History
1
298

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 298 total

Feature weighting algorithm based on margin and linear programming. (English)
Yao, JingTao (ed.) et al., Rough sets and current trends in computing. 8th international conference, RSCTC 2012, Chengdu, China, August 17‒20, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32114-6/pbk). Lecture Notes in Computer Science 7413. Lecture Notes in Artificial Intelligence, 388-396 (2012).
1
Improving virtualization security by splitting hypervisor into smaller components. (English)
Cuppens-Boulahia, Nora (ed.) et al., Data and applications security and privacy XXVI. 26th annual IFIP WG 11.3 conference, DBSec 2012, Paris, France, July 11‒13, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31539-8/pbk). Lecture Notes in Computer Science 7371, 298-313 (2012).
2
Physically-based haptic rendering for virtual hand interaction. (English)
Gavrilova, Marina L. (ed.) et al., Transactions on Computational Science XVI. Berlin: Springer (ISBN 978-3-642-32662-2/pbk). Lecture Notes in Computer Science 7380. Journal Subline, 163-178 (2012).
3
Anytime heuristic search in temporal HTN planning for developing incident action plans. (English)
AI Commun. 25, No. 4, 321-342 (2012).
4
Trends prediction using social diffusion models. (English)
Yang, Shanchieh Jay (ed.) et al., Social computing, behavioral ‒ cultural modeling and prediction. 5th international conference, SBP 2012, College Park, MD, USA, April 3‒5, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29046-6/pbk). Lecture Notes in Computer Science 7227, 97-104 (2012).
5
On fast and accurate block-based motion estimation algorithms using particle swarm optimization. (English)
Inf. Sci. 197, 53-64 (2012).
6
Bayesian joint modeling of multiple gene networks and diverse genomic data to identify target genes of a transcription factor. (English)
Ann. Appl. Stat. 6, No. 1, 334-355 (2012).
7
Convexity of reverse coherent information capacity and its application. (English)
Phys. Lett., A 375, No. 30-31, 2802-2808 (2011).
8
Image restoration algorithm using APEX method based on dark channel prior. (Chinese)
J. Comput. Appl. 31, No. 9, 2509-2511 (2011).
9
Social fMRI: investigating and shaping social mechanisms in the real world. (English)
Pervasive Mobile Comput. 7, No. 6, 643-659 (2011).
10
When does $\langle T \rangle$ equal sat$(T)$? (English)
J. Symb. Comput. 46, No. 12, 1291-1305 (2011).
11
Design of ship course controller based on genetic algorithm active disturbance rejection technique. (English)
Lin, Song (ed.) et al., Advances in computer science, environment, ecoinformatics, and education. International conference, CSEE 2011, Wuhan, China, August 21‒22, 2011. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-23320-3/pbk; 978-3-642-23321-0/ebook). Communications in Computer and Information Science 214, 476-481 (2011).
12
Design of ship Main engine speed controller based on expert active disturbance rejection technique. (English)
Lin, Song (ed.) et al., Advances in computer science, environment, ecoinformatics, and education. International conference, CSEE 2011, Wuhan, China, August 21‒22, 2011. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-23320-3/pbk; 978-3-642-23321-0/ebook). Communications in Computer and Information Science 214, 470-475 (2011).
13
Event detection over live and archived streams. (English)
Wang, Haixun (ed.) et al., Web-age information management. 12th international conference, WAIM 2011, Wuhan, China, September 14‒16, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-23534-4/pbk). Lecture Notes in Computer Science 6897, 566-577 (2011).
14
Evaluating optimized implementations of stream cipher ZUC algorithm on FPGA. (English)
Qing, Sihan (ed.) et al., Information and communications security. 13th international conference, ICICS 2011, Beijing, China, November 23‒26, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25242-6/pbk). Lecture Notes in Computer Science 7043, 202-215 (2011).
15
An efficient fuzzy rough approach for feature selection. (English)
Yao, JingTao (ed.) et al., Rough sets and knowledge technology. 6th international conference, RSKT 2011, Banff, Canada, October 9‒12, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24424-7/pbk). Lecture Notes in Computer Science 6954. Lecture Notes in Artificial Intelligence, 95-100 (2011).
16
Composite social network for predicting mobile apps installation. (English)
Comput. Res. Repos. 2011, Article No. 1106.0359 (2011).
17
A correlation power analysis attack against Tate pairing on FPGA. (English)
Koch, Andreas (ed.) et al., Reconfigurable computing: architectures, tools and applications. 7th international symposium, ARC 2011, Belfast, UK, March 23‒25, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19474-0/pbk). Lecture Notes in Computer Science 6578, 340-349 (2011).
18
SAQC: SNP array quality control. (English)
BMC Bioinform. 12, 100 (2011).
19
A novel color image watermarking scheme in nonsampled contourlet-domain (English)
Expert Syst. Appl. 38, No. 3, 2081-2098 (2011).
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 298 total