Search concepts
|
Selected Filters
|
- 35,250 - 35,300 out of 39,994 results
Search results
-
Conference contribution
SAFE: Similarity-Aware Multi-modal Fake News Detection
Zhou, X., Wu, J. & Zafarani, R., 2020, Advances in Knowledge Discovery and Data Mining - 24th Pacific-Asia Conference, PAKDD 2020, Proceedings. Lauw, H. W., Lim, E-P., Wong, R. C-W., Ntoulas, A., Ng, S-K. & Pan, S. J. (eds.). Springer, p. 354-367 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12085 LNAI).Research output: Chapter in Book/Entry/Poem › Conference contribution
Open Access57 Scopus citations -
Sample size effects on the behavior of EPS geofoam
Elragi, A., Negussey, D. & Kyanka, G., 2000, Proceedings of the United Engineering Foundation / ASCE Geo-Institute Soft Ground Technology Conference - Soft Ground Technology, GSP 112. p. 280-291 12 p. (Proceedings of the United Engineering Foundation / ASCE Geo-Institute Soft Ground Technology Conference - Soft Ground Technology, GSP 112; vol. 301).Research output: Chapter in Book/Entry/Poem › Conference contribution
17 Scopus citations -
Sampling community structure in dynamic social networks
Mensah, H. & Soundarajan, S., 2018, Recent Trends and Future Technology in Applied Intelligence - 31st International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, Proceedings. Ait Mohamed, O., Mouhoub, M., Sadaoui, S. & Ali, M. (eds.). Springer Verlag, p. 114-126 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10868 LNAI).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Sarcasm detection on twitter:A behavioral modeling approach
Rajadesingan, A., Zafarani, R. & Liu, H., Feb 2 2015, WSDM 2015 - Proceedings of the 8th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, p. 97-106 10 p. (WSDM 2015 - Proceedings of the 8th ACM International Conference on Web Search and Data Mining).Research output: Chapter in Book/Entry/Poem › Conference contribution
251 Scopus citations -
Scalable graph-based bug search for firmware images
Feng, Q., Zhou, R., Xu, C., Cheng, Y., Testa, B. & Yin, H., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 480-491 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).Research output: Chapter in Book/Entry/Poem › Conference contribution
255 Scopus citations -
Scalable Log Auditing on Private Blockchains via Lightweight Log-Fork Prevention
Tang, Y., Li, K., Wang, Y. & Somuncuoglu, S. B., Dec 7 2020, SERIAL 2020 - Proceedings of the 2020 4th Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, Part of Middleware 2020. Association for Computing Machinery, Inc, p. 1-4 4 p. (SERIAL 2020 - Proceedings of the 2020 4th Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, Part of Middleware 2020).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Scalable NoC-based Neuromorphic Hardware Learning and Inference
Fang, H., Shrestha, A., De Ma, M. & Qiu, Q., Oct 10 2018, 2018 International Joint Conference on Neural Networks, IJCNN 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8489619. (Proceedings of the International Joint Conference on Neural Networks; vol. 2018-July).Research output: Chapter in Book/Entry/Poem › Conference contribution
19 Scopus citations -
Scalable Quantum Computing Infrastructure Based on Superconducting Electronics
Mukhanov, O., Plourde, B. L. T., Opremcak, A., Liu, C. H., McDermott, R., Kirichenko, A., Howington, C., Walter, J., Hutchings, M., Vernik, I., Yohannes, D., Dodge, K. & Ballard, A., Dec 2019, 2019 IEEE International Electron Devices Meeting, IEDM 2019. Institute of Electrical and Electronics Engineers Inc., 8993634. (Technical Digest - International Electron Devices Meeting, IEDM; vol. 2019-December).Research output: Chapter in Book/Entry/Poem › Conference contribution
8 Scopus citations -
Scale estimation with difference of ordered residuals
Scalzo-Cornacchia, M. & Velipasalar, S., Dec 9 2015, Proceedings - International Conference on Image Processing, ICIP. IEEE Computer Society, Vol. 2015-December. p. 3377-3381 5 p. 7351430Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Scattering from a conducting cylinder shielded with a dielectric bead
Heidary, K., Lee, J. K. & Adams, A. T., 1995, IEEE Antennas and Propagation Society, AP-S International Symposium (Digest). Anon (ed.). IEEE Computer Society, Vol. 1. p. 10-13 4 p.Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Scattering from arbitrary planar periodic screen consisting of resistive patches and dielectric layers
Petre, P., Sarkar, T. K., Zombory, L. & Swaminathan, M., Dec 1 1991, 1991 Digest. IEEE Computer Society, p. 1870-1873 4 p. (AP-S International Symposium (Digest) (IEEE Antennas and Propagation Society); vol. 3).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
SCCS: A Scalable Clustered Camera System for multiple object tracking communicating via message passing interface
