Results 171 to 180 of about 32,768,627 (216)
Some of the next articles are maybe not open access.
A personalized authoritative user-based recommendation for social tagging
Future generations computer systems, 2018Personalized information recommendation based on social tagging is a hot issue in academia nowadays, butthe concept of an authoritative user has not been emphasized in the existing literature.
Jianliang Wei, Fei Meng, N. Arunkumar
semanticscholar +1 more source
CVE-assisted large-scale security bug report dataset construction method
Journal of Systems and Software, 2020Identifying SBRs (security bug reports) is crucial for eliminating security issues during software development. Machine learning are promising ways for SBR prediction.
Xiaoxue Wu +4 more
semanticscholar +1 more source
International Journal of Production Economics, 2023
Digitalization has become increasingly crucial for manufacturing firms to optimize their production processes and improve operations management. However, the role of digital transformation practices in firms ’ operations improvement is still debated in ...
Meng Tian +4 more
semanticscholar +1 more source
Digitalization has become increasingly crucial for manufacturing firms to optimize their production processes and improve operations management. However, the role of digital transformation practices in firms ’ operations improvement is still debated in ...
Meng Tian +4 more
semanticscholar +1 more source
Detection of Hijacked Authoritative DNS Servers by Name Resolution Traffic Classification
2019 IEEE International Conference on Big Data (Big Data), 2019Authoritative DNS server hijacking has been a critical threat which can be hardly prevented by DNSSEC. In this work, we propose a machine learning based detection method against DNS responses replied from hijacked external authoritative DNS servers by ...
Yong Jin, Masahiko Tomoishi, S. Matsuura
semanticscholar +1 more source
Government Information Quarterly, 2004
Abstract Government publications have long been considered authoritative sources of information regardless of the format [electronic via the World Wide Web (WWW) or paper] they are published in and with little consideration as to how they are researched, written, and published.
openaire +1 more source
Abstract Government publications have long been considered authoritative sources of information regardless of the format [electronic via the World Wide Web (WWW) or paper] they are published in and with little consideration as to how they are researched, written, and published.
openaire +1 more source
Heat waves and adaptation: A global systematic review.
Journal of Thermal Biology, 2023BACKGROUND Given the increasing trend of global warming and extreme weather conditions, including heat waves and its effects on health, the present study was done to investigate adaptive behaviors of communities in the world for combating heat waves ...
M. Kiarsi +6 more
semanticscholar +1 more source
The Structural design of tall and special buildings, 2018
In the current study, a new pattern recognition‐based damage detection technique is developed using the frequency response function of the structure. Principal component analysis is employed as an authoritative feature extraction method for dimensional ...
M. Fallahian +4 more
semanticscholar +1 more source
In the current study, a new pattern recognition‐based damage detection technique is developed using the frequency response function of the structure. Principal component analysis is employed as an authoritative feature extraction method for dimensional ...
M. Fallahian +4 more
semanticscholar +1 more source
Multi-hazard risk assessment methods: A comparative analysis based on five authoritative reports
Progress in Geography, 2023Jiachen NING +4 more
openaire +1 more source
2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC), 2023
Nariyoshi Yamai +3 more
openaire +1 more source
Nariyoshi Yamai +3 more
openaire +1 more source

