Showing results 1238 to 1257 of 2901
< previous
next >
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
I know where you all are! exploiting mobile social apps for large-scale location privacy probing Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 | 10 | ||
I/O-efficient algorithms for answering pattern-based aggregate queries in a sequence OLAP system Proceeding/Conference:Proceedings of the 20th ACM International Conference on Information and Knowledge Management | 2011 | 131 | ||
I3Net: Implicit Instance-Invariant Network for Adapting One-Stage Object Detectors Proceeding/Conference:IEEE Conference on Computer Vision and Pattern Recognition (CVPR) | 2021 | 8 | ||
ICNet for Real-Time Semantic Segmentation on High-Resolution Images Proceeding/Conference:Computer Vision – ECCV 2018: 15th European Conference, Munich, Germany, September 8-14, 2018, Proceedings, Part III | 2018 | 19 | ||
ID-based ring signature scheme secure in the standard model Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | 36 | ||
IDBA - A practical iterative De Bruijn graph De Novo assembler Proceeding/Conference:Lecture Notes in Computer Science | 2010 | 145 | ||
IDBA-MTP: A Hybrid MetaTranscriptomic Assembler Based on Protein Information Proceeding/Conference:Lecture Notes in Computer Science | 2014 | 43 | ||
Identification of categories and choices in activity diagrams Proceeding/Conference:Proceedings - International Conference on Quality Software | 2005 | 91 | ||
Identifying centers of circulating and spiraling flow patterns Proceeding/Conference:Proceedings - International Conference on Pattern Recognition | 2006 | 90 | ||
Identifying Cyber Threats from Financial Social Media: A Hybrid Feature Selection Approach Proceeding/Conference:Research Symposium of The Florida Center for Cybersecurity | 2018 | 40 | ||
Identifying first seeders in foxy peer to peer networks Proceeding/Conference:Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010 : revised selected papers | 2010 | 127 | ||
Identifying static and dynamic volatile memory data from multiple dumps for live forensics Proceeding/Conference:6th IFIP WG 11.9 International Conference on Digital Forensics | 2010 | 162 | ||
Identifying volatile data from multiple memory dumps in live forensics Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2010 | 131 | ||
Identifying weather systems from numerical weather prediction data Proceeding/Conference:Proceedings - International Conference on Pattern Recognition | 2006 | 89 | ||
Identity based delegation network Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2005 | 269 | ||
Identity based ring signature: Why, how and what next Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2005 | 236 | ||
Identity based threshold ring signature Proceeding/Conference:Lecture Notes in Computer Science | 2005 | 118 | ||
Identity-based encryption resilient to continual auxiliary leakage Proceeding/Conference:Lecture Notes in Computer Science | 2012 | 133 | ||
Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications Proceeding/Conference:Lecture Notes in Computer Science | 2014 | 100 | ||
Identity-based lossy encryption from learning with errors Proceeding/Conference:Advances in Information and Computer Security, 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26–28, 2015, Proceedings | 2015 | 3 |