skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 70,580  for All Library Resources

Results 1 2 3 4 5 next page
Show only
Refined by: creation date: 2000 To 2012 remove
Result Number Material Type Add to My Shelf Action Record Details and Options
1
BlobSeer: Next Generation Data Management for Large Scale Infrastructures
Material Type:
Article
Add to My Research

BlobSeer: Next Generation Data Management for Large Scale Infrastructures

Journal of parallel and distributed computing, 2011-02, Vol.71 (2), p.168-184 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0743-7315 ;EISSN: 1096-0848 ;DOI: 10.1016/j.jpdc.2010.08.004

Digital Resources/Online E-Resources

2
Kerckhoffs-based embedding security classes for WOA data-hiding
Material Type:
Article
Add to My Research

Kerckhoffs-based embedding security classes for WOA data-hiding

IEEE transactions on information forensics and security, 2008-03, Vol.3 (1), p.1-15 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1556-6013 ;EISSN: 1556-6021 ;DOI: 10.1109/TIFS.2007.916006

Digital Resources/Online E-Resources

3
Attacks on Java Card 3.0 Combining Fault and Logical Attacks
Material Type:
Conference Proceeding
Add to My Research

Attacks on Java Card 3.0 Combining Fault and Logical Attacks

Smart Card Research and Advanced Application. 9th IFIP WG 8.8/11.2 International Conference, 2010, Vol.6035, p.148-163 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-642-12510-2_11

Digital Resources/Online E-Resources

4
A Context-Sensitive Nomadic Exhibition Guide
Material Type:
Conference Proceeding
Add to My Research

A Context-Sensitive Nomadic Exhibition Guide

Lecture notes in computer science, 2000, Vol.1927, p.127-142 [Peer Reviewed Journal]

2000 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 9783540410935 ;ISBN: 3540410937 ;EISSN: 1611-3349 ;DOI: 10.5555/647986.741314

Full text available

5
Extensions
Material Type:
Book Chapter
Add to My Research

Extensions

Generalized Measure Theory, 2009, Vol.25, p.111-132

Springer Science+Business Media, LLC 2008 ;ISSN: 1574-0463 ;ISBN: 9781441945761 ;ISBN: 1441945768 ;ISBN: 0387768513 ;ISBN: 9780387768519 ;EISBN: 0387768521 ;EISBN: 9780387768526 ;DOI: 10.1007/978-0-387-76852-6_5 ;OCLC: 656399333 ;OCLC: 1148074653 ;LCCallNum: QC20.7.M43 -- W36 2009eb

Full text available

6
Improving the Fisher Kernel for Large-Scale Image Classification
Material Type:
Conference Proceeding
Add to My Research

Improving the Fisher Kernel for Large-Scale Image Classification

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-642-15561-1_11

Digital Resources/Online E-Resources

7
Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in Cloud data centers
Material Type:
Article
Add to My Research

Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in Cloud data centers

Concurrency and computation, 2012-09, Vol.24 (13), p.1397-1420 [Peer Reviewed Journal]

Copyright © 2011 John Wiley & Sons, Ltd. ;ISSN: 1532-0626 ;EISSN: 1532-0634 ;DOI: 10.1002/cpe.1867

Full text available

8
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC
Material Type:
Conference Proceeding
Add to My Research

A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC

Lecture Notes in Computer Science, 2012, Vol.LNCS-7371, p.41-55 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-642-31540-4_4

Digital Resources/Online E-Resources

9
Time-series data mining
Material Type:
Article
Add to My Research

Time-series data mining

ACM computing surveys, 2012-11, Vol.45 (1) [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0360-0300 ;EISSN: 1557-7341 ;DOI: 10.1145/2379776.2379788

Digital Resources/Online E-Resources

10
Algorithms for hierarchical clustering: an overview
Material Type:
Article
Add to My Research

Algorithms for hierarchical clustering: an overview

Wiley interdisciplinary reviews. Data mining and knowledge discovery, 2012-01, Vol.2 (1), p.86-97 [Peer Reviewed Journal]

Copyright © 2011 John Wiley & Sons, Inc. ;ISSN: 1942-4787 ;EISSN: 1942-4795 ;DOI: 10.1002/widm.53

Full text available

11
Maximizing a Monotone Submodular Function Subject to a Matroid Constraint
Material Type:
Article
Add to My Research

Maximizing a Monotone Submodular Function Subject to a Matroid Constraint

SIAM journal on computing, 2011-01, Vol.40 (6), p.1740-1766 [Peer Reviewed Journal]

Copyright © 2011 Society for Industrial and Applied Mathematics ;ISSN: 0097-5397 ;EISSN: 1095-7111 ;DOI: 10.1137/080733991

