|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2367 occurrences of 1661 keywords
|
|
|
Results
Found 5099 publication records. Showing 5099 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
57 | Olivier Nicol, Jérémie Mary, Philippe Preux |
ICML Exploration & Exploitation Challenge: Keep it simple! ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML On-line Trading of Exploration and Exploitation ![In: Proceedings of the Workshop on On-line Trading of Exploration and Exploitation 2, Bellevue, Washington, USA, July 2, 2011, pp. 62-85, 2012, JMLR.org. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
57 | Christophe Salperwyck, Tanguy Urvoy |
Stumping along a Summary for Exploration & Exploitation Challenge 2011. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML On-line Trading of Exploration and Exploitation ![In: Proceedings of the Workshop on On-line Trading of Exploration and Exploitation 2, Bellevue, Washington, USA, July 2, 2011, pp. 86-97, 2012, JMLR.org. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
57 | Chris Lovell, Gareth L. Jones 0001, Klaus-Peter Zauner, Steve R. Gunn |
Exploration and Exploitation with Insufficient Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML On-line Trading of Exploration and Exploitation ![In: Proceedings of the Workshop on On-line Trading of Exploration and Exploitation 2, Bellevue, Washington, USA, July 2, 2011, pp. 37-61, 2012, JMLR.org. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
48 | Ernst-Jan Goedvolk, Edward Faber, René W. Wagenaar |
Towards a framework for understanding the effectiveness of digital content exploitation strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 6th International Conference on Electronic Commerce, ICEC 2004, Delft, The Netherlands, October 25-27, 2004, pp. 239-244, 2004, ACM, 1-58113-930-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
content exploitation, content protection |
48 | Markus Rickert 0001, Oliver Brock, Alois C. Knoll |
Balancing exploration and exploitation in motion planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: 2008 IEEE International Conference on Robotics and Automation, ICRA 2008, May 19-23, 2008, Pasadena, California, USA, pp. 2812-2817, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Dorota Glowacka, Louis Dorard, John Shawe-Taylor (eds.) |
Proceedings of the Workshop on On-line Trading of Exploration and Exploitation 2, Bellevue, Washington, USA, July 2, 2011 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML On-line Trading of Exploration and Exploitation ![JMLR.org The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
46 | Lihong Li 0001, Wei Chu, John Langford 0001, Taesup Moon, Xuanhui Wang |
Bandits with Generalized Linear Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML On-line Trading of Exploration and Exploitation ![In: Proceedings of the Workshop on On-line Trading of Exploration and Exploitation 2, Bellevue, Washington, USA, July 2, 2011, pp. 19-36, 2012, JMLR.org. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
46 | Dorota Glowacka, Louis Dorard, John Shawe-Taylor |
Preface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML On-line Trading of Exploration and Exploitation ![In: Proceedings of the Workshop on On-line Trading of Exploration and Exploitation 2, Bellevue, Washington, USA, July 2, 2011, 2012, JMLR.org. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
46 | Yevgeny Seldin, Nicolò Cesa-Bianchi, Peter Auer, François Laviolette, John Shawe-Taylor |
PAC-Bayes-Bernstein Inequality for Martingales and its Application to Multiarmed Bandits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML On-line Trading of Exploration and Exploitation ![In: Proceedings of the Workshop on On-line Trading of Exploration and Exploitation 2, Bellevue, Washington, USA, July 2, 2011, pp. 98-111, 2012, JMLR.org. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
46 | Anna Choromanska, Claire Monteleoni |
Online Clustering with Experts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICML On-line Trading of Exploration and Exploitation ![In: Proceedings of the Workshop on On-line Trading of Exploration and Exploitation 2, Bellevue, Washington, USA, July 2, 2011, pp. 1-18, 2012, JMLR.org. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
42 | Wei Li 0010, Xuerui Wang, Ruofei Zhang, Ying Cui, Jianchang Mao, Rong Jin 0001 |
Exploitation and exploration in a performance based contextual advertising system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28, 2010, pp. 27-36, 2010, ACM, 978-1-4503-0055-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
click feedback, exploitation and exploration, online advertising, click-through-rate |
42 | Luc Berthouze, Alexander Lorenzi |
