Improving Neural Networks Using Slice Models For Similar Classes | 0 | 0.34 | 2020 |
A Deep Learning Method For Intraoperative Age-Agnostic And Disease-Specific Cardiac Output Monitoring From Arterial Blood Pressure | 0 | 0.34 | 2020 |
MRPrimerW2: an enhanced tool for rapid design of valid high-quality primers with multiple search modes for qPCR experiments. | 0 | 0.34 | 2019 |
Real-Time Connection Monitoring Of Ubiquitous Networks For Intrusion Prediction: A Sequential Knn Voting Approach | 0 | 0.34 | 2015 |
DB-IR integration using tight-coupling in the Odysseus DBMS | 2 | 0.37 | 2015 |
Leveraging spatial join for robust tuple extraction from web pages | 1 | 0.35 | 2014 |
Joins on encoded and partitioned data | 7 | 0.52 | 2014 |
Robust and incremental stitching and calibration with known rotation on pan-tilt-zoom camera | 0 | 0.34 | 2013 |
Regional CRL Distribution Based on the LBS for Vehicular Networks. | 0 | 0.34 | 2013 |
Some symmetric identities on higher order q-Euler polynomials and multivariate fermionic p-adic q-integral on Zp | 0 | 0.34 | 2013 |
A Secure Self-Encryption Scheme for Resource Limited Mobile Devices. | 1 | 0.35 | 2012 |
Hybrid partitioned H.264 full high definition decoder on embedded quad-core. | 3 | 0.40 | 2012 |
Towards secure cooperation in online social networks | 1 | 0.38 | 2012 |
Business Analytics in (a) Blink. | 21 | 1.13 | 2012 |
Symmetry Fermionic -Adic -Integral on ℤ for Eulerian Polynomials. | 0 | 0.34 | 2012 |
A hybrid decision support model to discover informative knowledge in diagnosing acute appendicitis. | 6 | 0.39 | 2012 |
Decision-making model for early diagnosis of congestive heart failure using rough set and decision tree approaches. | 23 | 1.19 | 2012 |
A survey of security issue in multi-agent systems | 19 | 0.67 | 2012 |
A note on sums of products of Bernoulli numbers | 0 | 0.34 | 2011 |
H.264/Avc Uhd Decoder Implementation On Multi-Cluster Platform Using Hybrid Parallelization Method | 4 | 0.47 | 2011 |
Ontology-based Dynamic Role Interaction Control in Multi-Agent Systems. | 0 | 0.34 | 2011 |
Blink: Not Your Father's Database! | 6 | 0.66 | 2011 |
A study on hierarchical policy model for managing heterogeneous security systems | 1 | 0.36 | 2011 |
A study of inchworm robot by using smart materials. | 0 | 0.34 | 2011 |
Tightly-coupled spatial database features in the Odysseus/OpenGIS DBMS for high-performance | 8 | 0.50 | 2010 |
Energy-Efficient Distributed Spatial Join Processing In Wireless Sensor Networks | 0 | 0.34 | 2010 |
Structural consistency: enabling XML keyword search to eliminate spurious results consistently | 9 | 0.49 | 2010 |
Hybrid Spatial Query Processing Between A Server And A Wireless Sensor Network | 1 | 0.36 | 2010 |
Evasion technique and detection of malicious botnet | 2 | 0.39 | 2010 |
H.264 decoder on embedded dual core with dynamically load-balanced functional paritioning | 12 | 0.77 | 2010 |
Situation-Aware Community Computing Model for Developing Dynamic Ubiquitous Computing Systems | 2 | 0.41 | 2010 |
A particle-and-density based evolutionary clustering method for dynamic networks | 89 | 3.94 | 2009 |
Handling Exceptions in Situation-Driven Agent Systems | 1 | 0.35 | 2009 |
The partitioned-layer index: Answering monotone top-k queries using the convex skyline and partitioning-merging technique | 10 | 0.54 | 2009 |
EDCA-TM: IEEE 802.11e MAC enhancement for wireless multi-hop networks | 8 | 0.70 | 2009 |
Installation and evaluation of RFID readers on moving vehicles | 19 | 2.79 | 2009 |
Robot visual servo through trajectory estimation of a moving object using kalman filter | 0 | 0.34 | 2009 |
A Formal Definition of Situation towards Situation-Aware Computing | 1 | 0.39 | 2009 |
Fast Service Selection Using rete Network in Dynamic Environment | 0 | 0.34 | 2009 |
CHRONICLE: A Two-Stage Density-Based Clustering Algorithm for Dynamic Networks | 7 | 0.49 | 2009 |
An architecture for specification and enforcement of temporal access control constraints using OWL | 4 | 1.65 | 2009 |
A Security Coordination Model for an Inter-Organizational Information Incidents Response Supporting Forensic Process | 0 | 0.34 | 2008 |
A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence | 0 | 0.34 | 2008 |
Relevant pattern selection for subspace learning | 3 | 0.40 | 2008 |
Group organization algorithm based on trust and reputation in agent society | 0 | 0.34 | 2008 |
Access Control for Cooperation Systems Based on Group Situation | 5 | 0.60 | 2008 |
A Logical Model And Data Placement Strategies For Mems Storage Devices | 1 | 0.35 | 2008 |
An Automatic Identification of a Damaged Malicious File Using HMM against Anti-Forensics | 0 | 0.34 | 2008 |
Structural optimization of a full-text n-gram index using relational normalization | 5 | 0.58 | 2008 |
Developing Protege Plug-In: Owl Ontology Visualization Using Social Network | 1 | 0.48 | 2008 |