Browsing "Computer Science publications" by Title

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 2501 to 2520 of 3132 < previous   next >
PreviewIssue DateTitleAuthor(s)
2011Robust visual tracking via transfer learningLuo, Wenhan; Li, Xi; Li, Wei; Hu, Weiming; IEEE International Conference on Image Processing (18th : 2011 : Brussels, Belgium); ICIP 2011
2004Robust wavelet-based blind image watermarking against geometrical attacksXie, G.; Shen, H.; IEEE International Conference on Multimedia and Expo (2004 : Taipei, Taiwan)
2009Robust web services provisioning through on-demand replicationSheng, Q.; Maamar, Z.; Yu, J.; Ngu, A.; Yang, J.; Ginige, A.; Mayr, H.C.; Kutsche, R.D.; International United Information Systems Conference (3rd : 2009 : Sydney, Australia)
2019Robust website fingerprinting through the cache occupancy channelShusterman, A.; Kang, L.; Haskal, Y.; Meltser, Y.; Mittal, P.; Oren, Y.; Yarom, Y.; Usenix Annual Technical Conference (USENIX) (14 Aug 2019 - 16 Aug 2019 : Santa Clara, USA)
2004Robustness and specificity in object detectionEriksson, A.; Astrom, K.; International Conference on Pattern Recognition (17th : 2004 : Cambridge, UK)
2021Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic CodeShelton, M.A.; Chmielewski, Ł.; Samwel, N.; Wagner, M.; Batina, L.; Yarom, Y.; CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security (15 Nov 2021 - 19 Nov 2021 : virtual online)
2021ROSITA: Towards Automatic Elimination of Power-Analysis Leakage in CiphersShelton, M.A.; Samwel, N.; Batina, L.; Regazzoni, F.; Wagner, M.; Yarom, Y.; Network and Distributed Systems Security Symposium (NDSS) (21 Feb 2021 - 25 Feb 2021 : virtual online)
2011Routing and wavelength assignment for hypercube communications embedded on optical chordal ring networks of degrees 3 and 4Chen, Y.; Shen, H.; Zhang, H.
2010Routing and wavelength assignment for hypercube in array-based WDM optical networksChen, Y.; Shen, H.
2023Row, Row, Row Your Boat: How to Not Find Weak Keys in PilsungChuengsatiansup, C.; Ronen, E.; Rose, G.G.; Yarom, Y.
2017RRD-SLAM: Radial-distorted rolling-shutter direct SLAMKim, J.; Latif, Y.; Reid, I.; IEEE International Conference on Robotics and Automation (ICRA) (29 May 2017 - 3 Jun 2017 : Singapore)
2022RSA Key Recovery from Digit Equivalence InformationChuengsatiansup, C.; Feutrill, A.; Sim, R.Q.; Yarom, Y.; Ateniese, G.; Venturi, D.; International Conference on Applied Cryptography and Network Security (20 Jun 2022 - 23 Jun 2022 : Rome, Italy)
2011RSLAM: a system for large-scale mapping in constant-time using stereoMei, C.; Sibley, G.; Cummins, M.; Newman, P.; Reid, I.
2015Rubbing shoulders with mobile service robotsDayoub, F.; Morris, T.; Corke, P.
2022Run-of-mine stockyard recovery scheduling and optimisation for multiple reclaimersAssimi, H.; Koch, B.; Garcia, C.; Wagner, M.; Neumann, F.; Hong, J.; Bures, M.; Park, J.W.; Cerný, T.; ACM/SIGAPP Symposium on Applied Computing (SAC) (25 Apr 2022 - 29 Apr 2022 : virtual online)
2021Run-time monitoring of machine learning for robotic perception: a survey of emerging trendsRahman, Q.M.; Corke, P.; Dayoub, F.
2008Runtime analyses for using fairness in evolutionary multi-objective optimizationFriedrich, T.; Horoba, C.; Neumann, F.; Rudolph, G.; Jansen, T.; Lucas, S.M.; Poloni, C.; Beume, N.; Conference on Parallel Problem Solving from Nature (10th : 2008 : Dortmund, Germany)
2014Runtime analysis for maximizing population diversity in single-objective optimizationGao, W.; Neumann, F.; Igel, C.; 2014 Annual Conference on Genetic and Evolutionary Computation (GECCO'14) (12 Jul 2014 - 16 Jul 2014 : Vancouver, Canada)
2009Runtime analysis of a simple ant colony optimization algorithmNeumann, F.; Witt, C.
2019Runtime analysis of evolutionary algorithms for the depth restricted (1,2)-minimum spanning tree problemShi, F.; Neumann, F.; Wang, J.; Friedrich, T.; Doerr, C.; Arnold, D.V.; Foundations of Genetic Algorithms (FOGA) (27 Aug 2019 - 29 Aug 2019 : Potsdam, Germany)