Velipasalar, S., Schlessman, J., Chen, G. Y., Wolf, W. & Singh, J. P., 2006, 2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings. p. 277-280 4 p. 4036590. (2006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proceedings; vol. 2006).Research output: Chapter in Book/Entry/Poem › Conference contribution
27 Scopus citations -
SC-DCNN: Highly-scalable deep convolutional neural network using stochastic computing
Ren, A., Li, Z., Ding, C., Qiu, Q., Wang, Y., Li, J., Qian, X. & Yuan, B., Apr 4 2017, ASPLOS 2017 - 22nd International Conference on Architectural Support for Programming Languages and Operating Systems. Association for Computing Machinery, p. 405-418 14 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS; vol. Part F127193).Research output: Chapter in Book/Entry/Poem › Conference contribution
75 Scopus citations -
Schedulability bound for integrated modular avionics partitions
Kim, J. E., Abdelzaher, T. & Sha, L., Apr 22 2015, Proceedings of the 2015 Design, Automation and Test in Europe Conference and Exhibition, DATE 2015. Institute of Electrical and Electronics Engineers Inc., p. 37-42 6 p. 7092355. (Proceedings -Design, Automation and Test in Europe, DATE; vol. 2015-April).Research output: Chapter in Book/Entry/Poem › Conference contribution
6 Scopus citations -
Scheduling and mapping of periodic tasks on multi-core embedded systems with energy harvesting
Lu, J. & Qiu, Q., 2011, 2011 International Green Computing Conference and Workshops, IGCC 2011. 6008595. (2011 International Green Computing Conference and Workshops, IGCC 2011).Research output: Chapter in Book/Entry/Poem › Conference contribution
26 Scopus citations -
Scheduling in D2D underlaid cellular networks with deadline constraints
Li, Y., Cenk Gursoy, M. & Velipasalar, S., Jul 2 2016, 2016 IEEE 84th Vehicular Technology Conference, VTC Fall 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7881211. (IEEE Vehicular Technology Conference; vol. 0).Research output: Chapter in Book/Entry/Poem › Conference contribution
3 Scopus citations -
Schelkunoff integrals for vertical dipoles
Dyab, W. M., Sarkar, T. K. & Salazar-Palma, M., Dec 1 2013, 2013 IEEE Antennas and Propagation Society International Symposium, APSURSI 2013 - Proceedings. p. 726-727 2 p. 6711022. (IEEE Antennas and Propagation Society, AP-S International Symposium (Digest)).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Scitokens: Demonstrating Capability-Based Access to Remote Scientific Data using HTCondor
Withers, A., Brown, D., Basney, J., Bockelman, B., Patton, J., Tannenbaum, T., Miller, Z., Weitzel, D., Gaynor, J. & Gao, Y. A., Jul 28 2019, Proceedings of the Practice and Experience in Advanced Research Computing: Rise of the Machines (Learning), PEARC 2019. Association for Computing Machinery, 3333258. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Entry/Poem › Conference contribution
Open Access3 Scopus citations -
SciTokens: Capability-based secure access to remote scientific data
Withers, A., Brown, D., Bockelman, B., Gaynor, J., Weitzel, D., Basney, J., Tannenbaum, T. & Miller, Z., Jul 22 2018, Practice and Experience in Advanced Research Computing 2018: Seamless Creativity, PEARC 2018. Association for Computing Machinery, a24. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Entry/Poem › Conference contribution
6 Scopus citations -
SCUTA: A server-side access control system for web applications
Tan, X., Du, W., Luo, T. & Soundararaj, K. D., Jul 25 2012, SACMAT'12 - Proceedings of the 17th ACM Symposium on Access Control Models and Technologies. p. 71-82 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Seamless Deductive Inference via Macros
Sahebolamri, A., Gilray, T. & Micinski, K., Sep 19 2022, CC 2022 - Proceedings of the 31st ACM SIGPLAN International Conference on Compiler Construction. Egger, B. & Smith, A. (eds.). Association for Computing Machinery, Inc, p. 77-88 12 p. (CC 2022 - Proceedings of the 31st ACM SIGPLAN International Conference on Compiler Construction).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Searches for Λb0 and Ξb0 decays to KS0pπ- and KS0pK- final states with first observation of the Λ° → KS0pπ- decay
Coutinho, R. S., 2014, Proceedings of the 49th Rencontres de Moriond - 2014 Electroweak Interactions and Unified Theories, EW 2014. Auge, E., Dumarchez, J. & Tron Thanh Van, J. (eds.). ARISF, p. 463-466 4 p. (Proceedings of the 49th Rencontres de Moriond - 2014 Electroweak Interactions and Unified Theories, EW 2014).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Search for Lorentz violation in top quark pair production and decay
Whittington, D. W., 2014, Proceedings of the 6th Meeting on CPT and Lorentz Symmetry, CPT 2013. Kostelecky, V. A. (ed.). World Scientific Publishing Co. Pte Ltd, p. 200-203 4 p. (Proceedings of the 6th Meeting on CPT and Lorentz Symmetry, CPT 2013).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Searching and search engines: When is current research going to lead to major progress?