Bifurcation Angles in Ant Foraging Networks: A Trade-Off between Exploration and Exploitation?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAB ![In: From Animals to Animats 10, 10th International Conference on Simulation of Adaptive Behavior, SAB 2008, Osaka, Japan, July 7-12, 2008. Proceedings, pp. 113-122, 2008, Springer, 978-3-540-69133-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Exploration-exploitation trade-off, ant foraging, network polarisation, bifurcation angle, self-organisation, stigmergy |
42 | Handong Mao, Weiming Zhang |
An Approach for Network Security Analysis Using Logic Exploitation Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Seventh International Conference on Computer and Information Technology (CIT 2007), October 16-19, 2007, University of Aizu, Fukushima, Japan, pp. 761-766, 2007, IEEE Computer Society, 978-0-7695-2983-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Farhad Nadi, Ahamad Tajudin Abdul Khader, Mohammed Azmi Al-Betar |
Adaptive genetic algorithm using harmony search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2010, Proceedings, Portland, Oregon, USA, July 7-11, 2010, pp. 819-820, 2010, ACM, 978-1-4503-0072-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
exploration, exploitation, parameter control, harmony search algorithm |
36 | Nicolas Cebron, Michael R. Berthold |
Active learning for object classification: from exploration to exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 18(2), pp. 283-299, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Prototype classification, Data mining, Active learning, Exploration, Exploitation, Subtractive clustering |
36 | Fernando Santos, José Manuel Oliveira, Renato Roque, Isabelle Korthals, Riccardo Pascotto |
Business exploitation cases for providing pervasiveness services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2008 - The Tenth International Conference on Information Integration and Web-based Applications Services, 24-26 November 2008, Linz, Austria, pp. 609-612, 2008, ACM, 978-1-60558-349-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
business exploitation cases, market trends, pervasive services, business models, value-chains, service provision |
36 | Wei Li 0025, Rayford B. Vaughn |
Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 16-19 May 2006, Singapore, pp. 26, 2006, IEEE Computer Society, 0-7695-2585-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cluster security, exploitation graph (e-graph), network security, modeling and simulating |
36 | Petter Gottschalk, Hans Solli-Sæther |
Integration between Business Planning and Information Systems Planning: An Analysis of Technology Exploration and Exploitation in Different Value Configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 34th Annual Hawaii International Conference on System Sciences (HICSS-34), January 3-6, 2001, Maui, Hawaii, USA, 2001, IEEE Computer Society, 0-7695-0981-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Integration mechanisms, activity configurations, the role of IS/IT, exploration and exploitation, strategic IS/IT plans, content analysis |
36 | Kostas Masselos, Francky Catthoor, Constantinos E. Goutis, Hugo De Man |
Combined Application of Data Transfer and Storage Optimizing Transformations and Subword Parallelism Exploitation for Power Consumption and Execution Time Reduction in VLIW Multimedia Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. VLSI Signal Process. ![In: J. VLSI Signal Process. 37(1), pp. 53-73, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
low-power-dissipation, performance, memory, VLIW processors, multi-media, code transformations, subword parallelism, system level |
36 | Josep Lluís Larriba-Pey |
Exploitation of the Memory Hierarchy in Relational DBMSs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Algorithms for Memory Hierarchies ![In: Algorithms for Memory Hierarchies, Advanced Lectures [Dagstuhl Research Seminar, March 10-14, 2002], pp. 290-319, 2002, Springer, 3-540-00883-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Michael Lawo, Otthein Herzog, Paul Lukowicz, Hendrik Witt |
Using wearable computing solutions in real-world applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, CHI 2008, Florence, Italy, April 5-10, 2008, pp. 3687-3692, 2008, ACM, 978-1-60558-012-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
exploitation of scientific results, wearable computing, industrial applications |
31 | Rebecca Angeles |
Anticipated IT infrastructure and supply chain integration capabilities for RFID and their associated deployment outcomes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2008 - The Tenth International Conference on Information Integration and Web-based Applications Services, 24-26 November 2008, Linz, Austria, pp. 634-646, 2008, ACM, 978-1-60558-349-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IT infrastructure integration, market knowledge creation, operational efficiency, supply chain process integration, radio frequency identification (RFID), supply chain management, exploration, exploitation |
