this bibliometric study examines the authorship of the papers presented at ICER since the conference began in 2005. It finds that the pattern of authorship complies well with Lotka's law, an accepted model of auth...
详细信息
ISBN:
(纸本)9781450344494
this bibliometric study examines the authorship of the papers presented at ICER since the conference began in 2005. It finds that the pattern of authorship complies well with Lotka's law, an accepted model of author distribution within a discipline. ICER's most prolific authors are identified and their contributions quantified, along with measures of the collaborations between authors. New authors are found to be joining the community at a steady rate, some beginning as co-authors with established community members and some joining alone or with other new authors. the analysis extends to the contributions from different countries. the conclusion is that the community of ICER authors is truly international, has a solid core around which excellent growth is evident, displays strong collaboration, and has at least one of the characteristics of a full-fledged discipline.
Neural networks have demonstrated superior performance in image classification tasks, however, acquiring sufficient labeled data for training them in real-world scenarios remains challenging. Few-shot learning (FSL) w...
详细信息
Query-by-Humming (QBH) systems base their operation on aligning the melody sung/hummed by a user with a set of candidate melodies retrieved from polyphonic songs. While MIDI-based QBH builds on the premise of existing...
详细信息
Gaining extraordinary attention in recent years, Finger Vein Biometrics has an ideal viability withthe advantages of being the least susceptible to identity theft and being present inside the body, making it difficul...
详细信息
Musical genre classification has been paramount in the last years, mainly in large multimedia datasets, in which new songs and genres can be added at every moment by anyone. In this context, we have seen the growing o...
详细信息
the application of blockchain technology on mobile devices requires significant computing resources. However, the limited capacity of mobile devices cannot meet the high computing power requirements of blockchain tech...
详细信息
ISBN:
(纸本)9798400709265
the application of blockchain technology on mobile devices requires significant computing resources. However, the limited capacity of mobile devices cannot meet the high computing power requirements of blockchain technology, which limits the development of blockchain technology. Mobile Edge computing (MEC) is capable of alleviate the limited computing capacity of IoT terminals. this paper introduces an edge computing-enabled blockchain system consisting of an edge computing allocation center (ECAC), multiple edge service providers (ESPs), and multiple miners. To efficiently allocate resources between these miners and ESPs, we propose a hierarchical computation offloading strategy based on contract theory and matching game. During contract design phase, ECAC designs a contribution-reward contract to attract ESPs to join the trading market, and provide services to miners. By analyzing the attributes and conditions of feasible contracts of feasible contract, the optimal contract is devised using Lagrange multiplication. During matching phase, an iterative matching algorithm (IMA) is proposed to achieve the matching between ESPs and miners by constructing preference sets for miners and ESPs. Boththe stability and convergence have been proved by theoretical analysis. Finally, we conduct experiments to validate the feasibility and effectiveness of the design contract. Experimental results also demonstrate the stability of IMA matching algorithm.
the proceedings contain 96 papers. the topics discussed include: a study of requirement definition in user-oriented virtual network architecture;approaches to analyze requirements of billing management for cloud compu...
ISBN:
(纸本)9781479901746
the proceedings contain 96 papers. the topics discussed include: a study of requirement definition in user-oriented virtual network architecture;approaches to analyze requirements of billing management for cloud computing services;instant distributed minimum diameter tree construction for scalable application layer multicast;adaptation of region growing thresholds using the memetic programming algorithm;a framework for evaluating software design pattern specification languages;analysis of impression received from reverse perspective illusion to create innovative advertising;analysis of programming competency for PEAS system innovation - PEAS system: programming experience assessment scale system;layout-tree-based approach for identifying visually similar blocks in a web page;mapping of nearest neighbor for classification;and developing an argumentation support system for face-to-face collaborative learning.
the proceedings contain 11 papers. the topics discussed include: SEIF: augmented symbolic execution for information flow verification;EntryBleed: a universal KASLR bypass against KPTI on Linux;Triton: software-defined...
ISBN:
(纸本)9798400716232
the proceedings contain 11 papers. the topics discussed include: SEIF: augmented symbolic execution for information flow verification;EntryBleed: a universal KASLR bypass against KPTI on Linux;Triton: software-defined threat model for secure multi-tenant ml inference accelerators;automated security analysis for real-world IoT devices;DINAR: enabling distribution agnostic noise injection in machine learning hardware;DeMiST: detection and mitigation of stealthy analog hardware trojans;data processing unit’s entry into confidential computing;towards a formally verified security monitor for VM-based confidential computing;SoK: a first order survey of quantum supply dynamics and threat landscapes;and a gem5 based platform for micro-architectural security analysis.
the proceedings contain 45 papers. the topics discussed include: skin cancer classification using levy stable based ensemble and it’s real-time implementation on OpenVINO toolkit;effects of region of interest locatio...
ISBN:
(纸本)9798350325416
the proceedings contain 45 papers. the topics discussed include: skin cancer classification using levy stable based ensemble and it’s real-time implementation on OpenVINO toolkit;effects of region of interest location on osteoarthritis detection using deep feature learning;invariant convolutional networks;an order and difference local binary pattern for hyperspectral texture classification;leveraging transfer learning for analyzing cattle front teat placement;animated lightning bolt generation using machine learning;and CNN ensemble robust to rotation using radon transform.
the paper deals with problems which appear when solving the task of patternrecognition in a feature space that is not identical withthe space of the unknown decisive key features. In a common sense it deals withthe...
详细信息
暂无评论