You are here

Search results

Searching as anonymous (not verified)

14 items found in collection [showing 1 - 14]
  • CSV Spreadsheet
Effective and Efficient Approach for Clusterability Evaluation
Effective and Efficient Approach for Clusterability Evaluation
Building Trusted Computer Systems via Unified Software Integrity Protection
Building Trusted Computer Systems via Unified Software Integrity Protection
There & Never Back Again
There & Never Back Again
Foundations of Perturbation Robust Clustering
Foundations of Perturbation Robust Clustering
Pyquery
Pyquery
Improving the Effectiveness of Performance Analysis for HPC by Using Appropriate Modeling and Simulation Schemes
Improving the Effectiveness of Performance Analysis for HPC by Using Appropriate Modeling and Simulation Schemes
Data Subset Selection and Its Applications in Computer Vision
Data Subset Selection and Its Applications in Computer Vision
MAR
MAR
Possibilistic Hierarchical Task Networks
Possibilistic Hierarchical Task Networks
Improving IoT Security Based on Network Traffic Analytics
Improving IoT Security Based on Network Traffic Analytics
Multi-Criteria Decision Support System for Ph.D. Supervisor Selection
Multi-Criteria Decision Support System for Ph.D. Supervisor Selection
Comparing Samos Document Search Performance between Apache Solr and Neo4j
Comparing Samos Document Search Performance between Apache Solr and Neo4j
Comprehensive Study of Portability Bug Characteristics in Desktop and Android Applications
Comprehensive Study of Portability Bug Characteristics in Desktop and Android Applications
Cyber Physical System Vulnerability Research
Cyber Physical System Vulnerability Research