|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 58 occurrences of 47 keywords
|
|
|
Results
Found 230 publication records. Showing 229 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
124 | Colin D. Walter |
Seeing through MIST Given a Small Fraction of an RSA Private Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 391-402, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
division chains, randomized exponentiation, Mist, randomary exponentiation, RSA, DPA, blinding, power analysis, smartcard, SPA, Addition chains, DEMA, side channel leakage, SEMA |
105 | Sang Gyoo Sim, Dong Jin Park, Pil Joong Lee |
New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 291-304, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Ha-Moon algorithm, MIST algorithm, randomized exponentiation algorithm, power analysis |
87 | Colin D. Walter |
MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings, pp. 53-66, 2002, Springer, 3-540-43224-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Mist exponentiation algorithm, division chains, smart card, DPA, blinding, power analysis, addition chains |
77 | Mike P. Wittie, Brett Stone-Gross, Kevin C. Almeroth, Elizabeth M. Belding |
MIST: Cellular data network measurement for mobile applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BROADNETS ![In: Fourth International Conference on Broadband Communications, Networks and Systems, (BROADNETS 2007), 10-14 September 2007, Raleigh, North-Carolina, USA, pp. 743-751, 2007, IEEE, 978-1-4244-1432-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
74 | Ali R. Montazemi, Feng Wang |
MIS-Tutor: An ITS in Support of IS Mastery Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Tutoring Systems ![In: Intelligent Tutoring Systems, 4th International Conference, ITS '98, San Antonio, Texas, USA, August 16-19, 1998, Proceedings, pp. 613, 1998, Springer, 3-540-64770-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
65 | Colin D. Walter |
Some Security Aspects of the M IST Randomized Exponentiation Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 276-290, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Randomary exponentiation, Mist exponentiation algorithm, division chains, DPA, blinding, power analysis, smartcard, addition chains, DEMA |
55 | Leonidas Kazatzopoulos, Constantinos Delakouridis, Giannis F. Marias |
Providing anonymity services in SIP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIMRC ![In: Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, 15-18 September 2008, Cannes, French Riviera, France, pp. 1-6, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Ilsun You, Elisa Bertino (eds.) |
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016 ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![ACM, 978-1-4503-4571-2 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
48 | Tabish Rashid, Ioannis Agrafiotis, Jason R. C. Nurse |
A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016, pp. 47-56, 2016, ACM, 978-1-4503-4571-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
48 | Fulvio Valenza, Marco Vallini, Antonio Lioy |
Online and Offline Security Policy Assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016, pp. 101-104, 2016, ACM, 978-1-4503-4571-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
48 | Kyungroul Lee, Hyeungjun Yeuk, Kangbin Yim, Suhyun Kim |
Analysis on Manipulation of the MAC Address and Consequent Security Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016, pp. 113-117, 2016, ACM, 978-1-4503-4571-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
48 | Noam Shalev, Idit Keidar, Yosef Moatti, Yaron Weinsberg |
WatchIT: Who Watches Your IT Guy? ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016, pp. 93-96, 2016, ACM, 978-1-4503-4571-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
48 | Peter Mell, James M. Shook, Serban I. Gavrila |
Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016, pp. 13-22, 2016, ACM, 978-1-4503-4571-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
48 | Simon Parkin, Andrew Fielder, Alex Ashby |
Pragmatic Security: Modelling IT Security Management Responsibilities for SME Archetypes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016, pp. 69-80, 2016, ACM, 978-1-4503-4571-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
48 | Yvo Desmedt, Arash Shaghaghi |
Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016, pp. 89-92, 2016, ACM, 978-1-4503-4571-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
48 | Fei Song 0001, Wei Quan 0001, Tianming Zhao, Hongke Zhang, Ziwei Hu, Ilsun You |
Ports Distribution Management for Privacy Protection inside Local Domain Name System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016, pp. 81-87, 2016, ACM, 978-1-4503-4571-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
48 | Markus Wurzenberger, Florian Skopik, Roman Fiedler, Wolfgang Kastner |
Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016, pp. 109-112, 2016, ACM, 978-1-4503-4571-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
