[3-17]Intelligent Interfaces
|
2010-03-17 |
[3-31]Social networks and beyond --- Our recent work on large networks
|
2010-03-16 |
[3-24]Future Challenges for Software Cost Estimation
|
2010-03-16 |
[3-10]A Generalized Real-Time Obstacle Avoidance Method without the Cspace Calculation—what we can learn from this practical problem
|
2010-03-10 |
[3-3]Weak Kernels
|
2010-03-03 |
[2-3]Cryptography and complexity theory
|
2010-02-03 |
[1-28]Solving the Salinity Control Problem in a Potable Water System Using Constraint Programming
|
2010-01-28 |
[1-27]Recent developments in counting complexity
|
2010-01-27 |
[1-20]Turing Definability -- current trends in computability
|
2010-01-19 |
[1-13]A Cross-Layer Routing in Wireless Ad Hoc Sensor Networks
|
2010-01-11 |
[1-7]Energy-balanced Data Collection in Wireless Sensor Networks
|
2010-01-05 |
[2010-1-5]NetTube: Exploring Social Networks for Peer-to-Peer Short Video Sharing
|
2010-01-04 |
[12-30]Engineering/Cyber-Physical systems
|
2009-12-30 |
[12-22]Energy and Time Constrained Task Scheduling on Multiprocessor Computers with Variable Voltage and Speed
|
2009-12-16 |
[12-18]A Designated Confirmer Signature Scheme from Bilinear Maps
|
2009-12-16 |