Conference Paper RDF
pages:- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- more...
- Conceptual Analysis of Transactional-, Capacity-Driven Web Services
- Conceptualizing outcomes of Employee Advocacy platforms
- Concevoir pour et avec les personnes âgées des technologies au service de l'autonomie
- Concurrent engineering: an expert system for fixture design
- Conditional Cross Correlation Network for Video Question Answering
- Conditionnement des boues par gel-dégel
- Conductivité thermique apparente d'un milieu granulaire soumis à des contraintes mécaniques
- Conductivité thermique apparente d'un milieux granulaire soumis à des contraintes mécaniques
- Conduire un véhicule connecté : focus sur le concept de surcharge informationnelle
- Cone-Beam Computed Tomography contrast validation of an artificial periodontal phantom for use in endodontics
- Configuration of Heterogeneous Agent Fleet: a Preliminary Generic Model
- Configuration of high performance apartment buildings renovation: A constraint based approach
- Configuration of the Detection Function in a Distributed IDS Using Game Theory
- Conférence "Innovations plurielles" #2 (Organisation et Animation)
- Congestion mitigation in 5G networks using drone relays
- Connected devices for weight loss : lessons learned from field interventions conducted between 2004 and 2018
- Connected health: co-designing a new service with consumers
- Connecting frameworks:case study with middleware-based load balancing
- Connectivity analysis of wireless sensor networks deployments in smart cities
- Consecutive courtroom interpreting and the management of long turnsVideo-mediated hearings at the French appeal court for asylum demands
- Consensus pair-à-pair asynchrone dans les variétés
- Considering Internal Vulnerabilities and the Attacker's Knowledge to Model the Impact of Cyber Events as Geometrical Prisms
- Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)
- Considering the high level critical situations in context-aware recommender systems
- Constant-size Threshold Attribute based SignCryption for Cloud Applications
- Constellation Labeling Optimization for Iteratively Decoded Concatenated Multilayer Space-Time Error Correcting Codes
- Constitutive modelling of anisotropic rate-dependent Ti-6Al-4V titanium alloy for aircraft fan blade design
- CONSTRAINED BAYESIAN OPTIMIZATION OVER MIXED CATEGORICAL VARIABLES, WITH APPLICATION TO AIRCRAFT DESIGN
- Constrained Deep Reinforcement Learning for Smart Load Balancing
- Constrained dynamic virtual network embedding 1 st Junkai He