Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
All Papers
Title
Home
Papers
All Papers
50 / 544,621 papers shown
Title
Hierarchical Web Page Classification Based on a Topic Model and Neighboring Pages Integration
W. Sriurai
P. Meesad
C. Haruechaiyasak
26
16
0
07 Mar 2010
A New Variable Threshold and Dynamic Step Size Based Active Noise Control System for Improving Performance
P. Babu
A. Krishnan
18
5
0
07 Mar 2010
Indexer Based Dynamic Web Services Discovery
Saba Bashir
F. Khan
M. Y. Javed
Aihab Khan
M. Khiyal
23
4
0
07 Mar 2010
Evaluation of E-Learners Behaviour using Different Fuzzy Clustering Models: A Comparative Study
Mofreh A. Hogo
32
43
0
07 Mar 2010
Integration of Rule Based Expert Systems and Case Based Reasoning in an Acute Bacterial Meningitis Clinical Decision Support System
Mariana Maceiras Cabrera
Ernesto Ocampo Edye
26
25
0
07 Mar 2010
A Secure Hash Function MD-192 With Modified Message Expansion
Harshvardhan Tiwari
Krishna Asawa
37
19
0
07 Mar 2010
State Of The Art In Digital Steganography Focusing ASCII Text Documents
K. F. Rafat
M. Sher
30
2
0
07 Mar 2010
Implementing New-age Authentication Techniques using OpenID for Security Automation
Dharmendra Choukse
U. Singh
D. Sukheja
Rekha Shahapurkar
21
2
0
07 Mar 2010
Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris
A.Jagadeesan
Dr. K.Duraiswamy
43
76
0
07 Mar 2010
The Comparison of Methods Artificial Neural Network with Linear Regression Using Specific Variables for Prediction Stock Price in Tehran Stock Exchange
R. Ahangar
M. Yahyazadehfar
H. Pournaghshband
26
61
0
07 Mar 2010
A Computational Algorithm based on Empirical Analysis, that Composes Sanskrit Poetry
Rama N
M. Lakshmanan
31
3
0
07 Mar 2010
A New Clustering Approach based on Page's Path Similarity for Navigation Patterns Mining
Heidar Mamosian
A. Rahmani
M. Dezfouli
36
2
0
07 Mar 2010
Securing Iris Templates using Combined User and Soft Biometric based Password Hardened Fuzzy Vault
V. Meenakshi
G. Padmavathi
20
9
0
07 Mar 2010
Polar Coding for Secure Transmission and Key Agreement
O. O. Koyluoglu
H. El Gamal
34
142
0
06 Mar 2010
Local Space-Time Smoothing for Version Controlled Documents
Seungyeon Kim
Guy Lebanon
45
2
0
06 Mar 2010
Macro and micro view on steady states in state space
B. Sobota
M. Guzan
40
0
0
06 Mar 2010
Automatic derivation of domain terms and concept location based on the analysis of the identifiers
Peter Václavík
J. Porubän
Marek Mezei
41
2
0
06 Mar 2010
Using Coloured Petri Nets for design of parallel raytracing environment
Š. Korečko
B. Sobota
41
2
0
06 Mar 2010
Start-phase control of distributed systems written in Erlang/OTP
P. Burcsi
A. Kovács
Antal Tátrai
43
1
0
06 Mar 2010
Public-key cryptography in functional programming context
Gyöngyvér Márton
41
0
0
06 Mar 2010
Faster Rates for training Max-Margin Markov Networks
Xinhua Zhang
Ankan Saha
S. University
48
1
0
06 Mar 2010
What does Newcomb's paradox teach us?
