Browsing "School of Computer Science" by Title

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 2953 to 2972 of 3138 < previous   next >
PreviewIssue DateTitleAuthor(s)
2015Tree RE-weighted belief propagation using deep learning potentials for mass segmentation from mammogramsDhungel, N.; Carneiro, G.; Bradley, A.; 2015 IEEE 12th International Symposium on Biomedical Imaging (ISBI 2015) (16 Apr 2015 - 19 Apr 2015 : New York, NY)
2016Tree-based data retrieval algorithm for multi-item request with deadline in wireless networksHe, P.; Shen, H.; Li, Y.
2005Trellis properties of product codesKan, H.; Shen, H.
2022TREVERSE: trial-and-error lightweight secure ReVERSE authentication with simulatable PUFsGao, Y.; Van Dijk, M.; Xu, L.; Yang, W.; Nepal, S.; Ranasinghe, D.C.
2011Triangulating a planeOlsson, C.; Eriksson, A.; Heyden, A.; Kahl, F.; Scandinavian Conference on Image Analysis (23 May 2011 - 27 May 2011 : Sweden)
2011Trust as a service: A framework for trust management in cloud environmentsNoor, T.; Sheng, Q.; Bouguettaya, A.; Hauswirth, M.; Liu, L.; International Conference on Web Information System Engineering (WISE) (12th : 2011 : Sydney, NSW)
2014Trust management in cloud servicesNoor, T.; Sheng, Q.; Bouguettaya, A.
2013Trust management of services in cloud environments: obstacles and solutionsNoor, T.; Sheng, Q.; Zeadally, S.; Yu, J.
2023Trust–SIoT: Towards Trustworthy Object Classification in the Social Internet of ThingsSagar, S.; Mahmood, A.; Wang, K.; Sheng, Q.Z.; Pabani, J.K.; Zhang, W.E.
2016Truth discovery via exploiting implications from multi-source dataWang, X.; Sheng, Q.; Yao, L.; Li, X.; Fang, X.; Xu, X.; Benatallah, B.; 25th ACM International Conference on Information and Knowledge Management (CIKM) (24 Oct 2016 - 28 Oct 2016 : Indianapolis, IN)
2020Truth finding by reliability estimation on inconsistent entities for heterogeneous data setsTian, H.; Sheng, W.; Shen, H.; Wang, C.
2019Twenty years of open source software: from skepticism to mainstreamRobles, G.; Steinmacher, I.; Adams, P.; Treude, C.
2016Twitter knows: understanding the emergence of topics in social networksBirdsey, L.; Szabo, C.; Teo, Y.; Yilmaz, L.; Chan, W.; Moon, I.; Roeder, T.; Macal, C.; Rosetti, M.; Winter Simulation Conference (WSC) (6 Dec 2015 - 9 Dec 2015 : Huntington Beach, CA)
2023Two novel families of multiscale staggered patch schemes efficiently simulate large-scale, weakly damped, linear wavesDivahar, J.; Roberts, A.J.; Mattner, T.W.; Bunder, J.E.; Kevrekidis, I.G.
2007Two solutions to the localization using time difference of arrival problemSathyan, Thuraiappah; Kirubarajan, T.; Signal Processing, Sensor Fusion, and Target Recognition (16th : 2007 : Orlando, Florida, U.S.A.)
2014Two-phase layered learning recommendation via category structureJi, K.; Shen, H.; Tian, H.; Wu, Y.; Wu, J.; Tseng, V.; Ho, T.; Zhou, Z.-H.; Chen, A.; Kao, H.-Y.; 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2014) (13 May 2014 - 16 May 2014 : Tainan, Taiwan)
2011A two-stage assignment-based algorithm for asynchronous multisensor bearings-only trackingSathyan, Thuraiappah; Sinha, A.
2019Two-stream convolutional networks for blind image quality assessmentYan, Q.; Gong, D.; Zhang, Y.
2005Two-view multibody structure-and-motion with outliersSchindler, K.; Suter, D.; Schmid, C.; Soatto, S.; Tomasi, C.; IEEE Computer Society Conference on Computer Vision and Pattern Recognition (18th : 2005 : San Diego, CA, U.S.A.)
2006Two-view multibody structure-and-motion with outliers through model selectionSchindler, K.; Suter, D.