Showing results 2875 to 2894 of 5841
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Joint optimization toward effective and efficient image search Journal:IEEE Transactions on Cybernetics | 2013 | ||
Joint Search by Social and Spatial Proximity Journal:IEEE Transactions on Knowledge and Data Engineering | 2015 | ||
Joint semantic segmentation by searching for compatible-competitive references Proceeding/Conference:MM 2012 - Proceedings of the 20th ACM International Conference on Multimedia | 2012 | ||
2020 | |||
Jointly Private Convex Programming Proceeding/Conference:Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016 Proceedings | 2016 | ||
JointPruning: Pruning Networks Along Multiple Dimensions for Efficient Point Cloud Processing Journal:IEEE Transactions on Circuits and Systems for Video Technology | 2022 | ||
JPEG image width estimation for file carving Journal:IET Image Processing | 2018 | ||
JSBiRTH: Dynamic javascript birthmark based on the run-time heap Proceeding/Conference:Proceedings of IEEE Annual International Computer Software and Applications Conference, COMPSAC 2011 | 2011 | ||
JSCloud: toward remote execution of JavaScript code on handheld devices Proceeding/Conference:Proceedings of the 12th International Conference on Quality Software (QSIC 2012), Xi'an, Shaanxi, China, 27-29 August 2012 | 2012 | ||
Judgment Tagging and Recommendation Using Pre-Trained Language Models and Legal Taxonomy Book:The 21st European Conference on Artificial Intelligence (ECAI), August, 2014, Czech Republic | 5-Dec-2022 | ||
JUMP-DP: A Software DSM System with Low-Latency Communication Support Proceeding/Conference:International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA 2000) | 2000 | ||
Just curious: an interview with John Cocke Journal:Computer | 1999 | ||
K-Dimensional hashing scheme for hard disk integrity verification in computer forensics Journal:Journal of Zhejiang University: Science C | 2011 | ||
K-recombination haplotype inference in pedigrees Proceeding/Conference:Lecture Notes in Computer Science | 2005 | ||
k-Times Attribute-Based Anonymous Access Control for Cloud Computing Journal:IEEE Transactions on Computers | 2015 | ||
Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security Proceeding/Conference:Annual Computer Security Applications Conference (ACSAC) 2017 | 2017 | ||
Kalman normalization: Normalizing internal representations across network layers Proceeding/Conference:Advances in Neural Information Processing Systems 31 (NIPS 2018) | 2018 | ||
KB-enabled query recommendation for long-tail queries Proceeding/Conference:Conference on Information and Knowledge Management, CIKM 2016 Proceedings | 2016 | ||
KClist++: A Simple Algorithm for Finding k-Clique Densest Subgraphs in Large Graphs Journal:Proceedings of the VLDB Endowment | 2020 | ||
KDFC-ART: a KD-tree approach to enhancing Fixed-size-Candidate-set Adaptive Random Testing Journal:IEEE Transactions on Reliability | 2019 |