Filters








5 Hits in 3.2 sec

Multikey access methods based on term discrimination and signature clustering

J. W. Chang, J. H. Lee, Y. J. Lee
1989 SIGIR Forum  
In order to improve the two-level signature file method designed by Sacks-Davis et al. [20], we propose new multikey access methods based on term discrimination and signature clustering.  ...  By term discrimination, we create separate, efficient access methods for the terms frequently used in user queries.  ...  First we present a brief overview of the signature file method. In section 3 we propose new, efficient multikey access methods based on term discrimination and record signature clustering.  ... 
doi:10.1145/75335.75353 fatcat:gofcyqw2ujb7vis7zshrei6otm

A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges

Pls Jayalaxmi, Rahul Saha, Gulshan Kumar, Neeraj Kumar, Tai-Hoon Kim
2021 IEEE Access  
Yao et.al based on Credential based Public Key Cryptography (AC-PKC) schema. Two-level verification is enforced with signature generation and access controls using fuzzy techniques [26] .  ...  Authorization: It is used to allow the user to access the content which is permitted and block the other accesses based on conditions.  ...  He has many publications in well renowned International journals and Conferences.  ... 
doi:10.1109/access.2021.3057766 fatcat:adrf6tuayfagjnwfztzkozf64y

2021 Index IEEE Transactions on Industrial Informatics Vol. 17

2021 IEEE Transactions on Industrial Informatics  
The primary entry includes the coauthors' names, the title of the paper or other item, and its location, specified by the publication abbreviation, year, month, and inclusive pagination.  ...  The Subject Index contains entries describing the item under all appropriate subject headings, plus the first author's name, the publication abbreviation, month, and year, and inclusive pages.  ...  Term Load Forecasting Method of Smart Grid Using MLR and LSTM Neural Network.  ... 
doi:10.1109/tii.2021.3138206 fatcat:ulsazxgmpfdmlivigjqgyl7zre

SWAET 2018: Scandinavian Workshop on Applied Eye Tracking Abstracts 23-24 August, 2018 Copenhagen Business School Solbjerg Plads 3, SP2.01 2000 Frederiksberg DENMARK Edited by Daniel Barratt, Raymond Bertram, & Marcus Nyström

2018 Journal of Eye Movement Research  
Resolution measurements have only been made on the DPI and one other eye tracker. We do not know resolution values for the most used eye trackers.  ...  His research focuses on how the dynamics of language-related, perceptual, and oculomotor processes subserve attentional control, using reading, spatial attention, and working memory tasks as experimental  ...  and unfiltered) during a fixation task.  ... 
doi:10.16910/jemr.11.5.1 pmid:33828710 pmcid:PMC7905738 fatcat:qs5svkolpzhjpltzmbayfx6x3i

Study of 2D Representations of Encrypted Network Traffic for Attack Detection with Deep Learning

Martin Pichler, Tanja Zseby, Felix Iglesias Vazquez
2022
Using multikey based visual representations, we outperform state of the art CNN-representations, yet equalizing ensembles that also work on multikey-based vectors.  ...  We show that different models and architectures have only little influence on the detection performance.  ...  Félix Iglesias, who shared his expertise, insight and ideas with me. Your help during the thesis was invaluable for me and withouth it I could not have finished the thesis.  ... 
doi:10.34726/hss.2022.89762 fatcat:ioxgqcq6sbgwhfqcr36tew2ea4