48 | Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese |
A Tripwire Grammar for Insider Threat Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016, pp. 105-108, 2016, ACM, 978-1-4503-4571-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
48 | Mohamed Yassine Naghmouchi, Nancy Perrot, Nizar Kheir, Ali Ridha Mahjoub, Jean-Philippe Wary |
A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016, pp. 97-100, 2016, ACM, 978-1-4503-4571-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
48 | Florian Kammueller, Manfred Kerber, Christian W. Probst |
Towards Formal Analysis of Insider Threats for Auctions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016, pp. 23-34, 2016, ACM, 978-1-4503-4571-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
48 | Stefan Achleitner, Thomas La Porta, Patrick D. McDaniel, Shridatt Sugrim, Srikanth V. Krishnamurthy, Ritu Chadha |
Cyber Deception: Virtual Networks to Defend Insider Reconnaissance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016, pp. 57-68, 2016, ACM, 978-1-4503-4571-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
48 | Wafa Ben Jaballah, Nizar Kheir |
A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016, pp. 1-12, 2016, ACM, 978-1-4503-4571-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
48 | Ryan V. Johnson, Jessie Lass, W. Michael Petullo |
Studying Naive Users and the Insider Threat with SimpleFlow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016, pp. 35-46, 2016, ACM, 978-1-4503-4571-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
48 | Elisa Bertino, Ilsun You (eds.) |
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![ACM, 978-1-4503-3824-0 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
48 | Aniello Castiglione, Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri 0002, Raffaele Pizzolante |
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015, pp. 29-39, 2015, ACM, 978-1-4503-3824-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
48 | Sherenaz W. Al-Haj Baddar, Alessio Merlo, Mauro Migliardi |
SKETURE: A Sketch-based Packet Analysis Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015, pp. 67-70, 2015, ACM, 978-1-4503-3824-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
48 | Yessir Hashem, Hassan Takabi, Mohammad GhasemiGol, Ram Dantu |
Towards Insider Threat Detection Using Psychophysiological Signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015, pp. 71-74, 2015, ACM, 978-1-4503-3824-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
48 | Alessandro Armando, Gianluca Bocci, Gabriele Costa 0001, Rocco Mammoliti, Alessio Merlo, Silvio Ranise, Riccardo Traverso, Andrea Valenza |
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015, pp. 41-49, 2015, ACM, 978-1-4503-3824-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
48 | Andrew Stephen McGough, David Wall, John Brennan, Georgios Theodoropoulos 0001, Ed Ruck-Keene, Budi Arief, Carl Gamble, John S. Fitzgerald, Aad P. A. van Moorsel, Sujeewa Alwis |
Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware). ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015, pp. 1-12, 2015, ACM, 978-1-4503-3824-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
48 | Kangbin Yim, Aniello Castiglione, Jeong Hyun Yi, Mauro Migliardi, Ilsun You |
Cyber Threats to Industrial Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015, pp. 79-81, 2015, ACM, 978-1-4503-3824-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
48 | Kun Lin Tsai, Mengyuan Ye, Fang-Yie Leu |
Secure Power Management Scheme for WSN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015, pp. 63-66, 2015, ACM, 978-1-4503-3824-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
48 | Gökhan Kul, Shambhu J. Upadhyaya |
A Preliminary Cyber Ontology for Insider Threats in the Financial Sector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015, pp. 75-78, 2015, ACM, 978-1-4503-3824-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
48 | William Austin Casey, Quanyan Zhu, Jose Andre Morales, Bud Mishra |
Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015, pp. 53-62, 2015, ACM, 978-1-4503-3824-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
48 | Gaurang Gavai, Kumar Sricharan, Dave Gunning, Rob Rolleston, John Hanley, Mudita Singhal |
Detecting Insider Threat from Enterprise Social and Online Activity Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015, pp. 13-20, 2015, ACM, 978-1-4503-3824-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
48 | Nicolas David 0002, Alexandre David, René Rydhof Hansen, Kim Guldstrand Larsen, Axel Legay, Mads Chr. Olesen, Christian W. Probst |
Modelling Social-Technical Attacks with Timed Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015, pp. 21-28, 2015, ACM, 978-1-4503-3824-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
48 | William R. Claycomb |
