Results 31 to 40 of about 165,246 (172)

Editor’s Introduction: Deconstructing the Master Signifier of Community [PDF]

open access: yes, 1998
Deconstructing the master signifier of community: Between the pre-modern and modern community of organic solidarity and the postmodern community of technological dissemination in ...
Jagodzinski, Jan
core   +1 more source

Simple yet Effective ECG Identity Authentication With Low EER and Without Retraining

open access: yesIET Biometrics
Recently, electrocardiogram (ECG) signals have garnered significant attention in the field of identity authentication. For identity authentication, the ECG signals collected by wearing smart devices need to be determined whether the signal belongs to an ...
Mingyu Dong   +5 more
doaj   +1 more source

The geographies of cyberspace [PDF]

open access: yes, 1999
In this I paper I explore the need for a new field of geographic enquiry called cybergeography. This is the investigation of the complex and multifaceted structure, use and experience of the online world inside global computer-communications networks,
Dodge, Martin
core   +1 more source

Sovereignty in cyberspace: lex lata vel non? [PDF]

open access: yes, 2017
Globalization has not conquered sovereignty. Instead, the notion of sovereignty occupies center stage in discussions concerning the normative architecture of cyberspace.
Schmitt, Michael, Vihul, Liis
core   +1 more source

Transferable adversarial attacks for multi-model systems coupling image fusion with classification models

open access: yesCybersecurity
Image preprocessing models typically serve as the initial step in advanced visual tasks, aiming to enhance the performance of subsequent tasks. For example, multi-focus image fusion technology significantly improves the performance of downstream semantic
Pengcheng Zhu   +6 more
doaj   +1 more source

Technology Policy, Gender, and Cyberspace [PDF]

open access: yes, 1997
Event based sampling occurs when the time instants are measured everytime the amplitude passes certain pre-defined levels. This is in contrast with classical signal processing where the amplitude is measured at regular time intervals.
Gustafsson, Fredrik, Persson, Niclas
core   +1 more source

Agency Law in Cyberspace [PDF]

open access: yes, 2006
This short article articulates and defends the proposition that basic doctrines within common-law agency apply readily to transactions and other encounters effected through the internet.
DeMott, Deborah A.
core   +1 more source

European regulation of cross-border hate speech in cyberspace: The limits of legislation [PDF]

open access: yes, 2011
This paper examines the complexities of regulating hate speech on the Internet through legal frameworks. It demonstrates the limitations of unilateral national content legislation and the difficulties inherent in multilateral efforts to regulate the ...
Banks, James
core   +1 more source

HiCoS-Net: hierarchical cross-modal graph learning with dynamic attention for hard negative-aware image-text matching

open access: yesJournal of King Saud University: Computer and Information Sciences
Fine-grained image-text matching, which is pivotal to multimodal intelligence, has advanced semantic correspondence inference through inter-modal region-word aggregation.
Dingcheng Feng   +4 more
doaj   +1 more source

An Evaluation of Deep Learning-Based Computer Generated Image Detection Approaches

open access: yesIEEE Access, 2019
With the rapid development of Computer Graphics, the computer-generated images (CG) are almost as realistic as real photographs(PG) and it is difficult to distinguish between CG and PG accurately with the naked eye.
Xuan Ni   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy