text
stringlengths 1
13.7k
| __index_level_0__
int64 0
3.6M
|
---|---|
Left luggage detection using bayesian inference | 840 |
Detection of multiple, partially occluded humans in a single image by Bayesian combination of edgelet part detectors | 841 |
Recognizing action at a distance | 843 |
Multiple histogram matching | 850 |
Appearance modeling for tracking in multiple non-overlapping cameras | 851 |
digital image processing , 3rd edition . | 853 |
Fast and robust Earth Mover's Distances | 855 |
The Earth Mover's Distance as a Metric for Image Retrieval | 859 |
Men as Cultural Ideals: Cultural Values Moderate Gender Stereotype Content | 860 |
An ambivalent alliance: Hostile and benevolent sexism as complementary justifications for gender inequality. | 861 |
Are Leader Stereotypes Masculine? A Meta-Analysis of Three Research Paradigms | 863 |
A model of (often mixed) stereotype content: Competence and warmth respectively follow from perceived status and competition | 865 |
Millimeter Wave Communications: From Point-to-Point Links to Agile Network Connections | 870 |
Hekaton: Efficient and Practical Large-Scale MIMO | 871 |
BeamSpy: enabling robust 60 GHz links under blockage | 873 |
Channel Estimation and Hybrid Precoding for Millimeter Wave Cellular Systems | 877 |
Automatic Detection of Mind Wandering During Reading Using Gaze and Physiology | 880 |
The restless mind | 881 |
Correlation-based Feature Selection for Machine Learning | 883 |
anwendung der blockchain au脽erhalb von geldwahrungen . | 890 |
Is Bitcoin a Decentralized Currency? | 891 |
MedRec: Using Blockchain for Medical Data Access and Permission Management | 893 |
technische grundlagen und datenschutzrechtliche fragen der blockchain - technologie . | 895 |
World of Empowered IoT Users | 897 |
Trust and mobile commerce in North America | 900 |
The impact of initial consumer trust on intentions to transact with a web site: a trust building model | 901 |
Affective Design of E-Commerce User Interfaces: How to Maximise Perceived Trustworthiness | 903 |
Brain MRI Super Resolution Using 3D Deep Densely Connected Neural Networks | 910 |
TensorFlow: learning functions at scale | 911 |
Image Super-Resolution Using Deep Convolutional Networks | 913 |
Backpropagation Applied to Handwritten Zip Code Recognition | 915 |
Image quality assessment: from error visibility to structural similarity | 919 |
Joint Attention in Driver-Pedestrian Interaction: from Theory to Practice | 920 |
Using spin images for efficient object recognition in cluttered 3D scenes | 921 |
Qualitative Spatial Representation and Reasoning Techniques | 923 |
Vehicle Detection by Independent Parts for Urban Driver Assistance | 927 |
Multi-modal gesture recognition challenge 2013: dataset and results | 929 |
Automatic Judgment Prediction via Legal Reading Comprehension | 930 |
Gated-Attention Readers for Text Comprehension | 931 |
TriviaQA: A Large Scale Distantly Supervised Challenge Dataset for Reading Comprehension | 933 |
Learning Natural Language Inference with LSTM | 937 |
A Fast Wavelet-Based Algorithm for Global and Local Image Sharpness Estimation | 940 |
Blur detection for digital images using wavelet transform | 941 |
A No-Reference Objective Image Sharpness Metric Based on the Notion of Just Noticeable Blur (JNB) | 943 |
DCT statistics model-based blind image quality assessment | 945 |
Word Sense Disambiguation with Recurrent Neural Networks | 950 |
Semi-supervised Word Sense Disambiguation with Neural Models | 951 |
Long Short Term Memory | 953 |
A unified architecture for natural language processing: deep neural networks with multitask learning | 957 |
Solving the Credit Assignment Problem: The interaction of Explicit and Implicit learning with Internal and External State Information | 960 |
The interaction of the explicit and the implicit in skill learning: A dual-process approach | 961 |
Context-aware music recommendation based on latenttopic sequential patterns | 970 |
PrefixSpan: Mining Sequential Patterns by Prefix-Projected Growth | 971 |
Mining Sequential Patterns : Generalizations and Performance Improvements | 975 |
Mining Longest Repeating Subsequences To Predict World Wide Web Surfing | 977 |
passwords and the evolution of imperfect authentication . | 980 |
Does my password go up to eleven?: the impact of password meters on password selection | 981 |
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes | 983 |
password memorability and security : empirical results . | 989 |
Optical interconnects for extreme scale computing systems | 990 |
Packaging of silicon photonics systems | 991 |
Contactless and Partial 3D Fingerprint Recognition using Multi-view Deep Representation | 1,000 |
Learning scale-variant and scale-invariant features for deep image classification | 1,001 |
Learning a similarity metric discriminatively, with application to face verification | 1,003 |
Biometric Recognition: An Overview | 1,005 |
Detecting Deceptive Behavior via Integration of Discriminative Features From Multiple Modalities | 1,010 |
Deception Detection using Real-life Trial Data | 1,011 |
Syntactic Stylometry for Deception Detection | 1,013 |
Good features to track | 1,017 |
Automated Personalized Feedback in Introductory Java Programming MOOCs | 1,020 |
Learning Program Embeddings to Propagate Feedback on Student Code | 1,021 |
Software Verification and Graph Similarity for Automated Evaluation of Students' Assignments | 1,027 |
Computational Thinking | 1,029 |
A Heterogeneous Parallel Framework for Domain-Specific Languages | 1,030 |
Distributed data-parallel computing using a high-level programming language | 1,031 |
A domain-specific approach to heterogeneous parallelism | 1,037 |
Domain-specific languages: an annotated bibliography | 1,039 |
Collective Sensemaking in Online Health Forums | 1,040 |
mimir: a market-based real-time question and answer service | 1,041 |
Questions in, knowledge in?: a study of naver's question answering community | 1,043 |
NOUS: Construction and Querying of Dynamic Knowledge Graphs | 1,050 |
Toward an architecture for never-ending language learning | 1,051 |
Developing an Ontology for Cyber Security Knowledge Graphs | 1,053 |
DeepDive: Web-scale Knowledge-base Construction using Statistical Learning and Inference | 1,057 |
Multiple-Kernel Based Vehicle Tracking Using 3D Deformable Model and Camera Self-Calibration | 1,060 |
Online Multi-Target Tracking Using Recurrent Neural Networks | 1,061 |
Mean shift: A robust approach toward feature space analysis | 1,067 |
SSD: Single Shot MultiBox Detector | 1,069 |
Development Pattern Recognition Model for the Classification of Circuit Probe Wafer Maps on Semiconductors | 1,070 |
low - rank structure learning via nonconvex heuristic recovery . | 1,080 |
Linearized Alternating Direction Method with Adaptive Penalty for Low-Rank Representation | 1,081 |
A Compositional and Dynamic Model for Face Aging | 1,085 |
Effective attack models for shilling item-based collaborative filtering systems | 1,090 |
Identifying Attack Models for Secure Recommendation | 1,091 |
Shilling recommender systems for fun and profit | 1,095 |
Limited knowledge shilling attacks in collaborative filtering systems | 1,097 |
Feminist HCI: taking stock and outlining an agenda for design | 1,100 |
COVER STORYThe washing machine that ate my sari---mistakes in cross-cultural design | 1,101 |
Empathy and experience in HCI | 1,103 |
Placeless Place-Recognition | 1,110 |