History

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 974 total

$k$-anonymity-based horizontal fragmentation to preserve privacy in data outsourcing. (English)
Cuppens-Boulahia, Nora (ed.) et al., Data and applications security and privacy XXVI. 26th annual IFIP WG 11.3 conference, DBSec 2012, Paris, France, July 11‒13, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31539-8/pbk). Lecture Notes in Computer Science 7371, 263-273 (2012).
1
Development of a mobile museum guide robot that can configure spatial formation with visitors. (English)
Huang, De-Shuang (ed.) et al., Intelligent computing technology. 8th international conference, ICIC 2012, Huangshan, China, July 25‒29, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31587-9/pbk). Lecture Notes in Computer Science 7389, 423-432 (2012).
2
Lessons learned in using social media for disaster relief ‒ ASU crisis response game. (English)
Yang, Shanchieh Jay (ed.) et al., Social computing, behavioral ‒ cultural modeling and prediction. 5th international conference, SBP 2012, College Park, MD, USA, April 3‒5, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29046-6/pbk). Lecture Notes in Computer Science 7227, 282-289 (2012).
3
Real-world behavior analysis through a social media Lens. (English)
Yang, Shanchieh Jay (ed.) et al., Social computing, behavioral ‒ cultural modeling and prediction. 5th international conference, SBP 2012, College Park, MD, USA, April 3‒5, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29046-6/pbk). Lecture Notes in Computer Science 7227, 18-26 (2012).
4
A skin detection approach based on the Dempster-Shafer theory of evidence. (English)
Int. J. Approx. Reasoning 53, No. 4, 636-659 (2012).
5
Solution of general dual fuzzy linear systems using ABS algorithm. (English)
Appl. Math. Sci., Ruse 6, No. 1-4, 163-171 (2012).
6
$H_{\infty}$ mode-independent filter design for Markovian jump genetic regulatory networks with time-varying delays. (English)
Neurocomputing 87, 10-18 (2012).
7
Efficient pairwise classification using local cross off strategy. (English)
Kosseim, Leila (ed.) et al., Advances in artificial intelligence. 25th Canadian conference on artificial intelligence, Canadian AI 2012, Toronto, ON, Canada, May 28‒30, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30352-4/pbk). Lecture Notes in Computer Science 7310. Lecture Notes in Artificial Intelligence, 25-36 (2012).
8
Improving PAWS by the island confinement method. (English)
Rutkowski, Leszek (ed.) et al., Artificial intelligence and soft computing. 11th international conference, ICAISC 2012, Zakopane, Poland, April 29‒May 3, 2012. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-29349-8/pbk). Lecture Notes in Computer Science 7268. Lecture Notes in Artificial Intelligence, 662-670 (2012).
9
Kinetic pie Delaunay graph and its applications. (English)
Fomin, Fedor V. (ed.) et al., Algorithm theory ‒ SWAT 2012. 13th Scandinavian symposium and workshops, Helsinki, Finland, July 4‒6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31154-3/pbk). Lecture Notes in Computer Science 7357, 48-58 (2012).
10
Modeling and verification of hybrid dynamic systems using multisingular hybrid Petri nets. (English)
Theor. Comput. Sci. 446, 48-74 (2012).
11
Chaos control and modified projective synchronization of unknown heavy symmetric chaotic gyroscope systems via Gaussian radial basis adaptive backstepping control. (English)
Nonlinear Dyn. 67, No. 3, 1913-1941 (2012).
12
A secure framework of the surveillance video network integrating heterogeneous video formats and protocols. (English)
Comput. Math. Appl. 63, No. 2, 525-535 (2012).
13
New constructions of SSPDs and their applications. (English)
Comput. Geom. 45, No. 5-6, 200-214 (2012).
14
An integrated cross-layer framework of adaptive FEedback REsource allocation and Prediction for OFDMA systems. (English)
Comput. Netw. 56, No. 7, 1863-1875 (2012).
15
A high-performance and scalable multi-core aware software solution for network monitoring (English)
The Journal of Supercomputing 59, No. 2, 720-743 (2012).
16
Performance, optimization, and fitness: connecting applications to architectures. (English)
Concurrency Comput. Pract. Exp. 23, No. 10, 1066-1100 (2011).
17
A class of BCK-algebras. (English)
Int. J. Algebra 5, No. 25-28, 1379-1385 (2011).
18
A novel crawling algorithm for web pages. (English)
Salem, Mohamed Vall Mohamed (ed.) et al., Information retrieval technology. 7th Asia information retrieval societies conference, AIRS 2011, Dubai, United Arab Emirates, December 18‒20, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25630-1/pbk). Lecture Notes in Computer Science 7097, 263-272 (2011).
19
On the use of Haar wavelet transform and scaling data perturbation for privacy preserving clustering of large datasets. (English)
Int. J. Wavelets Multiresolut. Inf. Process. 9, No. 6, 867-904 (2011).
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 974 total