17   Artículos

 
en línea
Valeria Mercuri, Martina Saletta and Claudio Ferretti    
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Mattia Di Bartolomeo, Arrigo Pellacani, Federico Bolelli, Marco Cipriano, Luca Lumetti, Sara Negrello, Stefano Allegretti, Paolo Minafra, Federico Pollastri, Riccardo Nocini, Giacomo Colletti, Luigi Chiarini, Costantino Grana and Alexandre Anesi    
Convolutional neural networks can accurately identify the Inferior Alveolar Canal, rapidly generating precise 3D data. The datasets and source code used in this paper are publicly available, allowing the reproducibility of the experiments performed.
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Dominik Stallmann and Barbara Hammer    
Novel neural network models that can handle complex tasks with fewer examples than before are being developed for a wide range of applications. In some fields, even the creation of a few labels is a laborious task and impractical, especially for data tha... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
I.A. Kosyanenko,R.G. Bolbakov     Pág. 55 - 60
In the modern world, no software development project is complete without the use of version control systems to track changes in data. The version control system is especially important in teamwork, when work on different parts of the same project is dele... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Ahmet Ilker Topuz, Madis Kiisk and Andrea Giammanco    
The simulation of muon tomography requires a multi-directional particle source that traverses a number of horizontal detectors of limited angular acceptance that are used to track cosmic-ray muons. In this study, we describe a simple strategy that can us... ver más
Revista: Instruments    Formato: Electrónico

 
en línea
Nguyen Tran Quoc Vinh,Dang Thanh Hao,Pham Duong Thu Hang,Abeer Alsadoon,PW Chandana Prasad,Nguyen Viet Anh     Pág. 6 - 17
Materialized views are excessively stored query execution results in the database. They can be used to partially or completely answer queries which will be further appeared instead of re-executing query from the scratch. There is a large number of publis... ver más
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

 
en línea
Imane Essebaa, Salima Chantit and Mohammed Ramdani    
Model-driven engineering (MDE) uses models during the application development process. Thus, the MDE is particularly based on model-driven architecture (MDA), which is one of the important variants of the Object Management Group (OMG). MDA aims to genera... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Michael Lescisin, Qusay H. Mahmoud and Anca Cioraca    
Software security is a component of software development that should be integrated throughout its entire development lifecycle, and not simply as an afterthought. If security vulnerabilities are caught early in development, they can be fixed before the s... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Otto Parra,Sergio España,Oscar Pastor     Pág. 73 - 92
Among the technological advances in touch-based devices, gesture-based interaction have become a prevalent feature in many application domains. Information systems are starting to explore this type of interaction. As a result, gesture specifications are ... ver más
Revista: Complex Systems Informatics and Modeling Quarterly    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »