|
|
|
Valeria Mercuri, Martina Saletta and Claudio Ferretti
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential...
ver más
|
|
|
|
|
|
|
Mattia Di Bartolomeo, Arrigo Pellacani, Federico Bolelli, Marco Cipriano, Luca Lumetti, Sara Negrello, Stefano Allegretti, Paolo Minafra, Federico Pollastri, Riccardo Nocini, Giacomo Colletti, Luigi Chiarini, Costantino Grana and Alexandre Anesi
Convolutional neural networks can accurately identify the Inferior Alveolar Canal, rapidly generating precise 3D data. The datasets and source code used in this paper are publicly available, allowing the reproducibility of the experiments performed.
|
|
|
|
|
|
|
Dominik Stallmann and Barbara Hammer
Novel neural network models that can handle complex tasks with fewer examples than before are being developed for a wide range of applications. In some fields, even the creation of a few labels is a laborious task and impractical, especially for data tha...
ver más
|
|
|
|
|
|
|
I.A. Kosyanenko,R.G. Bolbakov
Pág. 55 - 60
In the modern world, no software development project is complete without the use of version control systems to track changes in data. The version control system is especially important in teamwork, when work on different parts of the same project is dele...
ver más
|
|
|
|
|
|
|
Ahmet Ilker Topuz, Madis Kiisk and Andrea Giammanco
The simulation of muon tomography requires a multi-directional particle source that traverses a number of horizontal detectors of limited angular acceptance that are used to track cosmic-ray muons. In this study, we describe a simple strategy that can us...
ver más
|
|
|
|
|
|
|
Nguyen Tran Quoc Vinh,Dang Thanh Hao,Pham Duong Thu Hang,Abeer Alsadoon,PW Chandana Prasad,Nguyen Viet Anh
Pág. 6 - 17
Materialized views are excessively stored query execution results in the database. They can be used to partially or completely answer queries which will be further appeared instead of re-executing query from the scratch. There is a large number of publis...
ver más
|
|
|
|
|
|
|
Imane Essebaa, Salima Chantit and Mohammed Ramdani
Model-driven engineering (MDE) uses models during the application development process. Thus, the MDE is particularly based on model-driven architecture (MDA), which is one of the important variants of the Object Management Group (OMG). MDA aims to genera...
ver más
|
|
|
|
|
|
|
Michael Lescisin, Qusay H. Mahmoud and Anca Cioraca
Software security is a component of software development that should be integrated throughout its entire development lifecycle, and not simply as an afterthought. If security vulnerabilities are caught early in development, they can be fixed before the s...
ver más
|
|
|
|
|
|
|
Otto Parra,Sergio España,Oscar Pastor
Pág. 73 - 92
Among the technological advances in touch-based devices, gesture-based interaction have become a prevalent feature in many application domains. Information systems are starting to explore this type of interaction. As a result, gesture specifications are ...
ver más
|
|
|
|