Browsing "Computer Science publications" by Title

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 11 to 30 of 2560 < previous   next >
PreviewIssue DateTitleAuthor(s)
2011A2U2: A stream cipher for printed electronics RFID tagsDavid, M.; Ranasinghe, D.; Larsen, T.; IEEE International Conference on RFID (5th : 2011 : Orlando, FL)
2014AB-chord: an improved chord based on ant colony optimizationand bi-directional lookup routingZhao, L.; Shen, H.; Li, Y.; Wu, J.; Sixth International Symposium on Parallel Architectures, Algorithms and Programming (PAAP) (13 Jul 2014 - 15 Jul 2014 : Beijing, China)
1996Abstract Data Types and the Digital System Description and Simulation EnvironmentsWilsey, Peter A.; Mause, Norman E.; Ashenden, Peter J.
2014The academic journey of university students on Facebook: an analysis of informal academic-related activity over a semesterVivian, R.; Barnes, A.; Geer, R.; Wood, D.
2010Accelerated hypothesis generation for multi-structure robust fittingChin, T.; Yu, J.; Suter, D.; European Conference on Computer Vision (2010 : Crete, Greece)
2012Accelerated hypothesis generation for multistructure data via preference analysisChin, T.; Yu, J.; Suter, D.
2013Accelerating the divisive information-theoretic clustering of visual wordsZhang, J.; Wang, L.; Liu, L.; Zhou, L.; Li, W.; International Conference on Digital Image Computing: Techniques and Applications (2013 : Hobart, Tasmania)
2015An accuracy-assured privacy-preserving recommender system for internet commerceLu, Z.; Shen, H.
2012Achieving high availability of web services based on a particle filtering approachYao, L.; Sheng, Q.; Maamar, Z.
2015Achieving inter-domain routing security based on distributed translator trust modelKong, L.; Shen, H.
2016Achieving policy defined networking for military operationsNguyen, H.; Webb, M.; Naguleswaran, S.; Military Communications and Information Systems Conference (MilCIS 2016) (08 Nov 2016 - 10 Nov 2016 : Canberra, Australia)
2013Achieving probabilistic anonymity against one-to-multiple linkage attacksShen, H.; Tian, H.; Sang, Y.; Zhang, Z.; International Conference on e-Business Engineering (10th : 2013 : Coventry, United Kingdom)
2016Achieving probabilistic anonymity in a linear and hybrid randomization modelSang, Y.; Shen, H.; Tian, H.; Zhang, Z.
2014Acquisition of triples of knowledge from lecture notes: a natural language processing approachAtapattu Mudiyanselage, T.; Falkner, K.; Falkner, N.; 7th International Conference on Educational Data Mining (04 Jul 2014 - 07 Jul 2014 : London, United Kingdom)
2008Action recognition using shared motion partsPatron-Perez, A.; Sommerlade, E.; Reid, I.; International Workshop on Visual Surveillance (8th : 2008 : Marseille, France)
2004Active control of radiation from a piston set in a rigid sphereLin, Z.; Lu, J.; Shen, C.; Qiu, X.; Xu, B.
2015Active debugger: ITS to teach C++ comprehension skillsMarker, R.; Weerasinghe, A.; 23rd International Conference on Computers in Education (ICCE) (30 Nov 2015 - 04 Dec 2015 : Hangzhou, China)
2018Active learning from noisy tagged imagesAbbasnejad, M.E.; Dick, A.R.; Shi, Q.; Hengel, A.V.D.; British Machine Vision Conference 2018 (BMVC 2018) (03 Sep 2018 - 06 Sep 2018 : Newcastle upon Tyne)
2012Activity theory applied to global software engineering: theoretical foundations and implications for tool buildersTell, P.; Babar, M.A.; 2012 IEEE 7th International Conference on Global Software Engineering (ICGSE 2012) (27 Aug 2012 - 30 Aug 2012 : Porto Alegre, Brazil)
2006Activity topology estimation for large networks of camerasVan Den Hengel, A.; Dick, A.; Hill, R.; IEEE International Conference on Advanced Video and Signal Based Surveillance (2006 : Sydney Australia)