Showing results 2550 to 2569 of 2928
< previous
next >
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
A statistics-based sensor selection scheme for continuous probabilistic queries in sensor networks Proceeding/Conference:Proceedings of the 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA’05 | 2005 | 115 | ||
Stepping motion for a human-like character to maintain balance against large perturbations Proceeding/Conference:Proceedings - IEEE International Conference on Robotics and Automation | 2006 | 5 | ||
Stochastic gradient hamiltonian monte carlo methods with recursive variance reduction Proceeding/Conference:Advances in Neural Information Processing Systems | 2019 | 1 | ||
Stochastic optimal multirate multicast in socially selfish wireless networks Proceeding/Conference:IEEE Infocom Proceedings | 2012 | |||
Stochastic variance-reduced Hamilton Monte Carlo methods Proceeding/Conference:35th International Conference on Machine Learning, ICML 2018 | 2018 | 3 | ||
Storing identically prepared particles in the smallest amount of memory Proceeding/Conference:Conference on Quantum Information and Quantum Control VII (CQIQC) | 2017 | 23 | ||
Strategies of collaboration in multi-channel P2P VoD streaming Proceeding/Conference:Proceedings of the IEEE Conference and Exhibition on Global Telecommunications, GLOBECOM 2010 | 2010 | |||
Strategies of conflict in coexisting streaming overlays Proceeding/Conference:Proceedings - IEEE INFOCOM | 2007 | 130 | ||
A Strategy for Selecting Synchronization Sequences to Test Concurrent Object-Oriented Software Proceeding/Conference:Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003 | 2003 | |||
Strategy-proof mechanism for obnoxious facility location on a line Proceeding/Conference:Lecture Notes in Computer Science | 2015 | 75 | ||
Strategyproof auctions for balancing social welfare and fairness in secondary spectrum markets Proceeding/Conference:Proceedings of the IEEE INFOCOM | 2011 | |||
Stratified Transformer for 3D Point Cloud Segmentation Proceeding/Conference:2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) | 2022 | |||
Stratified Transformer for 3D Point Cloud Segmentation Proceeding/Conference:Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition | 2022 | |||
The streaming capacity of sparsely-connected P2P systems with distributed control Proceeding/Conference:Proceedings of the IEEE INFOCOM | 2011 | 146 | ||
Stroke Controllable Fast Style Transfer with Adaptive Receptive Fields Proceeding/Conference:Computer Vision – ECCV 2018: 15th European Conference, Munich, Germany, September 8-14, 2018, Proceedings, Part XIII | 2018 | 89 | ||
Strong Cryptographic Library - Implementation and Applications Proceeding/Conference:Proceedings of the 9th Hong Kong computer Society Database Conference | 1999 | 109 | ||
Strong Known Related-Key Attacks and the Security of ECDSA Proceeding/Conference:13th International Conference on Network and System Security (NSS 2019) | 2019 | 65 | ||
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2019 | |||
Strong revenue (non-)monotonicity of single-parameter auctions Proceeding/Conference:24th ACM Conference on Economics and Computation (09/07/2023-12/07/2023, London) | 9-Jul-2023 | |||
(Strong) multi-designated verifiers signatures secure against rogue key attack Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | 7 |