Publications in OpenAlex of which a co-author is affiliated to this organization
All publications | By field | By subfield
All publications [Next]
| Title | DOI |
|---|---|
| https://doi.org/10.1109/tpwrs.2005.857942 | Causes of the 2003 Major Grid Blackouts in North America and Europe, and Recommended Means to Improve System Dynamic Performance |
| https://doi.org/10.1109/tkde.2006.152 | A Survey of Web Information Extraction Systems |
| https://doi.org/10.1109/tse.2007.70725 | Comparison and Evaluation of Clone Detection Tools |
| Fast Normalized Cross-Correlation | |
| Classification of Model Transformation Approaches | |
| https://doi.org/10.1364/aop.5.000456 | Three-dimensional display technologies |
| https://doi.org/10.1109/mc.2018.3191268 | User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection |
| https://doi.org/10.1109/tkde.2005.32 | Preserving privacy by de-identifying face images |
| https://doi.org/10.1109/mim.2015.7108393 | 5G cellular: key enabling technologies and research challenges |
| https://doi.org/10.1109/tse.2004.52 | Predicting source code changes by mining change history |
| https://doi.org/10.1109/tc.2007.250627 | A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks |
| https://doi.org/10.1109/tkde.2004.90 | Discovering colocation patterns from spatial data sets: a general approach |
| https://doi.org/10.3217/jucs-008-11-1016 | Finding Plagiarisms among a Set of Programs with JPlag |
| https://doi.org/10.1109/tse.2007.1016 | Feature Location Using Probabilistic Ranking of Methods Based on Execution Scenarios and Information Retrieval |
| https://doi.org/10.1109/tpami.2006.195 | Total variation models for variable lighting face recognition |
| https://doi.org/10.1109/tpami.2007.59 | Skeleton Pruning by Contour Partitioning with Discrete Curve Evolution |
| https://doi.org/10.1111/j.1465-7295.1993.tb01305.x | FRANK KNIGHT ON RISK, UNCERTAINTY, AND THE FIRM: A NEW INTERPRETATION |
| https://doi.org/10.1109/tse.2004.91 | A taxonomy and catalog of runtime software-fault monitoring tools |
| https://doi.org/10.1109/tse.2005.71 | Hipikat: a project memory for software development |
| https://doi.org/10.1109/tkde.2006.123 | Discovering expressive process models by clustering log traces |
| https://doi.org/10.1109/tse.2005.37 | On the effectiveness of the test-first approach to programming |
| The Levels of Conceptual Interoperability Model | |
| The Optimized Link State Routing Protocol: Evaluation through Experiments and Simulation | |
| https://doi.org/10.1109/tvcg.2006.160 | MatrixExplorer: a Dual-Representation System to Explore Social Networks |
| https://doi.org/10.1109/tse.2005.25 | Information-theoretic software clustering |
| https://doi.org/10.1109/tpami.2006.253 | Shape Representation and Classification Using the Poisson Equation |
| https://doi.org/10.1109/tkde.2006.46 | Enhancing data analysis with noise removal |
| https://doi.org/10.1109/tmc.2005.30 | The impact of multihop wireless channel on TCP performance |
| https://doi.org/10.1109/tse.2005.74 | Toward understanding the rhetoric of small source code changes |
| https://doi.org/10.1108/13673270510602818 | The concept of knowledge work revisited |
| https://doi.org/10.1109/tdsc.2004.15 | Checkpointing for peta-scale systems: a look into the future of practical rollback-recovery |
| An Ontology Framework for Semantic Business Process Management | |
| https://doi.org/10.1109/neurel.2006.341200 | Bee Colony Optimization: Principles and Applications |
| https://doi.org/10.1287/isre.1040.0014 | Economics of an Information Intermediary with Aggregation Benefits |
| https://doi.org/10.1162/glep.2007.7.4.1 | The Comparative Politics of Climate Change |
| https://doi.org/10.1109/tse.2006.117 | Approximate Structural Context Matching: An Approach to Recommend Relevant Examples |
| https://doi.org/10.1109/tkde.2007.1016 | Classifier Ensembles with a Random Linear Oracle |