Detecting Insider Threats: Who Is Winning the Game? ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015, pp. 51, 2015, ACM, 978-1-4503-3824-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
47 | Joseph James Mist, Stuart James Gibson, Christopher J. Solomon |
Comparing Evolutionary Operators, Search Spaces, and Evolutionary Algorithms in the Construction of Facial Composites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica (Slovenia) ![In: Informatica (Slovenia) 39(2), 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
47 | Christopher J. Solomon, Stuart J. Gibson, Joseph James Mist |
Interactive evolutionary generation of facial composites for locating suspects in criminal investigations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Soft Comput. ![In: Appl. Soft Comput. 13(7), pp. 3298-3306, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
47 | Joseph James Mist, Stuart James Gibson |
Optimization of weighted vector directional filters using an interactive evolutionary algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO '13, Amsterdam, The Netherlands, July 6-10, 2013, Companion Material Proceedings, pp. 1691-1694, 2013, ACM, 978-1-4503-1964-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
42 | Satyaban Behera, Meenakshi Kandpal, Veena Goswami, Nachiketa Tarasia, Ganga Bishnu Mund, Rabindra Kumar Barik |
Leveraging towards dynamic allocations of mist nodes for IoT-Mist-Fog-Cloud system using M/Er/1 queueing model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OCIT ![In: OITS International Conference on Information Technology, OCIT 2023, Raipur, India, December 13-15, 2023, pp. 59-64, 2023, IEEE, 979-8-3503-5823-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
42 | Hak-Joon Kim, Jin-Seon Kim, Bangwoo Han, Yong-Jin Kim |
Mist removal performance of a novel electrostatic precipitation type mist eliminator with a narrow gap at high velocity for coal-fired power plant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: 2019 IEEE Industry Applications Society Annual Meeting, Baltimore, MD, USA, September 29 - Oct. 3, 2019, pp. 1-9, 2019, IEEE, 978-1-5386-4539-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
40 | Jalal Al-Muhtadi, Roy H. Campbell, Apu Kapadia, M. Dennis Mickunas, Seung Yi |
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), Vienna, Austria, July 2-5, 2002, pp. 74-83, 2002, IEEE Computer Society, 0-7695-1585-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Robert Law |
Using student blogs for documentation in software development projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 16th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2011, Darmstadt, Germany, June 27-29, 2011, pp. 366, 2011, ACM, 978-1-4503-0697-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
37 | Mohit Gupta 0001, Srinivasa G. Narasimhan |
Legendre fluids: a unified framework for analytic reduced space modeling and rendering of participating media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symposium on Computer Animation ![In: Proceedings of the 2007 ACM SIGGRAPH/Eurographics Symposium on Computer Animation, SCA 2007, San Diego, California, USA, August 2-4, 2007, pp. 17-25, 2007, Eurographics Association, 978-1-59593-624-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, Dongho Won |
Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part II, pp. 954-963, 2006, Springer, 3-540-34072-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbell, M. Dennis Mickunas |
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 22nd International Conference on Distributed Computing Systems, Workshops (ICDCSW '02) July 2-5, 2002, Vienna, Austria, Proceedings, pp. 771-776, 2002, IEEE Computer Society, 0-7695-1588-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Mist, security, privacy, Ubiquitous computing, authentication, context-awareness |
27 | Hassan Takabi, Jafar Haadi Jafarian |
Insider Threat Mitigation Using Moving Target Defense and Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017, pp. 93-96, 2017, ACM, 978-1-4503-5177-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Mookyu Park, Junwoo Seo, Kyoungmin Kim 0001, Moosung Park, Kyungho Lee |
Criminal Minds: Reasoning Prime Suspect in Russian Hacking Scandal by Perspective of Insiders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017, pp. 97-100, 2017, ACM, 978-1-4503-5177-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Vishal Sharma 0001, Ilsun You, Gökhan Kul |
Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017, pp. 81-84, 2017, ACM, 978-1-4503-5177-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Nir Drucker, Shay Gueron |
Combining Homomorphic Encryption with Trusted Execution Environment: A Demonstration with Paillier Encryption and SGX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017, pp. 85-88, 2017, ACM, 978-1-4503-5177-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Gökhan Kul, Shambhu J. Upadhyaya, Andrew Hughes |
