study on the Influence of the User Profile Enrichment on Buzz Propagation in Social Media: Experiments on Delicious.
49. ADMAN: An Alarm-Based Mobile Diabetes Management System for Mobile Geriatric Teams.
50. A Comparative Study of Two Egocentric-based User Profiling Algorithms - Experiment in Delicious.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.