A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Multikey access methods based on term discrimination and signature clustering
1989
SIGIR Forum
In order to improve the two-level signature file method designed by Sacks-Davis et al. [20], we propose new multikey access methods based on term discrimination and signature clustering. ...
By term discrimination, we create separate, efficient access methods for the terms frequently used in user queries. ...
First we present a brief overview of the signature file method. In section 3 we propose new, efficient multikey access methods based on term discrimination and record signature clustering. ...
doi:10.1145/75335.75353
fatcat:gofcyqw2ujb7vis7zshrei6otm
A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges
2021
IEEE Access
Yao et.al based on Credential based Public Key Cryptography (AC-PKC) schema. Two-level verification is enforced with signature generation and access controls using fuzzy techniques [26] . ...
Authorization: It is used to allow the user to access the content which is permitted and block the other accesses based on conditions. ...
He has many publications in well renowned International journals and Conferences. ...
doi:10.1109/access.2021.3057766
fatcat:adrf6tuayfagjnwfztzkozf64y
2021 Index IEEE Transactions on Industrial Informatics Vol. 17
2021
IEEE Transactions on Industrial Informatics
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination. ...
The Subject Index contains entries describing the item under all appropriate subject headings, plus the first author's name, the publication abbreviation, month, and year, and inclusive pages. ...
Term Load Forecasting Method of Smart Grid Using MLR and LSTM Neural Network. ...
doi:10.1109/tii.2021.3138206
fatcat:ulsazxgmpfdmlivigjqgyl7zre
SWAET 2018: Scandinavian Workshop on Applied Eye Tracking Abstracts 23-24 August, 2018 Copenhagen Business School Solbjerg Plads 3, SP2.01 2000 Frederiksberg DENMARK Edited by Daniel Barratt, Raymond Bertram, & Marcus Nyström
2018
Journal of Eye Movement Research
Resolution measurements have only been made on the DPI and one other eye tracker. We do not know resolution values for the most used eye trackers. ...
His research focuses on how the dynamics of language-related, perceptual, and oculomotor processes subserve attentional control, using reading, spatial attention, and working memory tasks as experimental ...
and unfiltered) during a fixation task. ...
doi:10.16910/jemr.11.5.1
pmid:33828710
pmcid:PMC7905738
fatcat:qs5svkolpzhjpltzmbayfx6x3i
Study of 2D Representations of Encrypted Network Traffic for Attack Detection with Deep Learning
2022
Using multikey based visual representations, we outperform state of the art CNN-representations, yet equalizing ensembles that also work on multikey-based vectors. ...
We show that different models and architectures have only little influence on the detection performance. ...
Félix Iglesias, who shared his expertise, insight and ideas with me. Your help during the thesis was invaluable for me and withouth it I could not have finished the thesis. ...
doi:10.34726/hss.2022.89762
fatcat:ioxgqcq6sbgwhfqcr36tew2ea4