Complexity of Insider Attacks to Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017, pp. 25-32, 2017, ACM, 978-1-4503-5177-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Matt Shockley, Chris Maixner, Ryan V. Johnson, Mitch DeRidder, W. Michael Petullo |
Using VisorFlow to Control Information Flow without Modifying the Operating System Kernel or its Userspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017, pp. 13-24, 2017, ACM, 978-1-4503-5177-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Alexander Hartl, Robert Annessi, Tanja Zseby |
A Subliminal Channel in EdDSA: Information Leakage with High-Speed Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017, pp. 67-78, 2017, ACM, 978-1-4503-5177-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Yassir Hashem, Hassan Takabi, Ram Dantu, Rodney D. Nielsen |
A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017, pp. 33-44, 2017, ACM, 978-1-4503-5177-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Kim-Kwang Raymond Choo |
Research Challenges and Opportunities in Big Forensic Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017, pp. 79-80, 2017, ACM, 978-1-4503-5177-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Shih-Chieh Su |
Behavior Prediction over Summarized Network Activities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017, pp. 89-92, 2017, ACM, 978-1-4503-5177-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Pablo Moriano, Jared Pendleton, Steven Rich, L. Jean Camp |
Insider Threat Event Detection in User-System Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017, pp. 1-12, 2017, ACM, 978-1-4503-5177-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Athul Harilal, Flavio Toffalini, John Henry Castellanos, Juan Guarnizo, Ivan Homoliak, Martín Ochoa |
TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017, pp. 45-56, 2017, ACM, 978-1-4503-5177-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Antonis Michalas, Rohan Murray |
MemTri: A Memory Forensics Triage Tool Using Bayesian Network and Volatility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017, pp. 57-66, 2017, ACM, 978-1-4503-5177-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | |
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017 ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIST@CCS ![ACM, 978-1-4503-5177-5 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
21 | Sunil K. Panigrahi, Veena Goswami, Ganga Bishnu Mund, Rabindra K. Barik |
Performance Evaluation of IoST-Mist-Fog-Cloud Framework for Geospatial Crime Data Visualization: A State Dependent Queueing Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 5(1), pp. 85, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Ziyad Almudayni, Ben Soh, Alice S. Li |
IMBA: IoT-Mist Bat-Inspired Algorithm for Optimising Resource Allocation in IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 16(3), pp. 93, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Samuel Goldman, Jiayi Xin, Joules Provenzano, Connor W. Coley |
MIST-CF: Chemical Formula Inference from Tandem Mass Spectra. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Chem. Inf. Model. ![In: J. Chem. Inf. Model. 64(7), pp. 2421-2431, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Hidir Yesiltepe, Kiymet Akdemir, Pinar Yanardag |
MIST: Mitigating Intersectional Bias with Disentangled Cross-Attention Editing in Text-to-Image Diffusion Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.19738, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Md Motiur Rahman, Shiva Shokouhmand, Smriti Bhatt, Miad Faezipour |
MIST: Medical Image Segmentation Transformer with Convolutional Attention Mixing (CAM) Decoder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WACV ![In: IEEE/CVF Winter Conference on Applications of Computer Vision, WACV 2024, Waikoloa, HI, USA, January 3-8, 2024, pp. 403-412, 2024, IEEE, 979-8-3503-1892-0. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Prakhar Diwan, Suryakant Toraskar, Varun Venkitaraman, Nirmal Kumar Boran, Chandramani Chaudhary, Virendra Singh |
MIST: Many-ISA Scheduling Technique for Heterogeneous-ISA Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSID ![In: 37th International Conference on VLSI Design and 23rd International Conference on Embedded Systems, VLSID 2024, Kolkata, India, January 6-10, 2024, pp. 348-353, 2024, IEEE, 979-8-3503-8440-6. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Elham Fazel, Hamid Esmaeili Najafabadi, Mohammad Rezaei, Henry Leung |
Unlocking the power of mist computing through clustering techniques in IoT networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 22, pp. 100710, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Sujit Bebortta, Subhranshu Sekhar Tripathy, Shakila Basheer, Chiranji Lal Chowdhary |
DeepMist: Toward Deep Learning Assisted Mist Computing Framework for Managing Healthcare Big Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 42485-42496, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Dong Pan, Zhaohui Jiang 0001, Yitian Li, Haoyang Yu, Weihua Gui 0001 |
