Search for persons
X
?
Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 02 ,
1
Oragentburg : A Platform Supporting Organisation-Based P..:
, In:
?
ACM SIGGRAPH 97 Visual Proceedings: The art and interdisciplinary programs of SIGGRAPH '97 ,
2
Curvelet feature extraction and matching for image retrieva:
, In:
?
2023 Winter Simulation Conference (WSC) ,
3
A Simulation Model and Dashboard for Predicting Covid-19 Be..:
, In:
?
2021 5th International Conference on Computer Science and Artificial Intelligence ,
4
Predictive Screening of Accident Black Spots based on Deep ..:
, In:
?
2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics (ISCAIE) ,
5
Neigbourhood Embedding for Improving Diffusion based Short ..:
, In:
?
2020 IEEE 21st International Conference on High Performance Switching and Routing (HPSR) ,
6
Performance Evaluation of 5G mmWave Networks with Physical-..:
, In:
?
Proceedings of the 20th ACM international conference on Multimedia ,
7
Automatic cinemagraphs for ranking beautiful scenes:
, In:
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
8
Reconstructing Chameleon Hash: Full Security and the Multi-..:
, In:
?
2023 10th International Conference on Dependable Systems and Their Applications (DSA) ,
9
Spatio-Temporal Rule Constraint Guided Safe Reinforcement L..:
, In:
?
2023 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC) ,
10
WhatsNext: Guidance-enriched Exploratory Data Analysis with..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
11
DIDO: Data Provenance from Restricted TLS 1.3 Websites:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
12
Efficient Multiplicative-to-Additive Function from Joye-Lib..:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
14
Attribute-Based Anonymous Credential: Optimization for Sing..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
15