Zobrazeno 1 - 10
of 174
pro vyhledávání: '"Thorsten Strufe"'
Autor:
Ladan Khaloopour, Yanpeng Su, Florian Raskob, Tobias Meuser, Roland Bless, Leon Janzen, Kamyar Abedi, Marko Andjelkovic, Hekma Chaari, Pousali Chakraborty, Michael Kreutzer, Matthias Hollick, Thorsten Strufe, Norman Franchi, Vahid Jamali
Publikováno v:
IEEE Access, Vol 12, Pp 155666-155695 (2024)
The sixth generation (6G) mobile communication networks are expected to intelligently integrate into various aspects of modern digital society, including smart cities, homes, health-care, transportation, and factories. While offering a multitude of s
Externí odkaz:
https://doaj.org/article/e83e829e730c407facd28d164dcc2622
Publikováno v:
Applied Sciences, Vol 12, Iss 21, p 11177 (2022)
Hierarchical text classification consists of classifying text documents into a hierarchy of classes and sub-classes. Although Artificial Neural Networks have proved useful to perform this task, unfortunately, they can leak training data information t
Externí odkaz:
https://doaj.org/article/454637815dc24661bd5b8e1d0b5a81fe
Autor:
Sven Jager, Benjamin Schiller, Philipp Babel, Malte Blumenroth, Thorsten Strufe, Kay Hamacher
Publikováno v:
Algorithms for Molecular Biology, Vol 12, Iss 1, Pp 1-16 (2017)
Abstract Background In this work, we present a new coarse grained representation of RNA dynamics. It is based on adjacency matrices and their interactions patterns obtained from molecular dynamics simulations. RNA molecules are well-suited for this r
Externí odkaz:
https://doaj.org/article/7b936fff4fe74f4291a99e92d7dd60bd
Autor:
Patricia Arias-Cabarcos, Matin Fallahi, Thilo Habrich, Karen Schulze, Christian Becker, Thorsten Strufe
Publikováno v:
ACM Transactions on Privacy and Security. 26:1-36
Brainwaves have demonstrated to be unique enough across individuals to be useful as biometrics. They also provide promising advantages over traditional means of authentication, such as resistance to external observability, revocability, and intrinsic
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2023:384-399
Data collection and aggregation by online services happens to an extent that is often beyond awareness and comprehension of its users. Transparency tools become crucial to inform people, though it is unclear how well they work. To investigate this ma
Publikováno v:
2023 IEEE International Conference on Pervasive Computing and Communications (PerCom).
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783031334870
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::542336a0744e061a2b85edbea9376a36
https://doi.org/10.1007/978-3-031-33488-7_17
https://doi.org/10.1007/978-3-031-33488-7_17
Publikováno v:
Computers & Chemical Engineering, 176, Art.-Nr.: 108295
Information which is contained in Hazard & Operability (HAZOP) studies is highly sensitive since it can reveal the vulnerabilities of a system and potential ways in which to bypass safeguards. Through the design of systems involving collaboration alo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5518319216f3e264fc7f32e8794e7243
Publikováno v:
2022 IEEE International Conference on Big Data (Big Data).
Publikováno v:
Journal of Interactive Marketing. 56:1-17
Today, online social networks (OSNs) constitute a major part of our lives and have, to a large extent, replaced traditional media for direct communication, as well as information dissemination and gathering. In the vast amount of posts that get publi