Showing results 4422 to 4441 of 4484
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Web image concept annotation with better understanding of tags and visual features Journal:Journal of Visual Communication and Image Representation | 2010 | ||
Web Services Oriented Data Processing and Integration Proceeding/Conference:The Twelfth International World Wide Web Conference | 2003 | ||
Web User Profiling and Identification Based on Browsing Behavior Analysis Proceeding/Conference:Annual International Federation for Information Processing Working Group (IFIP WG) 11.9 International Conference on Digital Forensics | 2014 | ||
2015 | |||
Webformer: A rapid application development toolkit for writing ajax web form applications Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
WeChecker: Efficient and precise detection of privilege escalation vulnerabilities in Android apps Proceeding/Conference:Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec '15) | 2015 | ||
Weighted average problem revisited under hybrid and malicious model Proceeding/Conference:3rd International Conference on Next Generation Information Technology, ICNIT 2012 | 2012 | ||
Weighted block-sparse low rank representation for face clustering in videos Proceeding/Conference:Computer Vision -- ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part VI | 2014 | ||
Weighted coverage based reviewer assignment Proceeding/Conference:Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, SIGMOD '15 | 2015 | ||
Weighted flow time does not admit O(1)-competitive algorithms Proceeding/Conference:Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms | 2009 | ||
Welcome to ASIACCS 2011 Journal:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011 | 2011 | ||
Welfare maximization with production costs: A primal dual approach Journal:Games and Economic Behavior | 2019 | ||
Welfare maximization with production costs: a primal dual approach Proceeding/Conference:Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms | 2015 | ||
What an Investigator Needs to Know about Encryption & Tracking Technologies Proceeding/Conference:Asia Cyber Crime Summit | 2001 | ||
What do recurrent neural network grammars learn about syntax? Proceeding/Conference:Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics | 2017 | ||
What does aspect-oriented programming mean for functional programmers? Proceeding/Conference:Proceedings of the 2009 ACM SIGPLAN Workshop on Generic Programming, WGP'09, Co-located with the International Conference on Functional Programming, ICFP 2009 | 2009 | ||
When HPC meets Big Data in the Cloud Proceeding/Conference:International Conference on Cloud Computing and Big Data (CloudCom-Asia) | 2013 | ||
When Human Pose Estimation Meets Robustness: Adversarial Algorithms And Benchmarks Proceeding/Conference:IEEE Computer Vision And Pattern Recognition (CVPR) Proceedings | 2021 | ||
When Importless Becomes Meaningful: A Call for Tag-based Namespaces in Programming Languages Proceeding/Conference:Proceedings of the companion publication of the 2014 ACM SIGPLAN conference on Systems, Programming, and Applications Software for Humanity | 2014 | ||
When query authentication meets fine-grained access control: A zero-knowledge approach Proceeding/Conference:Proceedings of the ACM SIGMOD International Conference on Management of Data | 2018 |