IEEE Computer Society

Publications in OpenAlex of which a co-author is affiliated to this organization

All publications | By field | By subfield

All publications [Next]
Title DOI
https://doi.org/10.1109/tpwrs.2005.857942 Causes of the 2003 Major Grid Blackouts in North America and Europe, and Recommended Means to Improve System Dynamic Performance
https://doi.org/10.1109/tkde.2006.152 A Survey of Web Information Extraction Systems
https://doi.org/10.1109/tse.2007.70725 Comparison and Evaluation of Clone Detection Tools
Fast Normalized Cross-Correlation
Classification of Model Transformation Approaches
https://doi.org/10.1364/aop.5.000456 Three-dimensional display technologies
https://doi.org/10.1109/mc.2018.3191268 User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection
https://doi.org/10.1109/tkde.2005.32 Preserving privacy by de-identifying face images
https://doi.org/10.1109/mim.2015.7108393 5G cellular: key enabling technologies and research challenges
https://doi.org/10.1109/tse.2004.52 Predicting source code changes by mining change history
https://doi.org/10.1109/tc.2007.250627 A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks
https://doi.org/10.1109/tkde.2004.90 Discovering colocation patterns from spatial data sets: a general approach
https://doi.org/10.3217/jucs-008-11-1016 Finding Plagiarisms among a Set of Programs with JPlag
https://doi.org/10.1109/tse.2007.1016 Feature Location Using Probabilistic Ranking of Methods Based on Execution Scenarios and Information Retrieval
https://doi.org/10.1109/tpami.2006.195 Total variation models for variable lighting face recognition
https://doi.org/10.1109/tpami.2007.59 Skeleton Pruning by Contour Partitioning with Discrete Curve Evolution
https://doi.org/10.1111/j.1465-7295.1993.tb01305.x FRANK KNIGHT ON RISK, UNCERTAINTY, AND THE FIRM: A NEW INTERPRETATION
https://doi.org/10.1109/tse.2004.91 A taxonomy and catalog of runtime software-fault monitoring tools
https://doi.org/10.1109/tse.2005.71 Hipikat: a project memory for software development
https://doi.org/10.1109/tkde.2006.123 Discovering expressive process models by clustering log traces
https://doi.org/10.1109/tse.2005.37 On the effectiveness of the test-first approach to programming
The Levels of Conceptual Interoperability Model
The Optimized Link State Routing Protocol: Evaluation through Experiments and Simulation
https://doi.org/10.1109/tvcg.2006.160 MatrixExplorer: a Dual-Representation System to Explore Social Networks
https://doi.org/10.1109/tse.2005.25 Information-theoretic software clustering
https://doi.org/10.1109/tpami.2006.253 Shape Representation and Classification Using the Poisson Equation
https://doi.org/10.1109/tkde.2006.46 Enhancing data analysis with noise removal
https://doi.org/10.1109/tmc.2005.30 The impact of multihop wireless channel on TCP performance
https://doi.org/10.1109/tse.2005.74 Toward understanding the rhetoric of small source code changes
https://doi.org/10.1108/13673270510602818 The concept of knowledge work revisited
https://doi.org/10.1109/tdsc.2004.15 Checkpointing for peta-scale systems: a look into the future of practical rollback-recovery
An Ontology Framework for Semantic Business Process Management
https://doi.org/10.1109/neurel.2006.341200 Bee Colony Optimization: Principles and Applications
https://doi.org/10.1287/isre.1040.0014 Economics of an Information Intermediary with Aggregation Benefits
https://doi.org/10.1162/glep.2007.7.4.1 The Comparative Politics of Climate Change
https://doi.org/10.1109/tse.2006.117 Approximate Structural Context Matching: An Approach to Recommend Relevant Examples
https://doi.org/10.1109/tkde.2007.1016 Classifier Ensembles with a Random Linear Oracle
https://doi.org/10.1145/2490868.2490870 Computer Science curricula 2013
https://doi.org/10.1109/tvcg.2007.28 A Model and Framework for Visualization Exploration
https://doi.org/10.1109/tpami.2005.142 Indexing hierarchical structures using graph spectra
https://doi.org/10.1109/tpami.2005.179 Feature-based affine-invariant localization of faces
https://doi.org/10.1109/tvcg.2007.1021 Vector Field Editing and Periodic Orbit Extraction Using Morse Decomposition
https://doi.org/10.1109/tc.2005.52 High-speed function approximation using a minimax quadratic interpolator
https://doi.org/10.1162/glep_a_00182 Multi-Forum Non-State Actors: Navigating the Regime Complexes for Forestry and Genetic Resources
https://doi.org/10.1109/tkde.2006.34 WebGuard: a Web filtering engine combining textual, structural, and visual content-based analysis
https://doi.org/10.1126/science.abb8637 Call for transparency of COVID-19 models
https://doi.org/10.1109/tse.2006.106 A Synthetic Workload Generation Technique for Stress Testing Session-Based Systems
https://doi.org/10.1109/tse.2004.87 Evaluating Web software reliability based on workload and failure data extracted from server logs
https://doi.org/10.1162/glep.2007.7.4.47 Russia and the Kyoto Protocol: Seeking an Alignment of Interests and Image
https://doi.org/10.1007/978-981-10-0557-2 Information Science and Applications (ICISA) 2016
https://doi.org/10.1097/hp.0000000000001301 IEEE Committee on Man and Radiation—COMAR Technical Information Statement: Health and Safety Issues Concerning Exposure of the General Public to Electromagnetic Energy from 5G Wireless Communications Networks
https://doi.org/10.1080/03054985.2023.2182768 The core content framework and the ‘new science’ of educational research
https://doi.org/10.1177/09544089221081344 Ternary nanofluid with heat source/sink and porous medium effects in stretchable convergent/divergent channel
