Browsing "Computer Science publications" by Title

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 2424 to 2443 of 2550 < previous   next >
PreviewIssue DateTitleAuthor(s)
2016Unobtrusive human localization and activity recognition for supporting independent living of the elderlyRuan, W.; 18th Annual PhD Forum on Pervasive Computing and Communication (PerCom PhD) (14 Mar 2016 - 18 Mar 2016 : Sydney, NSW)
2015Unregistered multiview mammogram analysis with pre-trained deep learning modelsCarneiro, G.; Nascimento, J.; Bradley, A.; 18th International Conference on Medical Image Computing and Computer-Assisted Intervention (MICCAI 2015) (05 Oct 2015 - 09 Oct 2015 : Munich, GERMANY)
2016Unsupervised CNN for single view depth estimation: geometry to the rescueGarg, R.; Vijay Kumar, B.; Carneiro, G.; Reid, I.; 14th European Conference on Computer Vision (ECCV 2016) (11 Oct 2016 - 14 Oct 2016 : Amsterdam, Netherlands)
2019Unsupervised domain adaptation using robust class-wise matchingZhang, L.; Wang, P.; Wei, W.; Lu, H.; Shen, C.; van den Hengel, A.; Zhang, Y.
2016Unsupervised Feature Learning for Dense Correspondences Across ScenesZhang, C.; Shen, C.; Shen, T.
2011Unsupervised learning of a scene-specific coarse gaze estimatorBenfold, B.; Reid, I.; IEEE International Conference on Computer Vision (ICCV) (06 Nov 2011 - 13 Nov 2011 : Barcelona, Spain)
2017Unsupervised metric fusion over multiview data by graph random walk-based cross-view diffusionWang, Y.; Zhang, W.; Wu, L.; Lin, X.; Zhao, X.
2014Updating attribute reduction in incomplete decision systems with the variation of attribute setShu, W.; Shen, H.
2017USB snooping made easy: crosstalk leakage attacks on USB hubsSu, Y.; Genkin, D.; Ranasinghe, D.; Yarom, Y.; 26th USENIX Security Symposium (16 Aug 2017 - 18 Aug 2017 : Vancouver, BC, Canada)
2015The use of deep learning features in a hierarchical classifier learned with the minimization of a non-greedy loss function that delays gratificationLiao, Z.; Carneiro, G.; IEEE International Conference on Image Processing (ICIP) (27 Sep 2015 - 30 Sep 2015 : Quebec City, CANADA)
2009The use of empirical methods in open source software research: Facts, trends and future directionsStol, K.J.; Babar, M.A.; Russo, B.; Fitzgerald, B.; ICSE Workshop on Emerging Trends in Free/Libre/Open Source Software Research and Development, 2009 (FLOSS '09) (18 May 2009 - 18 May 2009 : Vancouver, Canada)
2012The use of on-line co-training to reduce the training set size in pattern recognition methods: application to left ventricle segmentation in ultrasoundCarneiro, G.; Nascimento, J.; IEEE Conference on Computer Vision and Pattern Recognition (25th : 2012 : Providence, Rhode Island)
2017User clustering in a dynamic social network topic model for short text streamsQiu, Z.; Shen, H.
2012User feedback based query refinement by exploiting skyline operatorIslam, M.; Liu, C.; Zhou, R.; International Conference on Conceptual Modeling (15 Oct 2012 - 18 Oct 2012 : Florence, Italy)
2014User preferences for approximation-guided multi-objective evolutionNguyen, A.; Wagner, M.; Neumann, F.; 10th International Conference on Simulated Evolution and Learning (SEAL) (15 Dec 2014 - 18 Dec 2014 : Dunedin, New Zealand)
2014User-centric ambient information systems and applicationsSheng, Q.; Shakshuki, E.; Ma, J.
2009A user-centric mobile service creation approach converging telco and IT servicesYu, J.; Falcarin, P.; del Alamo, J.; Sienel, J.; Sheng, Q.; Mejia, J.; International Conference on Mobile Business (8th : 2009 : China)
2008A user-centric service creation approach for next generation networksYelmo, J.; del Alamo, J.; Trapero, R.; Falcarin, P.; Yu, J.; Carro, B.; Baladron, C.; ITU-T Kaleidoscope Academic Conference (1st : 2008 : Geneva, Switzerland)
2008User-Centric Services Provisioning in Wireless EnvironmentsSheng, Q.; Benatallah, B.; Maamar, Z.
2012User-driven RFID applications and challengesMitrokotsa, A.; Sheng, Q.; Maamar, Z.