Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CSCI
CSCI 2017
Generate Citations
2017 International Conference on Computational Science and Computational Intelligence (CSCI)
Dec. 14 2017 to Dec. 16 2017
Las Vegas, NV, USA
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
Real-Time Cyber-Physical False Data Attack Detection in Smart Grids Using Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Erik M. Ferragut
,
Jason Laska
,
Mohammed M. Olama
,
Ozgur Ozmen
Tracking Cyber Adversaries with Adaptive Indicators of Compromise
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-12
by
Justin E. Doak
,
Joe B. Ingram
,
Sam A. Mulder
,
John H. Naegle
,
Jonathan A. Cox
,
James B. Aimone
,
Kevin R. Dixon
,
Conrad D. James
,
David R. Follett
Deep Learning Approach to Malware Multi-class Classification Using Image Processing Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-18
by
Mamta Kumari
,
George Hsieh
,
Christopher A. Okonkwo
Security Mechanisms for Signaling in WebRTC-Based Peer-to-Peer Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-24
by
Dennis Boldt
,
Sebastian Ebers
Deception in Cyberspace: Performance Focused Con Resistant Trust Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-30
by
Md Minhaz Chowdhury
,
Kendall E. Nygard
,
Krishna Kambhampaty
,
Maryam Alruwaythi
A Study on Construction and Security of Computer-Aided Security Schemes
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-36
by
Yasuyoshi Jinno
,
Takashi Tsuchiya
,
Tetsushi Ohki
,
Kenta Takahashi
,
Wakaha Ogata
,
Masakatsu Nishigaki
Security Evaluation of an Airbag-ECU by Reusing Threat Modeling Artefacts
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-43
by
Jürgen Dürrwang
,
Johannes Braun
,
Marcel Rumez
,
Reiner Kriesten
Security Governance, Management and Strategic Alignment via Capabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-49
by
George W. Jackson
,
Shawon S. M. Rahman
An Integrated Mechanism for Resetting Passwords in Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-54
by
Ching-yu Huang
A Highly-Reliable Virtual Primary Key Scheme for Relational Database Watermarking Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-60
by
Maikel Lázaro Pérez Gort
,
Ernesto Aparicio Díaz
,
Claudia Feregrino Uribe
A Mathematical Model of Mitigating Memory Randomization Weakness via Moving Target Defense
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-67
by
Sultan Aldossary
,
William Allen
,
Shengzhi Zhang
DynamicPIN: A Novel Approach towards Secure ATM Authentication
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-73
by
Jong-Hoon Kim
,
Gokarna Sharma
,
Irvin Steve Cardenas
,
Do Yeon Kim
,
Nagarajan Prabakar
,
S.S. Iyengar
Security Mental Model: Cognitive Map Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-79
by
Tahani Albalawi
,
Kambiz Ghazinour
,
Austin Melton
Enhancing Trojan Detection by Finding LTL and Taint Properties in RTL Circuit Designs: A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-85
by
Juan Portillo
,
Eugene John
ESeizure: A Mobile App for Digital Forensics First Responders
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-90
by
Cheryl Hinds
,
Peter Fenton
Drone Forensics: Digital Flight Log Examination Framework for Micro Drones
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-96
by
Ankit L. P. S Renduchintala
,
Abdulsahib Albehadili
,
Ahmad Y Javaid
Hunting Malware: An Example Using Gh0st
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-102
by
Sandi Samuel
,
Jonathan Graham
,
Cheryl Hinds
A Platform for Raising Awareness on Cyber Security in a Maritime Context
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-108
by
Thomas Becmeur
,
Xavier Boudvin
,
David Brosset
,
Gaël Héno
,
Thibaud Merien
,
Olivier Jacq
,
Yvon Kermarrec
,
Bastien Sultan
Anonymity of TOR Users Demystified
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-114
by
Natalija Vlajic
,
Pooria Madani
,
Ethan Nguyen
Dynamic Re-planning for Cyber-Physical Situational Awareness
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-120
by
Michal Piskozub
,
Sadie Creese
,
Jassim Happa
Analyzing the Effect of Ransomware Attacks on Different Industries
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-126
by
Christopher Patrick Gibson
,
Shankar Madhab Banik
Graph Algorithm Alternatives via Polynomial-Time Transformations: An Empirical Study Using Boolean Satisfiability and Integer Linear Programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-134
by
Kai Wang
,
Charles A. Phllips
,
Casey Miller
,
David G. Laughon
,
Michael A. Langston
Stochastic Path Finding under Congestion
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-140
by
Kamilia Ahmadi
,
Vicki H Allan
An Efficient Storage Format for Storing Configuration Interaction Sparse Matrices on CPU/GPU
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-147
by
Mohammed Mahmoud
,
Mark Hoffmann
,
Hassan Reza
Adaption of Levenshtein Algorithm for Albanian Language
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-151
by
Alban Rashiti
,
Arben Damoni
Improving Lives through Donation Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-157
by
Harini Musunuru
,
Roger Lee
,
Tokuro Matsuo
Calculating Persistence Homology of Attractors in High-Dimensional Chaotic Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-160
by
Anda Xiong
,
Amir Assadi
,
Yueqi Cao
A Conceptual Framework for Battery Storage Integration into the Electric Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-167
by
Vivian Sultan
,
Ahmed Alzahrani
,
Hind Bitar
,
Brian Hilton
Probabilistic Tit-for-Tat Strategy versus Nash Equilibrium for Infinitely Repeated Games
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-173
