Search

Your search keyword '"Kevin Chen"' showing total 150 results

Search Constraints

Start Over You searched for: Author "Kevin Chen" Remove constraint Author: "Kevin Chen" Database Complementary Index Remove constraint Database: Complementary Index
150 results on '"Kevin Chen"'

Search Results

1. Empowering health geography research with location-based social media data: innovative food word expansion and energy density prediction via word embedding and machine learning.

2. ROBUST OPTIMIZATION WITH CONTINUOUS DECISION-DEPENDENT UNCERTAINTY WITH APPLICATIONS TO DEMAND RESPONSE MANAGEMENT.

3. Heterogeneous Network Crawling: Reaching Target Nodes by Motif-Guided Navigation.

4. US Diplomacy on Twitter (and Why It Should Remain There).

5. Active Surveillance via Group Sparse Bayesian Learning.

6. Decision tree Thompson sampling for mining hidden populations through attributed search.

7. Metagraph-Based Learning on Heterogeneous Graphs.

8. Project-Based Learning of Optics and Photonics: How to Teach a Stand- Alone Technical Elective "Niche" Course?

10. Childhood otitis media: Relationship with daycare attendance, harsh parenting, and maternal mental health.

11. Nonintrusive Smartphone User Verification Using Anonymized Multimodal Data.

12. A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications.

13. Primary Total Hip Arthroplasty With Same-Day Discharge: Who Failed and Why.

21. Monoamine Oxidase A is Required for Rapid Dendritic Remodeling in Response to Stress.

27. TEDAS: A Twitter-based Event Detection and Analysis System.

29. DoCQS.

34. AIDE.

37. A Version Management of Business Process Models in BPMS.

38. Research on Architecture and Key Technology for Service-Oriented Workflow Performance Analysis.

39. The Study on Internet-Based Face Recognition System Using Principal Component Analysis.

40. Permission-Centric Hybrid Access Control.

41. SOGA: Fine-Grained Authorization for Self-Organizing Grid.

42. An Efficient Algorithm for Proportionally Fault-Tolerant Data Mining.

43. Classification of Key Management Schemes for Wireless Sensor Networks.

44. An Efficient Fragile Watermarking for Web Pages Tamper-Proof.

45. A Design of Authentication Protocol for Multi-key RFID Tag.

46. Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags.

47. Adapting Web Services Security Standards for Mobile and Wireless Environments.

48. A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices.

49. A Mechanism for Securing Digital Evidences in Pervasive Environments.

50. Improvement of an Authenticated Key Agreement Protocol.

Catalog

Books, media, physical & digital resources