History

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 | next | last

Result 1 to 20 of 41 total

Approximate verification and enumeration problems. (English)
Roychoudhury, Abhik (ed.) et al., Theoretical aspects of computing ‒ ICTAC 2012. 9th international colloquium, Bangalore, India, September 24‒27, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32942-5/pbk). Lecture Notes in Computer Science 7521, 228-242 (2012).
1
Webspam demotion: low complexity node aggregation methods. (English)
Neurocomputing 76, 105-113 (2012).
2
Using patterns in the behavior of the random surfer to detect webspam beneficiaries. (English)
Chiu, Dickson K. W. (ed.) et al., Web information systems engineering ‒ WISE 2010 workshops. WISE 2010 international symposium WISS, and international workshops CISE, MBC, Hong Kong, China, December 12‒14, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24395-0/pbk). Lecture Notes in Computer Science 6724, 241-253 (2011).
3
Uniform Monte-Carlo model checking. (English)
Giannakopoulou, Dimitra (ed.) et al., Fundamental approaches to software engineering. 14th international conference, FASE 2011, held as part of the joint European conferences on theory and practice of software, ETAPS 2011, Saarbrücken, Germany, March 26 ‒ April 3, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19810-6/pbk). Lecture Notes in Computer Science 6603, 127-140 (2011).
4
Exact optimization for the $\ell ^{1}$-compressive sensing problem using a modified Dantzig-Wolfe method. (English)
Theor. Comput. Sci. 412, No. 15, 1325-1337 (2011).
5
QCG-OMPI: MPI applications on grids (English)
Future Generation Comp. Syst. 27, No. 4, 357-369 (2011).
6
Detecting webspam beneficiaries using information collected by the random surfer (English)
IJOCI 2, No. 2, 36-48 (2011).
7
Uniform Monte-Carlo model checking (English)
FASE, 127-140 (2011).
8
A compressive sensing algorithm for many-core architectures. (English)
Bebis, George (ed.) et al., Advances in visual computing. 6th international symposium, ISVC 2010, Las Vegas, NV, USA, November 29‒December 1, 2010. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-17273-1/pbk). Lecture Notes in Computer Science 6454, 678-686 (2010).
9
A compressive sensing algorithm for many-core architectures (English)
ISVC (2), 678-686 (2010).
10
Planning large data transfers in institutional grids (English)
CCGRID, 547-552 (2010).
11
Partial ranking of products for recommendation systems (English)
EC-Web, 265-277 (2010).
12
Spotrank: a robust voting system for social news websites (English)
WICOW, 59-66 (2010).
13
Lightweight clustering methods for webspam demotion (English)
Web Intelligence, 98-104 (2010).
14
Using patterns in the behavior of the random surfer to detect webspam beneficiaries (English)
WISE Workshops, 241-253 (2010).
15
Brief announcement: lower bounds on communication for sparse Cholesky factorization of a model problem (English)
SPAA, 79-81 (2010).
16
SAFE-OS: A secure and usable desktop operating system (English)
CRiSIS, 1-7 (2010).
17
Supple: a flexible probabilistic data dissemination protocol for wireless sensor networks (English)
MSWiM, 385-392 (2010).
18
High accuracy failure injection in parallel and distributed systems using virtualization (English)
Conf. Computing Frontiers, 193-196 (2009).
19
Coverage-biased random exploration of models. (English)
Electron. Notes Theor. Comput. Sci. 220, No. 1, 3-14 (2008).
20
first | previous | 1 21 41 | next | last

Result 1 to 20 of 41 total