31 | Md. Monirul Islam, Mohammad Shafiul Alam, Kazuyuki Murase |
A New Recurring Multistage Evolutionary Algorithm for Solving Problems Efficiently. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2007, 8th International Conference, Birmingham, UK, December 16-19, 2007, Proceedings, pp. 97-106, 2007, Springer, 978-3-540-77225-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
exploitation and optimization problem, Evolutionary algorithm, exploration |
31 | Jinlan Liu, Meng-dong Wang, Yin Bai |
Using DEA and Grey Markovian Model to Measure the Goal Cost of Petroleum Enterprise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (3) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part III, pp. 1008-1011, 2007, Springer, 978-3-540-72587-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Petroleum Enterprise Discovery Goal Cost, Exploitation Goal Cost, Grey Markovian Model, Data Envelopment Analysis (DEA) |
31 | Daniela Pucci de Farias, Nimrod Megiddo |
Combining expert advice in reactive environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 53(5), pp. 762-799, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
complexity and performance bounds, experts algorithms, exploration-exploitation tradeoffs, reactive environments, Sequential decision making |
31 | The Jin Ai, Voratas Kachitvichyanukul |
Dispersion and velocity indices for observing dynamic behavior of particle swarm optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Congress on Evolutionary Computation ![In: Proceedings of the IEEE Congress on Evolutionary Computation, CEC 2007, 25-28 September 2007, Singapore, pp. 3264-3271, 2007, IEEE, 978-1-4244-1339-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Belur V. Dasarathy, José Salvador Sánchez, S. Townsend |
Nearest Neighbour Editing and Condensing Tools-Synergy Exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Anal. Appl. ![In: Pattern Anal. Appl. 3(1), pp. 19-30, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Editing and condensing tools, Synergy exploitation, Nearest neighbour |
29 | David Simoncini, Sébastien Vérel, Philippe Collard, Manuel Clergue |
Centric selection: a way to tune the exploration/exploitation trade-off. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2009, Proceedings, Montreal, Québec, Canada, July 8-12, 2009, pp. 891-898, 2009, ACM, 978-1-60558-325-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cellular evolutionnary algorithms, selection operators, selective pressure, theoretical model |
29 | Karla Parussel, Lola Cañamero |
Biasing Neural Networks Towards Exploration or Exploitation Using Neuromodulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANN (2) ![In: Artificial Neural Networks - ICANN 2007, 17th International Conference, Porto, Portugal, September 9-13, 2007, Proceedings, Part II, pp. 889-898, 2007, Springer, 978-3-540-74693-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Lilia Rejeb, Zahia Guessoum, Rym M'Hallah |
An Adaptive Approach for the Exploration-Exploitation Dilemma for Learning Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEEMAS ![In: Multi-Agent Systems and Applications IV, 4th International Central and Eastern European Conference on Multi-Agent Systems, CEEMAS 2005, Budapest, Hungary, September 15-17, 2005, Proceedings, pp. 316-325, 2005, Springer, 3-540-29046-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Lilia Rejeb, Zahia Guessoum, Rym M'Hallah |
An Adaptive Approach for the Exploration-Exploitation Dilemma and Its Application to Economic Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LAMAS ![In: Learning and Adaption in Multi-Agent Systems, First International Workshop, LAMAS 2005, Utrecht, The Netherlands, July 25, 2005, Revised Selected Papers, pp. 165-176, 2005, Springer, 3-540-33053-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Sonia Campa, Marco Danelutto |
A Framework for Orthogonal Data and Control Parallelism Exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part II, pp. 206-215, 2004, Springer, 3-540-22056-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | John R. Schott, Kyungsuk Lee, Rolando Raqueño, Gary Hoffmann |
Use of Physics Based Models in Hyperspectral Image Exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIPR ![In: 31st Applied Image Pattern Recognition Workshop (AIPR 2002), From Color to Hyperspectral: Advancements in Spectral Imagery Exploitation, 16-18 October 2002, Washington, D.C., USA, Proceedings, pp. 36-42, 2002, IEEE Computer Society, 0-7695-1863-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Hong Zhang 0026, Masumi Ishikawa |