by
K Madhumidha
,
N Vijayarangan
,
K Padmanabhan
,
B Satish
,
N Kartick
,
Viswanath Ganesan
Proposition of a method for assessing similarity between two ontologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-179
by
Aly Ngoné Ngom
,
Fatou Kamara-Sangaré
,
Moussa Lo
Online Updating for Gaussian Process Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-183
by
Hongjun Su
,
Hong Zhang
New Techniques to Solve Differential Equations Automatically
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-189
by
Jun Zhang
,
Weiwei Zhu
,
Fangyang Shen
Numerical and Evolutionary Approaches for the Optimization of Electrical Microgrid Control Parameters
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-195
by
Jeremy Mange
,
Annette Skowronska
Unsolved Lattice Path Problems in Computational Science
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-201
by
Shanzhen Gao
,
Keh-Hsun Chen
Improvement of Voltage Sags Rates by Applying Optimal Reconfiguration of Electrical Networks in Presence of DG by Using Tabu Search
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-206
by
S. García-Martínez
,
E. Espinosa-Juárez
,
C. Pérez-Rojas
Computation in Markoff-Hurwitz Equations II
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-212
by
Shanzhen Gao
,
Keh-Hsun Chen
Solving Minimum K-Supplier in Adleman-Lipton Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-217
by
Saeid Safaei
,
Vahid Safaei
,
Elizabeth D. Trippe
,
Karen Aguar
,
Hamid R. Arabnia
From Blockchain to Internet-Based Voting
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-221
by
Elham Akbari
,
Qing Wu
,
Wenbing Zhao
,
Hamid R. Arabnia
,
Mary Qu Yang
Advance Gender Prediction Tool of First Names and its Use in Analysing Gender Disparity in Computer Science in the UK, Malaysia and China
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-227
by
Hua Zhao
,
Fairouz Kamareddine
An Improved Bank Credit Scoring Model: A Naïve Bayesian Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-233
by
Olatunji J. Okesola
,
Kennedy O. Okokpujie
,
Adeyinka A. Adewale
,
Samuel N. John
,
Osemwegie Omoruyi
Computer Aided Writing — A Prototype of an Intelligent Word Processing System
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-239
by
André Klahold
,
Johannes Zenkert
,
Madjid Fathi
An Occam's Razor Approach to Hedonic Pricing Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-245
by
Timothy Oladunni
,
Sharad Sharma
Computer Aided Design Using a Rational Quadratic Trigonometric Spline with Interval Shape Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-251
by
Shamaila Samreen
,
Muhammad Sarfraz
,
Nabila Jabeen
,
Malik Zawwar Hussain
Mapping Innovations in Artificial Intelligence through Patents: A Social Data Science Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-257
by
Thierry Warin
,
Romain Le Duc
,
William Sanger
Stochastic Local-to-Global Methods for Air Quality Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-260
by
Kaixi Zhu
,
Mitchell P. Krawiec-Thayer
,
Lin He
,
Amir H. Assadi
A Method to Use Power Generated from a Solar Energy Generator
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-262
by
Jihyun Lee
,
Youngmee Shin
,
Ilwoo Lee
Filter Optimization for Enhancing Transformed Voice
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-266
by
Soon S. Jarng
,
Dong S. Jarng
,
You J. Kwon
Research Experience on the DC House Project for Rural Electrification
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-270
by
Taufik Taufik
vcBalancer: Dynamic Volunteer Manager for Self-Adaptive Task Pulling
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-274
by
Chung Geon Song
,
Bong Woo Bak
,
Roh Young Myung
,
Jae Hyeck Lee
,
Jaehak Lee
,
Heon Chang Yu
Analyze Unstructured Data Patterns for Conceptual Representation
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-278
by
Aboubakr Aqle
,
Dena Al-Thani
,
Ali Jaoua
Automatic Code Generation for Microcontroller-Based System Using Multi-objective Linear Genetic Programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-285
by
Wildor Ferrel Serruto
,
Luis Alfaro Casas
A Genetic Algorithm Based Approach for Data Fusion at Grammar Level
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-291
by
Mohammad Faridul Haque Siddiqui
,
Ahmad Y Javaid
,
Jackson D. Carvalho
Opinion Mining Techniques and Tools: A Case Study on an Arab Newspaper
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-296
by
Ahmed Emam
,
Maha Alzahrani
Agent-Based Models Predicting Collective Behaviors
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-302
by
Raghda Alqurashi
,
Heba Alsultaan
,
Michael Greene
,
Tom Altman
Bio-inspired Neural Network Model Applied to Urban Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-308
by
Nelson Murcia García
,
André R. Hirakawa
,
Guilherme B. Castro
Graph Based AHC Algorithm for Text Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-314
by
Taeho Jo
Fuzzy System for Human Resource Performance Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-321
by
Anderson Silva de Oliveira Góes
,
Roberto Célio Limão
Graph Based KNN for Text Segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-327
by
Taeho Jo
GSO: A New Solution for Solving Unconstrained Optimization Tasks Using Garter Snake's Behavior
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-333
by
Maryam Naghdiani
,
Mohsen Jahanshahi
Movie Master: Hybrid Movie Recommendation
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-339
by
Rajan Subramaniam
,
Roger Lee
,
Tokuro Matsuo
Predicting Personal Transitional Location Based on Modified-SVM
Full-text access may be available. Sign in or learn about subscription options.
