set
sequence |
---|
[
"Development and Evolution of the Human Neocortex",
"Cortical neurons arise in symmetric and asymmetric division zones and migrate through specific phases",
"Brain of the African elephant (Loxodonta africana): Neuroanatomy from magnetic resonance images"
] |
[
"Development and Evolution of the Human Neocortex",
"Cortical neurons arise in symmetric and asymmetric division zones and migrate through specific phases",
"The desire for sexual variety as a key to understanding basic human mating strategies"
] |
[
"Development and Evolution of the Human Neocortex",
"The Human Brain in Numbers: A Linearly Scaled-up Primate Brain",
"The impact of knowledge sharing, organizational capability and partnership quality on IS outsourcing success"
] |
[
"Development and Evolution of the Human Neocortex",
"Cortical neurons arise in symmetric and asymmetric division zones and migrate through specific phases",
"SafeRNet: Safe Transportation Routing in the era of Internet of Vehicles and Mobile Crowd Sensing"
] |
[
"Development and Evolution of the Human Neocortex",
"Cortical neurons arise in symmetric and asymmetric division zones and migrate through specific phases",
"Compact Pulse Topology for Adjustable High-Voltage Pulse Generation Using an SOS Diode"
] |
[
"Brain-Computer Interfaces, Virtual Reality, and Videogames",
"Steady-state VEP-based brain-computer interface control in an immersive 3D gaming environment",
"the thought translation device ( ttd ) for completely paralyzed patients ."
] |
[
"Brain-Computer Interfaces, Virtual Reality, and Videogames",
"Steady-state VEP-based brain-computer interface control in an immersive 3D gaming environment",
"inhibitory modulation of orbitofrontal cortex on medial prefrontal cortex - amygdala information flow ."
] |
[
"Brain-Computer Interfaces, Virtual Reality, and Videogames",
"Steady-state VEP-based brain-computer interface control in an immersive 3D gaming environment",
"Variational mesh segmentation via quadric surface fitting"
] |
[
"Brain-Computer Interfaces, Virtual Reality, and Videogames",
"Steady-state VEP-based brain-computer interface control in an immersive 3D gaming environment",
"Marketing and social networks: a criterion for detecting opinion leaders"
] |
[
"Brain-Computer Interfaces, Virtual Reality, and Videogames",
"Steady-state VEP-based brain-computer interface control in an immersive 3D gaming environment",
"THE ROLE OF IMPUTATION IN DETECTING FRAUDULENT FINANCIAL REPORTING"
] |
[
"Designing for a billion users: a case study of facebook",
"A Field Study of the Software Design Process for Large Systems",
"Making usable, useful, productivity-enhancing computer applications"
] |
[
"Designing for a billion users: a case study of facebook",
"A Field Study of the Software Design Process for Large Systems",
"Design and characterization of a novel high-compliance spring for robots with soft joints"
] |
[
"Designing for a billion users: a case study of facebook",
"A survey of user-centered design practice",
"Evidence for Infants' Internal Working Models of Attachment"
] |
[
"Designing for a billion users: a case study of facebook",
"A Field Study of the Software Design Process for Large Systems",
"A method for the segmentation of images based on thresholding and applied to vesicular textures"
] |
[
"Designing for a billion users: a case study of facebook",
"A Field Study of the Software Design Process for Large Systems",
"Maximizing Energy Efficiency for Consumption Circuit Power in Downlink Massive MIMO Wireless Networks"
] |
[
"Abstract Meaning Representation for Sembanking",
"Learning For Semantic Parsing With Statistical Machine Translation",
"Learning for semantic parsing using statistical machine translation techniques"
] |
[
"Abstract Meaning Representation for Sembanking",
"Learning For Semantic Parsing With Statistical Machine Translation",
"Analysis of Audio-Visual Features for Unsupervised Speech Recognition"
] |
[
"Abstract Meaning Representation for Sembanking",
"From TreeBank to PropBank",
"Leakage Current Mechanisms and Leakage Reduction Techniques in Deep-Submicrometer CMOS Circuits"
] |
[
"Abstract Meaning Representation for Sembanking",
"Learning For Semantic Parsing With Statistical Machine Translation",
"Wisture: RNN-based Learning of Wireless Signals for Gesture Recognition in Unmodified Smartphones"
] |
[
"Abstract Meaning Representation for Sembanking",
"Learning For Semantic Parsing With Statistical Machine Translation",
"Smart contracts vulnerabilities: a call for blockchain software engineering?"