Full text available

12
A tutorial on spectral clustering
Material Type:
Article
Add to My Research

A tutorial on spectral clustering

Statistics and computing, 2007-12, Vol.17 (4), p.395-416 [Peer Reviewed Journal]

ISSN: 0960-3174 ;EISSN: 1573-1375 ;DOI: 10.1007/s11222-007-9033-z

Full text available

13
Graph Sparsification by Effective Resistances
Material Type:
Article
Add to My Research

Graph Sparsification by Effective Resistances

SIAM journal on computing, 2011-01, Vol.40 (6), p.1913-1926 [Peer Reviewed Journal]

Copyright © 2011 Society for Industrial and Applied Mathematics ;ISSN: 0097-5397 ;EISSN: 1095-7111 ;DOI: 10.1137/080734029

Full text available

14
Steganalysis by Subtractive Pixel Adjacency Matrix
Material Type:
Article
Add to My Research

Steganalysis by Subtractive Pixel Adjacency Matrix

IEEE transactions on information forensics and security, 2010-06, Vol.5 (2), p.215-224 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1556-6013 ;EISSN: 1556-6021 ;DOI: 10.1109/TIFS.2010.2045842

Digital Resources/Online E-Resources

15
Local Descriptors Encoded by Fisher Vectors for Person Re-identification
Material Type:
Conference Proceeding
Add to My Research

Local Descriptors Encoded by Fisher Vectors for Person Re-identification

12th European Conference on Computer Vision (ECCV) Workshops, 2012, p.413-422 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-642-33863-2_41

Digital Resources/Online E-Resources

16
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault
Material Type:
Conference Proceeding
Add to My Research

Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault

Lecture Notes in Computer Science, 2011, Vol.LNCS-6633, p.224-233 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-642-21040-2_15

Digital Resources/Online E-Resources

17
Cache “Less for More” in Information-Centric Networks
Material Type:
Conference Proceeding
Add to My Research

Cache “Less for More” in Information-Centric Networks

Lecture Notes in Computer Science, 2012, Vol.LNCS-7289 (Part I), p.27-40 [Peer Reviewed Journal]

Attribution ;DOI: 10.1007/978-3-642-30045-5_3

Digital Resources/Online E-Resources

18
Replaying history on process models for conformance checking and performance analysis
Material Type:
Article
Add to My Research

Replaying history on process models for conformance checking and performance analysis

Wiley interdisciplinary reviews. Data mining and knowledge discovery, 2012-03, Vol.2 (2), p.182-192 [Peer Reviewed Journal]

Copyright © 2012 John Wiley & Sons, Inc. ;ISSN: 1942-4787 ;EISSN: 1942-4795 ;DOI: 10.1002/widm.1045

Full text available

19
Density-based clustering
Material Type:
Article
Add to My Research

Density-based clustering

Wiley interdisciplinary reviews. Data mining and knowledge discovery, 2011-05, Vol.1 (3), p.231-240 [Peer Reviewed Journal]

Copyright © 2011 John Wiley & Sons, Inc. ;ISSN: 1942-4787 ;EISSN: 1942-4795 ;DOI: 10.1002/widm.30

Full text available

20
Stability of Persistence Diagrams
Material Type:
Article
Add to My Research

Stability of Persistence Diagrams

Discrete & computational geometry, 2007-01, Vol.37 (1), p.103-120 [Peer Reviewed Journal]

Springer 2007 ;ISSN: 0179-5376 ;EISSN: 1432-0444 ;DOI: 10.1007/s00454-006-1276-5 ;CODEN: DCGEER

Full text available

Results 1 - 20 of 70,580  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Show only

  1. Peer-reviewed Journals (61,154)

Refine My Results

Creation Date 

From To
  1. Before 2002  (11,331)
  2. 2002 To 2005  (32,307)
  3. 2006 To 2009  (11,818)
  4. 2010 To 2014  (16,013)
  5. After 2014  (32)
  6. More options open sub menu

Resource Type 

  1. Articles  (26,739)
  2. Conference Proceedings  (26,349)
  3. Book Chapters  (17,109)
  4. Books  (288)
  5. magazinearticle  (92)
  6. Reviews  (3)
  7. More options open sub menu

Language 

  1. English  (70,455)
  2. Japanese  (2,737)
  3. Portuguese  (160)
  4. German  (54)
  5. Russian  (25)
  6. French  (8)
  7. Polish  (4)
  8. Chinese  (2)
  9. Danish  (1)
  10. Slovenian  (1)
  11. More options open sub menu

Searching Remote Databases, Please Wait