All Stories

  1. A fairer way to train and evaluate AI text summaries using multiple references
  2. Teaching self-driving cars to understand roads better using AI and learning from experience
  3. How safe is monocular depth estimation for self-driving cars at intersections?
  4. A better way to evaluate how similar summaries are to the original text
  5. A new way to evaluate question-answering systems for better reliability
  6. Making self-driving cars safer by testing their vision against road hacks
  7. How Computers Learn to Write Human-Like Text Summaries: A Global Research Overview
  8. An Efficient System for Finding Relevant Information from Internal Company Documents and Websites
  9. Improving Lane Detection in Self-Driving Cars with a Layered Network Approach
  10. Smart Network Switching: Improving Mobile Data Transfer Between LTE and WiFi
  11. Detecting and classifying threats in tweets
  12. Improving AdaGrad Algorithms via Cosine Annealing: Data Distribution Analysis
  13. Explaining how easily deep learning models misjudge images
  14. Efficacy of Combining Neural Networks and Symbolic Reasoning for Common Sense Reasoning
  15. Selection of Key Sentences to Enhance the Effectiveness of Text Summarization
  16. Recognizing and Extracting Tabular Data from Scanned Documents
  17. Omniscient: An Automatic Question Answering System
  18. User Application Based Network Service
  19. Evaluating Gender Bias in Hindi-English Machine Translation
  20. Recognition of institute names and degrees in a CV with minimum tagging using AI
  21. Multiclass Queueing Network Modeling and Traffic Flow Analysis for SDN-Enabled Mobile Core Networks With Network Slicing
  22. Out of the Closet
  23. Automated Stock Price Forecasting for The Near Future
  24. Improving learning in hearing-impaired children through artificial intelligence
  25. Symmetric key-based authenticated encryption protocol
  26. Meta-Learner with Sparsified Backpropagation
  27. IoT Based Driving Risk Assessment and Warning System
  28. Performance Analysis of Out-Band OpenFlow Switch Architecture: The Single Node Case
  29. A meta data mining framework for botnet analysis
  30. Face Detection and Tagging Using Deep Learning
  31. Chroot Hardening Through System Calls Modification
  32. Chatbot for university related FAQs
  33. Extracting quality relations from categorical data using modified qube algorithm
  34. Fitness function to find game equilibria using genetic algorithms
  35. Multi-modality face recognition: An information theoretic approach
  36. Neural network approach for vision-based track navigation using low-powered computers on mavs
  37. Word based thematic game on Indian mythology
  38. Safe buzz: adaptive security for multi-agents through situational awareness
  39. Safe buzz: adaptive security for multi-agents through situational awareness
  40. Context based interesting tweet recommendation framework
  41. Intelligence analysis of Tay Twitter bot
  42. Path independent real time points of interest detection in road networks
  43. Detection of fake Twitter followers using graph centrality measures
  44. Identification of causal relationships among clinical variables for cancer diagnosis using multi-tenancy
  45. Identification of gene network motifs for cancer disease diagnosis
  46. Mutual fund performance prediction
  47. Unemployment rates forecasting using supervised neural networks
  48. Image sentiment analysis using deep convolutional neural networks with domain specific fine tuning
  49. Natural language image descriptor
  50. Anti-scraping application development
  51. Is That Twitter Hashtag Worth Reading
  52. Is Stack Overflow Overflowing With Questions and Tags
  53. Smart card based password authentication and user anonymity scheme using ECC and steganography
  54. Differential private random forest
  55. Towards a generic framework for short term firm-specific stock forecasting
  56. Threat Analysis and malicious user detection in reputation systems using Mean Bisector Analysis and Cosine Similarity (MBACS)
  57. Detection of User Cluster with Suspicious Activity in Online Social Networking Sites
  58. Contextual information based recommender system using Singular Value Decomposition
  59. Detection and filtering of collaborative malicious users in reputation system using quality repository approach
  60. Alert-BDI: BDI model with adaptive alertness through situational awareness
  61. Optimal Neural Network Architecture for Stock Market Forecasting
  62. Stock Market Prediction Accuracy Analysis Using Kappa Measure
  63. Aware-BDI: An Extension of the BDI Model Incorporating Situational Awareness
  64. Ownership authentication transfer protocol for ubiquitous computing devices
  65. Model Checking Zero Knowledge System
  66. Enhanced mining association rule algorithm with reduced time & space complexity
  67. Modelling and Verification of Extensible Authentication Protocol Using Spin Model Checker
  68. Web opinion mining for social networking sites
  69. Decoding robustness performance comparison for QR and data matrix code
  70. Modeling & verification of Sliding Window Protocol with data loss and intruder detection using NuSMV
  71. Formal verification of the Extensible Authentication Protocol using SPIN
  72. Design and development of a desktop monitoring system
  73. Modeling two way concurrent buffer system using timed automata in UPPAAL
  74. Erroneous state detection in piecewise FIFO system
  75. Differentiated QoS with Modified C/I based scheduling algorithm
  76. Modeling and Verification of Agent based Adaptive Traffic Signal using Symbolic Model Verifier
  77. Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication
  78. Symbolic verification of web crawler functionality and its properties
  79. Modeling and Verification of Fiat-Shamir Zero Knowledge Authentication Protocol
  80. Cloud Based Application Development for Accessing Restaurant Information on Mobile Device using LBS
  81. Is OAuth flawless?
  82. Modeling and Verification of Kerberos Protocol Using Symbolic Model Verifier
  83. Symbolic Verification of a Strength Based Multi-Agent Argumentation Scheme
  84. Modeling and Verification of Inter Realm Authentication in Kerberos Using Symbolic Model Verifier
  85. Logical Modeling and Verification of a Strength Based Multi-agent Argumentation Scheme Using NuSMV
  86. Modeling and Verification of Server Aided Verification Protocol Using NuSMV
  87. Modeling and Verification of Chess Game Using NuSMV
  88. Cloud Based Application Development for Mobile Devices for Accessing LBS
  89. Physical Layer Authentication in Wired and Wireless Communication Systems
  90. Modeling freshness concept to overcome Replay attack in Kerberos protocol using NuSMV
  91. Protecting location privacy in Augmented Reality using k-anonymization and pseudo-id
  92. Model checking message exchange in Location Based Services
  93. Securing location privacy in Augmented Reality
  94. Exact schedulability analysis of global multi-processor IUF scheduling using symbolic model checking
  95. A generalized closed form relation for BER of QPSK/M-QAM over fading channel