Browsing by ???browse.type.metadata.discipline??? Computer Science

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 51 to 70 of 81 < previous   next >
PreviewIssue DateTitleAuthor(s)???itemlist.dc.contributor.advisor???
zhaoX2000m-1b.pdf.jpg2000Neighborhood system in concept latticeZhao, XudongYao, Yiyu; Miao, Tianxuan
2023Neural synergy in compact biomedical IoT devices: spintronic pathways for MEG-EEG integration and portabilityElshafei, MohamedFadlullah, Zubair; Fouda, Mostafa
BeddaK2023m-1a.pdf.jpg2023New paradigms of distributed AI for improving 5G-based network systems performanceBedda, KhaledFadlullah, Zubair; Fouda, Mostafa
PaulA2020m-1a.pdf.jpg2020Online sequential learning with non-iterative strategy for feature extraction, classification and data augmentationPaul, Adhri NandiniYang, Yimin
SimpsonM2020-1a.pdf.jpg2021Optimization of hospital emergency departmentSimpson, Mackenzie Robert AndrewChoudhury, Salimur; Savage, David
IsmailA2020m-1a.pdf.jpg2020Permissioned blockchains for real world applicationsIsmail, AshianaWei, Ruizhong
GhaiK2019m-1b.pdf.jpg2019Placements of virtual network functions for effective network functions virtualizationGhai, Karanbir SinghChoudhury, Salimur
MariappanA2023m-1a.pdf.jpg2023Preliminary identification and therapeutic support of depression in mental health using conversational AIMariappan, ArchanaJinan, Fiaidhi
KamakL2023m-1a.pdf.jpg2023Programming pedagogy in the age of accessible artificial intelligenceKamak, Lakshmi PreethiMago, Vijay
BaxiM2022m-1a.pdf.jpg2022Quantifying the impact of Twitter activity in political battlegroundsKaur Baxi, ManmeetMago, Vijay; Yang, Yimin
PetrickM2000m-1b.pdf.jpg2000Results on perfect graphsPetrick, Mark David TimothyHoang, Chinh
ServosD2012m-1a.pdf.jpg10-Nov-2012A role and attribute based encryption approach to privacy and security in cloud based health servicesServos, Daniel-
FentonM2003m-1a.pdf.jpg2003Searching for incomplete self orthogonal latin squares : a targeted and parallel approachFenton, Mike (Michael Ryan)Wei, Ruizhong
MiaoC2003m-1a.pdf.jpg2003Secret sharing for mobile agent cryptographyMiao, ChungWei, Ruizhong
PawarA2018m-1a.pdf.jpg2018Semantic similarity between words and sentences using lexical database and word embeddingsPawar, Atish ShivajiMago, Vijay
ChowY2021m-1a.pdf.jpg2021Semi-supervised framework for clustering and semantic segmentationChow, Yik LunYang, Yimin; Du, Shan
IslamM2023m-1a.pdf.jpg2024Supporting the executability of R markdown filesIslam, Md AnaytulAsaduzzaman, Muhammad
ThrikawalaI2021m-1a.pdf.jpg2021Surface estimation from multi-modal tactile dataThrikawala, Isurade Oliveira, Thiago E. Alves
RamosCheretL2023m.pdf.jpg2023Texture recognition from robotic tactile surface reconstruction: a reinforcement learning approachRamos Cheret, Laurent Yves EmileAlves de Oliveira, Thiago E.
YingC2005m-1a.pdf.jpg2005The inference problem in multilevel secure databasesChen, Xue YingWei, Ruizhong