Uploads
Contact
/
Login
Upload
Search Results for 'Splicing Wang'
Experimental Demonstration of a Complete SPINet Optical Packet Switche
cheryl-pisano
Shield VulnerabilityDriven Network Filters for Preventing Known Vulnerability Exploits
ellena-manuel
A Comprehensive Study on Third Order
olivia-moreira
ImprovingReverberantVTSforHands-freeRobustSpeechRecognitionY.-Q.Wang,M
lindy-dunigan
Sequential Projection Learning for Hashing with Compact Code Jun Wang jwangee
luanne-stotts
Anagram A Content Anomaly Detector Resistant to Mimicry Attack Ke Wang Janak J
faustina-dinatale
IM4DC Evaluation of Impact: he Program DeliverersPerspectivehis
cheryl-pisano
Anagram A Content Anomaly Detector Resistant to Mimicry Attack Ke Wang Janak J
yoshiko-marsland
Learning Models for Object Recognition
test
2Scharstein,Hirschmuller,Kitajima,Krathwohl,Nesic,Wang,Westling ...
lois-ondreau
Sequential Projection Learning for Hashing with Compact Code Jun Wang jwangee
min-jolicoeur
Nanoscale eld effect transistor for biomolecular signal amplication Yu Chen Xihua Wang
alida-meadow
Continuous Character Control with LowDimensional Embeddings Sergey Levine Jack M
danika-pritchard
: Some Observations on the Presentation and Interpretation ofWong Chin
lindy-dunigan
Time Series Consistency
alida-meadow
DKSM:SubvertingVirtualMachineIntrospectionforFunandProtSinaBahram,Xux
cheryl-pisano
Studying Aesthetics in Photographic Images Using a Computational Approach Ritendra Datta
sherrill-nordquist
Improving Application Security with Data Flow Assertions Alexander Yip Xi Wang Nickolai
briana-ranney
WANGULLAHKLSERLAPTEVSCHMIDFEATURESFORACTIONRECOGNITION Evaluation of local spatiotemporal
marina-yarberry
Online Variational Inference for the Hierarchical Dirichlet Process Chong Wang John Paisley
giovanna-bartolotta
GenemutationsinretinitispigmentosaandtheirclinicalimplicationsD.Y.Wang
lindy-dunigan
Variance Reduction for Stochastic Gradient Optimization Chong Wang Xi Chen Alex Smola
briana-ranney
Sensing Vehicle Dynamics for Determining Driver Phone Use Yan Wang Stevens Institute of
yoshiko-marsland
Unauthorized Origin Crossing on Mobile Platforms Threats and Mitigation Rui Wang Microsoft
lois-ondreau
2
3
4
5
6
7
8
9
10
11
12