pp. 340-344
by
Chenyang Xu
,
Changqing Xu
Multilayer Artificial Neural Network Design and Architecture Optimization for the Pattern Recognition and Prediction of EEG Signals Based on Hénon Map Chaotic System
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-350
by
Lei Zhang
Extraction of the Essential Constituents of the S&P 500 Index
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-356
by
Ray R. Hashemi
,
Omid M. Ardakani
,
Azita A. Bahrami
,
Jeffrey A. Young
Educational Data Mining Based on Multi-objective Weighted Voting Ensemble Classifier
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-362
by
Moloud Abdar
,
Neil Y. Yen
,
Jason C. Hung
Multi-perspective Machine Learning (MPML) — A Machine Learning Model for Multi-faceted Learning Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-368
by
Sean Tavarez Miller
,
Curtis Busby-Earle
A Deep Dive into Automatic Code Generation Using Character Based Recurrent Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 369-374
by
Renita Priya
,
Xinyuan Wang
,
Yujie Hu
,
Yu Sun
A Multivariate Discretization Algorithm Based on Multiobjective Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-380
by
Rafael Zamudio-Reyes
,
Nicandro Cruz-Ramírez
,
Efrén Mezura-Montes
Evacuation Evaluation Using Machine Learning and Wearable Sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 381-386
by
Dongyang Huang
,
Susumu Aida
,
Masaki Kitazawa
,
Satoshi Takahashi
,
Tooru B. Takahashi
,
Atsushi Yoshikawa
,
Takao Terano
A Fuzzy Controller for Fault Tolerant Control of Nuclear Reactor
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-390
by
Meng Wang
,
Jiamei Deng
,
Colin Pattinson
,
Suzanne Richardson
Deep Learning Art History from Data: Baroque Intellectual Influence on the Romantic Era Painting
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-393
by
Song Yuchen
,
Ehsan Qasemi
,
Adel Ardalan
,
Huijing Gao
,
Amir H. Assadi
Deep Learning Empirical Topology for Classical Music Style Decision Making
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-395
by
Peter Han
,
Ehsan Qasemi
,
Adel Ardalan
,
Huijing Gao
,
Amir H. Assadi
A Fast Incremental Spectral Clustering Algorithm for Image Segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-407
by
Xiaochun Wang
,
Chenyu Chang
,
Xia Li Wang
A Survey on Audio Content-Based Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-413
by
Amal Dandashi
,
Jihad AlJaam
Age Estimation with Local Statistical Biologically Inspired Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-419
by
Raphael Angulu
,
Jules-Raymond Tapamo
,
Aderemi O. Adewumi
Algorithmic Approaches and Embedded Architectures for Robotic Search and Rescue
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-425
by
Manuel Garcia
,
Aleksander Milshteyn
,
Airs Lin
,
Garth Herman
,
Khosrow Rad
,
Charles Liu
,
Helen Boussalis
Estimation of Illumination Map from Dermoscopy Images for Extracting Differential Structures Using Gabor Local Mesh Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-431
by
Farhan Riaz
,
Rida Nisar
,
Ali Hassan
,
Muntaha Sakeena
,
Muhammad Ajmal Azad
FaceNet Based Face Sketch Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 432-436
by
Weiguo Wan
,
Hyo Jong Lee
Facial Action Unit Recognition Using Data Mining Integrated Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-443
by
Ömer M. Soysal
,
Shahrzad Shirzad
,
Kazim Sekeroglu
Flood Event Recognition from Images Based on CNN and Semantics
Full-text access may be available. Sign in or learn about subscription options.
