Filters








1,824,296 Hits in 7.9 sec

Information Sciences and Technologies Bulletin of the ACM Slovakia Volume 6, Number 2 Advanced Notification System for TCP Performance Increase Group and Single-user Influence Modeling for Personalized Recommendation Reducing the Sparsity of Contextual Information for Recommendations On Board Localization Technologies for Vehicle Positioning Analysis of Dysfluencies by Computational Intelligence

M Olšovský, M Kompan, D Zeleník, M Hodoò, J Pálfy
2014 unpublished
computer science, computer engineering, software engineering and information systems, and also other similarly well established fields such as artificial intelligence or information science.  ...  Aim and Scope of the Information Sciences and Technologies Bulletin of the ACM Slovakia ACM Slovakia offers a forum for rapid dissemination of research of computing/informatics and more broadly of information  ... 
fatcat:t7c227a63zhw5bjdw5bo4syo5i

A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security

Gurpreet Singh, Supriya Supriya
2013 International Journal of Computer Applications  
As more and more information is stored on computers or communicated via computers, the need to insure that this information is invulnerable to snooping and/or tampering becomes more relevant.  ...  Information Confidentiality has a prominent significance in the study of ethics, law and most recently in Information Systems.  ...  Umarani, "A Survey on Various Most Common Encryption Techniques", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, pp. 226-233, July  ... 
doi:10.5120/11507-7224 fatcat:ubssrj6znbhchkdhpxw2llumwa

Mutual Exclusive Distributive Clustering (MEDC) Protocol for Wireless Sensor Networks

Yashwant Singh, Urvashi Chugh
2014 International Journal of Sensors Wireless Communications and Control  
Amit Kumar Singh, S P Ghrera, Amrit Kumar Agrawal, Akshay Dhawan "Level 2 Feature Extraction and Matching Algorithm using Fingerprint Image" International Journal on Computer Engineering and Information  ...  Amit Kumar Singh, Chandrabhan Pal, Amrit Kumar Agrawal, "Level 2 Feature Extraction Algorithm using Fingerprint Image" International Journal on Computer Engineering and Information Technology, ISSN No  ... 
doi:10.2174/221032790302140505100253 fatcat:y6ttiopi3nb4nkurzuvdaj77ci

A Critical Analysis on the Security Concerns of Internet of Things (IoT)

M. U.Farooq, Muhammad Waseem, Anjum Khairi, Sadia Mazhar
2015 International Journal of Computer Applications  
Qu, Security Architecture of the Internet of Things Oriented to Perceptual Layer, in International Journal on Computer, Consumer and Control (IJ3C), Volume 2, No. 2 (2013) -K. E. Emam, F. K.  ...  of Advanced Computer Research, Volume 3, Number 2, 2013 -W.  ... 
doi:10.5120/19547-1280 fatcat:2y2ku4llujfrdeazrcevbp3hju

The Evaluation of Management Information Systems: A Dynamic and Holistic Approach

David C. Lane, Eric F. Wolstenholme, Simon Henderson, Allan Gavine
1994 Journal of the Operational Research Society  
This volume follows on from Volumes 1, on Optimization', and 2 on Stochastic Optimiza- tion’.  ...  Journal of the Operational Research Society Vol. 45, No. 9 Computing: Handbooks in Operations Research and Management Science, Volume 3 E. G. CorrMan Jr, J. K. Lenstra and A. H. G.  ... 
doi:10.2307/2584155 fatcat:mm2r36hqqngz3ef7cff44o7dhm

It's more than just use: An exploration of telemedicine use quality

Cynthia LeRouge, Alan R. Hevner, Rosann Webb Collins
2007 Decision Support Systems  
The Information Society: an International Journal. April-June 1998, Volume 14, Number 2, 137-152. (with France Belanger) "The Changing Information Environment."  ...  The Journal of Computer Information Systems, Winter 1985, Vol. 26, No. 2, 23-30. (with Robert C. Tesch) "An Investigation of Componential Skill Relationships in Programming."  ... 
doi:10.1016/j.dss.2006.02.007 fatcat:cvzif4uh2nefnbl3q2k6n5fide

Computing: Handbooks in Operations Research and Management Science, Volume 3

Gautam Appa
1994 Journal of the Operational Research Society  
This volume follows on from Volumes 1, on Optimization', and 2 on Stochastic Optimiza- tion’.  ...  Journal of the Operational Research Society Vol. 45, No. 9 Computing: Handbooks in Operations Research and Management Science, Volume 3 E. G. CorrMan Jr, J. K. Lenstra and A. H. G.  ... 
doi:10.1057/jors.1994.178 fatcat:5lkddryui5evjbqoc4uiqy26xe

