Filter your results
- 20
- 20
- 20
- 20
- 6
- 5
- 6
- 7
- 11
- 2
- 8
- 8
- 10
- 18
- 20
- 10
- 3
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.261-272, ⟨10.1007/978-3-642-30436-1_22⟩
Conference papers
hal-01518260v1
|
||
|
A Goal Decomposition Approach for Automatic Mashup Development4th International Working Conference on Enterprise Interoperability (IWEI), Sep 2012, Harbin, China. pp.20-33, ⟨10.1007/978-3-642-33068-1_4⟩
Conference papers
hal-01515735v1
|
||
|
Ensemble of k-Labelset Classifiers for Multi-label Image Classification7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.364-371, ⟨10.1007/978-3-642-32891-6_45⟩
Conference papers
hal-01524951v1
|
||
|
Big Data Mining in the Cloud7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.13-14, ⟨10.1007/978-3-642-32891-6_4⟩
Conference papers
hal-01524977v1
|
||
|
DGraph: Algorithms for Shortgun Reads Assembly Using De Bruijn Graph9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.14-21, ⟨10.1007/978-3-642-35606-3_2⟩
Conference papers
hal-01551353v1
|
||
|
Dynamic Logic for the Semantic Web7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.137-146, ⟨10.1007/978-3-642-32891-6_19⟩
Conference papers
hal-01524969v1
|
||
|
Support Vector Machine with Mixture of Kernels for Image Classification7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.68-76, ⟨10.1007/978-3-642-32891-6_11⟩
Conference papers
hal-01524965v1
|
||
|
Effectively Constructing Reliable Data for Cross-Domain Text Classification7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.16-27, ⟨10.1007/978-3-642-32891-6_6⟩
Conference papers
hal-01524990v1
|
||
|
Improving Virtualization Security by Splitting Hypervisor into Smaller Components26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.298-313, ⟨10.1007/978-3-642-31540-4_23⟩
Conference papers
hal-01534758v1
|
||
|
Improving Transfer Learning by Introspective Reasoner7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.28-39, ⟨10.1007/978-3-642-32891-6_7⟩
Conference papers
hal-01524942v1
|
||
|
Small World Asynchronous Parallel Model for Genome Assembly9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.145-155, ⟨10.1007/978-3-642-35606-3_17⟩
Conference papers
hal-01551319v1
|
||
|
On the Support of Ad-Hoc Semantic Web Data Sharing7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.147-156, ⟨10.1007/978-3-642-32891-6_20⟩
Conference papers
hal-01524964v1
|
||
|
A Task-Based Model for the Lifespan of Peer-to-Peer Swarms11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.71-83, ⟨10.1007/978-3-642-30054-7_6⟩
Conference papers
hal-01531955v1
|
||
|
Building a Flexible and Scalable Virtual Hardware Data Plane11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.205-216, ⟨10.1007/978-3-642-30045-5_16⟩
Conference papers
hal-01531130v1
|
||
|
A Cluster-Based Multilevel Security Model for Wireless Sensor Networks7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.320-330, ⟨10.1007/978-3-642-32891-6_40⟩
Conference papers
hal-01524956v1
|
||
|
Privacy Preserving Social Network Publication on Bipartite Graphs6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.58-70, ⟨10.1007/978-3-642-30955-7_7⟩
Conference papers
hal-01534307v1
|
||
|
Towards an Author Intention Based Computational Model of Story Generation7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.177-185, ⟨10.1007/978-3-642-32891-6_23⟩
Conference papers
hal-01524957v1
|
||
|
Reasoning Theory for D3L with Compositional Bridge Rules7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.106-115, ⟨10.1007/978-3-642-32891-6_15⟩
Conference papers
hal-01524961v1
|
||
|
PPLSA: Parallel Probabilistic Latent Semantic Analysis Based on MapReduce7th International Conference on Intelligent Information Processing (IIP), Oct 2012, Guilin, China. pp.40-49, ⟨10.1007/978-3-642-32891-6_8⟩
Conference papers
hal-01524958v1
|
||
|
Agricultural Landscape Dynamics and Its Response in Seasonal Vegetation Activities in the Loess Plateau, Northern Shaanxi, China5th Computer and Computing Technologies in Agriculture (CCTA), Oct 2011, Beijing, China. pp.151-167, ⟨10.1007/978-3-642-27278-3_17⟩
Conference papers
hal-01360975v1
|