History
1
1731

Please fill in your query. A complete syntax description you will find on the General Help page.

Result 41 to 60 of 1731 total

A Novel Technique for Radar Depth Sounding of Fast Outlet Glaciers and Ice-Sheet Margins. (English)
IEEE Geosci. Remote Sensing Lett.IEEE Geosci. Remote Sensing Lett. 12, N0. 3, 587-591(2015)
41
Estimations of Regional Surface Energy Fluxes Over Heterogeneous Oasis-Desert Surfaces in the Middle Reaches of the Heihe River During HiWATER-MUSOEXE. (English)
IEEE Geosci. Remote Sensing Lett.IEEE Geosci. Remote Sensing Lett. 12, N0. 3, 671-675(2015)
42
You Are Where You Go: Inferring Demographic Attributes from Location Check-ins. (English)
WSDM, 295-304(2015)
43
Detecting and analyzing influenza epidemics with social media in China. (English)
Tseng, Vincent S. (ed.) et al., Advances in knowledge discovery and data mining. 18th Pacific-Asia conference, PAKDD 2014, Tainan, Taiwan, May 13‒16, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-319-06607-3/pbk). Lecture Notes in Computer Science 8443. Lecture Notes in Artificial Intelligence, 90-101 (2014).
44
Water molecules diffusion in diffusion weighted imaging. (English)
Zhang, Yanchun (ed.) et al., Health information science. Third international conference, HIS 2014, Shenzhen, China, April 22‒23, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06268-6/pbk). Lecture Notes in Computer Science 8423, 229-236 (2014).
45
Color-coded imaging with adaptive multiscale spatial filtering. (English)
Zhang, Yanchun (ed.) et al., Health information science. Third international conference, HIS 2014, Shenzhen, China, April 22‒23, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06268-6/pbk). Lecture Notes in Computer Science 8423, 121-128 (2014).
46
Mean shift based feature points selection algorithm of DSA images. (English)
Zhang, Yanchun (ed.) et al., Health information science. Third international conference, HIS 2014, Shenzhen, China, April 22‒23, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06268-6/pbk). Lecture Notes in Computer Science 8423, 12-19 (2014).
47
A full privacy-preserving scheme for location-based services. (English)
Linawati (ed.) et al., Information and communication technology. Second IFIP TC5/8 international conference, ICT-Eurasia 2014, Bali, Indonesia, April 14‒17, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55031-7/pbk). Lecture Notes in Computer Science 8407, 596-601 (2014).
48
An improved ants colony algorithm for NP-hard problem of travelling salesman. (English)
Zu, Qiaohong (ed.) et al., Pervasive computing and the networked world. Joint international conference, ICPCA/SWS 2013, Vina del Mar, Chile, December 5‒7, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-319-09264-5/pbk). Lecture Notes in Computer Science 8351, 432-440 (2014).
49
Online auction based relay selection for cooperative communications in CR networks. (English)
Cai, Zhipeng (ed.) et al., Wireless algorithms, systems, and applications. 9th international conference, WASA 2014, Harbin, China, June 23‒25, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07781-9/pbk). Lecture Notes in Computer Science 8491, 482-493 (2014).
50
An improved correlation method based on rotation invariant feature for automatic particle selection. (English)
Basu, Mitra (ed.) et al., Bioinformatics research and applications. 10th international symposium, ISBRA 2014, Zhangjiajie, China, June 28‒30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08170-0/pbk). Lecture Notes in Computer Science 8492. Lecture Notes in Bioinformatics, 114-125 (2014).
51
A parallel scheme for three-dimensional reconstruction in large-field electron tomography. (English)
Basu, Mitra (ed.) et al., Bioinformatics research and applications. 10th international symposium, ISBRA 2014, Zhangjiajie, China, June 28‒30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08170-0/pbk). Lecture Notes in Computer Science 8492. Lecture Notes in Bioinformatics, 102-113 (2014).
52
Vertex distinguishing edge coloring of graphs with $δ= Δ\ge \frac{n}{3}^1$. (English)
Util. Math. 95, 341-347 (2014).
53
Representation and reasoning of fuzzy ER models with description logic DLR. (English)
J. Intell. Fuzzy Syst. 26, No. 2, 611-623 (2014).
54
A non-existence proof of generalized Bent functions. (Chinese)
J. Zhengzhou Univ., Nat. Sci. Ed. 46, No. 3, 32-35 (2014).
55
A binary wolf pack algorithm for solving 0-1 knapsack problems. (Chinese)
Syst. Eng. Electron. 36, No. 8, 1660-1667 (2014).
56
Cryptanalysis and improvement of a certificateless partially blind signature scheme. (Chinese)
J. Xinyang Norm. Univ., Nat. Sci. 27, No. 2, 170-175 (2014).
57
New conditional gradient algorithms for the graph max-bisection problem. (Chinese)
Numer. Math., Nanjing 36, No. 1, 86-96 (2014).
58
Stochastic maximum principle for forward-backward stochastic systems associated with Lévy processes. (Chinese)
Chin. Ann. Math., Ser. A 35, No. 1, 83-100 (2014).
59
A provably secure ring signature scheme with bounded leakage resilience. (English)
Huang, Xinyi (ed.) et al., Information security practice and experience. 10th international conference, ISPEC 2014, Fuzhou, China, May 5‒8, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06319-5/pbk). Lecture Notes in Computer Science 8434, 388-402 (2014).
60

Result 41 to 60 of 1731 total