Computing: Handbooks in Operations Research and Management Science, Volume 3

Gautam Appa, E. G. Coffman Jr, J. K. Lenstra, A. H. G. Rinooy Kan
1994 Journal of the Operational Research Society  
This volume follows on from Volumes 1, on Optimization', and 2 on Stochastic Optimiza- tion’.  ...  Journal of the Operational Research Society Vol. 45, No. 9 Computing: Handbooks in Operations Research and Management Science, Volume 3 E. G. CorrMan Jr, J. K. Lenstra and A. H. G.  ... 
doi:10.2307/2584154 fatcat:mthikuesejclteuwhznrvrdjgu

Efficient Algorithms for Computing Conservative Portal Visibility Information

W. F. H. Jiménez, C. Esperança, A. A. F. Oliveira
2000 Computer graphics forum (Print)  
The geometry of this information is termed a 'visibility volume' and its computation is usually quite complex.  ...  Conservative approximations of viewing volumes, however, are simpler and less expensive to compute.  ...  The Computer Journal 14(3): 232. August 1971. 1 c The Eurographics Association and Blackwell Publishers 2000.  ... 
doi:10.1111/1467-8659.00441 fatcat:egwn42ov55hkfi26gwbmb2n5su

Page 1096 of The Journal of the Operational Research Society Vol. 45, Issue 9 [page]

1994 The Journal of the Operational Research Society  
This volume follows on from Volumes 1, on Optimization', and 2 on Stochastic Optimiza- tion’.  ...  Journal of the Operational Research Society Vol. 45, No. 9 Computing: Handbooks in Operations Research and Management Science, Volume 3 E. G. CorrMan Jr, J. K. Lenstra and A. H. G.  ... 

A Clustering based Transfer Function for Volume Rendering Using Gray-Gradient Mode Histogram

Yisha Lan, Yimin Ding, Xin Luo, Yanzhao Zhang, Chenxi Huang, E.Y.K. Ng, Weihong Huang, Xuezhong Zhou, Jie Su, Yonghong Peng, Zhicheng Wang, Yongqiang Cheng (+1 others)
2019 IEEE Access  
Clustering analysis is carried out based on the spatial information of volume data in the histogram, and the transfer function is automatically generated by means of clustering analysis of the spatial  ...  information.  ...  FIGURE 2 . 2 The principle of threshold segmentation based on gray histogram.  ... 
doi:10.1109/access.2019.2923080 fatcat:lxur3lkpybffvpgfxhnywqwpsi

Deep Stereo Matching With Explicit Cost Aggregation Sub-Architecture

Lidong Yu, Yucheng Wang, Yuwei Wu, Yunde Jia
2018 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
Many efforts focus on the feature extraction and similarity measurement of the matching cost computation step while less attention is paid on cost aggregation which is crucial for stereo matching.  ...  The criterion for the selection is determined by the low-level structure information obtained from a light convolutional network.  ...  Finally, the similarity measurement using 3D auto-encoder is applied on the feature volume to compute the matching cost volume.  ... 
doi:10.1609/aaai.v32i1.12267 fatcat:yefxt5qg75dhdm3q3v5o4rjsoq

Constraining volume by matching the moments of a distance distribution

C.C. Chen, R.O. Chen, R.B. Altman
1996 Bioinformatics  
Quantitative analysis of our results allows us to assess the information content contained in constraints on volume, and to show that in some cases addition of a volume constraint adds information roughly  ...  One of the most problematic constraints is the constraint on the total volume occupied by the atoms.  ...  Some computing facilities were provided by the CAMIS resource, funded by NIH LMO53O5. We thank Doran Fink and Mark Gerstein for useful discussions. for structures generated from NMR data.  ... 
doi:10.1093/bioinformatics/12.4.319 fatcat:fwqk5qdknrbzto4l36mwxtts2q

Rhythmic and sustained oscillations in metabolism and gene expression of Cyanothece sp. ATCC 51142 under constant light

Sandeep B. Gaudana, S. Krishnakumar, Swathi Alagesan, Madhuri G. Digmurti, Ganesh A. Viswanathan, Madhu Chetty, Pramod P. Wangikar
2013 Frontiers in Microbiology  
International Conference on Neural Information Processing (ICONIP), NEURAL INFORMATION PROCESSING, Lecture Notes in Computer Science, 2011, Volume 7062/2011, 636-645, DOI: 10.1007/978-3-642-24955-6_75  ...  , ISSN: 0925-2312, Special issue on Computational Intelligence in Bioinformatics, Volume 73, pages 2308-2316.  ... 
doi:10.3389/fmicb.2013.00374 pmid:24367360 pmcid:PMC3854555 fatcat:lvjvebne2ja4tasxsc3a7r5znm

Page 327 of Mathematical Reviews Vol. , Issue 83a [page]

1983 Mathematical Reviews  
Volume 2 contains 27 articles from AN/FSQ-7 computer to bivalent programming by implicit enumeration.  ...  Volume 6 contains 16 articles from computer selection criteria to curriculum committee on computer science.  ... 
« Previous Showing results 1 — 15 out of 1,824,296 results