] |
[
"Secure data processing framework for mobile cloud computing",
"Ciphertext-Policy Attribute-Based Encryption",
"Attribute-based encryption for fine-grained access control of encrypted data"
] |
[
"Secure data processing framework for mobile cloud computing",
"Ciphertext-Policy Attribute-Based Encryption",
"From theory to modelling : urban systems as complex systems"
] |
[
"Secure data processing framework for mobile cloud computing",
"Ciphertext-Policy Attribute-Based Encryption",
"Moodbile: A Framework to Integrate m-Learning Applications with the LMS"
] |
[
"Secure data processing framework for mobile cloud computing",
"Ciphertext-Policy Attribute-Based Encryption",
"Botnet with Browser Extensions"
] |
[
"Secure data processing framework for mobile cloud computing",
"Ciphertext-Policy Attribute-Based Encryption",
"Aalborg Universitet Multidimensional Modeling"
] |
[
"Traffic Sign Detection for Advanced Driver Assistance System",
"Fast shape-based road sign detection for a driver assistance system",
"Road traffic sign detection and classification"
] |
[
"Traffic Sign Detection for Advanced Driver Assistance System",
"Traffic sign detection and recognition using OpenCV",
"Using ID-Hopping to Defend Against Targeted DoS on CAN"
] |
[
"Traffic Sign Detection for Advanced Driver Assistance System",
"Traffic sign recognition and analysis for intelligent vehicles",
"Pose-Invariant Face Alignment with a Single CNN"
] |
[
"Traffic Sign Detection for Advanced Driver Assistance System",
"Traffic sign detection and recognition using OpenCV",
"MMSE subchannel decision feedback equalization for filter bank based multicarrier systems"
] |
[
"Traffic Sign Detection for Advanced Driver Assistance System",
"Robust real-time object detection",
"Neural Network based Extreme Classification and Similarity Models for Product Matching"
] |
[
"3D - Playfair cipher with additional bitwise operation",
"Modified Version of Playfair Cipher Using Linear Feedback Shift Register",
"Handbook of Applied Cryptography"
] |
[
"3D - Playfair cipher with additional bitwise operation",
"Applied cryptography : protocols, algorithms, and source codein C",
"Pulsed radiofrequency treatment in interventional pain management: mechanisms and potential indications—a review"
] |
[
"3D - Playfair cipher with additional bitwise operation",
"Applied cryptography : protocols, algorithms, and source codein C",
"Amalgamating knowledge bases"
] |
[
"3D - Playfair cipher with additional bitwise operation",
"Modified Version of Playfair Cipher Using Linear Feedback Shift Register",
"From theory to modelling : urban systems as complex systems"
] |
[
"3D - Playfair cipher with additional bitwise operation",
"Applied cryptography : protocols, algorithms, and source codein C",
"Nutraceuticals as potential therapeutic agents for colon cancer: a review"
] |
[
"neural enquirer : learning to query tables in natural language .",
"Learning Dependency-Based Compositional Semantics",
"Using String-Kernels For Learning Semantic Parsers"
] |
[
"neural enquirer : learning to query tables in natural language .",
"Compositional Semantic Parsing on Semi-Structured Tables",
"Facility layouts based on differential evolution algorithm"
] |
[
"neural enquirer : learning to query tables in natural language .",
"Learning Dependency-Based Compositional Semantics",
"Axe UX: Exploring long-term user experience with iScale and AttrakDiff"
] |
[
"neural enquirer : learning to query tables in natural language .",
"Compositional Semantic Parsing on Semi-Structured Tables",
"The importance of lactic acid bacteria for the prevention of bacterial growth and their biogenic amines formation: A review"
] |
[
"neural enquirer : learning to query tables in natural language .",
"Towards AI-Complete Question Answering: A Set of Prerequisite Toy Tasks",
"Proceedings of the First International Workshop on Argumentation in Logic Programming and Non-Monotonic Reasoning (Arg-LPNMR 2016)"
] |
[
"Privacy-Preserving Human Activity Recognition from Extreme Low Resolution",
"Discovering important people and objects for egocentric video summarization",