David Wolpert
G. Benford
37
2
0
06 Mar 2010
A Computationally Stable Approach to Gaussian Process Interpolation of Deterministic Computer Simulation Data
P. Ranjan
Ronald D. Haynes
R. Karsten
40
6
0
05 Mar 2010
The Grid[Way] Job Template Manager, a tool for parameter sweeping
A. Lorca
E. Huedo
I. Llorente
43
5
0
05 Mar 2010
Hitting and commute times in large graphs are often misleading
U. V. Luxburg
Agnes Radl
Matthias Hein
OT
42
47
0
05 Mar 2010
Integrating Innate and Adaptive Immunity for Intrusion Detection
Gianni Tedesco
J. Twycross
U. Aickelin
42
10
0
05 Mar 2010
Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images
Panduranga H.T
Naveen Kumar S.K
48
41
0
05 Mar 2010
Mirror averaging with sparsity priors
A. Dalalyan
Alexandre B. Tsybakov
70
55
0
05 Mar 2010
Asymptotic admissibility of priors and elliptic differential equations
J.A.Hartigan
39
0
0
05 Mar 2010
In Cloud, Do MTC or HTC Service Providers Benefit from the Economies of Scale?
Lei Wang
Jianfeng Zhan
Weisong Shi
Yi Liang
Lin-feng Yuan
44
37
0
05 Mar 2010
Global identifiability of linear structural equation models
Mathias Drton
Rina Foygel
S. Sullivant
35
87
0
04 Mar 2010
From Frequency to Meaning: Vector Space Models of Semantics
Peter D. Turney
Patrick Pantel
45
2,916
0
04 Mar 2010
An Offline Technique for Localization of License Plates for Indian Commercial Vehicles
Satadal Saha
Subhadip Basu
M. Nasipuri
D. K. Basu
35
18
0
04 Mar 2010
Algorithms For Extracting Timeliness Graphs
C. Delporte-Gallet
Stéphane Devismes
H. Fauconnier
M. Larrea
37
7
0
04 Mar 2010
Learning by random walks in the weight space of the Ising perceptron
Haiping Huang
Haijun Zhou
44
4
0
04 Mar 2010
Decreasing log data of multi-tier services for effective request tracing
Bo Sang
Jianfeng Zhan
Guanhua Tian
49
4
0
04 Mar 2010
Precise Request Tracing and Performance Debugging for Multi-tier Services of Black Boxes
Zhihong Zhang
Jianfeng Zhan
Yong Li
Lei Wang
Dan Meng
Bo Sang
44
27
0
04 Mar 2010
PhoenixCloud: Provisioning Resources for Heterogeneous Cloud Workloads
Jianfeng Zhan
Lei Wang
Weisong Shi
Shimin Gong
Xiutao Zang
43
8
0
04 Mar 2010
Parallel structurally-symmetric sparse matrix-vector products on multi-core processors
Vicente H. F. Batista
G. O. Ainsworth
F. Ribeiro
38
8
0
04 Mar 2010
LogMaster: Mining Event Correlations in Logs of Large scale Cluster Systems
Rui Ren
Xiaoyu Fu
Jianfeng Zhan
Wei Zhou
56
101
0
04 Mar 2010
Universality, Characteristic Kernels and RKHS Embedding of Measures
Bharath K. Sriperumbudur
Kenji Fukumizu
Gert R. G. Lanckriet
93
487
0
03 Mar 2010
Penalized maximum likelihood estimation for generalized linear point processes
N. Hansen
47
2
0
03 Mar 2010
Branch and Bound Algorithms for Maximizing Expected Improvement Functions
M. Franey
P. Ranjan
H. Chipman
44
15
0
03 Mar 2010
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
Julie Greensmith
U. Aickelin
Gianni Tedesco
40
128
0
03 Mar 2010
Supervised Topic Models
David M. Blei
Jon D. McAuliffe
BDL
36
1,759
0
03 Mar 2010
Properties of the Discrete Pulse Transform for Multi-Dimensional Arrays
R. Anguelov
I. Fabris-Rotelli
35
2
0
03 Mar 2010
Asymptotic Results on Adaptive False Discovery Rate Controlling Procedures Based on Kernel Estimators
P. Neuvial
42
16
0
03 Mar 2010
Automatically Discovering Hidden Transformation Chaining Constraints
Raphael Chenouard
F. Jouault
37
15
0
03 Mar 2010
Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection
Chengfang Fang
E. Chang
35
6
0
03 Mar 2010
Exponential Family Hybrid Semi-Supervised Learning
Arvind Agarwal
Hal Daumé
BDL
49
8
0
02 Mar 2010
Previous
1
2
3
...
10773
10774
10775
...
10891
10892
10893
Next