A Novel Compensation Method for Infrared Temperature Measurement Using Infrared Vision and Visible Light Vision Under Water Mist Interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Instrum. Meas. ![In: IEEE Trans. Instrum. Meas. 72, pp. 1-9, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Tian Min, Chengshuo Xia, Takumi Yamamoto, Yuta Sugiura |
Seeing the Wind: An Interactive Mist Interface for Airflow Input. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Hum. Comput. Interact. ![In: Proc. ACM Hum. Comput. Interact. 7(ISS), pp. 398-419, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Rolando Herrero |
Integrating cloud and mist computing to lower latency in IoT topologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Emerg. Telecommun. Technol. ![In: Trans. Emerg. Telecommun. Technol. 34(10), October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Chumeng Liang, Xiaoyu Wu |
Mist: Towards Improved Adversarial Examples for Diffusion Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.12683, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Md Motiur Rahman, Shiva Shokouhmand, Smriti Bhatt, Miad Faezipour |
MIST: Medical Image Segmentation Transformer with Convolutional Attention Mixing (CAM) Decoder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.19898, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jiacheng Li, Ninghui Li, Bruno Ribeiro 0001 |
MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.00919, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Messaoud Babaghayou, Noureddine Chaib, Leandros Maglaras, Yagmur Yigit, Mohamed Amine Ferrag |
Distance-Only Task Orchestration Algorithm for Energy Efficiency in Satellite-Based Mist Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.14308, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Rupei Xu, Yuming Jiang 0001, Jason P. Jue |
MIST: An Efficient Approach for Software-Defined Multicast in Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.04418, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Linyun Gu, Huahu Xu, Xiaojin Ma |
A Joint De-Rain and De-Mist Network Based on the Atmospheric Scattering Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Imaging ![In: J. Imaging 9(7), pp. 129, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Helen D. Karatza |
Introduction on cloud, fog and mist computing - Resource allocation and scheduling perspectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Simul. Model. Pract. Theory ![In: Simul. Model. Pract. Theory 128, pp. 102822, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Andrew Banman, Nikita A. Sakhanenko, James Kunert-Graf, David J. Galas |
ApoE Modifier Alleles for Alzheimer's Disease Discovered by Information Theory Dependency Measures: MIST Software Package. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Biol. ![In: J. Comput. Biol. 30(3), pp. 323-336, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Salah Eddine Essalhi, Mohamed Janati Idrissi, Mohammed Raiss El-Fenni, Houda Chafnaji |
Optimized Energy Management with Fuzzy Clustering for Heterogeneous Fog-Mist-IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CommNet ![In: 6th International Conference on Advanced Communication Technologies and Networking, CommNet 2023, Rabat, Morocco, December 11-13, 2023, pp. 1-8, 2023, IEEE, 979-8-3503-2939-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Difei Gao, Luowei Zhou, Lei Ji 0001, Linchao Zhu, Yi Yang 0001, Mike Zheng Shou |
MIST : Multi-modal Iterative Spatial-Temporal Transformer for Long-form Video Question Answering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023, Vancouver, BC, Canada, June 17-24, 2023, pp. 14773-14783, 2023, IEEE, 979-8-3503-0129-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Xinyu Tang, Frederik Schulte |
Stockyard Storage Space Allocation in Dry Bulk Terminals Considering Mist Cannons and Energy Expenditure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCL ![In: Computational Logistics - 14th International Conference, ICCL 2023, Berlin, Germany, September 6-8, 2023, Proceedings, pp. 154-169, 2023, Springer, 978-3-031-43611-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Chieh Hubert Lin, Hung-Yu Tseng, Hsin-Ying Lee 0001, Maneesh Kumar Singh 0001, Ming-Hsuan Yang 0001 |
Unveiling The Mask of Position-Information Pattern Through the Mist of Image Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML ![In: International Conference on Machine Learning, ICML 2023, 23-29 July 2023, Honolulu, Hawaii, USA., pp. 21204-21222, 2023, PMLR. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
21 | Juan José López López Escobar, Rebeca P. Díaz Redondo, Felipe J. Gil-Castiñeira |
In-depth analysis and open challenges of Mist Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cloud Comput. ![In: J. Cloud Comput. 11, pp. 81, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Sung-Woo Moon, Sunghyun Kim, Yong-Hoon Choi |