Characterization of particle swarm optimization with diversive curiosity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 18(5), pp. 409-415, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Evolutionary particle swarm optimization, Temporally cumulative fitness function, Diversive curiosity, Exploration, Exploitation, Premature convergence |
25 | Bin Qian 0001, Ling Wang 0001, Dexian Huang, Xiong Wang |
Multi-objective no-wait flow-shop scheduling with a memetic algorithm based on differential evolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 13(8-9), pp. 847-869, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Multi-objective no-wait flow-shop scheduling, Exploration and exploitation, Local search, Differential evolution, Memetic algorithm |
25 | Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore J. Stolfo |
Brave New World: Pervasive Insecurity of Embedded Network Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 378-380, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Router insecurity, network webcams, print servers, embedded device management interface exploitation, default password |
25 | Shih-Hsi Liu, Marjan Mernik, Barrett R. Bryant |
A clustering entropy-driven approach for exploring and exploiting noisy functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 738-742, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cluster, entropy, exploration, exploitation |
25 | Atsuyoshi Nakamura, Naoki Abe |
Improvements to the Linear Programming Based Scheduling of Web Advertisements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. ![In: Electron. Commer. Res. 5(1), pp. 75-98, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
banner advertisement scheduling, exploration-exploitation trade-off, linear programming, inventory management |
25 | Marcus Ciolkowski, Jürgen Münch |
Accumulation and presentation of empirical evidence: problems and challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-3, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
measurement, empirical studies, aggregation, software process, software project management, evidence, exploitation, dissemination, accumulation, experience management |
25 | Ali Hamzeh, Adel Rahmani |
Intelligent exploration method for XCS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO Workshops ![In: Genetic and Evolutionary Computation Conference, GECCO 2005, Workshop Proceedings, Washington DC, USA, June 25-26, 2005, pp. 100-102, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
adaptive exploration rate, learning classifier systems, exploration, XCS, exploitation |
25 | Heni Ben Amor, Achim Rettinger |
Intelligent exploration for genetic algorithms: using self-organizing maps in evolutionary computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2005, Proceedings, Washington DC, USA, June 25-29, 2005, pp. 1531-1538, 2005, ACM, 1-59593-010-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
exploration vs. exploitation, genetic algorithm, self-organizing map, diversity, premature convergence, genetic drift |
25 | Ali Hamzeh, Adel Rahmani |
A Fuzzy System to Control Exploration Rate in XCS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWLCS ![In: Learning Classifier Systems, International Workshops, IWLCS 2003-2005, Revised Selected Papers, pp. 115-127, 2005, Springer, 978-3-540-71230-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Adaptive Exploration Rate, Learning Classifier Systems, Exploration, XCS, Exploitation |
25 | Iván Arce |
The Shellcode Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(5), pp. 72-76, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
taxonomy of attacks, exploitation program, attack, exploits |
25 | Winfried E. Kühnhauser |
Root Kits: an operating systems viewpoint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(1), pp. 12-23, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
error exploitation, error proliferation, kernel abstractions, mandatory and discretionary access control, privilege proliferation, secure program execution, reference monitor, trusted computing base, security domains, secure booting |
25 | Filippo Menczer, Gautam Pant, Padmini Srinivasan |
Topical web crawlers: Evaluating adaptive algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 4(4), pp. 378-419, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
evaluation, reinforcement learning, Efficiency, evolution, exploration, exploitation, topical crawlers |
25 | Rhys Smith, Jianhua Shao 0001 |
Preserving privacy when preference searching in e-commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, pp. 101-110, 2003, ACM, 1-58113-776-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
privacy, e-commerce, user preferences, exploitation |