https://doi.org/10.1080/09500782.2024.2382748 Transpositioning in English medium instruction classroom discourse: insights from a translanguaging perspective
https://doi.org/10.1109/mnet.2020.9199796 Private Blockchain in Industrial IoT
https://doi.org/10.52711/0974-360x.2023.00592 Understanding the Global Transmission and Demographic Distribution of Nipah Virus (NiV)
https://doi.org/10.1080/24694452.2022.2160302 Gendering and Diversifying the Research Pipeline: A Quantitative Feminist Geographical Approach to Gender in Higher Education
https://doi.org/10.1080/14647273.2023.2216395 Reproductive health education in the schools of the four UK nations: is it falling through the gap?
https://doi.org/10.52711/0974-360x.2024.00436 Eltrombopag Olamine in Dengue Fever: Systematic Review of Clinical Trials and Beyond
https://doi.org/10.1016/j.learninstruc.2025.102083 Enhancing students’ content and language development: Implications for researching multilingualism in CLIL classroom context
https://doi.org/10.1109/tkde.2003.1209003 Managing and sharing servents' reputations in P2P systems
https://doi.org/10.1109/tse.2003.1265521 Design and evaluation of a support service for mobile, wireless publish/subscribe applications
https://doi.org/10.1109/tvcg.2005.92 Comparison of path visualizations and cognitive measures relative to travel technique in a virtual environment
https://doi.org/10.1109/tse.2005.130 The structural complexity of software an experimental test
https://doi.org/10.5465/amr.1985.4277346 Sociologists, Economists, and Opportunism
https://doi.org/10.1109/tmc.2006.12 Mobility helps peer-to-peer security
https://doi.org/10.1109/tse.2007.70723 Applying Concept Analysis to User-Session-Based Testing of Web Applications
https://doi.org/10.1109/tvcg.2004.30 Point-based probabilistic surfaces to show surface uncertainty
https://doi.org/10.1109/mcs.1985.1104945 1984 Conference on decision and control
https://doi.org/10.1109/tpami.2003.1206512 A graphical model for audiovisual object tracking
https://doi.org/10.1063/1.4823299 Visual Cues: Practical Data Visualization
https://doi.org/10.1007/978-0-387-75807_5 Robust Simultaneous Registration of Multiple Range Images
https://doi.org/10.1109/wicsa.2009.5290789 Every architecture description needs a framework: Expressing architecture frameworks using ISO/IEC 42010
https://doi.org/10.1109/mp.2002.1166620 Packet sniffing: a brief introduction
https://doi.org/10.1109/tmc.2005.35 ARC: an integrated admission and rate control framework for competitive wireless CDMA data networks using noncooperative games
https://doi.org/10.1109/tpami.2006.29 Channel smoothing: efficient robust smoothing of low-level signal features
https://doi.org/10.1109/tkde.2003.1209010 Effectively finding relevant web pages from linkage information
https://doi.org/10.1007/3-540-61511-3 Automated Deduction — Cade-13
https://doi.org/10.1109/tvcg.2006.90 Expressive Facial Animation Synthesis by Learning Speech Coarticulation and Expression Spaces
https://doi.org/10.1109/tse.2005.129 Shallow knowledge as an aid to deep understanding in early phase requirements engineering
https://doi.org/10.1109/tkde.2005.55 Compression, clustering, and pattern discovery in very high-dimensional discrete-attribute data sets
https://doi.org/10.1109/tkde.2006.136 A Tree-Based Data Perturbation Approach for Privacy-Preserving Data Mining
https://doi.org/10.1109/tvcg.2006.57 A topological approach to simplification of three-dimensional scalar functions
https://doi.org/10.1109/tdsc.2004.32 An authorization model for geospatial data
https://doi.org/10.1109/tc.2004.1275299 A performance model for wormhole-switched interconnection networks under self-similar traffic
https://doi.org/10.1109/tvcg.2007.70623 Weaving Versus Blending: a quantitative assessment of the information carrying capacities of two alternative methods for conveying multivariate data with color.
https://doi.org/10.1016/j.cja.2014.12.001 Navigation sensors and systems in GNSS degraded and denied environments
https://doi.org/10.1109/tse.2005.12 Model-based performance risk analysis
https://doi.org/10.1109/tpds.2005.114 You can run, but you can't hide: an effective statistical methodology to trace back DDoS attackers
https://doi.org/10.1109/tkde.2003.1198395 P-autoclass: scalable parallel clustering for mining large data sets
https://doi.org/10.1109/tse.2005.137 From live sequence charts to state machines and back: a guided tour
https://doi.org/10.1109/tse.2004.50 Evaluating software reuse alternatives: a model and its application to an industrial case study
https://doi.org/10.1109/tc.2007.1038 A Radix-10 Digit-Recurrence Division Unit: Algorithm and Architecture
https://doi.org/10.1109/tkde.2006.79 Design and evaluation of a scalable and reliable P2P assisted proxy for on-demand streaming media delivery
A retrospective consecutive case analysis of pretreatment and comparative static radiological parameters following chiropractic adjustments.
https://doi.org/10.1109/tvcg.2006.69 Explanatory and illustrative visualization of special and general relativity
https://doi.org/10.1109/tdsc.2006.41 System Call Monitoring Using Authenticated System Calls
https://doi.org/10.1109/tpami.2005.96 Automatic image orientation detection via confidence-based integration of low-level and semantic cues
https://doi.org/10.1109/wicsa-ecsa.212.18 Forces on Architecture Decisions - A Viewpoint
https://doi.org/10.1109/tkde.2005.187 Using datacube aggregates for approximate querying and deviation detection