the research of automatic recognition of machining features constitutes a crucial supporting pillar for intelligent design and manufacturing. Despite the availability of existing algorithms, there are prevalent proble...
详细信息
the proceedings contain 6 papers. the topics discussed include: the promise and perils of using machine learning when engineering software;neural language models for code quality identification;are machine programming...
ISBN:
(纸本)9781450394567
the proceedings contain 6 papers. the topics discussed include: the promise and perils of using machine learning when engineering software;neural language models for code quality identification;are machine programming systems using right source-code measures to select code repositories?;on the application of machine learning models to assess and predict software reusability;using machine learning to guide the application of software refactorings: a preliminary exploration;and DeepCrash: deep metric learning for crash bucketing based on stack trace.
In this study, we report our participation in Checkthat! lab’s Task 1. the aim is to determine whether a claim made in either unimodal or multimodal content is worth fact-checking. We implemented standard preprocessi...
详细信息
It is expected to be pervasive sensors to integrate physical and digital world. Low-latency and wide-covering networks are hence urged, which lead to costly infrastructure. We are proposing ARCH based on smart contrac...
详细信息
In the realm of online education, precise identification of the participants and their engagement is critical for optimal learning results. Withthe aim of precisely monitoring attendance and engagement in an online l...
详细信息
the proceedings contain 38 papers. the topics discussed include: a strong authentication method for web/mobile services;efficient shoulder surfing resistant PIN authentication scheme based on localized tactile feedbac...
ISBN:
(纸本)9781728116600
the proceedings contain 38 papers. the topics discussed include: a strong authentication method for web/mobile services;efficient shoulder surfing resistant PIN authentication scheme based on localized tactile feedback;detection of sources being used in DDoS attacks;automatic question tagging using multi-label classification in community question answering sites;enabling privacy-preserving sharing of cyber threat information in the cloud;a survey on cryptography: comparative study between RSA vs ECC algorithms, and RSA vs El-Gamal algorithms;cost and effect of using scheduling security model in a cloud environment;estimating web attack detection via model uncertainty from inaccurate annotation;and assessing the security risks of multicloud SaaS applications: a real-world case study.
Presently across the world, financial institutions strive tremendously hard to make financial services smarter to benefit from the advantages of digitization. To enhance client services, financial technology (Fintech)...
详细信息
Social media is an interactive and reliable tool used for communication among people around the world. It provides a facility for people to make accounts of it and to share their personal ideas, photos, interests, and...
详细信息
Multiple Access Edge computing (MEC) is a key driver in the development of 5G/6G networks for the provision of time-critical services. this is primarily due to the ability to compute and cache in close proximity to us...
详细信息
暂无评论