25 | Carlos García 0001, Roberto Lario, Manuel Prieto 0001, Luis Piñuel, Francisco Tirado |
Vectorization of Multigrid Codes Using SIMD ISA Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 22-26 April 2003, Nice, France, CD-ROM/Abstracts Proceedings, pp. 58, 2003, IEEE Computer Society, 0-7695-1926-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
SIMD exploitation, Robust Multigrid, Cache-efficient multigrid, Multigrid methods |
25 | Chih-Ping Chu, Doris L. Carver |
Reordering the Statements with Dependence Cycles to Improve the Performance of Parallel Loops. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 11-13 December 1997, Seoul, Korea, Proceedings, pp. 322-328, 1997, IEEE Computer Society, 0-8186-8227-2. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Parallelism Exploitation, Dependence Cycles, Statement Reordering, Parallelization, Parallelizing Compilers |
25 | Yoon Ho Kim, Soo Hong Kim, Dae Woong Rhee, Heunghwan Kim, Juno Chang, Sang-Yong Han |
Exploiting the locality of data structures in multithreaded architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 1996 International Conference on Parallel and Distributed Systems (ICPADS '96), June 3-6, 1996, Tokyo, Japan, Proceedings, pp. 352-358, 1996, IEEE Computer Society, 0-8186-7267-6. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
locality exploitation, von Neumann computers, asynchronous parallel execution, IB-structure, I-structure, DAVRID, performance, data structures, data structures, parallel architectures, digital simulation, simulation results, multithreaded architecture, dataflow computers |
25 | Christopher M. Kreucher, Kevin M. Carter 0002 |
An information theoretic approach to processing management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2008, March 30 - April 4, 2008, Caesars Palace, Las Vegas, Nevada, USA, pp. 1869-1872, 2008, IEEE, 1-4244-1484-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Bo Liu 0008, Ling Wang 0001, Yihui Jin |
An Effective PSO-Based Memetic Algorithm for Flow Shop Scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part B ![In: IEEE Trans. Syst. Man Cybern. Part B 37(1), pp. 18-27, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Chuan-Kang Ting, Chun-Cheng Chen |
The effects of supermajority on multi-parent crossover. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Congress on Evolutionary Computation ![In: Proceedings of the IEEE Congress on Evolutionary Computation, CEC 2007, 25-28 September 2007, Singapore, pp. 4524-4530, 2007, IEEE, 978-1-4244-1339-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Barbara A. Eckstein, John M. Irvine |
Evaluating the Benefits of Assisted Target Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIPR ![In: 30th Applied Image Pattern Recognition Workshop (AIPR 2001), Analysis and Understanding of Time Varying Imagery, 10-12 October 2001, Washington, DC, USA, Proceedings, pp. 39-45, 2001, IEEE Computer Society, 0-7695-1245-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
23 | Lin Lin 0008, Mitsuo Gen |
Auto-tuning strategy for evolutionary algorithms: balancing between exploration and exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 13(2), pp. 157-168, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Auto-tuning strategy, Evolutionary Algorithms, Fuzzy logic control |
23 | Grant Osborne, Benjamin P. Turnbull |
Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 1012-1017, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Andrea Clematis, Angelo Corana, Daniele D'Agostino, Antonella Galizia, Alfonso Quarati |
A Performance-Based Methodology to Improve Grid Exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Integrated Management of Systems, Services, Processes and People in IT, 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2009, Venice, Italy, October 27-28, 2009. Proceedings, pp. 43-55, 2009, Springer, 978-3-642-04988-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Grid management, Benchmark-driven matchmaking, Grid language extensions |
23 | Liran Goshen, Ilan Shimshoni |
Balanced Exploration and Exploitation Model Search for Efficient Epipolar Geometry Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 30(7), pp. 1230-1242, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Computer vision, Motion, 3D/stereo scene analysis, Vision and Scene Understanding |
23 | Yuanxia Shen, Chuanhua Zeng |
An Adaptive Approach for the Exploration-Exploitation Dilemma in Non-stationary Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (1) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 1: Artificial Intelligence, December 12-14, 2008, Wuhan, China, pp. 497-500, 2008, IEEE Computer Society, 978-0-7695-3336-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Maryam Shokri, Hamid R. Tizhoosh, Mohamed S. Kamel |
