Showing results 2565 to 2584 of 5787
< previous
next >
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
Beyond spatial pyramids: A new feature extraction framework with dense spatial sampling for image classification Proceeding/Conference:Computer Vision - ECCV 2012: 12th European Conference on Computer Vision, Florence, Italy, October 7-13, 2012. Proceedings, Part IV | 2012 | |||
An Efficient Alignment Algorithm for Searching Simple Pseudoknots over Long Genomic Sequence Journal:IEEE/ACM Transactions on Computational Biology and Bioinformatics | 2012 | 32 | ||
Advisor(s):Hui, CK | 2012 | 175 | ||
Parallel H-Tree Based Data Cubing on Graphics Processors Journal:International Journal of Software and Informatics | 2012 | 122 | ||
Algorithms for Placing Monitors in a Flow Network Journal:Algorithmica | 2012 | 35 | ||
Efficient HMAC-based secure communication for VANETs Journal:Computer Networks | 2012 | 151 | ||
A cache approach towards web-based interactive large-scale terrain rendering Journal:Journal of Information and Computational Science | 2012 | 95 | ||
Centroidal Voronoi Tessellation of Line Segments and Graphs Journal:Computer Graphics Forum: the international journal of the Eurographics Association | 2012 | 70 | ||
An O(log n) distributed approximation algorithm for local broadcasting in unstructured wireless networks Proceeding/Conference:International Conference on Distributed Computing in Sensor Systems Proceedings | 2012 | 77 | ||
Entropic test of quantum contextuality Journal:Physical Review Letters | 2012 | 10 | ||
Collision-free and curvature-continuous path smoothing in cluttered environments Proceeding/Conference:Robotics: Science and Systems VII | 2012 | 5 | ||
MetaCluster 5.0: a two-round binning approach for metagenomic data for low-abundance species in a noisy sample Proceeding/Conference:Bioinformatics | 2012 | 47 | ||
Validation of rules used in foxy peer-to-peer network investigations Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2012 | 67 | ||
(Strong) multi-designated verifiers signatures secure against rogue key attack Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | 7 | ||
Advisor(s):Mamoulis, N | 2012 | 146 | ||
Enchanced monitoring rule through direct node query for Foxy network investigation Proceeding/Conference:International Conference on Digital Forensics and Investigation, ICDFI 2012 | 2012 | 21 | ||
Advisor(s):Wu, C | 2012 | 271 | ||
Enhancing location privacy for electric vehicles (at the right time) Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | 27 | ||
GPU-based parallel collision detection for fast motion planning Journal:International Journal of Robotics Research | 2012 | 55 | ||
Computer-Assisted Rehabilitation Program - Virtual Reality (CARP-VR): A program for cognitive rehabilitation of executive dysfunction Proceeding/Conference:Communications in Computer and Information Science | 2012 | 79 |