Filter your results
- 5
- 5
- 5
- 1
- 3
- 1
- 5
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Speedup of Network Training Process by Eliminating the Overshoots of Outputs14th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), May 2018, Rhodes, Greece. pp.462-470, ⟨10.1007/978-3-319-92007-8_39⟩
Conference papers
hal-01821056v1
|
||
|
An Approach for Validating Semantic Consistency of Model Transformation Based on Pattern4th International Working Conference on Enterprise Interoperability (IWEI), Sep 2012, Harbin, China. pp.161-171, ⟨10.1007/978-3-642-33068-1_15⟩
Conference papers
hal-01515734v1
|
||
|
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.114-121, ⟨10.1007/978-3-642-31540-4_9⟩
Conference papers
hal-01534767v1
|
||
|
Breaking a Robust Remote User Authentication Scheme Using Smart Cards9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.110-118, ⟨10.1007/978-3-642-35606-3_13⟩
Conference papers
hal-01551357v1
|
||
|
A Construction Approach of Model Transformation Rules Based on Rough Set Theory3rd IFIP Working Conference on Enterprise Interoperability (IWEI), Mar 2011, Stockholm, Sweden. pp.19-35, ⟨10.1007/978-3-642-19680-5_4⟩
Conference papers
hal-01572093v1
|