Tradeoff between exploration and exploitation of OQ(lambda) with non-Markovian update in dynamic environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2008, part of the IEEE World Congress on Computational Intelligence, WCCI 2008, Hong Kong, China, June 1-6, 2008, pp. 2915-2921, 2008, IEEE, 978-1-4244-1820-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Giorgos Kourlimpinis, Giorgos Gyftodimos, John E. Psarras, Dimitris Askounis |
Knowledge Exploitation through Modeling, Navigation and Querying, an Ontology-Based Integrated Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Panhellenic Conference on Informatics ![In: Panhellenic Conference on Informatics, PCI 2008, August 28-30, 2008, Samos Island, Greece, Proceedings, pp. 95-99, 2008, IEEE Computer Society, 978-0-7695-3323-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Krishnan Suresh, Ameya Sirpotdar |
Automated symmetry exploitation in engineering analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eng. Comput. ![In: Eng. Comput. 21(4), pp. 304-311, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
CAD/CAE, Symmetry, Group theory, Engineering analysis, Eigen-value |
23 | Kaifu Zhang, Wei Pan |
The Two Facets of the Exploration-Exploitation Dilemma. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT ![In: Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, Hong Kong, China, 18-22 December 2006, pp. 371-380, 2006, IEEE Computer Society, 0-7695-2748-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Marco Danelutto, Patrizio Dazzi |
Joint Structured/Unstructured Parallelism Exploitation in muskel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (2) ![In: Computational Science - ICCS 2006, 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part II, pp. 937-944, 2006, Springer, 3-540-34381-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Liran Goshen, Ilan Shimshoni |
Balanced Exploration and Exploitation Model Search for Efficient Epipolar Geometry Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECCV (2) ![In: Computer Vision - ECCV 2006, 9th European Conference on Computer Vision, Graz, Austria, May 7-13, 2006, Proceedings, Part II, pp. 151-164, 2006, Springer, 3-540-33834-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Mohamed Essawy |
Exploring the Presence and Exploitation of E-Relationship Marketing by UK Based Multi-unit Hotel Brands. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ENTER ![In: Information and Communication Technologies in Tourism, ENTER 2005, Proceedings of the International Conference in Innsbruck, Austria, 2005, pp. 338-349, 2005, Springer, 978-3-211-24148-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Web sites content analysis, relationship marketing levels, multi-unit hotel brands, internet marketing |
23 | David M. Booth, Nicholas J. Redding, Ronald Jones, M. Smith, I. J. Lucas, K. L. Jones |
Federated Exploitation of All-Source Imagery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DICTA ![In: Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, DICTA 2005, 6-8 December 2005, Cairns, Australia, pp. 36, 2005, IEEE Computer Society, 0-7695-2467-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Hyeong Soo Chang |
An ant system based exploration-exploitation for reinforcement learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (4) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 3805-3810, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Yujun Liu, Shuai Dianxun, Weili Han |
Network Self-Organizing Information Exploitation Model Based on GCA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (2) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part II, pp. 327-334, 2003, Springer, 3-540-21993-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Manuel Prieto 0001, Ignacio Martín Llorente, Francisco Tirado |
Data Locality Exploitation in the Decomposition of Regular Domain Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 11(11), pp. 1141-1150, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
MPI performance evaluation, domain decomposition applications, data locality, data partitioning |
23 | Kazunori Iwata 0001, Nobuhiro Ito, Koichiro Yamauchi 0001, Naohiro Ishii |
Combining Exploitation-Based and Exploration-Based Approach in Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2000, Data Mining, Financial Engineering, and Intelligent Agents, Second International Conference, Shatin, N.T. Hong Kong, China, December 13-15, 2000, Proceedings, pp. 326-331, 2000, Springer, 3-540-41450-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
23 | John R. Schott |
Combining Image Derived Spectra and Physics Based Models for Hyperspectral Image Exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIPR ![In: 29th Applied Image Pattern Recognition Workshop (AIPR 2000), 16-18 October 2000, Washington, DC, USA, Proceedings, pp. 15-24, 2000, IEEE Computer Society, 0-7695-0978-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