"Story-Driven Summarization for Egocentric Video"
] |
[
"Privacy-Preserving Human Activity Recognition from Extreme Low Resolution",
"First-Person Activity Recognition: What Are They Doing to Me?",
"Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks"
] |
[
"Privacy-Preserving Human Activity Recognition from Extreme Low Resolution",
"Temporal Segmentation of Egocentric Videos",
"Low-voltage CMOS analog bootstrapped switch for sample-and-hold circuit: design and chip characterization"
] |
[
"Privacy-Preserving Human Activity Recognition from Extreme Low Resolution",
"Discovering important people and objects for egocentric video summarization",
"Single Sensor Techniques for Sleep Apnea Diagnosis Using Deep Learning"
] |
[
"Privacy-Preserving Human Activity Recognition from Extreme Low Resolution",
"Action Recognition with Improved Trajectories",
"An enhanced MPPT technique for high gain DC-DC converter for photovoltaic applications"
] |
[
"IOT Based Door Access Control Using Face Recognition",
"RFID and Face Recognition Based Security and Access Control System",
"Eigenfaces for Recognition"
] |
[
"IOT Based Door Access Control Using Face Recognition",
"Automatic Door Access System Using Face Recognition",
"Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics"
] |
[
"IOT Based Door Access Control Using Face Recognition",
"Automatic Door Access System Using Face Recognition",
"ANTENNA MINIATURIZATION TECHNIQUES FOR WIRELESS APPLICATIONS"
] |
[
"IOT Based Door Access Control Using Face Recognition",
"RFID and Face Recognition Based Security and Access Control System",
"Improving Estimations in Agile Projects: Issues and Avenues"
] |
[
"IOT Based Door Access Control Using Face Recognition",
"RFID and Face Recognition Based Security and Access Control System",
"Generation of Offensive Strategies in Robot Soccer Game"
] |
[
"DuoRC: Towards Complex Language Understanding with Paraphrased Reading Comprehension",
"S-Net: From Answer Extraction to Answer Generation for Machine Reading Comprehension",
"A Simple Named Entity Extractor Using AdaBoost"
] |
[
"DuoRC: Towards Complex Language Understanding with Paraphrased Reading Comprehension",
"The NarrativeQA Reading Comprehension Challenge",
"BURG: fast optimal instruction selection and tree parsing"
] |
[
"DuoRC: Towards Complex Language Understanding with Paraphrased Reading Comprehension",
"Introduction To The CoNLL-2003 Shared Task: Language-Independent Named Entity Recognition",
"SQuAD Reading Comprehension with Coattention"
] |
[
"DuoRC: Towards Complex Language Understanding with Paraphrased Reading Comprehension",
"TriviaQA: A Large Scale Distantly Supervised Challenge Dataset for Reading Comprehension",
"Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades"
] |
[
"DuoRC: Towards Complex Language Understanding with Paraphrased Reading Comprehension",
"Modeling Biological Processes for Reading Comprehension",
"A model based engineering tool for ROS component compositioning, configuration and generation of deployment information"
] |
[
"One Parser, Many Languages",
"Cross-lingual Dependency Parsing Based on Distributed Representations",
"An Autoencoder Approach to Learning Bilingual Word Representations"
] |
[
"One Parser, Many Languages",
"Cross-Lingual Dependency Parsing with Universal Dependencies and Predicted PoS Labels",
"Design and use paradigms for Gazebo, an open-source multi-robot simulator"
] |
[
"One Parser, Many Languages",
"Speech recognition with deep recurrent neural networks",
"Squirrel: a decentralized peer-to-peer web cache"
] |
[
"One Parser, Many Languages",
"Speech recognition with deep recurrent neural networks",
"Exploration or Fact-Finding: Inferring User's Search Activity Just in Time"
] |
[
"One Parser, Many Languages",
"Cross-lingual Dependency Parsing Based on Distributed Representations",
"Landfarmed oil sludge as a carbon source for Canavalia ensiformis during phytoremediation"
] |
[
"Classifying and Characterizing Query Intent",
"Predicting clicks: estimating the click-through rate for new ads",
"transparent queries : investigating users ' mental models of search engines ."
