Journal articles on the topic 'End-To-End'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'End-To-End.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
G, Shravya, and Prof Smitha G R. "CMRepo End-to-End Automation." International Journal of Innovative Research in Computer Science & Technology 7, no. 3 (2019): 79–83. http://dx.doi.org/10.21276/ijircst.2019.7.3.9.
Full textKim, Wiback, and Hosung Nam. "End-to-end non-autoregressive fast text-to-speech." Phonetics and Speech Sciences 13, no. 4 (2021): 47–53. http://dx.doi.org/10.13064/ksss.2021.13.4.047.
Full textAbirami, N., M. Sri Nivetha, and S. Veena. "End to End Encryption using QKD Algorithm." International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (2018): 936–39. http://dx.doi.org/10.31142/ijtsrd18723.
Full textPark, Mingyu, Hyeonseok Kim, and Seongkeun Park. "End-to-End autonomous driving based on Convolutional Recurrent Neural Network." Journal of Korean Institute of Intelligent Systems 29, no. 4 (2019): 297–301. http://dx.doi.org/10.5391/jkiis.2019.29.4.297.
Full textKim, Kihun, Cheonum Park, Changki Lee, and Hyunki Kim. "Korean End-to-end Neural Coreference Resolution with BERT." Journal of KIISE 47, no. 10 (2020): 942–47. http://dx.doi.org/10.5626/jok.2020.47.10.942.
Full textLi-Hong Deng, Li-Hong Deng, Fei Deng Li-Hong Deng, Ge-Xiang Chiou Fei Deng, and Qiang Yang Ge-Xiang Chiou. "End-to-end Speaker Recognition Based on MTFC-FullRes2Net." 電腦學刊 34, no. 3 (2023): 075–91. http://dx.doi.org/10.53106/199115992023063403006.
Full textP L, Subramanian, Baruni M K, and Laksitha N R G. "End-to-End Secure Image Steganography using RSA Encryption." International Journal of Research Publication and Reviews 6, no. 5 (2025): 14892–98. https://doi.org/10.55248/gengpi.6.0525.1965.
Full textRieck, Steffi, Joachim Heidelbach, and Tobias Stahl. "End-to-End- Prozessautomatisierung/End-to-end process automation." wt Werkstattstechnik online 113, no. 01-02 (2023): 42–47. http://dx.doi.org/10.37544/1436-4980-2023-01-02-46.
Full textKim, June-Woo, and Ho-Young Jung. "End-to-end speech recognition models using limited training data*." Phonetics and Speech Sciences 12, no. 4 (2020): 63–71. http://dx.doi.org/10.13064/ksss.2020.12.4.063.
Full textKim, June-Woo, and Ho-Young Jung. "End-to-end speech recognition models using limited training data*." Phonetics and Speech Sciences 12, no. 4 (2020): 63–71. http://dx.doi.org/10.13064/ksss.2020.12.4.063.
Full textKim, Kihun, Cheonum Park, Changki Lee, and Hyunki Kim. "Korean End-to-End Neural Coreference Resolution Using Higher-Order Inference." KIISE Transactions on Computing Practices 26, no. 5 (2020): 250–55. http://dx.doi.org/10.5626/ktcp.2020.26.5.250.
Full textJo, Kyeongbin, Youngjun Jung, Changki Lee, Jihee Ryu, and Joonho Lim. "Korean End-to-End Coreference Resolution with BERT for Long Document." Journal of KIISE 50, no. 1 (2023): 32–39. http://dx.doi.org/10.5626/jok.2023.50.1.32.
Full textThatiparthi, Jayaprakash. "Designing an End-to-End Case Management Solution: From Case Creation to Closure." International Journal of Science and Research (IJSR) 14, no. 5 (2025): 589. https://doi.org/10.21275/sr25508201524.
Full textBae, Kyoung Yul, and Hong Woo Lee. "End to End Model and Delay Performance for V2X in 5G." Journal of Intelligence and Information Systems 22, no. 1 (2016): 107–18. http://dx.doi.org/10.13088/jiis.2016.22.1.107.
Full textIslam, Md Rakibul, Rokshana Akter Jhilik, Nazmul Alam Khan, and Usama Ali. "End-to-End Deep Learning Models for Real-Time Image Compression." International Journal of Research Publication and Reviews 6, no. 5 (2025): 18381–88. https://doi.org/10.55248/gengpi.6.0525.2022.
Full textJeong, Yeon-Jeong, and Ki-Song Yoon. "Design & Implementation of DRM System for End-to-end Content Protection." KIPS Transactions:PartC 13C, no. 1 (2006): 35–44. http://dx.doi.org/10.3745/kipstc.2006.13c.1.035.
