![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
IEEE Open Journal of the Computer Society, Volume 5
Volume 5, 2024
- Koji Matsuda
, Yuya Sasaki
, Chuan Xiao
, Makoto Onizuka
:
Benchmark for Personalized Federated Learning. 2-13 - Chhaya Gupta
, Nasib Singh Gill
, Preeti Gulia
, Sangeeta Yadav
, Giovanni Pau
, Mohammad Alibakhshikenari
, Xiangjie Kong
:
A Real-Time 3-Dimensional Object Detection Based Human Action Recognition Model. 14-26 - Nien-Ting Lee
, Hau-Chen Lee, Joseph Hsin, Shih-Hau Fang
:
Prediction of Customer Behavior Changing via a Hybrid Approach. 27-38 - Song Guo
:
Editorial. 1 - Veeramani Sonai
, Indira Bharathi
, Muthaiah U
, Sountharrajan Sehar
, Durga Prasad Bavirisetti
:
CTLA: Compressed Table Look up Algorithm for Open Flow Switch. 73-82 - Yongrong Huang
, Huiqing Wang
, Zhide Chen
, Chen Feng
, Kexin Zhu
, Xu Yang
, Wencheng Yang
:
Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model. 83-94 - Zhengxiang Zhou
, Cong Wang
:
ShadowBug: Enhanced Synthetic Fuzzing Benchmark Generation. 95-106 - Jiahang Zhou
, Yanyu Chen
, Zicong Hong
, Wuhui Chen
, Yue Yu
, Tao Zhang
, Hui Wang
, Chuanfu Zhang
, Zibin Zheng
:
Training and Serving System of Foundation Models: A Comprehensive Survey. 107-119 - Moshiur Rahman Tonmoy
, Abdul Fattah Rakib
, Rashik Rahman
, Md. Akhtaruzzaman Adnan
, Muhammad Firoz Mridha
, Jie Huang, Jungpil Shin
:
A Lightweight Visual Font Style Recognition With Quantized Convolutional Autoencoder. 120-130 - Usman Khalil
, Mueen Uddin
, Owais Ahmed Malik
, Ong Wee Hong
:
A Novel NFT Solution for Assets Digitization and Authentication in Cyber-Physical Systems: Blueprint and Evaluation. 131-143 - Abu Saleh Musa Miah
, Md. Al Mehedi Hasan
, Yoichi Tomioka
, Jungpil Shin
:
Hand Gesture Recognition for Multi-Culture Sign Language Using Graph and General Deep Learning Network. 144-155 - Mir Ali Rezazadeh Baee
, Leonie Simpson
, Warren Armstrong
:
Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata. 156-169 - Zixiang Wei
, Bomin Mao
, Hongzhi Guo
, Yijie Xun
, Jiajia Liu
, Nei Kato
:
An Intelligent Path Loss Prediction Approach Based on Integrated Sensing and Communications for Future Vehicular Networks. 170-180 - Urja Pawar
, Donna O'Shea
, Ruairi O'Reilly
, Maebh Costello
, Christian Beder
:
Optimal Neighborhood Contexts in Explainable AI: An Explanandum-Based Evaluation. 181-194 - Farrukh Pervez
, Moazzam Shoukat
, Muhammad Usama
, Moid Sandhu
, Siddique Latif
, Junaid Qadir
:
Affective Computing and the Road to an Emotionally Intelligent Metaverse. 195-214 - Yuto Omae
, Masaya Mori, Yohei Kakimoto
:
Multi-Rules Mining Algorithm for Combinatorially Exploded Decision Trees With Modified Aitchison-Aitken Function-Based Bayesian Optimization. 215-226 - Christos Chronis
, Iraklis Varlamis
, Yassine Himeur
, Aya Nabil Sayed
, Tamim M. Al-Hasan
, Armstrong Nhlabatsi
, Faycal Bensaali
, George Dimitrakopoulos
:
A Survey on the use of Federated Learning in Privacy-Preserving Recommender Systems. 227-247 - Mohammad Wazid, Ashok Kumar Das
, Youngho Park:
Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future Research. 248-267 - Clóvis Holanda do Nascimento
, Vinicius Cardoso Garcia
, Ricardo de Andrade Araújo
:
A Word Sense Disambiguation Method Applied to Natural Language Processing for the Portuguese Language. 268-277 - Syeda Tayyaba Bukhari
, Muhammad Umar Janjua
, Junaid Qadir
:
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique. 278-289 - Sateeshkrishna Dhuli
, Fouzul Atik
, Anamika Chhabra
, Prem Singh
, Linga Reddy Cenkeramaddi
:
Performance Analysis of Gossip Algorithms for Large Scale Wireless Sensor Networks. 290-302 - Petro Mushidi Tshakwanda
, Sisay Tadesse Arzo
, Michael Devetsikiotis
:
Advancing 6G Network Performance: AI/ML Framework for Proactive Management and Dynamic Optimal Routing. 303-314 - Mir Ali Rezazadeh Baee, Leonie Simpson, Warren Armstrong:
Anomaly Detection in Key-Management Activities Using Metadata: A Case Study and Framework. 315-328 - Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, Mou Dasgupta, Ashok Kumar Das, Youngho Park:
ECC-PDGPP: ECC-Based Parallel Dependency RFID-Grouping-Proof Protocol Using Zero-Knowledge Property in the Internet of Things Environment. 329-342 - Farzam Tajdari, Toon Huysmans, Xinhe Yao, Jun Xu, Maryam Zebarjadi, Yu Song:
4D Feet: Registering Walking Foot Shapes Using Attention Enhanced Dynamic-Synchronized Graph Convolutional LSTM Network. 343-355
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.