Search

Showing total 28,176 results
28,176 results

Search Results

1. A Collaborative Approach Toward Scientific Paper Recommendation Using Citation Context

2. Trim Loss Optimization in Paper Production Using Reinforcement Artificial Bee Colony

3. Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework

4. Personalized Scientific Paper Recommendation Based on Heterogeneous Graph Representation

5. Towards Consensus in IoT Driven Business Ecosystem Research:A Position Paper

6. Low-Rank and Sparse Matrix Factorization for Scientific Paper Recommendation in Heterogeneous Network

7. Conference Paper Recommendation for Academic Conferences

8. Combining Optical Character Recognition With Paper ECG Digitization

9. On Estimating Maximum Sum Rate of MIMO Systems with Successive Zero-Forcing Dirty Paper Coding and Per-antenna Power Constraint

10. Performance of two multiscale texture algorithms in classifying silver gelatine paper via k-nearest neighbors

11. A Hybrid Model Based on LFM and BiGRU Toward Research Paper Recommendation

12. Scientific Developers v/s Static Analysis Tools: Vision and Position Paper

13. BigyaPAn: Deep Analysis of Old Paper Advertisement

14. SCUT-EPT: New Dataset and Benchmark for Offline Chinese Text Recognition in Examination Paper

15. Generalization of Space-Time Block Coded-Spatial Modulation for High Data Rate VLC Systems (Invited Paper)

16. Towards Demand-Driven Optimization Algorithms in Electromagnetic Engineering (Invited Paper)

17. Analyzing highly cited papers in Intelligent Transportation Systems

18. Performance evaluation of the cognitive piggyback overlay systems with dirty paper coding

19. Multiscale Anisotropic Texture Unsupervised Clustering for Photographic Paper

20. Achievable fixed rate capacity in emerging wireless systems (invited paper)

21. The use of qualitative data analysis software in brazilian educational papers

22. A Dirty Paper Scheme for Hierarchical OFDM

23. Invited Paper: Secure Boot and Remote Attestation in the Sanctum Processor

24. Analyzing Highly Cited Papers in Intelligent Transportation Systems.

25. Playable cities: A short survey (Keynote paper)

26. Work in progress paper: pessimism analysis of network calculus approach on AFDX networks

27. CONNA: Addressing Name Disambiguation on the Fly.

28. An Overview of Publications on Artificial Intelligence Research: A Quantitative Analysis on Recent Papers.

29. Formalization of the Paper Registration Process to Institutional Repositories

30. Simultaneous registration of scholarly papers to a researcher database and a repository

31. Publication Venue Recommendation Based on Paper Abstract

32. Building Models of Computation of Service-Oriented Software via Monitoring Performance Indicators (Short Paper)

33. Semi-automated Paper-registration System for Institutional Repository

34. Producing Interactive Paper Documents Based on Multi-Channel Content Publishing

35. Features for the reconstruction of shredded notebook paper

36. Generic techniques to improve SVC enhancement layer encoding: digest of technical papers

37. Invited paper: Parallel programming and run-time resource management framework for many-core platforms: The 2PARMA approach

38. Guest Editorial—Special Issue on Selected Papers From ISCAS 2009

39. Annotation based personal knowledge management of research scholars.

40. IEEE Computer Society Call for Papers.

41. Latin American Women and Computer Science: A Systematic Literature Mapping.

42. Selected papers from the seventh itu kaleidoscope academic conference - Guest Editorial.

43. Call and Calendar.

44. 2013 International Symposium on Computer Architecture Influential Paper Award.

45. Modelling of Transmission Lines Inside Modern Integrated Semiconductor and Test Boards

46. VirFace ∞ : A Semi-Supervised Method for Enhancing Face Recognition via Unlabeled Shallow Data.

47. Efficient Top-k Retrieval on Massive Data.

49. Secure Wireless Communications in Broadcast Channels With Confidential Messages

50. An Enhanced Steganographic Code and its Application in Voice-Over-IP Steganography