Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
BlobSeer: Next Generation Data Management for Large Scale InfrastructuresJournal of parallel and distributed computing, 2011-02, Vol.71 (2), p.168-184 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0743-7315 ;EISSN: 1096-0848 ;DOI: 10.1016/j.jpdc.2010.08.004Digital Resources/Online E-Resources |
|
2 |
Material Type: Article
|
Kerckhoffs-based embedding security classes for WOA data-hidingIEEE transactions on information forensics and security, 2008-03, Vol.3 (1), p.1-15 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1556-6013 ;EISSN: 1556-6021 ;DOI: 10.1109/TIFS.2007.916006Digital Resources/Online E-Resources |
|
3 |
Material Type: Conference Proceeding
|
Attacks on Java Card 3.0 Combining Fault and Logical AttacksSmart Card Research and Advanced Application. 9th IFIP WG 8.8/11.2 International Conference, 2010, Vol.6035, p.148-163 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-642-12510-2_11Digital Resources/Online E-Resources |
|
4 |
Material Type: Conference Proceeding
|
A Context-Sensitive Nomadic Exhibition GuideLecture notes in computer science, 2000, Vol.1927, p.127-142 [Peer Reviewed Journal]2000 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 9783540410935 ;ISBN: 3540410937 ;EISSN: 1611-3349 ;DOI: 10.5555/647986.741314Full text available |
|
5 |
Material Type: Book Chapter
|
ExtensionsGeneralized Measure Theory, 2009, Vol.25, p.111-132Springer Science+Business Media, LLC 2008 ;ISSN: 1574-0463 ;ISBN: 9781441945761 ;ISBN: 1441945768 ;ISBN: 0387768513 ;ISBN: 9780387768519 ;EISBN: 0387768521 ;EISBN: 9780387768526 ;DOI: 10.1007/978-0-387-76852-6_5 ;OCLC: 656399333 ;OCLC: 1148074653 ;LCCallNum: QC20.7.M43 -- W36 2009ebFull text available |
|
6 |
Material Type: Conference Proceeding
|
Improving the Fisher Kernel for Large-Scale Image ClassificationDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-642-15561-1_11Digital Resources/Online E-Resources |
|
7 |
Material Type: Article
|
Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in Cloud data centersConcurrency and computation, 2012-09, Vol.24 (13), p.1397-1420 [Peer Reviewed Journal]Copyright © 2011 John Wiley & Sons, Ltd. ;ISSN: 1532-0626 ;EISSN: 1532-0634 ;DOI: 10.1002/cpe.1867Full text available |
|
8 |
Material Type: Conference Proceeding
|
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBACLecture Notes in Computer Science, 2012, Vol.LNCS-7371, p.41-55 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-642-31540-4_4Digital Resources/Online E-Resources |
|
9 |
Material Type: Article
|
Time-series data miningACM computing surveys, 2012-11, Vol.45 (1) [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0360-0300 ;EISSN: 1557-7341 ;DOI: 10.1145/2379776.2379788Digital Resources/Online E-Resources |
|
10 |
Material Type: Article
|
Algorithms for hierarchical clustering: an overviewWiley interdisciplinary reviews. Data mining and knowledge discovery, 2012-01, Vol.2 (1), p.86-97 [Peer Reviewed Journal]Copyright © 2011 John Wiley & Sons, Inc. ;ISSN: 1942-4787 ;EISSN: 1942-4795 ;DOI: 10.1002/widm.53Full text available |
|
11 |
Material Type: Article
|
Maximizing a Monotone Submodular Function Subject to a Matroid ConstraintSIAM journal on computing, 2011-01, Vol.40 (6), p.1740-1766 [Peer Reviewed Journal]Copyright © 2011 Society for Industrial and Applied Mathematics ;ISSN: 0097-5397 ;EISSN: 1095-7111 ;DOI: 10.1137/080733991Full text available |
|
12 |
Material Type: Article
|
A tutorial on spectral clusteringStatistics and computing, 2007-12, Vol.17 (4), p.395-416 [Peer Reviewed Journal]ISSN: 0960-3174 ;EISSN: 1573-1375 ;DOI: 10.1007/s11222-007-9033-zFull text available |
|
13 |
Material Type: Article
|
Graph Sparsification by Effective ResistancesSIAM journal on computing, 2011-01, Vol.40 (6), p.1913-1926 [Peer Reviewed Journal]Copyright © 2011 Society for Industrial and Applied Mathematics ;ISSN: 0097-5397 ;EISSN: 1095-7111 ;DOI: 10.1137/080734029Full text available |
|
14 |
Material Type: Article
|
Steganalysis by Subtractive Pixel Adjacency MatrixIEEE transactions on information forensics and security, 2010-06, Vol.5 (2), p.215-224 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1556-6013 ;EISSN: 1556-6021 ;DOI: 10.1109/TIFS.2010.2045842Digital Resources/Online E-Resources |
|
15 |
Material Type: Conference Proceeding
|
Local Descriptors Encoded by Fisher Vectors for Person Re-identification12th European Conference on Computer Vision (ECCV) Workshops, 2012, p.413-422 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-642-33863-2_41Digital Resources/Online E-Resources |
|
16 |
Material Type: Conference Proceeding
|
Differential Fault Analysis of the Advanced Encryption Standard Using a Single FaultLecture Notes in Computer Science, 2011, Vol.LNCS-6633, p.224-233 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-642-21040-2_15Digital Resources/Online E-Resources |
|
17 |
Material Type: Conference Proceeding
|
Cache “Less for More” in Information-Centric NetworksLecture Notes in Computer Science, 2012, Vol.LNCS-7289 (Part I), p.27-40 [Peer Reviewed Journal]Attribution ;DOI: 10.1007/978-3-642-30045-5_3Digital Resources/Online E-Resources |
|
18 |
Material Type: Article
|
Replaying history on process models for conformance checking and performance analysisWiley interdisciplinary reviews. Data mining and knowledge discovery, 2012-03, Vol.2 (2), p.182-192 [Peer Reviewed Journal]Copyright © 2012 John Wiley & Sons, Inc. ;ISSN: 1942-4787 ;EISSN: 1942-4795 ;DOI: 10.1002/widm.1045Full text available |
|
19 |
Material Type: Article
|
Density-based clusteringWiley interdisciplinary reviews. Data mining and knowledge discovery, 2011-05, Vol.1 (3), p.231-240 [Peer Reviewed Journal]Copyright © 2011 John Wiley & Sons, Inc. ;ISSN: 1942-4787 ;EISSN: 1942-4795 ;DOI: 10.1002/widm.30Full text available |
|
20 |
Material Type: Article
|
Stability of Persistence DiagramsDiscrete & computational geometry, 2007-01, Vol.37 (1), p.103-120 [Peer Reviewed Journal]Springer 2007 ;ISSN: 0179-5376 ;EISSN: 1432-0444 ;DOI: 10.1007/s00454-006-1276-5 ;CODEN: DCGEERFull text available |