| https://doi.org/10.1145/2490868.2490870 | Computer Science curricula 2013 |
| https://doi.org/10.1109/tvcg.2007.28 | A Model and Framework for Visualization Exploration |
| https://doi.org/10.1109/tpami.2005.142 | Indexing hierarchical structures using graph spectra |
| https://doi.org/10.1109/tpami.2005.179 | Feature-based affine-invariant localization of faces |
| https://doi.org/10.1109/tvcg.2007.1021 | Vector Field Editing and Periodic Orbit Extraction Using Morse Decomposition |
| https://doi.org/10.1109/tc.2005.52 | High-speed function approximation using a minimax quadratic interpolator |
| https://doi.org/10.1162/glep_a_00182 | Multi-Forum Non-State Actors: Navigating the Regime Complexes for Forestry and Genetic Resources |
| https://doi.org/10.1109/tkde.2006.34 | WebGuard: a Web filtering engine combining textual, structural, and visual content-based analysis |
| https://doi.org/10.1126/science.abb8637 | Call for transparency of COVID-19 models |
| https://doi.org/10.1109/tse.2006.106 | A Synthetic Workload Generation Technique for Stress Testing Session-Based Systems |
| https://doi.org/10.1109/tse.2004.87 | Evaluating Web software reliability based on workload and failure data extracted from server logs |
| https://doi.org/10.1162/glep.2007.7.4.47 | Russia and the Kyoto Protocol: Seeking an Alignment of Interests and Image |
| https://doi.org/10.1007/978-981-10-0557-2 | Information Science and Applications (ICISA) 2016 |
| https://doi.org/10.1097/hp.0000000000001301 | IEEE Committee on Man and Radiation—COMAR Technical Information Statement: Health and Safety Issues Concerning Exposure of the General Public to Electromagnetic Energy from 5G Wireless Communications Networks |
| https://doi.org/10.1080/03054985.2023.2182768 | The core content framework and the ‘new science’ of educational research |
| https://doi.org/10.1177/09544089221081344 | Ternary nanofluid with heat source/sink and porous medium effects in stretchable convergent/divergent channel |
| https://doi.org/10.1080/09500782.2024.2382748 | Transpositioning in English medium instruction classroom discourse: insights from a translanguaging perspective |
| https://doi.org/10.1109/mnet.2020.9199796 | Private Blockchain in Industrial IoT |
| https://doi.org/10.52711/0974-360x.2023.00592 | Understanding the Global Transmission and Demographic Distribution of Nipah Virus (NiV) |
| https://doi.org/10.1080/24694452.2022.2160302 | Gendering and Diversifying the Research Pipeline: A Quantitative Feminist Geographical Approach to Gender in Higher Education |
| https://doi.org/10.1080/14647273.2023.2216395 | Reproductive health education in the schools of the four UK nations: is it falling through the gap? |
| https://doi.org/10.52711/0974-360x.2024.00436 | Eltrombopag Olamine in Dengue Fever: Systematic Review of Clinical Trials and Beyond |
| https://doi.org/10.1016/j.learninstruc.2025.102083 | Enhancing students’ content and language development: Implications for researching multilingualism in CLIL classroom context |
| https://doi.org/10.1109/tkde.2003.1209003 | Managing and sharing servents' reputations in P2P systems |
| https://doi.org/10.1109/tse.2003.1265521 | Design and evaluation of a support service for mobile, wireless publish/subscribe applications |
| https://doi.org/10.1109/tvcg.2005.92 | Comparison of path visualizations and cognitive measures relative to travel technique in a virtual environment |
| https://doi.org/10.1109/tse.2005.130 | The structural complexity of software an experimental test |
| https://doi.org/10.5465/amr.1985.4277346 | Sociologists, Economists, and Opportunism |
| https://doi.org/10.1109/tmc.2006.12 | Mobility helps peer-to-peer security |
| https://doi.org/10.1109/tse.2007.70723 | Applying Concept Analysis to User-Session-Based Testing of Web Applications |
| https://doi.org/10.1109/tvcg.2004.30 | Point-based probabilistic surfaces to show surface uncertainty |
