Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
24529
search results - page 457 / 4906
»
Computing on Authenticated Data
Sort
relevance
views
votes
recent
update
View
thumb
title
95
click to vote
CVPR
2008
IEEE
209
views
Computer Vision
»
more
CVPR 2008
»
Building segmentation for densely built urban regions using aerial LIDAR data
15 years 6 months ago
Download
mplab.ucsd.edu
Bodgan C. Matei, Harpreet S. Sawhney, Supun Samara...
claim paper
Read More »
106
click to vote
EUC
2008
Springer
267
views
Applied Computing
»
more
EUC 2008
»
Data Mining for Security Applications
15 years 6 months ago
Download
isi.se.cuhk.edu.hk
Bhavani M. Thuraisingham, Latifur Khan, Mohammad M...
claim paper
Read More »
104
click to vote
ISMB
2003
81
views
Computational Biology
»
more
ISMB 2003
»
Predicting bacterial transcription units using sequence and expression data
15 years 6 months ago
Download
www.biostat.wisc.edu
Joseph Bockhorst, Yu Qiu, Jeremy D. Glasner, Mingz...
claim paper
Read More »
128
click to vote
CLUSTER
2008
IEEE
144
views
Distributed And Parallel Com...
»
more
CLUSTER 2008
»
Autonomic resource management in virtualized data centers using fuzzy logic-based approaches
15 years 5 months ago
Download
users.cs.fiu.edu
Jing Xu, Ming Zhao 0002, José A. B. Fortes,...
claim paper
Read More »
119
click to vote
CGA
2004
90
views
Computational Geometry
»
more
CGA 2004
»
Detecting Flaws and Intruders with Visual Data Analysis
15 years 4 months ago
Download
www.cs.ucdavis.edu
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, T. ...
claim paper
Read More »
« Prev
« First
page 457 / 4906
Last »
Next »