] |
[
"Classifying and Characterizing Query Intent",
"A taxonomy of web search",
"Transparent active learning for robots"
] |
[
"Classifying and Characterizing Query Intent",
"Predicting clicks: estimating the click-through rate for new ads",
"An Upper-Level Ontology for the Biomedical Domain"
] |
[
"Classifying and Characterizing Query Intent",
"Predicting clicks: estimating the click-through rate for new ads",
"Use of lean and six sigma methodology to improve operating room efficiency in a high-volume tertiary-care academic medical center."
] |
[
"Classifying and Characterizing Query Intent",
"Predicting clicks: estimating the click-through rate for new ads",
"Thermal Phenomena in Fiber-reinforced Thermoplastic Tape Winding Process: Computational Simulations and Experimental Validations"
] |
[
"COBRAS-TS: A new approach to Semi-Supervised Clustering of Time Series",
"The great time series classification bake off: a review and experimental evaluation of recent algorithmic advances",
"Fast Shapelets: A Scalable Algorithm for Discovering Time Series Shapelets"
] |
[
"COBRAS-TS: A new approach to Semi-Supervised Clustering of Time Series",
"Fast and Accurate Time-Series Clustering",
"Reinforcement learning of traffic light controllers adapting to traffic congestion"
] |
[
"COBRAS-TS: A new approach to Semi-Supervised Clustering of Time Series",
"Active Learning of Constraints for Semi-Supervised Clustering",
"Stepper motor modeling and control design for a 1.5 square meters heliostat prototype"
] |
[
"COBRAS-TS: A new approach to Semi-Supervised Clustering of Time Series",
"Constrained K-means Clustering with Background Knowledge",
"Designing Neural Network Architectures using Reinforcement Learning"
] |
[
"COBRAS-TS: A new approach to Semi-Supervised Clustering of Time Series",
"Fast and Accurate Time-Series Clustering",
"Effect of iodine intake on thyroid diseases in China."
] |
[
"Engineering Cheerful Robots: An Ethical Consideration",
"Robots for Use in Autism Research",
"the effects of early relational trauma on right brain development , affect regulation , and infant mental health ."
] |
[
"Engineering Cheerful Robots: An Ethical Consideration",
"The crying shame of robot nannies: an ethical appraisal",
"Clinical and cognitive factors affecting psychosocial functioning in remitted patients with bipolar disorder"
] |
[
"Engineering Cheerful Robots: An Ethical Consideration",
"The crying shame of robot nannies: an ethical appraisal",
"consequences and solutions in agenesis of the lateral incisors partial anodontia ."
] |
[
"Engineering Cheerful Robots: An Ethical Consideration",
"Robots for Use in Autism Research",
"[Dialectical behavior therapy approaches with disruptive behavior disorders]."
] |
[
"Engineering Cheerful Robots: An Ethical Consideration",
"Robots for Use in Autism Research",
"Generation of Offensive Strategies in Robot Soccer Game"
] |
[
"The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved",
"On the features and challenges of security and privacy in distributed internet of things",
"Botnets and Internet of Things Security"
] |
[
"The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved",
"avatar : a framework to support dynamic security analysis of embedded systems ' firmwares .",
"How to Fit when No One Size Fits"
] |
[
"The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved",
"stuxnet : dissecting a cyberwarfare weapon .",
"Implementation of 3D Obstacle Compliant Mobility Models for UAV Networks in ns-3"
] |
[
"The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved",
"TrustLite: a security architecture for tiny embedded devices",
"A Decision Support System for Performance Appraisal"
] |
[
"The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved",
"security , privacy and trust in internet of things : the road ahead .",
"Comparative Validation of Polyp Detection Methods in Video Colonoscopy: Results From the MICCAI 2015 Endoscopic Vision Challenge"
] |
[
"BotGAD: detecting botnets by capturing group activities in network traffic",
"an inside look at botnets .",
"Snort - Lightweight Intrusion Detection for Networks"
] |
[
"BotGAD: detecting botnets by capturing group activities in network traffic",
"an inside look at botnets .",
"A taxonomy of reasoning flaws in the anti-vaccine movement."