| https://doi.org/10.1109/mcs.1985.1104945 | 1984 Conference on decision and control |
| https://doi.org/10.1109/tpami.2003.1206512 | A graphical model for audiovisual object tracking |
| https://doi.org/10.1063/1.4823299 | Visual Cues: Practical Data Visualization |
| https://doi.org/10.1007/978-0-387-75807_5 | Robust Simultaneous Registration of Multiple Range Images |
| https://doi.org/10.1109/wicsa.2009.5290789 | Every architecture description needs a framework: Expressing architecture frameworks using ISO/IEC 42010 |
| https://doi.org/10.1109/mp.2002.1166620 | Packet sniffing: a brief introduction |
| https://doi.org/10.1109/tmc.2005.35 | ARC: an integrated admission and rate control framework for competitive wireless CDMA data networks using noncooperative games |
| https://doi.org/10.1109/tpami.2006.29 | Channel smoothing: efficient robust smoothing of low-level signal features |
| https://doi.org/10.1109/tkde.2003.1209010 | Effectively finding relevant web pages from linkage information |
| https://doi.org/10.1007/3-540-61511-3 | Automated Deduction — Cade-13 |
| https://doi.org/10.1109/tvcg.2006.90 | Expressive Facial Animation Synthesis by Learning Speech Coarticulation and Expression Spaces |
| https://doi.org/10.1109/tse.2005.129 | Shallow knowledge as an aid to deep understanding in early phase requirements engineering |
| https://doi.org/10.1109/tkde.2005.55 | Compression, clustering, and pattern discovery in very high-dimensional discrete-attribute data sets |
| https://doi.org/10.1109/tkde.2006.136 | A Tree-Based Data Perturbation Approach for Privacy-Preserving Data Mining |
| https://doi.org/10.1109/tvcg.2006.57 | A topological approach to simplification of three-dimensional scalar functions |
| https://doi.org/10.1109/tdsc.2004.32 | An authorization model for geospatial data |
| https://doi.org/10.1109/tc.2004.1275299 | A performance model for wormhole-switched interconnection networks under self-similar traffic |
| https://doi.org/10.1109/tvcg.2007.70623 | Weaving Versus Blending: a quantitative assessment of the information carrying capacities of two alternative methods for conveying multivariate data with color. |
| https://doi.org/10.1016/j.cja.2014.12.001 | Navigation sensors and systems in GNSS degraded and denied environments |
| https://doi.org/10.1109/tse.2005.12 | Model-based performance risk analysis |
| https://doi.org/10.1109/tpds.2005.114 | You can run, but you can't hide: an effective statistical methodology to trace back DDoS attackers |
| https://doi.org/10.1109/tkde.2003.1198395 | P-autoclass: scalable parallel clustering for mining large data sets |
| https://doi.org/10.1109/tse.2005.137 | From live sequence charts to state machines and back: a guided tour |
| https://doi.org/10.1109/tse.2004.50 | Evaluating software reuse alternatives: a model and its application to an industrial case study |
| https://doi.org/10.1109/tc.2007.1038 | A Radix-10 Digit-Recurrence Division Unit: Algorithm and Architecture |
| https://doi.org/10.1109/tkde.2006.79 | Design and evaluation of a scalable and reliable P2P assisted proxy for on-demand streaming media delivery |
| A retrospective consecutive case analysis of pretreatment and comparative static radiological parameters following chiropractic adjustments. | |
| https://doi.org/10.1109/tvcg.2006.69 | Explanatory and illustrative visualization of special and general relativity |
| https://doi.org/10.1109/tdsc.2006.41 | System Call Monitoring Using Authenticated System Calls |
| https://doi.org/10.1109/tpami.2005.96 | Automatic image orientation detection via confidence-based integration of low-level and semantic cues |
| https://doi.org/10.1109/wicsa-ecsa.212.18 | Forces on Architecture Decisions - A Viewpoint |
| https://doi.org/10.1109/tkde.2005.187 | Using datacube aggregates for approximate querying and deviation detection |