synthetic imagery, remote sensing, physics based models, hyperspectral imagery |
23 | Giovanni Chiola |
Manual and Automatic Exploitation of Symmetries in SPN Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICATPN ![In: Application and Theory of Petri Nets 1998, 19th International Conference, ICATPN '98, Lisbon, Portugal, June 22-26, 1998, Proceedings, pp. 28-43, 1998, Springer, 3-540-64677-9. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Christoph Scholl 0001 |
Multi-output Functional Decomposition with Exploitation of Don't Cares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 1998 Design, Automation and Test in Europe (DATE '98), February 23-26, 1998, Le Palais des Congrès de Paris, Paris, France, pp. 743-748, 1998, IEEE Computer Society, 0-8186-8359-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Olivier Temam, Yvon Jégou |
Using virtual lines to enhance locality exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Supercomputing ![In: Proceedings of the 8th international conference on Supercomputing, ICS 1994, Manchester, UK, July 11-15, 1994, pp. 344-352, 1994, ACM, 0-89791-665-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
memory hierarchy, temporal locality, spatial locality, cache architecture, numerical codes |
22 | Diego Gómez-Zará, Yozen Liu, Leonardo Neves, Neil Shah, Maarten W. Bos |
Unpacking the exploration-exploitation tradeoff on Snapchat: The relationships between users' exploration-exploitation interests and server log data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Hum. Behav. ![In: Comput. Hum. Behav. 150, pp. 108014, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Konstantinos Charmanas, Nikolaos Mittas, Lefteris Angelis |
Exploitation of Vulnerabilities: A Topic-Based Machine Learning Framework for Explaining and Predicting Exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 14(7), pp. 403, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | P. Karthikeyan 0004, Yuan-Huai Chang, Jia-Jun Qiu, Chih-Chun Chang, Pao-Ann Hsiung |
Tackling Labour Exploitation in Taiwan Distant Water Fishing Industry through Automated Exploitation Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GoodIT ![In: Proceedings of the 2023 ACM Conference on Information Technology for Social Good, GoodIT 2023, Lisbon, Portugal, September 6-8, 2023, pp. 182-188, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Giorgio A. Licciardi, Maria Libera Battagliere |
Prisma Hyperspectral Data Exploitation: The Italian Space Agency Programmes in Support of Scientific Downstream Applications, an Effort Towards the Commercial Exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IGARSS ![In: IEEE International Geoscience and Remote Sensing Symposium, IGARSS 2023, Pasadena, CA, USA, July 16-21, 2023, pp. 4682-4685, 2023, IEEE, 979-8-3503-2010-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Tristan Karch |
Agents artificiels autotelic et sociaux : formation et exploitation de conventions culturelles chez les agents artificiels autonomes incarnés. (Towards Social Autotelic Artificial Agents : Formation and Exploitation of Cultural Conventions in Autonomous Embodied Artificial Agents). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
22 | Louis Raimbault |
Association rules: search algorithms and statistical exploitation. (Règles d'association: algorithmes de recherche et exploitation statistique). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
22 | José Lopes Esteves |
Electromagnetic interference and Information security : characterization, exploitation and forensic analysis. (Interférences électromagnétiques et sécurité de l'information : caractérisation, exploitation et investigation numérique). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
22 | Alexandra Benamar |
Évaluation et adaptation de plongements lexicaux au domaine à travers l'exploitation de connaissances syntaxiques et sémantiques. (Domain evaluation and adaptation of word embeddings through the exploitation of syntaxic and semantic knowledge). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
22 | Jérôme Le Masson |
Communications numériques et exploitation de la diversité pour différents supports de transmission. (Digital communications and diversity exploitation for several transmission media). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
22 | Guillaume Bouleux |
Pilotage des urgences par analyse et exploitation géométrique et topologique des flux de patients. (Emergency management by geometric and topological analysis and exploitation of the patient flow). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
22 | Serge Sonfack Sounchio |