] |
[
"BotGAD: detecting botnets by capturing group activities in network traffic",
"an inside look at botnets .",
"A study of Byzantine fault-tolerant algorithms"
] |
[
"BotGAD: detecting botnets by capturing group activities in network traffic",
"an inside look at botnets .",
"Combining multiple depth-based descriptors for hand gesture recognition"
] |
[
"BotGAD: detecting botnets by capturing group activities in network traffic",
"BotHunter: Detecting Malware Infection Through IDSDriven Dialog Correlation",
"Customer Relationship Management (CRM) systems, intermediation and disintermediation: The case of INSG"
] |
[
"A COMPARISON-FREE SORTING ALGORITHM ON CPUs",
"Fast sort on CPUs and GPUs: a case for bandwidth oblivious SIMD sort",
"Efficient implementation of sorting on multi-core SIMD CPU architecture"
] |
[
"A COMPARISON-FREE SORTING ALGORITHM ON CPUs",
"Fast sort on CPUs and GPUs: a case for bandwidth oblivious SIMD sort",
"Automatic Brain Tumor Grading from MRI Data Using Convolutional Neural Networks and Quality Assessment"
] |
[
"A COMPARISON-FREE SORTING ALGORITHM ON CPUs",
"Fast sort on CPUs and GPUs: a case for bandwidth oblivious SIMD sort",
"EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements"
] |
[
"A COMPARISON-FREE SORTING ALGORITHM ON CPUs",
"Fast sort on CPUs and GPUs: a case for bandwidth oblivious SIMD sort",
"To Belong Is to Matter Sense of Belonging Enhances Meaning in Life"
] |
[
"A COMPARISON-FREE SORTING ALGORITHM ON CPUs",
"Fast sort on CPUs and GPUs: a case for bandwidth oblivious SIMD sort",
"3 resolution convergence a comparison of aerial photos , lidar and ikonos for monitoring cities ."
] |
[
"Tag Based Client Side Detection of Content Sniffing Attacks with File Encryption and File Splitter Technique",
"Mitigating program security vulnerabilities: Approaches and challenges",
"Web application security assessment by fault injection and behavior monitoring"
] |
[
"Tag Based Client Side Detection of Content Sniffing Attacks with File Encryption and File Splitter Technique",
"Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks",
"Are Therapeutic Human Mesenchymal Stromal Cells Compatible with Human Blood"
] |
[
"Tag Based Client Side Detection of Content Sniffing Attacks with File Encryption and File Splitter Technique",
"Mitigating program security vulnerabilities: Approaches and challenges",
"mathematical analysis of the pharmacokinetic - pharmacodynamic ( pkpd ) behaviour of monoclonal antibodies : predicting in vivo potency ."
] |
[
"Tag Based Client Side Detection of Content Sniffing Attacks with File Encryption and File Splitter Technique",
"Defeating script injection attacks with browser-enforced embedded policies",
"Illuminant-Based Transformed Spaces for Image Forensics"
] |
[
"Tag Based Client Side Detection of Content Sniffing Attacks with File Encryption and File Splitter Technique",
"Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks",
"Adenoid Hypertrophy in Adults: A case Series"
] |
[
"SymDrive: Testing Drivers without Devices",
"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs",
"Valgrind: a framework for heavyweight dynamic binary instrumentation"
] |
[
"SymDrive: Testing Drivers without Devices",
"Combining unit-level symbolic execution and system-level concrete execution for testing nasa software",
"Second-order constrained parametric proposals and sequential search-based structured prediction for semantic segmentation in RGB-D images"
] |
[
"SymDrive: Testing Drivers without Devices",
"Linux kernel vulnerabilities: State-of-the-art defenses and open problems",
"Confidence Measures for Neural Network Classifiers"
] |
[
"SymDrive: Testing Drivers without Devices",
"CIL: Intermediate language and tools for analysis and transformation of C programs",
"Evolutionary biology and feminism"
] |
[
"SymDrive: Testing Drivers without Devices",
"Linux kernel vulnerabilities: State-of-the-art defenses and open problems",
"Guidelines for the diagnosis and treatment of chronic lymphocytic leukemia: a report from the International Workshop on Chronic Lymphocytic Leukemia updating the National Cancer Institute-Working Group 1996 guidelines"
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.