no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A complete characterization of statistical query learning with applications to evolvability
|
Feldman, Vitaly |
|
2012 |
78 |
5 |
p. 1444-1459 16 p. |
article |
2 |
A historical probability based noise generation strategy for privacy protection in cloud computing
|
Zhang, Gaofeng |
|
2012 |
78 |
5 |
p. 1374-1381 8 p. |
article |
3 |
A privacy preserving authorisation system for the cloud
|
Chadwick, David W. |
|
2012 |
78 |
5 |
p. 1359-1373 15 p. |
article |
4 |
A QoS-aware composition method supporting cross-platform service invocation in cloud environment
|
Qi, Lianyong |
|
2012 |
78 |
5 |
p. 1316-1329 14 p. |
article |
5 |
A spectral algorithm for learning Hidden Markov Models
|
Hsu, Daniel |
|
2012 |
78 |
5 |
p. 1460-1480 21 p. |
article |
6 |
A tree-based regressor that adapts to intrinsic dimension
|
Kpotufe, Samory |
|
2012 |
78 |
5 |
p. 1496-1515 20 p. |
article |
7 |
Catalan structures and dynamic programming in H-minor-free graphs
|
Dorn, Frederic |
|
2012 |
78 |
5 |
p. 1606-1622 17 p. |
article |
8 |
Cloud federation in a layered service model
|
Villegas, David |
|
2012 |
78 |
5 |
p. 1330-1344 15 p. |
article |
9 |
Combinatorial bandits
|
Cesa-Bianchi, Nicolò |
|
2012 |
78 |
5 |
p. 1404-1422 19 p. |
article |
10 |
Contents
|
|
|
2012 |
78 |
5 |
p. IBC- 1 p. |
article |
11 |
Contents
|
|
|
2012 |
78 |
5 |
p. OBC- 1 p. |
article |
12 |
Distributed data possession checking for securing multiple replicas in geographically-dispersed clouds
|
He, Jing |
|
2012 |
78 |
5 |
p. 1345-1358 14 p. |
article |
13 |
Editorial Board
|
|
|
2012 |
78 |
5 |
p. IFC- 1 p. |
article |
14 |
Enforcing QoS in scientific workflow systems enacted over Cloud infrastructures
|
Tolosana-Calasanz, Rafael |
|
2012 |
78 |
5 |
p. 1300-1315 16 p. |
article |
15 |
Learning with ordinal-bounded memory from positive data
|
Carlucci, Lorenzo |
|
2012 |
78 |
5 |
p. 1623-1636 14 p. |
article |
16 |
Learning with stochastic inputs and adversarial outputs
|
Lazaric, Alessandro |
|
2012 |
78 |
5 |
p. 1516-1537 22 p. |
article |
17 |
Multicut in trees viewed through the eyes of vertex cover
|
Chen, Jianer |
|
2012 |
78 |
5 |
p. 1637-1650 14 p. |
article |
18 |
[No title]
|
Rakhlin, Alexander |
|
2012 |
78 |
5 |
p. 1403- 1 p. |
article |
19 |
Parameter reduction and automata evaluation for grammar-compressed trees
|
Lohrey, Markus |
|
2012 |
78 |
5 |
p. 1651-1669 19 p. |
article |
20 |
P2P-MapReduce: Parallel data processing in dynamic Cloud environments
|
Marozzo, Fabrizio |
|
2012 |
78 |
5 |
p. 1382-1402 21 p. |
article |
21 |
Reliable agnostic learning
|
Kalai, Adam Tauman |
|
2012 |
78 |
5 |
p. 1481-1495 15 p. |
article |
22 |
SLA-based admission control for a Software-as-a-Service provider in Cloud computing environments
|
Wu, Linlin |
|
2012 |
78 |
5 |
p. 1280-1299 20 p. |
article |
23 |
Sparse regression learning by aggregation and Langevin Monte-Carlo
|
Dalalyan, A.S. |
|
2012 |
78 |
5 |
p. 1423-1443 21 p. |
article |
24 |
Special Issue: Cloud Computing 2011
|
Chen, Jinjun |
|
2012 |
78 |
5 |
p. 1279- 1 p. |
article |
25 |
Testable and untestable classes of first-order formulae
|
Jordan, Charles |
|
2012 |
78 |
5 |
p. 1557-1578 22 p. |
article |
26 |
The complexity of approximately counting stable roommate assignments
|
Chebolu, Prasad |
|
2012 |
78 |
5 |
p. 1579-1605 27 p. |
article |
27 |
The K-armed dueling bandits problem
|
Yue, Yisong |
|
2012 |
78 |
5 |
p. 1538-1556 19 p. |
article |