Computing & Information Technology
Authenticating a User on a Mobile Device
Read more
Detecting Fake News on Social Media by Message Diffusion Pathways
Read more
CrossFire: Cross Media Joint Friend and Item Recommendations
Read more
Sequential Event Prediction with Noise-Contrastive Estimation for Marked Temporal Point Process
Read more
Method for Verifying Social Media Data Received from Third-Party Providers
Read more
Privacy-Preserving Social Media Data Outsourcing
Read more
Hybrid Automata Mining from Input/Output Traces of Cyber-Physical Systems
Read more
Co-Simulation of Physical Model and Self-Adaptive Predictive Controller Using Hybrid Automata
Read more
Predict Enterprise Cyber Incidents by Social Network Analysis on Dark Web Forums
Read more
RIM: Robust Intersection Management for Connected Autonomous Vehicles
Read more
Posts navigation
First
« Prev
1
…
10
11
12
13
14
…
35
Next »
Last