Computer Science and Engineering

Results: 6228



#Item
11Axiomatic Foundations and Algorithms for Deciding Semantic Equivalences of SQL Queries Shumo Chu, Brendan Murphy, Jared Roesch, Alvin Cheung, Dan Suciu Paul G. Allen School of Computer Science and Engineering University

Axiomatic Foundations and Algorithms for Deciding Semantic Equivalences of SQL Queries Shumo Chu, Brendan Murphy, Jared Roesch, Alvin Cheung, Dan Suciu Paul G. Allen School of Computer Science and Engineering University

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2018-07-28 03:46:38
    12For the DISTINCT Clause of SPARQL Queries Medha Atre Dept. of Computer Science and Engineering Indian Institute of Technology, Kanpur, India

    For the DISTINCT Clause of SPARQL Queries Medha Atre Dept. of Computer Science and Engineering Indian Institute of Technology, Kanpur, India

    Add to Reading List

    Source URL: gdac.uqam.ca

    Language: English - Date: 2017-10-04 00:50:47
    13SysPal: System-guided Pattern Locks for Android Geumhwan Cho1 , Jun Ho Huh2 , Junsung Cho1 , Seongyeol Oh1 , Youngbae Song1 , Hyoungshick Kim1 1 Department of Computer Science and Engineering, Sungkyunkwan University, So

    SysPal: System-guided Pattern Locks for Android Geumhwan Cho1 , Jun Ho Huh2 , Junsung Cho1 , Seongyeol Oh1 , Youngbae Song1 , Hyoungshick Kim1 1 Department of Computer Science and Engineering, Sungkyunkwan University, So

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 16:02:19
    14Under review as a conference paper at ICLRM ETA L EARNING S HARED H IERARCHIES Jonathan Ho, Xi Chen, Pieter Abbeel UC Berkeley, Department of Electrical Engineering and Computer Science

    Under review as a conference paper at ICLRM ETA L EARNING S HARED H IERARCHIES Jonathan Ho, Xi Chen, Pieter Abbeel UC Berkeley, Department of Electrical Engineering and Computer Science

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2017-10-26 20:31:00
    15Recommendations in Signed Social Networks Jiliang Tang‡ , Charu Aggarwal# , and Huan Liu† † Computer Science & Engineering, Arizona State University, Tempe, AZ, USA ‡

    Recommendations in Signed Social Networks Jiliang Tang‡ , Charu Aggarwal# , and Huan Liu† † Computer Science & Engineering, Arizona State University, Tempe, AZ, USA ‡

    Add to Reading List

    Source URL: gdac.uqam.ca

    Language: English - Date: 2017-10-04 01:18:50
      16TRecSo: Enhancing Top-k Recommendation With Social Information ∗ Chanyoung Park, Donghyun Kim, Jinoh Oh, Hwanjo Yu† Dept. of Computer Science and Engineering

      TRecSo: Enhancing Top-k Recommendation With Social Information ∗ Chanyoung Park, Donghyun Kim, Jinoh Oh, Hwanjo Yu† Dept. of Computer Science and Engineering

      Add to Reading List

      Source URL: gdac.uqam.ca

      Language: English - Date: 2017-10-04 00:59:03
      17Poster: Secure Computations of Trigonometric and Inverse Trigonometric Functions Fattaneh Bayatbabolghani∗ , Marina Blanton† , Mehrdad Aliasgari‡ and Michael Goodrich§ ∗ Computer  Science and Engineering, Univer

      Poster: Secure Computations of Trigonometric and Inverse Trigonometric Functions Fattaneh Bayatbabolghani∗ , Marina Blanton† , Mehrdad Aliasgari‡ and Michael Goodrich§ ∗ Computer Science and Engineering, Univer

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-04-25 08:06:46
      18Timothy Alden Davis Department Computer Science and Engineering Texas A&M University 3112 TAMU, College Station, Texasemail:  web: http://faculty.cse.tamu.edu/davis

      Timothy Alden Davis Department Computer Science and Engineering Texas A&M University 3112 TAMU, College Station, Texasemail: web: http://faculty.cse.tamu.edu/davis

      Add to Reading List

      Source URL: faculty.cse.tamu.edu

      Language: English - Date: 2018-06-27 12:39:25
        19Leveraging Internet Background Radiation for Opportunistic Network Analysis Karyn Benson∗† , Alberto Dainotti† , kc claffy† , Alex C. Snoeren∗ , Michael Kallitsis‡ ∗  Computer Science and Engineering, UC Sa

        Leveraging Internet Background Radiation for Opportunistic Network Analysis Karyn Benson∗† , Alberto Dainotti† , kc claffy† , Alex C. Snoeren∗ , Michael Kallitsis‡ ∗ Computer Science and Engineering, UC Sa

        Add to Reading List

        Source URL: www.caida.org

        Language: English - Date: 2018-09-13 19:48:51
          20Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

          Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

          Add to Reading List

          Source URL: www.ieee-security.org

          Language: English - Date: 2017-05-14 15:46:40