Search

Showing total 3,039 results

Search Constraints

Start Over You searched for: Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic computer science Remove constraint Topic: computer science
3,039 results

Search Results

151. Physical Layer Security Design for Polar Code Construction.

152. BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models.

153. Side-Channel Attacks on Masked Bitsliced Implementations of AES.

154. Image Encryption Based on Local Fractional Derivative Complex Logistic Map.

155. The Paternity of the Modern Computer.

156. Maximizing the Diversity of Exposure in a Social Network.

157. A PLS-SEM Neural Network for Understanding Computer Vision Technical. Apply to Gender Classification System.

158. An efficient maximum bound principle preserving p-adaptive operator-splitting method for three-dimensional phase field shape transformation model.

159. Q -Ary Non-Overlapping Codes: A Generating Function Approach.

160. Some Upper Bounds and Exact Values on Linear Complexities Over F M of Sidelnikov Sequences for M = 2 and 3.

161. Towards Query Pricing on Incomplete Data.

162. A General Categorical Framework of Minimal Realization Theory for a Fuzzy Multiset Language.

163. Decompositions of Circulant-Balanced Complete Multipartite Graphs Based on a Novel Labelling Approach.

164. MANAGEMENT INFORMATION SYSTEMS ERRORS. SCIENTOMETRIC ANALYSIS.

165. After All, Artificial Intelligence is not Intelligent: in a Search for a Comprehensible Neuroscientific Definition of Intelligence.

166. Computing In Humanity: To Predict The Human Behaviors Over Social Media.

167. GAN-Based Enhanced Deep Subspace Clustering Networks.

168. Preference-Aware Task Assignment in Spatial Crowdsourcing: From Individuals to Groups.

169. A Structure-Aware Storage Optimization for Out-of-Core Concurrent Graph Processing.

170. Complementary Data Augmentation for Cloth-Changing Person Re-Identification.

171. Weakly Supervised Learning for Textbook Question Answering.

172. Single Image Super-Resolution Quality Assessment: A Real-World Dataset, Subjective Studies, and an Objective Metric.

173. A data-driven analysis to discover research hotspots and trends of technologies for PFAS removal.

175. The Ultimately Publishable Computer Science Paper for the Latter ' 90s: A Tip for Authors.

176. Information theory inspired optimization algorithm for efficient service orchestration in distributed systems.

177. A Hybrid Systematic Review Approach on Complexity Issues in Data-Driven Fuzzy Inference Systems Development.

178. Análise de Ferramentas de Compiladores em Ambientes Virtualizados.

179. Quantum clustering drives innovations: A bibliometric and patentometric analysis.

180. Call and Calendar.

181. Quantifying the rise and fall of scientific fields.

182. Companion Modeling and "Committed Scenario-Building". For a Richer Taxonomy of Futures.

183. SANet: Statistic Attention Network for Video-Based Person Re-Identification.

184. A Robust Coverless Steganography Scheme Using Camouflage Image.

185. A theory of consciousness from a theoretical computer science perspective: Insights from the Conscious Turing Machine.

186. A General Framework for Approximating Min Sum Ordering Problems.

187. Quaternary Linear Codes and Related Binary Subfield Codes.

188. Near-Optimal Sparsity-Constrained Group Testing: Improved Bounds and Algorithms.

189. A Hierarchical Universal Algorithm for Geometric Objects' Reflection Symmetry Detection.

190. Data-Driven Variable Decomposition for Treatment Effect Estimation.

191. Index-Based Solutions for Efficient Density Peak Clustering.

192. Constructing Completely Independent Spanning Trees in a Family of Line-Graph-Based Data Center Networks.

193. Efficient Ancilla-Free Reversible and Quantum Circuits for the Hidden Weighted Bit Function.

194. Interior Space Design and Automatic Layout Method Based on CNN.

195. A smooth approximation approach for optimization with probabilistic constraints based on sigmoid function.

196. Underrepresentation of women in computer systems research.

197. GFocus: User Focus-Based Graph Query Autocompletion.

198. Research for Practice: Prediction-Serving Systems.

199. Calls for Papers: Important Dates.

200. Two Families of Optimal Linear Codes and Their Subfield Codes.