Conference Paper RDF
pages:- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- more...
- A Bayesian framework for 3D models retrieval based on characteristic views
- A bayesian statistical model for a multipath trust-based reactive ad hoc routing protocol
- A Behavior-Aware Systematic Approach for Merging Business Process Fragments
- A beneficial reuse of incinerator fly ash following phosphate treatment : reaction kinetics and control of properties by calcination
- A blind identification algorithm robust to order over estimation
- A blind robust color image watermarking method using quaternion Fourier transform
- A Blockchain based Access Control Scheme
- A Blockchain based Access Control Scheme
- A blockchain-based data usage auditing architecture with enhanced privacy and availability
- A bottom-up approach to inter-enterprise business processes
- A Bounding Histogram Approach for Network Performance Analysis
- A brief history of the evolution of local infrastructure based GNSS indoor positioning systems from pseudolites to repealites, through repeaters
- A bundle-scale model of propagation of a through-the-thickness notch in a woven composite under fatigue loading
- A Bypassing Security Model for Anonymous Bluetooth Peers
- A case study for understanding the organization of distributed problem-solving within the Mozilla's community: Poster paper
- A client-entropy measure for On-line Signatures
- A Cloud-Based Platform for Watching Same Content on Three-Screen TV Continuously in Smart Home
- A cognitive context-aware approach for adaptives services provisioning in Social Internet of Things
- A Collaborative Multi-Metric Interface Ranking Scheme for Named Data Networks
- A collection of MOOCs to create digital programs
- A Combinatorial Auction for Joint Radio and Processing Resource Allocation in C-RAN
- A common framework for the design optimization of fixed-wing, multicopter and VTOL UAV configurations
- A communicating scheme for adaptive resource allocation in wireless networks
- A Comparative Evaluation of Two Intrusion-Tolerant Routing Protocols for Wireless Sensor Networks
- A comparative study of Monte-Carlo methods for multitarget tracking
- A Comparative Study of Ranking Formulas Based on Consistency
- A comparative study on insertion strategies in MPEG-4 AVC watermarking
- A comparative study on machine learning algorithms for green context-aware intelligent transportation systems
- A comparison between thermo‐mechanical fatigue of 5 % and 9 % chromium steels
- A comparison of mass flow rate experimental data obtained using two different experimental setups by means of the dynamic constant volume technique