Conference Paper RDF
pages:- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- more...
- A Synthetic Dataset Generation for the Uveitis Pathology Based on MedWGAN Model
- A Tale of Two Models: Discussing the Timing and Sampling EM Fault Injection Models
- A TCP delay-based mechanism for detecting congestion in the Internet
- A telemedicine protocol based on watermarking evidence for identification of liabilities in case of litigation
- A Tentative Framework for Risk and Opportunity Detection in A Collaborative Environment Based on Data Interpretation
- A theatre of re-individuation
- A Thompson sampling approach to channel exploration-exploitation problem in multihop cognitive radio networks
- A thorough experimental residence time distribution study in rotary kiln
- A tool for software quality
- A tool for the generation of a secure access control filter
- A Tool-Supported Approach for Modeling and Verifying Hybrid Systems using EVENT-B and the Differential Equation Solver SAGEMATH
- A tracker based on a CPHD filter approach for infrared applications
- A tracking algorithm for GNSS reflected signals on sea surface
- A Transactional Approach for Reliable Elastic Cloud Resources
- A transformation formalism to model the Management Information lifecycle.
- A Transformer-based Siamese Network For Word Image Retrieval In Historical Documents
- A Translucent OBS Node Architecture to Improve Traffic Emission and Loss Probability
- A transparent micro-device to study mass transfer and thermodynamics in two-phase flows at high pressure
- A Triangle-Fan-based approach for low complexity 3D mesh compression
- A trust model for data sharing in smart cities
- A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networks
- A tunable slow start for TCP
- A two phases coupling free and porous flow method at multi-scales of LCM process
- A two-layered virtualization overlay system using software Avatars
- A two-level auction for C-RAN resource allocation
- A two-stage algorithm for the Virtual Network Embedding problem
- A two-stage Deep Convolutional Generative Adversarial Network-based data augmentation scheme for agriculture image regression tasks
- A unified approach for high throughput analysis of real-time biomolecular interactions in surface plasmon resonance and fluorescence imaging
- A unified session control protocol for IPTV services
- A unique interface for web and telecom services : from feeds aggregator to services aggregator