Showing results 2164 to 2183 of 6006
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Anonymous fuzzy identity-based encryption for similarity search Proceeding/Conference:Lecture Notes in Computer Science | 2010 | ||
Scalable probabilistic similarity ranking in uncertain databases Journal:IEEE Transactions on Knowledge and Data Engineering | 2010 | ||
Identifying static and dynamic volatile memory data from multiple dumps for live forensics Proceeding/Conference:6th IFIP WG 11.9 International Conference on Digital Forensics | 2010 | ||
Optimizing data acquisition by sensor-channel co-allocation in wireless sensor networks Proceeding/Conference:Proceedings of the IEEE International Conference on High Performance Computing, HiPC 2010 | 2010 | ||
Discriminative Hessian Eigenmaps for face recognition Proceeding/Conference:ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings | 2010 | ||
Evaluation of evidence in internet auction fraud investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2010 | ||
Adaptive sampling-based profiling techniques for optimizing the distributed JVM runtime Proceeding/Conference:Proceedings of the IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2010 | 2010 | ||
S-OLAP: an OLAP system for analyzing sequence data Proceeding/Conference:Association for Computing Machinery. Special Interest Group on Management of Data. International Conference Proceedings | 2010 | ||
An Ω(1/εlog1/ε) space lower bound for finding e-approximate quantiles in a data stream Proceeding/Conference:Lecture Notes in Computer Science | 2010 | ||
A spatial publish subscribe overlay for massively multiuser virtual environments Proceeding/Conference:ICEIE 2010 - 2010 International Conference on Electronics and Information Engineering, Proceedings | 2010 | ||
XML schema computations: Schema compatibility testing and subschema extraction Proceeding/Conference:International Conference on Information and Knowledge Management, Proceedings | 2010 | ||
Sensitivity analysis of a Bayesian network for reasoning about digital forensic evidence Proceeding/Conference:2010 3rd International Conference on Human-Centric Computing, HumanCom 2010 | 2010 | ||
Exploiting memory usage patterns to improve garbage collections in Java Proceeding/Conference:Proceedings of the 8th International Conference on the Principles and Practice of Programming in Java, PPPJ 2010 | 2010 | ||
Strategies of collaboration in multi-channel P2P VoD streaming Proceeding/Conference:Proceedings of the IEEE Conference and Exhibition on Global Telecommunications, GLOBECOM 2010 | 2010 | ||
Message from the Steering Committee Chair Proceeding/Conference:Proceedings - International Conference on Quality Software | 2010 | ||
Message from the Workshop Chairs of the First International Workshop on Program Debugging in China (IWPDC 2010) Proceeding/Conference:Proceedings of the 10th International Conference on Quality Software, QSIC 2010 | 2010 | ||
GPS calibrated ad-hoc localization for geosocial networking Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Mining uncertain data with probabilistic guarantees Proceeding/Conference:Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining | 2010 | ||
Conflict-minimizing dynamic load balancing for P2P desktop Grid Proceeding/Conference:Proceedings of the 11th IEEE/ACM International Workshop on Grid Computing, Grid 2010 | 2010 | ||
Non-claairvoyant scheduling for weighted flow time and energy on speed bounded processors Proceeding/Conference:Proceedings of the 16th Computing: The Australasian Theory Symposium | 2010 |