Liddy, E. D., Dec 1 2000, Proceedings of the 2000 International Chemical Information Conference. Collier, H. & Collier, H. (eds.). p. 109-114 6 p. (Proceedings of the 2000 International Chemical Information Conference).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Searching for better randomized response schemes for privacy-preserving data mining
Huang, Z., Du, W. & Teng, Z., 2007, Knowledge Discovery in Database: PKDD 2007 - 11th European Conference on Principles and Practice of Knowledge Discovery in Databases, Proceedings. Springer Verlag, p. 487-497 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4702 LNAI).Research output: Chapter in Book/Entry/Poem › Conference contribution
Open Access2 Scopus citations -
Seasonal optimization of a dynamic thermo-optical ETFE façade system
Han, J. M. & Park, D., 2019, 16th International Conference of the International Building Performance Simulation Association, Building Simulation 2019. Corrado, V., Fabrizio, E., Gasparella, A. & Patuzzi, F. (eds.). International Building Performance Simulation Association, p. 4887-4893 7 p. (Building Simulation Conference Proceedings; vol. 7).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Second-order plasma enabled tunable low-profile frequency selective surface based on coupling inter-layer
Payne, K., Peters, E. F., Brunett, J., Wedding, D. K., Wedding, C. A. & Choi, J. H., 2016, European Microwave Week 2016: "Microwaves Everywhere", EuMW 2016 - Conference Proceedings; 46th European Microwave Conference, EuMC 2016. Institute of Electrical and Electronics Engineers Inc., p. 309-312 4 p. 7824340. (European Microwave Week 2016: "Microwaves Everywhere", EuMW 2016 - Conference Proceedings; 46th European Microwave Conference, EuMC 2016).Research output: Chapter in Book/Entry/Poem › Conference contribution
10 Scopus citations -
Secrecy capacity of semi-deterministic wire-tap channels
Grubb, J., Vishwanath, S., Liang, Y. & Poor, H. V., Dec 1 2007, Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW. p. 199-202 4 p. 4318063. (Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW).Research output: Chapter in Book/Entry/Poem › Conference contribution
10 Scopus citations -
Secrecy capacity region of binary and Gaussian multiple access channels
Liang, Y. & Vincent Poor, H., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 1098-1106 9 p. (44th Annual Allerton Conference on Communication, Control, and Computing 2006; vol. 3).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Secrecy capacity region of fading broadcast channels
Liang, Y., Poor, H. V. & Shamai, S., 2007, Proceedings - 2007 IEEE International Symposium on Information Theory, ISIT 2007. p. 1291-1295 5 p. 4557401. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
29 Scopus citations -
Secrecy capacity region of parallel broadcast channels
Liang, Y., Poor, H. V. & Shamai, S., 2007, 2007 Information Theory and Applications Workshop, Conference Proceedings, ITA. p. 245-250 6 p. 4357587. (2007 Information Theory and Applications Workshop, Conference Proceedings, ITA).Research output: Chapter in Book/Entry/Poem › Conference contribution
4 Scopus citations -
Secrecy throughput of MANETs with malicious nodes
Liang, Y., Poor, H. V. & Ying, L., Nov 19 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 1189-1193 5 p. 5205992. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
36 Scopus citations -
SecReS: A secure and reliable storage scheme for cloud with client-side data deduplication
Islam, T., Mistareehi, H. & Manivannan, D., Dec 2019, 2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 9013469. (2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
3 Scopus citations -
Secret key capacity: Talk or keep silent?
