Wildcard Searchable Symmetric Encryption can achieve flexibility and pattern matching while protecting data privacy. There is a promising future for combining secure wildcard search with emerging technologies such as ...
详细信息
The present study explores the potential of gameplay performance to predict gains in adaptive expertise among primary school students. More specifically, this research evaluates adaptive number knowledge (ANK), an abi...
详细信息
Joint entity recognition and relation extraction are important tasks in natural language processing. While some previous work has recognized the importance of relation information in joint extraction, excessively focu...
详细信息
Clinical pathways are structured, multidisciplinary care plans utilized by healthcare providers to standardize the management of specific clinical problems. Designed to bridge the gap between evidence and practice, cl...
详细信息
This work focuses on the critical problem of enhancing data integrity within federated cloud environments. It explores a novel approach that leverages the principles of blockchain technology to provide a robust and de...
详细信息
Estimating the 6D pose of objects accurately, quickly, and robustly remains a difficult task. However, recent methods for directly regressing poses from RGB images using dense features have achieved state-of...
详细信息
The proceedings contain 12 papers. The special focus in this conference is on Verification and Evaluation of computer and Communication Systems. The topics include: Blockchain-Based Trust Management for IoMT Environme...
ISBN:
(纸本)9783031497360
The proceedings contain 12 papers. The special focus in this conference is on Verification and Evaluation of computer and Communication Systems. The topics include: Blockchain-Based Trust Management for IoMT Environment;Command & Control in UAVs Fleets: Coordinating Drones for Ground Missions in Changing Contexts;Verified High Performance Computing: The SyDPaCC Approach;A QoE Driven DRL Approach for Network Slicing Based on SFC Orchestration in SDN/NFV Enabled Networks;on Language-Based Opacity Verification Problem in Discrete Event Systems Under Orwellian Observation;an Enhanced Interface-Based Probabilistic Compositional Verification Approach;a Sound Abstraction Method Towards Efficient Neural Networks Verification;Towards Formal Verification of Node RED-Based IoT Applications;formal Verification of a Post-quantum Signal Protocol with Tamarin;a Comparative Study of Online Cybersecurity Training Platforms.
This study outlines essential elements needed to develop a Health Data Marketplace (HDM) by building upon an existing data platform in Norway. A comprehensive framework is proposed that accounts for technical, legal, ...
详细信息
Persistent memory gains increasing popularity in recent years. Many persistent memory systems leverage memory access monitoring to achieve user-transparent crash consistency enforcement. However, traditional program a...
详细信息
A proper k-coloring of a graph is an assignment of colors from the set to the vertices of the graph such that no two adjacent vertices receive the same color. Given a graph, the Dynamic Coloring problem asks to find a...
详细信息
暂无评论