pp. 450-455
by
Yanlin Teng
,
Bo Lang
,
Zepeng Gu
HSV and NDVI Color Space Analysis and Sampling Procedure for Counting of Seedlings in Eucalyptus spp Plantations from High Definition Aerial Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 456-462
by
Guilherme Pereira Jorge Franzé
,
Emanuel Rocha Woiski
,
Luiz Carlos Sandoval Góes
Identification of Cashmere/Wool Based on Pairwise Rotation Invariant Co-occurrence Local Binary Pattern
Full-text access may be available. Sign in or learn about subscription options.
pp. 463-467
by
Kai Lu
,
Xinyu Chai
,
Haoyang Xie
,
Zhicai Yu
,
Yueqi Zhong
Multi-camera Smart Surveillance System
Full-text access may be available. Sign in or learn about subscription options.
pp. 468-472
by
Bakhita Salman
,
Mohammed I. Thanoon
,
Saleh Zein-Sabatto
,
Fenghui Yao
Time Series Data Classification Using Discriminative Interpolation with Sparsity
Full-text access may be available. Sign in or learn about subscription options.
pp. 473-478
by
Nenad Mijatovic
,
Rana Haber
,
Anand Rangarajan
,
Anthony O. Smith
,
Adrian M. Peter
Facial Recognition: A Combined Approach Utilizing CICA, PCA, and FFT
Full-text access may be available. Sign in or learn about subscription options.
pp. 479-483
by
Omar Odeh Abusaleak
,
Venus W. Samawi
Object Movement Detection by Real-Time Deep Learning for Security Surveillance Camera
Full-text access may be available. Sign in or learn about subscription options.
pp. 484-488
by
Abdolreza Abhari
,
Sepideh Banihashemi
,
Jason Li
An Empirical Evaluation of Machine Learning Approaches for Species Identification through Bioacoustics
Full-text access may be available. Sign in or learn about subscription options.
pp. 489-494
by
Liang Zhang
,
Ibraheem Saleh
,
Sashi Thapaliya
,
Jonathan Louie
,
Jose Figueroa-Hernandez
,
Hao Ji
A Generalized State of the Art Model for Precise Visualization and Analysis of Defected Portions of Fruits Using Choice Based Segmentation Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 495-500
by
Tanya Makkar
,
Yogesh
,
Ashwani Kumar Dubey
,
Ayush Goyal
,
Sunayana Tirumalasetty
Analytic Signal Decomposition Using M-Channel Signal Matched Filter Bank
Full-text access may be available. Sign in or learn about subscription options.
pp. 501-504
by
Geetanjali Srivastava
,
Shiv Dutt Joshi
Edge Detection Using Spectral Intrinsic Decomposition
Full-text access may be available. Sign in or learn about subscription options.
pp. 505-509
by
Samba Sidibe
,
Oumar Niang
,
Ndeye Fatou Ngom
Hand Motion Recognition Based on a 3D Fingertip Detection Fusion Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 510-515
by
Jun Wang
,
Jiuchao Qian
,
Rendong Ying
,
Ke Jin
,
Weihang Wang
,
Peilin Liu
Real-Time Object Detection and Classification of Small and Similar Figures in Image Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 516-519
by
Aldo Marcelo Algorry
,
Arian Giles García
,
A. Gustavo Wofmann
Hierarchical-Dynamic Embedding for Zero-Shot Object Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 520-525
by
Xuebo Han
,
Kan Li
Real Time Eye Gaze Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 526-531
by
Suzan Anwar
,
Mariofanna Milanova
,
Zvetomira Svetleff
,
Shereen Abdulla
A Novel Approach to the Approximation of Conformal Mappings and Emerging Applications to Shape Recognition of Planar-Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 532-534
by
Sa'ar Hersonsky
,
Hamid R. Arabnia
,
Thiab R. Taha
Real-Time Hand Gesture Recognition Based on a Fusion Learning Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 535-540
by
Weihang Wang
,
Rendong Ying
,
Jiuchao Qian
,
Hao Ge
,
Jun Wang
,
Peilin Liu
Review of Person Re-identification Methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 541-546
by
Zengyan Wang
,
Hamid R. Arabnia
,
Thiab R. Taha
A Content-Aware Quantisation Mechanism for Transform Domain Distributed Video Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 547-553
by
Asif Mahmood
,
Laurence S. Dooley
,
Patrick Wong
Automated Diagnosis of Retinal Edema from Optical Coherence Tomography Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 554-557
by
Abdul Wahab Arif
,
Ammara Nasim
,
Adeel M Syed
,
Taimur Hassan
Learning via Decision Trees Approach for Video Super-Resolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 558-562
by
Yu-Zhu Zhang
,
Wan-Chi Siu
,
Zhi-Song Liu
,
Ngai-Fong Law
Showing 100 out of 340
Load More
Load All