Computing & Information Technology
Secure Zero-Effort Two-Factor Authentication for Mobile Devices
Read more
Effective Triplication for Flexible and Real-Time Soft Error Resilience
Read more
Triplet Network with Attention for Speaker Diarization
Read more
Authenticating a User on a Mobile Device
Read more
Detecting Fake News on Social Media by Message Diffusion Pathways
Read more
CrossFire: Cross Media Joint Friend and Item Recommendations
Read more
Sequential Event Prediction with Noise-Contrastive Estimation for Marked Temporal Point Process
Read more
Method for Verifying Social Media Data Received from Third-Party Providers
Read more
Privacy-Preserving Social Media Data Outsourcing
Read more
Hybrid Automata Mining from Input/Output Traces of Cyber-Physical Systems
Read more
Posts navigation
First
« Prev
1
…
9
10
11
12
13
…
34
Next »
Last