Full textChoi, Kyoung-Ho, and Changki Lee. "End-to-end Korean Document Summarization using Copy Mechanism and Input-feeding." Journal of KIISE 44, no. 5 (2017): 503–9. http://dx.doi.org/10.5626/jok.2017.44.5.503.
Full textLee, Jihyun, Kyungshik Lim, Hangseok Oh, and Taekyong Nam. "An Architecture for User Level End-to-end QoS using Overlay in NGN." KIPS Transactions:PartC 12C, no. 6 (2005): 781–92. http://dx.doi.org/10.3745/kipstc.2005.12c.6.781.
Full textReddy, S. Ramana, and C. Raja Rao C Raja Rao. "An end to end QOS Based network Extraction Scheme for 4G Systems." International Journal of Scientific Research 1, no. 7 (2012): 70–72. http://dx.doi.org/10.15373/22778179/dec2012/28.
Full textImmaneni, Jayaram. "End-to-End MLOps in Financial Services: Resilient Machine Learning with Kubernetes." International Journal of Science and Research (IJSR) 11, no. 10 (2022): 1459–67. https://doi.org/10.21275/sr221013093711.
Full textAmgothu, Sudheer. "An End-to-End CI/CD Pipeline Solution Using Jenkins and Kubernetes." International Journal of Science and Research (IJSR) 13, no. 8 (2024): 1576–78. http://dx.doi.org/10.21275/sr24826231120.
Full textHABER, I., F. M. BIENIOSEK, C. M. CELATA, et al. "End-to-end simulation: The front end." Laser and Particle Beams 20, no. 3 (2002): 431–33. http://dx.doi.org/10.1017/s0263034602203134.
Full textAleshire, Benjamin. "End-to-End Encryption." Pleiades: Literature in Context 44, no. 1 (2024): 285. http://dx.doi.org/10.1353/plc.2024.a926471.
Full textLee, Joun Yeop, Sung Jun Cheon, Byoung Jin Choi, Nam Soo Kim, and Doo Hwa Hong. "Speech Style Modeling Method Using Mutual Information for End-to-End Speech Synthesis." Journal of Korean Institute of Communications and Information Sciences 44, no. 9 (2019): 1641–47. http://dx.doi.org/10.7840/kics.2019.44.9.1641.
Full textAbdullah, Wisam Dawood, Ali Abdullah Ali, and Layth Rafea Hazim. "Analysis of End to End Internet Traffic in Education's Networks: A New Study." Webology 19, no. 1 (2022): 3392–409. http://dx.doi.org/10.14704/web/v19i1/web19223.
Full textFei Qi, Fei Qi, and Chen-Qing Wang Fei Qi. "An End-to-End Multi-Scale Conditional Generative Adversarial Network for Image Deblurring." 電腦學刊 34, no. 3 (2023): 237–50. http://dx.doi.org/10.53106/199115992023063403017.
Full textMooghala, Sridhar. "Comprehensive End - to - End Testing: Significance and Precision in Software Application Quality Assurance." International Journal of Science and Research (IJSR) 12, no. 1 (2023): 1253–57. http://dx.doi.org/10.21275/sr24127214929.
Full textSTANZIALE, Rodolfo, Massimo LODI, Enrico D'ANDREA, Fulvio Sammartino, and Virgilio DI LUZIO. "Arteriovenous fistula: end-to-end or end-to side anastomosis?" Hemodialysis International 15, no. 1 (2010): 100–103. http://dx.doi.org/10.1111/j.1542-4758.2010.00503.x.
Full textLee, Sang-Hyun, Jae-Dong kim, and Han-Seok Ko. "End-to-end based on CRNN-GLU-ATT Model for Robust Emotional Features Extraction." Journal of the Institute of Electronics and Information Engineers 57, no. 10 (2020): 45–55. http://dx.doi.org/10.5573/ieie.2020.57.10.45.
Full textNawy, Tal. "End-to-end RNA sequencing." Nature Methods 10, no. 12 (2013): 1144–45. http://dx.doi.org/10.1038/nmeth.2750.
Full textGras, J. J. "End-to-end defect modeling." IEEE Software 21, no. 5 (2004): 98–100. http://dx.doi.org/10.1109/ms.2004.1331312.
Full textJoel, Lucille A. "Laying Circles End to End." AJN, American Journal of Nursing 95, no. 9 (1995): 7. http://dx.doi.org/10.1097/00000446-199509000-00002.
Full textSaidi, Ali G., Nathan L. Binkert, Steven K. Reinhardt, and Trevor Mudge. "End-to-end performance forecasting." ACM SIGARCH Computer Architecture News 37, no. 3 (2009): 361–70. http://dx.doi.org/10.1145/1555815.1555800.
