set
sequence |
---|
[
"Class Label Enhancement via Related Instances",
"dirt – discovery of inference rules from text .",
"Extracting Collocations from Text Corpora"
] |
[
"Class Label Enhancement via Related Instances",
"Semantic Class Learning from the Web with Hyponym Pattern Linkage Graphs",
"A systematic review of software architecture visualization techniques"
] |
[
"Class Label Enhancement via Related Instances",
"Toward Completeness in Concept Extraction and Classification",
"Simulated Data Experiments for Time Series Classification Part 1: Accuracy Comparison with Default Settings"
] |
[
"Class Label Enhancement via Related Instances",
"Entity Extraction via Ensemble Semantics",
"A survey of MAC based QoS implementations for WiMAX networks"
] |
[
"Class Label Enhancement via Related Instances",
"Unsupervised Named-Entity Extraction from the Web: An Experimental Study",
"The capacity of the Hopfield associative memory"
] |
[
"Scheduling slack time in fixed priority pre-emptive systems",
"Aperiodic task scheduling for Hard-Real-Time systems",
"Real-time scheduling theory and ADA"
] |
[
"Scheduling slack time in fixed priority pre-emptive systems",
"Fixed priority scheduling of periodic task sets with arbitrary deadlines",
"Engineering mesenchymal stem cells to improve their exosome efficacy and yield for cell-free therapy"
] |
[
"Scheduling slack time in fixed priority pre-emptive systems",
"Aperiodic task scheduling for Hard-Real-Time systems",
"Fast search in Hamming space with multi-index hashing"
] |
[
"Scheduling slack time in fixed priority pre-emptive systems",
"Aperiodic task scheduling for Hard-Real-Time systems",
"The Foresighted Driver Model"
] |
[
"Scheduling slack time in fixed priority pre-emptive systems",
"Fixed priority scheduling of periodic task sets with arbitrary deadlines",
"Exploiting Synergy Between Ontologies and Recommender Systems"
] |
[
"Super-Scalar RAM-CPU Cache Compression",
"A decomposition storage model",
"The case for the reduced instruction set computer"
] |
[
"Super-Scalar RAM-CPU Cache Compression",
"A decomposition storage model",
"Five Fingers Haptic Interface Robot HIRO: Design, Rendering, and Applications"
] |
[
"Super-Scalar RAM-CPU Cache Compression",
"A decomposition storage model",
"Planar distributed structures with negative refractive index"
] |
[
"Super-Scalar RAM-CPU Cache Compression",
"A decomposition storage model",
"Seven Principles of Goal Activation: A Systematic Approach to Distinguishing Goal Priming From Priming of Non-Goal Constructs:"
] |
[
"Super-Scalar RAM-CPU Cache Compression",
"A decomposition storage model",
"Digital Stylometry: Linking Profiles Across Social Networks"
] |
[
"Urban network analysis. A new toolbox for ArcGIS",
"depthmap : a program to perform visibility graph analysis .",
"Reformulating space syntax: the automatic definition and generation of axial lines and axial maps"
] |
[
"Urban network analysis. A new toolbox for ArcGIS",
"depthmap : a program to perform visibility graph analysis .",
"Rotterdam Prostate Cancer Risk Calculator: Development and Usability Testing of the Mobile Phone App"
] |
[
"Urban network analysis. A new toolbox for ArcGIS",
"the network analysis of urban streets : a primal approach .",
"The Foresighted Driver Model"
] |
[
"Urban network analysis. A new toolbox for ArcGIS",
"depthmap : a program to perform visibility graph analysis .",
"Does the Mirror Neuron System and Its Impairment Explain Human Imitation and Autism"
] |
[
"Urban network analysis. A new toolbox for ArcGIS",
"depthmap : a program to perform visibility graph analysis .",
"An Auditory Scene Analysis Approach to Monaural Speech Segregation"
] |
[
"A Framework for Quality Assurance of Machine Learning Applications",
"The meaning and use of the area under a receiver operating characteristic (ROC) curve.",
"Basic principles of ROC analysis"
] |
[
"A Framework for Quality Assurance of Machine Learning Applications",
"An Introduction to Support Vector Machines and Other Kernel-based Learning Methods",
"A 3-D Micromechanical Multi-Loop Magnetometer Driven Off-Resonance by an On-Chip Resonator"
] |
[
"A Framework for Quality Assurance of Machine Learning Applications",
"An Introduction to Support Vector Machines and Other Kernel-based Learning Methods",
"GPU ray tracing with rayforce"
] |
[
"A Framework for Quality Assurance of Machine Learning Applications",
"An Introduction to Support Vector Machines and Other Kernel-based Learning Methods",
"Cistus ladanifer L. Shrub is Rich in Saturated and Branched Chain Fatty Acids and their Concentration Increases in the Mediterranean Dry Season"
] |
[
"A Framework for Quality Assurance of Machine Learning Applications",
"Automated Software Test Data Generation",
"Intelligent sleep stage mining service with smartphones"
] |
[
"Cyber Threat Intelligence",
"A data mining framework for building intrusion detection models",
"The KDD process for extracting useful knowledge from volumes of data"
] |
[
"Cyber Threat Intelligence",
"The Nature of Statistical Learning Theory",
"Effect of proton pump inhibitors on magnesium balance: is there a link to cardiovascular risk?"
