Search

Showing total 105 results
105 results

Search Results

1. Open source software security vulnerability detection based on dynamic behavior features.

2. Hypercomplex extreme learning machine with its application in multispectral palmprint recognition.

3. ECG R-wave peaks marking with simultaneously recorded continuous blood pressure.

4. Machine learning framework for assessment of microbial factory performance.

5. A novel QoS-aware prediction approach for dynamic web services.

6. MpBsmi: A new algorithm for the recognition of continuous biological sequence pattern based on index structure.

7. A parallel approximate string matching under Levenshtein distance on graphics processing units using warp-shuffle operations.

8. Multiple quay cranes scheduling for double cycling in container terminals.

9. Efficient string similarity join in multi-core and distributed systems.

10. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.

11. A Fast Alignment-Free Approach for De Novo Detection of Protein Conserved Regions.

12. Image blind detection based on LBP residue classes and color regions.

13. Similar image retrieval in large-scale trademark databases based on regional and boundary fusion feature.

14. CFSH: Factorizing sequential and historical purchase data for basket recommendation.

15. Protecting contacts against privacy leaks in smartphones.

16. A clustering-based method for single-channel fetal heart rate monitoring.

17. Residual-based approach for authenticating pattern of multi-style diacritical Arabic texts.

18. Abnormal network flow detection based on application execution patterns from Web of Things (WoT) platforms.

19. Face recognition algorithm using extended vector quantization histogram features.

20. A novel feature ranking method for prediction of cancer stages using proteomics data.

21. Mining of high utility-probability sequential patterns from uncertain databases.

22. : Oblivious similarity based searching for encrypted data outsourced to an untrusted domain.

23. Benchmarking desktop and mobile handwriting across COTS devices: The e-BioSign biometric database.

24. Mining dynamic noteworthy functions in software execution sequences.

25. Context-adaptive based CU processing for 3D-HEVC.

26. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.

27. Retinal Microaneurysms Detection Using Gradient Vector Analysis and Class Imbalance Classification.

28. Location Prediction Based on Transition Probability Matrices Constructing from Sequential Rules for Spatial-Temporal K-Anonymity Dataset.

29. Filter Design and Performance Evaluation for Fingerprint Image Segmentation.

30. Differential-Evolution Control Parameter Optimization for Unmanned Aerial Vehicle Path Planning.

31. Learning to Select Supplier Portfolios for Service Supply Chain.

32. Split4Blank: Maintaining consistency while improving efficiency of loading RDF data with blank nodes.

33. Identification of movement synchrony: Validation of windowed cross-lagged correlation and -regression with peak-picking algorithm.

34. Enhancing Confusion Entropy (CEN) for binary and multiclass classification.

35. One-time-pad cryptography scheme based on a three-dimensional DNA self-assembly pyramid structure.

36. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.

37. A PageRank-based heuristic for the minimization of open stacks problem.

38. A new split based searching for exact pattern matching for natural texts.

39. Creating longitudinal datasets and cleaning existing data identifiers in a cystic fibrosis registry using a novel Bayesian probabilistic approach from astronomy.

40. A lexicon based method to search for extreme opinions.

41. A loop-counting method for covariate-corrected low-rank biclustering of gene-expression and genome-wide association study data.

42. An evaluation of multi-probe locality sensitive hashing for computing similarities over web-scale query logs.

43. Single image super-resolution based on approximated Heaviside functions and iterative refinement.

44. Point cloud registration from local feature correspondences—Evaluation on challenging datasets.

45. DOMe: A deduplication optimization method for the NewSQL database backups.

46. A machine learning approach for predicting CRISPR-Cas9 cleavage efficiencies and patterns underlying its mechanism of action.

47. Temporal causal inference with stochastic audiovisual sequences.

48. A novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacks.

49. Synthesizer: Expediting synthesis studies from context-free data with information retrieval techniques.

50. A study of the transferability of influenza case detection systems between two large healthcare systems.