Full textNazaryan, Levon, Emmanouil Panaousis, and Christos Politis. "End-to-End Security Protection." IEEE Vehicular Technology Magazine 5, no. 1 (2010): 85–90. http://dx.doi.org/10.1109/mvt.2009.935542.
Full textJarvis, Graham. "Evolving End to End Traceability." Aerospace Testing International 2024, no. 1 (2024): 46–50. http://dx.doi.org/10.12968/s1478-2774(24)50053-9.
Full textLu, Yung-Hsiang, Qinru Qiu, Ali R. Butt, and Kirk W. Cameron. "End-to-End Energy Management." Computer 44, no. 11 (2011): 75–77. http://dx.doi.org/10.1109/mc.2011.342.
Full textStephenson, Peter. "End-to-End Digital Forensics." Computer Fraud & Security 2002, no. 9 (2002): 17–19. http://dx.doi.org/10.1016/s1361-3723(02)00914-4.
Full textGilbert, Gerald, Michael Hamrick, and Yaakov S. Weinstein. "End-to-end fault tolerance." Quantum Information Processing 7, no. 6 (2008): 263–74. http://dx.doi.org/10.1007/s11128-008-0087-4.
Full textSingh, Abhayendra, Satish Narayanasamy, Daniel Marino, Todd Millstein, and Madanlal Musuvathi. "End-to-end sequential consistency." ACM SIGARCH Computer Architecture News 40, no. 3 (2012): 524–35. http://dx.doi.org/10.1145/2366231.2337220.
Full textHamed, Abdelgaffar, and Robert M. Colomb. "End to End Development Engineering." Journal of Software Engineering and Applications 04, no. 04 (2011): 195–216. http://dx.doi.org/10.4236/jsea.2011.44023.
Full textRekatsinas, Theodoros, Dirk Duellmann, Witold Pokorski, et al. "CASTOR end-to-end monitoring." Journal of Physics: Conference Series 219, no. 4 (2010): 042052. http://dx.doi.org/10.1088/1742-6596/219/4/042052.
Full textJain, Manish, and Constantinos Dovrolis. "End-to-end available bandwidth." ACM SIGCOMM Computer Communication Review 32, no. 4 (2002): 295–308. http://dx.doi.org/10.1145/964725.633054.
Full textJishnu T S and Anju Antony. "LipNet: End-to-End Lipreading." Indian Journal of Data Mining 4, no. 1 (2024): 1–4. http://dx.doi.org/10.54105/ijdm.a1632.04010524.
Full textJishnu, T. S. "LipNet: End-to-End Lipreading." Indian Journal of Data Mining (IJDM) 4, no. 1 (2024): 1–4. https://doi.org/10.54105/ijdm.A1632.04010524.
Full textBradner, S. "The end of end-to-end security? [Internet security." IEEE Security & Privacy Magazine 4, no. 2 (2006): 76–79. http://dx.doi.org/10.1109/msp.2006.54.
Full textBurke, TW, EB Weiser, and WJ Hoskins. "End colostomy using the end-to-end anastomosis instrument." International Journal of Gynecology & Obstetrics 25, no. 6 (1987): 487–88. http://dx.doi.org/10.1016/0020-7292(87)90089-0.
Full textChao Wang, Chao Wang, Wei Luo Chao Wang, Jia-Rui Zhu Wei Luo, Ying-Chun Xia Jia-Rui Zhu, Jin He Ying-Chun Xia, and Li-Chuan Gu Jin He. "End-to-end Visual Grounding Based on Query Text Guidance and Multi-stage Reasoning." 電腦學刊 35, no. 1 (2024): 083–95. http://dx.doi.org/10.53106/199115992024023501006.
Full textResearcher. "BUILDING A ROBUST END-TO-END TESTING FRAMEWORK FOR MICROSERVICE ARCHITECTURES." International Journal of Computer Engineering and Technology (IJCET) 15, no. 5 (2024): 572–82. https://doi.org/10.5281/zenodo.13860001.
Full textJo, Jin-Yong, and Jong-Uk Kong. "Realizing an End-to-End IP Multicast Monitoring Framework for the Support of Networked Collaboration." KIPS Transactions:PartC 16C, no. 5 (2009): 605–14. http://dx.doi.org/10.3745/kipstc.2009.16c.5.605.
Full textFulton, Elizabeth A. "Approaches to end-to-end ecosystem models." Journal of Marine Systems 81, no. 1-2 (2010): 171–83. http://dx.doi.org/10.1016/j.jmarsys.2009.12.012.
Full text