Showing results 5813 to 5832 of 6014
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Validation of rules used in foxy peer-to-peer network investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | ||
Validation Rules for Enhancing Foxy P2P Network Investigations Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics | 2014 | ||
Validity information retrieval for spatio-temporal queries: Theoretical performance bounds Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2003 | ||
Value Analysis Framework for RFID Technology Adoption in Retailers in China Journal:Communications of the Association for Information Systems | 2008 | ||
VANET-based secure taxi service Journal:Ad Hoc Networks | 2013 | ||
Variable-size rectangle covering Proceeding/Conference:Lecture Notes in Computer Science | 2009 | ||
Variational 3D shape segmentation for bounding volume computation Journal:Computer Graphics Forum | 2007 | ||
Variational blue noise sampling Journal:IEEE Transactions on Visualization and Computer Graphics | 2012 | ||
Variational mesh segmentation via quadric surface fitting Journal:Computer-Aided Design | 2012 | ||
Advisor(s):Wang, WP | 2010 | ||
Variational smoothing in recurrent neural network language models Proceeding/Conference:7th International Conference on Learning Representations (ICLR 2019) | 2019 | ||
vBalance: using interrupt load balance to improve I/O performance for SMP virtual machines Proceeding/Conference:Proceedings of the 3rd ACM Symposium on Cloud Computing | 2012 | ||
VDM-DA: Virtual Domain Modeling for Source Data-Free Domain Adaptation Journal:IEEE Transactions on Circuits and Systems for Video Technology | 2022 | ||
Vector Regression Functions for Texture Compression Journal:ACM Transactions on Graphics | 2015 | ||
Vector solid textures Proceeding/Conference:ACM Transactions on Graphics | 2010 | ||
1992 | |||
Verifiable and anonymous encryption in asymmetric bilinear maps Proceeding/Conference:Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 | 2013 | ||
Advisor(s):Tse, TH | 2003 | ||
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation Proceeding/Conference:Lecture Notes in Computer Science | 2013 | ||
Verifying systems rules using rule-directed symbolic execution Proceeding/Conference:International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS | 2013 |