A Smart Algorithm for CO2 Emissions Reduction on Realistic Traffic Scenarios Exploiting VANET Architecture
|
2020 |
Sottile, Cesare |
Impact of Bloom Filters on Security and Efficiency of SecaaS Services
|
2020 |
Mencner, Maciej |
Evaluating Calibration and Robustness of Pedestrian Detectors
|
2020 |
Cygert, Sebastian |
A Resilient Distributed Measurement System for Smart Grid Application
|
2020 |
Artale, Giovanni |
Analysis of Available Microcontroller Computing Resources for the Application of Some Cryptographic Hash Functions on Different Internet of Things Platforms
|
2020 |
Dokic, Kristian |
Dangerous Tool Detection for CCTV Systems
|
2020 |
Donath, Paweł |
A Hybrid Data Fusion Architecture for BINDI: A Wearable Solution to Combat Gender-Based Violence
|
2020 |
Rituerto-González, Esther |
Audio Feature Analysis for Precise Vocalic Segments Classification in English
|
2020 |
Zaporowski, Szymon |
New Approach of Solving Congruence Equation System
|
2020 |
Ivanov, Andrey G. |
Towards the Design of a Cybersecurity Competence Network: Findings from the Analysis of Existing Network Organisations
|
2020 |
Tagarev, Todor |
Criticality Assessment of Critical Information Infrastructure Objects: A Category Based Methodology and Ukrainian Experience
|
2020 |
Potii, Oleksandr |
Crowd Density Estimation Based on Face Detection Under Significant Occlusions and Head Pose Variations
|
2020 |
Ara, Rouhollah Kian |
Convolutional Neural Network Decoder for Enhanced Hadamard Error Correcting Code and Its Application in Video Watermarking
|
2020 |
Wassermann, Jakob |
A VCA-Based Approach to Enhance Learning Data Sets for Object Classification
|
2020 |
Baran, Remigiusz |
Symbol Error Probability of Secondary User in Underlay Cognitive Radio Networks with Adaptive Transmit Power Constraint
|
2020 |
Nguyen, Hoang-Sy |
Three-Dimensional Operating Room with Unlimited Perspective
|
2020 |
Proniewska, Klaudia |
Multi-sector Assessment Framework - a New Approach to Analyse Cybersecurity Challenges and Opportunities
|
2020 |
Pappalardo, Salvatore Marco |
A Machine Learning Approach to Dataset Imputation for Software Vulnerabilities
|
2020 |
Rostami, Shahin |
On the Assessment of Completeness and Timeliness of Actionable Cyber Threat Intelligence Artefacts
|
2020 |
Yucel, Cagatay |
A Novel Watermark Method for Image Protection Based on Periodic Haar Piecewise-Linear Transform
|
2020 |
Dziech, Andrzej |