Browsing "Computer Science: Conference papers" by Title 

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1238 to 1257 of 2901 < previous   next >
TitleAuthor(s)Issue DateViews
I know where you all are! exploiting mobile social apps for large-scale location privacy probing
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016
10
I/O-efficient algorithms for answering pattern-based aggregate queries in a sequence OLAP system
Proceeding/Conference:Proceedings of the 20th ACM International Conference on Information and Knowledge Management
2011
131
 
I3Net: Implicit Instance-Invariant Network for Adapting One-Stage Object Detectors
Proceeding/Conference:IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
2021
8
ICNet for Real-Time Semantic Segmentation on High-Resolution Images
Proceeding/Conference:Computer Vision – ECCV 2018: 15th European Conference, Munich, Germany, September 8-14, 2018, Proceedings, Part III
2018
19
ID-based ring signature scheme secure in the standard model
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
36
 
IDBA - A practical iterative De Bruijn graph De Novo assembler
Proceeding/Conference:Lecture Notes in Computer Science
2010
145
 
IDBA-MTP: A Hybrid MetaTranscriptomic Assembler Based on Protein Information
Proceeding/Conference:Lecture Notes in Computer Science
2014
43
 
Identification of categories and choices in activity diagrams
Proceeding/Conference:Proceedings - International Conference on Quality Software
2005
91
Identifying centers of circulating and spiraling flow patterns
Proceeding/Conference:Proceedings - International Conference on Pattern Recognition
2006
90
 
Identifying Cyber Threats from Financial Social Media: A Hybrid Feature Selection Approach
Proceeding/Conference:Research Symposium of The Florida Center for Cybersecurity
2018
40
Identifying first seeders in foxy peer to peer networks
Proceeding/Conference:Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010 : revised selected papers
2010
127
 
Identifying static and dynamic volatile memory data from multiple dumps for live forensics
Proceeding/Conference:6th IFIP WG 11.9 International Conference on Digital Forensics
2010
162
Identifying volatile data from multiple memory dumps in live forensics
Proceeding/Conference:IFIP Advances in Information and Communication Technology
2010
131
Identifying weather systems from numerical weather prediction data
Proceeding/Conference:Proceedings - International Conference on Pattern Recognition
2006
89
Identity based delegation network
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2005
269
Identity based ring signature: Why, how and what next
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2005
236
Identity based threshold ring signature
Proceeding/Conference:Lecture Notes in Computer Science
2005
118
Identity-based encryption resilient to continual auxiliary leakage
Proceeding/Conference:Lecture Notes in Computer Science
2012
133
 
2014
100
Identity-based lossy encryption from learning with errors
Proceeding/Conference:Advances in Information and Computer Security, 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26–28, 2015, Proceedings
2015
3