Zhang, H., Liang, Y. & Lai, L., Sep 28 2015, Proceedings - 2015 IEEE International Symposium on Information Theory, ISIT 2015. Institute of Electrical and Electronics Engineers Inc., p. 291-295 5 p. 7282463. (IEEE International Symposium on Information Theory - Proceedings; vol. 2015-June).Research output: Chapter in Book/Entry/Poem › Conference contribution
9 Scopus citations -
Secret key-private key generation over three terminals: Capacity region
Zhang, H., Lai, L., Liang, Y. & Wang, H., 2014, 2014 IEEE International Symposium on Information Theory, ISIT 2014. Institute of Electrical and Electronics Engineers Inc., p. 1141-1145 5 p. 6875011. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
4 Scopus citations -
Secret sharing via noisy broadcast channels
Lai, L., Liang, Y., Du, W. & Shamai, S., 2011, 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011. p. 1955-1959 5 p. 6033894. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
4 Scopus citations -
Secure and efficient multi-party directory publication for privacy-preserving data sharing
Areekijseree, K., Tang, Y., Chen, J., Wang, S., Iyengar, A. & Palanisamy, B., 2018, Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Proceedings. Li, Y., Chang, B., Zhu, S. & Beyah, R. (eds.). Springer Verlag, p. 71-94 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 254).Research output: Chapter in Book/Entry/Poem › Conference contribution
1 Scopus citations -
Secure and Private Sequence Comparisons
Atallah, M. J., Kerschbaum, F. & Du, W., 2003, Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003. Samarati, P. & Syverson, P. (eds.). Association for Computing Machinery, p. 39-44 6 p. (Proceedings of the ACM Workshop on Privacy in the Electronic Society).Research output: Chapter in Book/Entry/Poem › Conference contribution
143 Scopus citations -
Secure broadcasting over fading channels with statistical QoS constraints
Qiao, D., Gursoy, M. C. & Velipasalar, S., 2010, 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010. 5683470. (GLOBECOM - IEEE Global Telecommunications Conference).Research output: Chapter in Book/Entry/Poem › Conference contribution
5 Scopus citations -
Secure coding over networks
Xu, J. & Chen, B., Nov 19 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 2116-2120 5 p. 5205251. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Secure communication in the low-SNR regime: A characterization of the energy-secrecy tradeoff
Gursoy, M. C., 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 2291-2295 5 p. 5205914. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
15 Scopus citations -
Secure communication over fading channels
Liang, Y. & Poor, H. V., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 817-823 7 p. (44th Annual Allerton Conference on Communication, Control, and Computing 2006; vol. 2).Research output: Chapter in Book/Entry/Poem › Conference contribution
43 Scopus citations -
Secure communication over fading channels with statistical QoS constraints
Qiao, D., Gursoy, M. C. & Velipasalar, S., 2010, 2010 IEEE International Symposium on Information Theory, ISIT 2010 - Proceedings. p. 2503-2507 5 p. 5513448. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Secure consistency verification for untrusted cloud storage by public blockchains
Li, K., Tang, Y., Kim, B. H. B. & Xu, J., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, p. 39-62 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems
Yoon, M. K., Mohan, S., Choi, J., Kim, J. E. & Sha, L., 2013, 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium, RTAS 2013. p. 21-32 12 p. 6531076. (Real-Time Technology and Applications - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
63 Scopus citations -
Secure distributed detection in the presence of eavesdroppers
Nadendla, V. S. S., Chen, H. & Varshney, P. K., Dec 1 2010, Conference Record of the 44th Asilomar Conference on Signals, Systems and Computers, Asilomar 2010. p. 1437-1441 5 p. 5757773. (Conference Record - Asilomar Conference on Signals, Systems and Computers).Research output: Chapter in Book/Entry/Poem › Conference contribution
18 Scopus citations -
Secured tag identification using EDSA (Enhanced Distributed Scalable Architecture)
Ahamed, S. I., Rahman, F. & Hoque, M. E., Dec 3 2008, Proceedings of the 23rd Annual ACM Symposium on Applied Computing, SAC'08. p. 1902-1907 6 p. (Proceedings of the ACM Symposium on Applied Computing).Research output: Chapter in Book/Entry/Poem › Conference contribution
1 Scopus citations -
Secure multi-party computational geometry
Atallah, M. J. & Du, W., 2001, Algorithms and Data Structures - 7th International Workshop, WADS 2001, Proceedings. Dehne, F., Sack, J-R. & Tamassia, R. (eds.). Springer Verlag, p. 165-179 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2125).Research output: Chapter in Book/Entry/Poem › Conference contribution
101 Scopus citations -
Secure nested codes for type II wiretap channels
Liu, R., Liang, Y., Poor, H. V. & Spasojević, P., 2007, 2007 IEEE Information Theory Workshop, ITW 2007, Proceedings. p. 337-342 6 p. 4313097. (2007 IEEE Information Theory Workshop, ITW 2007, Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
81 Scopus citations -
Secure relay beamforming over cognitive radio channels
Zhang, J. & Gursoy, M. C., 2011, 2011 45th Annual Conference on Information Sciences and Systems, CISS 2011. 5766188. (2011 45th Annual Conference on Information Sciences and Systems, CISS 2011).Research output: Chapter in Book/Entry/Poem › Conference contribution
15 Scopus citations