Results 61 to 70 of about 760,777 (341)
Designing Informative Securities [PDF]
Appears in Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI2012)
Yiling Chen+2 more
openaire +2 more sources
Quantum Private Query Protocol Based on Two Non-Orthogonal States
We propose a loss tolerant quantum private query (QPQ) protocol based on two non-orthogonal states and unambiguous state discrimination (USD) measurement.
Yan Chang+5 more
doaj +1 more source
DyCARS: A dynamic context-aware recommendation system
Dynamic recommendation systems aim to achieve real-time updates and dynamic migration of user interests, primarily utilizing user-item interaction sequences with timestamps to capture the dynamic changes in user interests and item attributes.
Zhiwen Hou+7 more
doaj +1 more source
Research on Hybrid Recommendation Model for Personalized Recommendation Scenarios
One of the five types of Internet information service recommendation technologies is the personalized recommendation algorithm, and knowledge graphs are frequently used in these algorithms.
Wenkai Ni+3 more
doaj +1 more source
Abstract Purpose This study compares the dosimetric accuracy of deep‐learning‐based MR synthetic CT (sCT) in brain radiotherapy between the Analytical Anisotropic Algorithm (AAA) and AcurosXB (AXB). Additionally, it proposes a novel metric to predict the dosimetric accuracy of sCT for individual post‐surgical brain cases.
Jeffrey C. F. Lui+3 more
wiley +1 more source
Secure Web-Based Student Information Management System [PDF]
The reliability and success of any organization such as academic institution rely on its ability to provide secure, accurate and timely data about its operations. Erstwhile managing student information in academic institution was done through paper-based information system, where academic records are documented in several files that are kept in shelves.
arxiv
Recent Advances in Information Security
[No abstract available]
Fei Yu+4 more
openaire +6 more sources
Abstract Purpose In radiation oncology, the integration and registration of multiple imaging modalities is a crucial aspect of the diagnosis and treatment planning process. These images are often inherently registered, a useful feature in most cases, but possibly a hindrance when registration modifications are required.
Brian M. Anderson, Casey Bojechko
wiley +1 more source
Considerations for Cloud Security Operations [PDF]
Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed. Topics covered include Information Security, Cloud Computing, Private Cloud, Public Cloud, SaaS, PaaS, IaaS, ISO 27001, OWASP, Secure SDLC.
arxiv