MIST-Tacotron: End-to-End Emotional Speech Synthesis Using Mel-Spectrogram Image Style Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 25455-25463, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Sang-Woong Lee, Hyunbin Park, Baeksuk Chu |
Excavator Posture Estimation and Position Tracking System Based on Kinematics and Sensor Network to Control Mist-Spraying Robot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 107949-107960, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | A. S. M. Sanwar Hosen, Pradip Kumar Sharma, Gi Hwan Cho |
MSRM-IoT: A Reliable Resource Management for Cloud, Fog, and Mist-Assisted IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(4), pp. 2527-2537, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Peng Li, Jianhui Shang, Yi Shi |
A simple linear time algorithm to solve the MIST problem on interval graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 930, pp. 77-85, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Andrea Sangiacomo, Hugo Dirk Hogenbirk, Raluca A. Tanasescu, Antonia Karaisl, Nick White |
Reading in the mist: high-quality optical character recognition based on freely available early modern digitized books. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digit. Scholarsh. Humanit. ![In: Digit. Scholarsh. Humanit. 37(4), pp. 1197-1209, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Da He, Xiaoyu Shang, Jiajia Luo |
Adherent mist and raindrop removal from a single image using attentive convolutional network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neurocomputing ![In: Neurocomputing 505, pp. 178-187, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Chieh Hubert Lin, Hsin-Ying Lee 0001, Hung-Yu Tseng, Maneesh Kumar Singh 0001, Ming-Hsuan Yang 0001 |
Unveiling The Mask of Position-Information Pattern Through the Mist of Image Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2206.01202, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Paula Fraga-Lamas, Daniel Barros, Sérgio Ivan Lopes, Tiago M. Fernández-Caramés |
Mist and Edge Computing Cyber-Physical Human-Centered Systems for Industry 5.0: A Cost-Effective IoT Thermal Imaging Safety System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.06294, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Sophie Henning, Nicole Macher, Stefan Grünewald, Annemarie Friedrich |
MIST: a Large-Scale Annotated Resource and Neural Models for Functions of Modal Verbs in English Scientific Text. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.07156, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Difei Gao, Luowei Zhou, Lei Ji 0001, Linchao Zhu, Yi Yang 0001, Mike Zheng Shou |
MIST: Multi-modal Iterative Spatial-Temporal Transformer for Long-form Video Question Answering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.09522, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | JayaChandra Raju, Subha Gayatri Kompella, Keerthi Ram, Rajeswaran Rangasami, Rajoo Ramachandran, Mohanasankar Sivaprakasam |
MIST GAN: Modality Imputation Using Style Transfer for MRI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.10396, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
21 | Hongquan Gui, Jialan Liu, Chi Ma, Mengyuan Li, Shilong Wang |
New mist-edge-fog-cloud system architecture for thermal error prediction and control enabled by deep-learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eng. Appl. Artif. Intell. ![In: Eng. Appl. Artif. Intell. 109, pp. 104626, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Georgios L. Stavrinides, Helen D. Karatza |
Leveraging blockchain and AI for IoT, mist, fog and cloud computing: A performance modeling and simulation perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Simul. Model. Pract. Theory ![In: Simul. Model. Pract. Theory 121, pp. 102661, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Paula Fraga-Lamas, Daniel Barros, Sérgio Ivan Lopes, Tiago M. Fernández-Caramés |
Mist and Edge Computing Cyber-Physical Human-Centered Systems for Industry 5.0: A Cost-Effective IoT Thermal Imaging Safety System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(21), pp. 8500, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Dmitriy Khort, Alexey Kutyrev, Nikolay A. Kiktev, Taras Hutsol, Szymon Glowacki, Maciej Kubon, Tomasz Nurek, Anatolii Rud, Zofia Gródek-Szostak |
Automated Mobile Hot Mist Generator: A Quest for Effectiveness in Fruit Horticulture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(9), pp. 3164, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Sophie Henning, Nicole Macher, Stefan Grünewald, Annemarie Friedrich |
MiST: a Large-Scale Annotated Resource and Neural Models for Functions of Modal Verbs in English Scientific Text. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMNLP (Findings) ![In: Findings of the Association for Computational Linguistics: EMNLP 2022, Abu Dhabi, United Arab Emirates, December 7-11, 2022., pp. 1305-1324, 2022, Association for Computational Linguistics. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 229 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ >>] |
|