Filters








5 Hits in 8.5 sec

Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys

Musheer Ahmad, Tanvir Ahmad
2014 International Journal of Communication Networks and Distributed Systems  
Reviewer of IEEE Symposium on Computers & Informatics (ISCI-2013) 26. Reviewed a paper of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC-2012) 27.  ...  Reviewed two papers of 4 th International Conference on Electronics, Communications and Networks (CECNet-2014) Date : 12-14 December 2014 Venue : Beijing, CHINA Proceeding Publisher : CRC Press  ...  Member of International Association of Computer Science and Information Technology (IACSIT), Singapore. Member of Institute of Doctors, Engineers and Scientists (IDES), India. PERSONAL DETAILS: Date  ... 
doi:10.1504/ijcnds.2014.057991 fatcat:rzyhturhnjba3g6jsh2mn3gkqy

Lexicon-constrained Copying Network for Chinese Abstractive Summarization [article]

Boyan Wan, Mishal Sohail
2021 arXiv   pre-print
computation and encourages the model to copy more words.  ...  On the source side, words and characters are aggregated into the same input memory using a Transformerbased encoder.  ...  Berlin, Germany: Association for Conference on Cyber-Enabled Distributed Computing and Knowledge Computational Linguistics, Aug. 2016, pp. 280–290.  ... 
arXiv:2010.08197v2 fatcat:7mp7mvrh2jbqzpch4zp7axfoce

Deep Spoken Keyword Spotting: An Overview

Ivan Lopez-Espejo, Zheng-Hua Tan, John Hansen, Jesper Jensen
2021 IEEE Access  
Speech Communication International Conference on Cyber-Enabled Distributed Computing and  ...  Knowledge Discovery, October 17-19, Guilin, China, 2019, pp. 444–451. [126] K. He, X.  ... 
doi:10.1109/access.2021.3139508 fatcat:i4pfpfxcpretlkbefp7owtxcti

Surveillance, Fighting Crime And Violence (Iriss Deliverable 1.1)

David Wright, Johann Cas, Ivan Szekely, Beatrix Vissy, Michael Friedewald, Kerstin Goos, William Webster, Gemma Galdon Clavell, Rowena Rodrigues, Reinhard Kreissl, Clive Norris, Marija Krlic (+10 others)
2012 Zenodo  
A report addressing and analysing the factors underpinning the development and use of surveillance systems and technologies by both public authorities and private actors, and their implications in fighting  ...  crime and terrorism, social and economic costs, protection or infringement of civil liberties, fundamental rights and ethical aspects Co-ordinator Trilateral Research and Consulting LLP Dissemination  ...  , CCTV Today, Vol. 2, No. 2, 1995, pp. 10-12. 172 Groombridge, Nic, "Stars of CCTV?  ... 
doi:10.5281/zenodo.1184324 fatcat:vxti37nlxbbejg6mjbk72ruh3e

Special Issue: Advances in Secure Data Streaming Systems

Fatos Xhafa, Jin Li, Vladi Kolici, Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Juan Carlos, Augusto, Argentina, Vladimir Batagelj (+18 others)
2015 unpublished
Acknowledgment The authors thank the anonymous reviewers for helpful comments and suggestions. This work was funded in part by the U.S. Army under grant #W911NF-11-1-0124.  ...  Proceeding of 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC12).  ...  Shen and R. Zimmermann, ISP-friendly peer selection in p2p networks[C]. in ACM Multimedia, Beijing, China, October 2009. [17] E. Setton, J. Noh, and B.  ... 
fatcat:vvmbxyvcyfccfi3wnl6q2kkfka