Showing results 2804 to 2823 of 5787
< previous
next >
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
Visual event recognition in videos by learning from web data Journal:IEEE Transactions on Pattern Analysis and Machine Intelligence | 2012 | |||
Initialization independent clustering with actively self-training method Journal:IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics | 2012 | |||
Histogram contextualization Journal:IEEE Transactions on Image Processing | 2012 | |||
Removing label ambiguity in learning-based visual saliency estimation Journal:IEEE Transactions on Image Processing | 2012 | |||
Detection of sudden pedestrian crossings for driving assistance systems Journal:IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics | 2012 | |||
Human gait recognition using patch distribution feature and locality-constrained group sparse representation Journal:IEEE Transactions on Image Processing | 2012 | |||
A secure public key encryption from computational linear Diffe-Hellman problem Proceeding/Conference:Proceedings of the 2012 8th International Conference on Computational Intelligence and Security, CIS 2012 | 2012 | 4 | ||
2-Nov-2012 | 109 | |||
A deep sum-product architecture for robust facial attributes analysis Proceeding/Conference:Proceedings of the IEEE International Conference on Computer Vision | 2013 | |||
Relation between nonlocality and contextuality for a biphoton Journal:Physical Review A - Atomic, Molecular, and Optical Physics | 2013 | 10 | ||
Oracles are hardly attain'd, and hardly understood: confessions of software testing researchers Proceeding/Conference:Proceedings: 13th International Conference on Quality Software (QSIC 13), Nanjing, China, 29-30 July 2013 | 2013 | 42 | ||
Efficient computation of clipped Voronoi diagram for mesh generation Journal:CAD Computer Aided Design | 2013 | 120 | ||
Error-tolerant resource allocation and payment minimization for cloud system Journal:IEEE Transactions on Parallel and Distributed Systems | 2013 | 43 | ||
Simple and nearly optimal multi-item auctions Proceeding/Conference:Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms | 2013 | 64 | ||
The next generation for the forensic extraction of electronic evidence from mobile telephones Proceeding/Conference:International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE) | 2013 | |||
Empirical evaluation of information leakage detection using net-flow analysis Proceeding/Conference:2nd International Conference on Digital Forensics and Investigation, ICDFI 2013 | 2013 | 55 | ||
Network performance isolation for latency-sensitive cloud applications Journal:Future Generation Computer Systems | 2013 | 48 | ||
Moving big data to the cloud Proceeding/Conference:IEEE Infocom Proceedings | 2013 | 132 | ||
On uniform matroidal networks Proceeding/Conference:IEEE International Symposium on Information Theory. Proceedings | 2013 | 35 | ||
vSkyConf: cloud-assisted multi- party mobile video conferencing Proceeding/Conference:Proceedings of the 2nd ACM SIGCOMM Workshop on Mobile Cloud Computing, MCC'13 | 2013 | 36 |