Displaying works 61 - 80 of 299 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2015 chapter
Understanding Co-run Degradations on Integrated Heterogeneous Processors
In Languages and Compilers for Parallel Computing (pp. 82–97).
2015 journal article
Special Issue: Selected Papers from the Sixth International IEEE Conference on Advanced Networks and Telecommunication Systems (IEEE ANTS 2012)
Optical Switching and Networking, 18, 151–152.
2015 conference paper
Augmenting introductory Computer Science Classes with GameMaker and Mobile Apps
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 709–709.
2015 conference paper
BOTS: Selecting Next-Steps from Player Traces in a Puzzle Game.
EDM (Workshops), 1446. http://www.scopus.com/inward/record.url?eid=2-s2.0-84944339515&partnerID=MN8TOARS
Contributors: D. Hicks, Y. Dong, R. Zhi, V. Cateté & T. Barnes
2015 journal article
Keep Your Promise: Mechanism Design Against Free-Riding and False-Reporting in Crowdsourcing
IEEE Internet of Things Journal.
2015 conference paper
Truthful incentive mechanisms for crowdsourcing
2015 IEEE Conference on Computer Communications (INFOCOM).
2015 magazine article
Network function virtualization in the multi-tenant cloud
(2015, May). IEEE Network.
2015 conference paper
Towards Min-Cost Virtual Infrastructure Embedding
2015 IEEE Global Communications Conference (GLOBECOM).
2015 conference paper
TSA: A framework of truthful spectrum auctions under the physical interference model
2015 IEEE International Conference on Communications (ICC).
2015 conference paper
A Sybil-Proof and Time-Sensitive Incentive Tree Mechanism for Crowdsourcing
2015 IEEE Global Communications Conference (GLOBECOM).
2015 chapter
Round-Optimal Black-Box Two-Party Computation
In Lecture Notes in Computer Science (pp. 339–358).
2015 chapter
Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box Way
In Theory of Cryptography (pp. 345–374).
2015 journal article
Fixing, preventing, and recovering from concurrency bugs
Science China Information Sciences, 58(5), 1–18.
2015 journal article
Reduced-Item Food Audits Based on the Nutrition Environment Measures Surveys
American Journal of Preventive Medicine, 49(4), e23–e33.
2015 journal article
Guest editorial: special multi-issue on selected topics in automated software engineering
Automated Software Engineering, 22(4), 437–438.
2015 chapter
Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis
In Data and Applications Security and Privacy XXIX (pp. 170–187).
2015 chapter
Response-Guided Community Detection: Application to Climate Index Discovery
In Machine Learning and Knowledge Discovery in Databases (pp. 736–751).
2015 chapter
Revisiting Computational Models of Creative Storytelling Based on Imaginative Recall
In Interactive Storytelling (Vol. 9445, pp. 170–178).
Contributors: S. Harmon * & A. Jhala*
2015 chapter
Remember That Time? Telling Interesting Stories from Past Interactions
In Interactive Storytelling (Vol. 9445, pp. 93–104).
Contributors: M. Behrooz*, R. Swanson* & A. Jhala*
2015 journal article
An entropy-based persistence barcode
Pattern Recognition, 48(2), 391–401.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.