History
1
396


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 396 total

Evaluating books finding tools on social media: A case study of aNobii. (English)
Inf. Process. Manage.Inf. Process. Manage. 50, N0. 1, 54-68(2014)
WorldCat.org
1
Consistent Latent Position Estimation and Vertex Classification for Random Dot Product Graphs. (English)
IEEE Trans. Pattern Anal. Mach. Intell.IEEE Trans. Pattern Anal. Mach. Intell. 36, N0. 1, 48-57(2014)
WorldCat.org
2
Universally consistent vertex classification for latent positions graphs. (English)
Ann. Stat. 41, No. 3, 1406-1430 (2013).
WorldCat.org
3
Inapproximability results for the minimum integral solution problem with preprocessing over $\ell_{\infty}$ norm. (English)
Theor. Comput. Sci. 478, 127-131 (2013).
WorldCat.org
4
A Collaborative Approach for FCA-Based Knowledge Extraction. (English)
CLA, 281-286(2013)
WorldCat.org
5
Spatial Approximate String Search. (English)
IEEE Trans. Knowl. Data Eng.IEEE Trans. Knowl. Data Eng. 25, N0. 6, 1394-1409(2013)
WorldCat.org
6
Comparative Study of Lesions Created by High-Intensity Focused Ultrasound Using Sequential Discrete and Continuous Scanning Strategies. (English)
IEEE Trans. Biomed. EngineeringIEEE Trans. Biomed. Engineering 60, N0. 3, 763-769(2013)
WorldCat.org
7
A steganalysis by adjacency pixel bits structure. (English)
Computers & Electrical EngineeringComputers & Electrical Engineering 39, N0. 2, 488-496(2013)
WorldCat.org
8
Building trust online: Interactions among trust building mechanisms. (English)
Information & ManagementInformation & Management 50, N0. 7, 439-445(2013)
WorldCat.org
9
On Design of Nonlinear Operations and Round Functions of Block Ciphers with Resistance to ASCAs. (English)
INCoS, 226-232(2013)
WorldCat.org
10
Translation validation of scheduling in high level synthesis. (English)
ACM Great Lakes Symposium on VLSI, 101-106(2013)
WorldCat.org
11
Six-degree-of-freedom haptic rendering using translational and generalized penetration depth computation. (English)
World Haptics, 289-294(2013)
WorldCat.org
12
Trust-Aware Service Recommendation via Exploiting Social Networks. (English)
IEEE SCC, 376-383(2013)
WorldCat.org
13
Efficient and scalable monitoring and summarization of large probabilistic data. (English)
SIGMOD/PODS Ph.D. Symposium, 61-66(2013)
WorldCat.org
14
Mashup Service Recommendation Based on User Interest and Social Network. (English)
ICWS, 99-106(2013)
WorldCat.org
15
Integrating local and partial network view for routing on scale-free networks. (English)
SCIENCE CHINA Information SciencesSCIENCE CHINA Information Sciences 56, N0. 10, 1-10(2013)
WorldCat.org
16
Supporting negotiation mechanism privacy authority method in cloud computing. (English)
Knowl.-Based Syst.Knowl.-Based Syst. 51, 48-59(2013)
WorldCat.org
17
Generalized canonical correlation analysis for disparate data fusion. (English)
Pattern Recognition LettersPattern Recognition Letters 34, N0. 2, 194-200(2013)
WorldCat.org
18
Consistent Adjacency-Spectral Partitioning for the Stochastic Block Model When the Model Parameters Are Unknown. (English)
SIAM J. Matrix Analysis ApplicationsSIAM J. Matrix Analysis Applications 34, N0. 1, 23-39(2013)
WorldCat.org
19
CASAT-HOOMT: Computer Aided Software Analysis Tool Based on High Order Object-Oriented Modeling Technique. (English)
COMPSAC, 824-825(2013)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 396 total

Valid XHTML 1.0 Transitional Valid CSS!