Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
High Expectations: An Observational Study of Programming and Cannabis Intoxication
He, Wenxin, Parikh, Manasvi, Weimer, Westley, Endres, Madeline
Published in Proceedings / International Conference on Software Engineering (14.04.2024)
Published in Proceedings / International Conference on Software Engineering (14.04.2024)
Get full text
Conference Proceeding
Gait-Guard: Turn-aware Freezing of Gait Detection for Non-intrusive Intervention Systems
Koltermann, Kenneth, Clapham, John, Blackwell, GinaMari, Jung, Woosub, Burnet, Evie N., Gao, Ye, Shao, Huajie, Cloud, Leslie, Pretzer-Aboff, Ingrid, Zhou, Gang
Published in IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies (Online) (01.06.2024)
Published in IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies (Online) (01.06.2024)
Get full text
Conference Proceeding
Journal Article
Accurate Body Pose Matching for Individuals with Stroke using Siamese Networks
Gokhman, Ruslan, Sawdayi, Talya, Khan, Rana, Satyanarayana, Ashwin, Vinjamuri, Ramana, Kadiyala, Sai Praveen
Published in IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies (Online) (19.06.2024)
Published in IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies (Online) (19.06.2024)
Get full text
Conference Proceeding
Do You Think It's Biased? How To Ask For The Perception Of Media Bias
Spinde, Timo, Kreuter, Christina, Gaissmaier, Wolfgang, Hamborg, Felix, Gipp, Bela, Giese, Helge
Published in 2021 ACM/IEEE Joint Conference on Digital Libraries (JCDL) (01.09.2021)
Published in 2021 ACM/IEEE Joint Conference on Digital Libraries (JCDL) (01.09.2021)
Get full text
Conference Proceeding
CRT RSA algorithm protected against fault attacks
Boscher, Arnaud, Naciri, Robert, Prouff, Emmanuel
Published in Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems (09.05.2007)
Published in Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems (09.05.2007)
Get full text
Conference Proceeding
Surfacing Collective Harms in Privacy Sensitive Data
Weber, Nicholas
Published in 2021 ACM/IEEE Joint Conference on Digital Libraries (JCDL) (01.09.2021)
Published in 2021 ACM/IEEE Joint Conference on Digital Libraries (JCDL) (01.09.2021)
Get full text
Conference Proceeding
The software engineer and the development, management and use of intellectual property
Rockman, Howard B., Khodosh, Vladimir
Published in Proceedings of the 27th international conference on Software engineering (15.05.2005)
Published in Proceedings of the 27th international conference on Software engineering (15.05.2005)
Get full text
Conference Proceeding
Usable Object Management approaches for online social networks
Cheek, Gorrell P., Shehab, Mohamed
Published in Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining : ASONAM 2013 : Niagara Falls, Canada, August 25-28, 2013 (01.08.2013)
Published in Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining : ASONAM 2013 : Niagara Falls, Canada, August 25-28, 2013 (01.08.2013)
Get full text
Conference Proceeding
A Trustworthiness Fusion Model for Service Cloud Platform Based on D-S Evidence Theory
Rong Hu, Jianxun Liu, Liu, X. F.
Published in 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (01.05.2011)
Published in 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (01.05.2011)
Get full text
Conference Proceeding
Boosting-Based Distributed and Adaptive Security-Monitoring through Agent Collaboration
Jean, Evens, Jiao, Yu, Hurson, Ali R., Potok, Thomas E.
Published in Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops (02.11.2007)
Published in Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops (02.11.2007)
Get full text
Conference Proceeding
An analysis of the bid behavior of the 2005 JCDL program committee
Rodriguez, Marko A., Bollen, Johan, Van de Sompel, Hebert
Published in International Conference on Digital Libraries: Proceedings of the 6th ACM/IEEE-CS joint conference on Digital libraries; 11-15 June 2006 (11.06.2006)
Published in International Conference on Digital Libraries: Proceedings of the 6th ACM/IEEE-CS joint conference on Digital libraries; 11-15 June 2006 (11.06.2006)
Get full text
Conference Proceeding
Access Control with Uncertain Surveillance
Balbiani, Philippe
Published in IEEE/WIC/ACM International Conference on web intelligence (19.09.2005)
Published in IEEE/WIC/ACM International Conference on web intelligence (19.09.2005)
Get full text
Conference Proceeding
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
Foley, Simon, Gong, Li, Qian, Xiaolei
Published in Proceedings of the 1996 IEEE Symposium on Security and Privacy (06.05.1996)
Published in Proceedings of the 1996 IEEE Symposium on Security and Privacy (06.05.1996)
Get full text
Conference Proceeding