Search

Showing total 768 results
768 results

Search Results

1. A Galois Connection Approach to Wei-Type Duality Theorems.

2. Improved Bounds for (b, k)-Hashing.

3. Latin American Women and Computer Science: A Systematic Literature Mapping.

4. CONNA: Addressing Name Disambiguation on the Fly.

5. Selected papers from the seventh itu kaleidoscope academic conference - Guest Editorial.

6. Shortened Linear Codes From APN and PN Functions.

7. The High Faulty Tolerant Capability of the Alternating Group Graphs.

8. 2013 International Symposium on Computer Architecture Influential Paper Award.

9. Deep Adaptively-Enhanced Hashing With Discriminative Similarity Guidance for Unsupervised Cross-Modal Retrieval.

10. Lw-Count: An Effective Lightweight Encoding-Decoding Crowd Counting Network.

11. Challenges in KNN Classification.

12. Shortened Linear Codes Over Finite Fields.

14. Reed–Muller Codes: Theory and Algorithms.

15. The Subfield Codes and Subfield Subcodes of a Family of MDS Codes.

16. Maximizing the Diversity of Exposure in a Social Network.

17. Q -Ary Non-Overlapping Codes: A Generating Function Approach.

18. Some Upper Bounds and Exact Values on Linear Complexities Over F M of Sidelnikov Sequences for M = 2 and 3.

19. Towards Query Pricing on Incomplete Data.

20. GAN-Based Enhanced Deep Subspace Clustering Networks.

21. Preference-Aware Task Assignment in Spatial Crowdsourcing: From Individuals to Groups.

22. A Structure-Aware Storage Optimization for Out-of-Core Concurrent Graph Processing.

23. Complementary Data Augmentation for Cloth-Changing Person Re-Identification.

24. Weakly Supervised Learning for Textbook Question Answering.

25. Single Image Super-Resolution Quality Assessment: A Real-World Dataset, Subjective Studies, and an Objective Metric.

26. SANet: Statistic Attention Network for Video-Based Person Re-Identification.

27. A Robust Coverless Steganography Scheme Using Camouflage Image.

28. Quaternary Linear Codes and Related Binary Subfield Codes.

29. Near-Optimal Sparsity-Constrained Group Testing: Improved Bounds and Algorithms.

30. Data-Driven Variable Decomposition for Treatment Effect Estimation.

31. Index-Based Solutions for Efficient Density Peak Clustering.

32. Constructing Completely Independent Spanning Trees in a Family of Line-Graph-Based Data Center Networks.

33. Efficient Ancilla-Free Reversible and Quantum Circuits for the Hidden Weighted Bit Function.

34. GFocus: User Focus-Based Graph Query Autocompletion.

35. Two Families of Optimal Linear Codes and Their Subfield Codes.

36. Criteria Making in Role Negotiation.

37. Call for papers.

38. Collision-Free Video Synopsis Incorporating Object Speed and Size Changes.

39. Cross-Network Skip-Gram Embedding for Joint Network Alignment and Link Prediction.

40. Non-Binary Diameter Perfect Constant-Weight Codes.

41. Generalized Submodular Information Measures: Theoretical Properties, Examples, Optimization Algorithms, and Applications.

42. Multiview Clustering: A Scalable and Parameter-Free Bipartite Graph Fusion Method.

43. Codes, Differentially $\delta$ -Uniform Functions, and $t$ -Designs.

44. Addressing the Item Cold-Start Problem by Attribute-Driven Active Learning.

45. Process Variation Aware Read Performance Improvement for LDPC-Based nand Flash Memory.

46. Resource-Efficient Index Shard Replication in Large Scale Search Engines.

47. Low-Mean Hitting Time for Random Walks on Heterogeneous Networks.

48. LinkBlackHole$^{*}$*: Robust Overlapping Community Detection Using Link Embedding.

49. The Subfield Codes of Ovoid Codes.

50. Locally-Constrained de Bruijn Codes: Properties, Enumeration, Code Constructions, and Applications.