NTIRE 2022 Spectral Recovery Challenge and Data Set | 0 | 0.34 | 2022 |
A Novel Hypercube-Based Heuristic for Quantum Boolean Circuit Synthesis | 0 | 0.34 | 2022 |
ALL Snow Removed - Single Image Desnowing Algorithm Using Hierarchical Dual-tree Complex Wavelet Representation and Contradict Channel Loss. | 0 | 0.34 | 2021 |
Benchmarking Dynamic Searchable Symmetric Encryption Scheme For Cloud-Internet Of Things Applications | 0 | 0.34 | 2020 |
Association Rule Mining with Differential Privacy | 0 | 0.34 | 2020 |
MDP-trees - multi-domain macro placement for ultra large-scale mixed-size designs. | 1 | 0.48 | 2019 |
Foreword for the Industry Track | 0 | 0.34 | 2018 |
MapReduce Scheduling for Deadline-Constrained Jobs in Heterogeneous Cloud Computing Systems. | 14 | 0.62 | 2018 |
Adaptive Repetition Scheme with Machine Learning for 3GPP NB-IoT | 0 | 0.34 | 2018 |
Toward Fog-Based Event-Driven Services For Internet Of Vehicles: Design And Evaluation | 1 | 0.34 | 2017 |
SER: Secure and efficient retrieval for anonymous range query in wireless sensor networks. | 4 | 0.43 | 2017 |
Error-Optimized Sparse Representation for Single Image Rain Removal. | 4 | 0.42 | 2017 |
Improved global motion estimation via motion vector clustering for video stabilization. | 3 | 0.42 | 2016 |
Moving Object Counting Using a Tripwire in H.265/HEVC Bitstreams for Video Surveillance. | 2 | 0.39 | 2016 |
Cyberphysical Security and Dependability Analysis of Digital Control Systems in Nuclear Power Plants. | 7 | 0.49 | 2016 |
Handling Nondeterminism in Logic Simulation So That Your Waveform Can Be Trusted Again | 3 | 0.51 | 2016 |
SFTopk: Secure Functional Top- $k$ Query via Untrusted Data Storage | 1 | 0.36 | 2015 |
Deadline-Constrained MapReduce Scheduling Based on Graph Modelling. | 3 | 0.37 | 2014 |
Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks | 7 | 0.49 | 2014 |
Privacy-Preserving Power Request in Smart Grid Networks | 1 | 0.36 | 2014 |
Smart And Cooperative Sensor Networks | 0 | 0.34 | 2014 |
Dependable Architecture of RFID Middleware on Networked RFID Systems | 0 | 0.34 | 2013 |
Mining Large Network Reconnaissance Data | 0 | 0.34 | 2013 |
Socio-organism inspired model forming multi-level computational scheme for integrated IoT service architecture | 0 | 0.34 | 2012 |
Resource Block Assignment for Interference Avoidance in Femtocell Networks | 4 | 0.50 | 2012 |
Applying verification intention for design customization via property mining under constrained testbenches | 3 | 0.47 | 2011 |
Dependability Enhancement of Reactor Containment in Safety Critical Nuclear Power Plants | 0 | 0.34 | 2011 |
uFlow: dynamic software updating in wireless sensor networks | 2 | 0.37 | 2011 |
An application-driven attack probability-based deterministic pairwise key pre-distribution scheme for non-uniformly deployed sensor networks | 7 | 0.40 | 2011 |
Malware Profiler Based on Innovative Behavior-Awareness Technique | 2 | 0.37 | 2011 |
iCon: utilizing everyday objects as additional, auxiliary and instant tabletop controllers | 22 | 1.09 | 2010 |
Acquiring authentic data in unattended wireless sensor networks. | 7 | 0.58 | 2010 |
A network-based mobility management scheme for future Internet | 10 | 0.54 | 2010 |
Effective design-for-testability techniques for H.264 all-binary integer motion estimation. | 1 | 0.35 | 2010 |
Secure Multidimensional Queries in Tiered Sensor Networks | 1 | 0.36 | 2009 |
Service integration with UPnP agent for an ubiquitous home environment | 4 | 0.52 | 2009 |
An O(n log n) path-based obstacle-avoiding algorithm for rectilinear Steiner tree construction | 11 | 0.73 | 2009 |
Holography: A Hardware Virtualization Tool for Malware Analysis | 5 | 0.70 | 2009 |
Mobile Sensor Network Resilient Against Node Replication Attacks | 29 | 1.04 | 2008 |
Optimization of spatial error concealment for H.264 featuring low complexity | 0 | 0.34 | 2008 |
Optimization of Hybridized Error Concealment for H.264 | 10 | 0.58 | 2008 |
QBIST: Quantum Built-in Self-Test for any Boolean Circuit | 0 | 0.34 | 2008 |
Fast-Transient DC–DC Converter With On-Chip Compensated Error Amplifier | 16 | 2.34 | 2007 |
A Low Complexity Design of Reed Solomon Code Algorithm for Advanced RAID System | 2 | 0.49 | 2007 |
A Randomized Distributed Algorithm for Peer-to-Peer Data Replication in Wireless Ad Hoc Networks | 0 | 0.34 | 2007 |
Fast-Transient DC–DC Converter With On-Chip Compensated Error Amplifier | 16 | 3.14 | 2007 |
Adaptive Low-Error Fixed-Width Booth Multipliers | 9 | 0.77 | 2007 |
Quantum Entanglement, Non-Locality and Secure Computation | 0 | 0.34 | 2007 |
Dependabilities in a High-performance Quantum Real-time Distributed System | 1 | 0.40 | 2007 |
Current path analysis for electrostatic discharge protection | 0 | 0.34 | 2006 |