Showing results 35 to 54 of 2928
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
A Forensic Logging System for Siemens Programmable Logic Controllers Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2018 | ||
A framework for evaluating client privacy leakages in federated learning Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2020 | ||
A framework for reducing ink-bleed in old documents Proceeding/Conference:26th IEEE Conference on Computer Vision and Pattern Recognition, CVPR | 2008 | ||
A Game-Theoretic Framework for Incentive Mechanism Design in Federated Learning Proceeding/Conference:Federated Learning 2020 (01/12/2020-01/12/2020) | 1-Dec-2020 | ||
A General Framework for Adjustable Neighbor Discovery in Wireless Sensor Networks Proceeding/Conference:The 12th IEEE International Conference on Cyber Physical and Social Computing (CPSCom- 2019) | 2019 | ||
A Generic Communication Scheduler for Distributed DNN Training Acceleration Proceeding/Conference:The 27th ACM Symposium on Operating Systems Principles (SOSP 2019) | 2019 | ||
A high-reflective surface measurement method based on conoscopic holography technology Proceeding/Conference:Proceedings of SPIE - The International Society for Optical Engineering | 2014 | ||
A large-scale car dataset for fine-grained categorization and verification Proceeding/Conference:Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition | 2015 | ||
A Local Similarity Learning Framework for Object Retrieval Proceeding/Conference:2nd World Conference on Robotics & Artificial Intelligence | 2021 | ||
A multi-resolution approach for adapting close character interaction Proceeding/Conference:Proceedings of the ACM Symposium on Virtual Reality Software and Technology, VRST | 2014 | ||
A nonoutsourceable puzzle under GHOST rule Proceeding/Conference:Proceedings - 2017 15th Annual Conference on Privacy, Security and Trust, PST 2017 | 2018 | ||
A power modelling approach for many-core architectures Proceeding/Conference:International Conference on Semantics, Knowledge and Grids (SKG) | 2014 | ||
A privacy-preserving encryption scheme for an internet real-name registration system Proceeding/Conference:IFIP Advances in Information and Communication Technology | 2015 | ||
A Provably-Efficient Online Algorithm for Re-Utilizing Unused VM Resources for Edge Providers Proceeding/Conference:IEEE International Conference on Communications (ICC) | 2019 | ||
A PTAS for the steiner forest problem in doubling metrics Proceeding/Conference:IEEE Annual Symposium on Foundations of Computer Science, FOCS 2016 | 2016 | ||
A recurrent variational autoencoder for human motion synthesis Proceeding/Conference:Proceedings of the British Machine Vision Conference (BMVC) | 2017 | ||
A reduced memory MPEG-2 decoder for compressed HD video Proceeding/Conference:2016 3rd International Conference on Systems and Informatics, ICSAI 2016 | 2016 | ||
A Scalable and Distributed Approach for NFV Service Chain Cost Minimization Proceeding/Conference:IEEE International Conference on Distributed Computing Systems | 2017 | ||
A second-quantised Shannon theory Proceeding/Conference:The Vienna Doctoral Program on Complex Quantum Systems (CoQuS) Colloquium | 2019 | ||
A second-quantized Shannon theory Proceeding/Conference:23rd Annual Conference of the Physical Society of Hong Kong (PSHK2020) | 2020 |