Modelling and exploitation of knowledge for collaborative expertise processes. (Modélisation et exploitation des connaissances pour les processus d'expertise collaborative). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
22 | Eustachio Roberto Matera |
A Multipath and Thermal noise joint error characterization and exploitation for low-cost GNSS PVT estimators in urban environment. (Caractérisation et exploitation des erreurs conjointes de multitrajet et de bruit thermique pour les estimateurs PVT GNSS faible coût, en environnement urbain dense). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
22 | Arthur Ouaknine |
Deep learning for radar data exploitation of autonomous vehicle. (Apprentissage profond pour l'exploitation de données radar dans la conduite autonome). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
22 | Vincent Werner |
Optimizing identification and exploitation of fault injection vulnerabilities on microcontrollers. (Optimiser l'identification et l'exploitation de vulnérabilités à l'injection de faute sur microcontrôleurs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
22 | Alexandre Boyer |
Contributions to Computing needs in High Energy Physics Offline Activities: Towards an efficient exploitation of heterogeneous, distributed and shared Computing Resources. (Contributions aux besoins informatiques dans les activités hors-ligne du domaine de la Physique des Hautes-Énergies: Vers une exploitation efficace de ressources de calcul partagées, hétérogènes et distribuées). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
22 | Alexandre Bettinger |
Influence indépendante et explicabilité de l'exploration et de l'exploitation dans les métaheuristiques. (Independent Influence and Explicability of Exploration and Exploitation in Metaheuristics). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
22 | Theo Jaunet |
Deep learning interpretability with visual analytics : Exploring reasoning and bias exploitation. (Interprétabilité de l'apprentissage profond via analyse visuelle : Exploration de raisonnements et de l'exploitation de biais). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
22 | Adam Faci |
Représentation, simulation et exploitation de connaissances dans le formalisme des graphes conceptuels. (Representation, simulation and exploitation of knowledge in conceptual graphs formalism). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
22 | Issam Ghabri |
Efficacité énergétique des phases de conception et d'exploitation des entrepôts de données. (Energy Efficiency of the Design and Exploitation Phases of Data Warehouses). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
22 | Sébastien Guimbard, Nicolas Reul, Roberto Sabia, Sylvain Herlédan, Ziad El Khoury Hanna, Jean-François Piollé, Frédéric Paul, Tong Lee, Julian J. Schanze, Frederick M. Bingham, David M. Le Vine, Nadya Vinogradova-Shiffer, Susanne Mecklenburg, Klaus Scipal, Henri Laur |
The Salinity Pilot-Mission Exploitation Platform (Pi-MEP): A Hub for Validation and Exploitation of Satellite Sea Surface Salinity Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 13(22), pp. 4600, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Florian Lemarchand |
Deep-Learning Based Exploitation of Eavesdropped Images. (Exploitation d'Images Interceptées Basée Apprentissage Profond). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2021 |
RDF |
|
22 | Bastien Trotobas |
Compromis exploration-exploitation dans la détection MIMO: algorithmie et implémentation. (Exploration-exploitation trade-off in MIMO detection: algorithms and implementation). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2021 |
RDF |
|
22 | Tiffany Luong |
Towards the Exploitation of Mental Workload in Virtual Reality. (Vers l'exploitation de la charge mentale de travail dans les systèmes de réalité virtuelle). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2021 |
RDF |
|
22 | Guillaume Sarthou |
Knowledge representation and exploitation for interactive and cognitive robots. (Représentation et exploitation des connaissances pour les robots interactifs et cognitifs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2021 |
RDF |
|
22 | Khedidja Boulanouar |
Gestion et exploitation de données capteurs : une approche basée sur la réduction de données. (Management and Exploitation of Sensor Data : an Approach Based on Data Reduction). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2021 |
RDF |
|
22 | Hicham El Boukkouri |
Domain adaptation of word embeddings through the exploitation of in-domain corpora and knowledge bases. (Adaptation au domaine de plongements lexicaux via l'exploitation de corpus et de bases de connaissances spécialisés). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2021 |
RDF |
|
Displaying result #1 - #100 of 5099 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|