] |
[
"Cyber Threat Intelligence",
"The Nature of Statistical Learning Theory",
"Blood Aspiration Test for Cosmetic Fillers to Prevent Accidental Intravascular Injection in the Face."
] |
[
"Cyber Threat Intelligence",
"The Nature of Statistical Learning Theory",
"Intrinsic representation of tangent vectors and vector transports on matrix manifolds"
] |
[
"Cyber Threat Intelligence",
"COMPARATIVE STUDY OF ATTRIBUTE SELECTION USING GAIN RATIO AND CORRELATION BASED FEATURE SELECTION",
"Behavioral Analysis of Docker Swarm Under DoS/ DDoS Attack"
] |
[
"An Automated Attendance System based on NFC&X-Bee Technologies with a Remote Database",
"A Students Attendance System Using QR Code",
"Automatic attendance recording system using mobile telephone"
] |
[
"An Automated Attendance System based on NFC&X-Bee Technologies with a Remote Database",
"A Students Attendance System Using QR Code",
"The incommensurability of nursing as a practice and the customer service model: an evolutionary threat to the discipline"
] |
[
"An Automated Attendance System based on NFC&X-Bee Technologies with a Remote Database",
"A Students Attendance System Using QR Code",
"Raman microscopy of bone."
] |
[
"An Automated Attendance System based on NFC&X-Bee Technologies with a Remote Database",
"A Students Attendance System Using QR Code",
"Review of electronic transport models for thermoelectric materials"
] |
[
"An Automated Attendance System based on NFC&X-Bee Technologies with a Remote Database",
"A Students Attendance System Using QR Code",
"Variational Bayes for Hierarchical Mixture Models"
] |
[
"Selecting training data for cross-corpus speech emotion recognition: Prototypicality vs. generalization",
"The WEKA data mining software: an update",
"A New Emotion Database: Considerations, Sources and Scope"
] |
[
"Selecting training data for cross-corpus speech emotion recognition: Prototypicality vs. generalization",
"OpenEAR — Introducing the munich open-source emotion and affect recognition toolkit",
"Voice Helper: A Mobile Assistive System for Visually Impaired Persons"
] |
[
"Selecting training data for cross-corpus speech emotion recognition: Prototypicality vs. generalization",
"The WEKA data mining software: an update",
"Privacy is dead, long live privacy"
] |
[
"Selecting training data for cross-corpus speech emotion recognition: Prototypicality vs. generalization",
"A database of german emotional speech",
"DCAN: Deep Contour-Aware Networks for Accurate Gland Segmentation"
] |
[
"Selecting training data for cross-corpus speech emotion recognition: Prototypicality vs. generalization",
"Getting started with SUSAS: a speech under simulated and actual stress database.",
"Power Quality Control and Design of Power Converter for Variable-Speed Wind Energy Conversion System with Permanent-Magnet Synchronous Generator"
] |
[
"Deep Reinforcement Learning for Green Security Game with Online Information",
"Human-level control through deep reinforcement learning",
"Reinforcement Learning in Finite MDPs: PAC Analysis"
] |
[
"Deep Reinforcement Learning for Green Security Game with Online Information",
"A Comprehensive Survey of Multi-Agent Reinforcement Learning",
"Simultaneous Hallucination and Recognition of Low-Resolution Faces Based on Singular Value Decomposition"
] |
[
"Deep Reinforcement Learning for Green Security Game with Online Information",
"Reinforcement Learning: An Introduction",
"Morphologic response to changes in neuromuscular patterns experimentally induced by altered modes of respiration"
] |
[
"Deep Reinforcement Learning for Green Security Game with Online Information",
"Deep Reinforcement Learning with Double Q-learning",
"Malignant hyperthermia, a Scandinavian update."
] |
[
"Deep Reinforcement Learning for Green Security Game with Online Information",
"Reinforcement Learning: An Introduction",
"The FGF23/KLOTHO Regulatory Network and Its Roles in Human Disorders."
] |
[
"Constrained band selection for hyperspectral imagery",
"Elements of Infor-mation Theory",
"Pattern classification and scene analysis"
] |
[
"Constrained band selection for hyperspectral imagery",
"Hyperspectral image classification and dimensionality reduction: an orthogonal subspace projection approach",
"extreme cerebrospinal fluid amyloid beta levels identify family with late - onset alzheimer ' s disease presenilin 1 mutation ."
] |
[
"Constrained band selection for hyperspectral imagery",
"Elements of Infor-mation Theory",
"Process implications of social networking-based requirements negotiation tools"
] |
[
"Constrained band selection for hyperspectral imagery",
"A fast iterative algorithm for implementation of pixel purity index",
"A High-Throughput and Compact Hardware Implementation for the Reconstruction Loop in HEVC Intra Encoding"
] |
[
"Constrained band selection for hyperspectral imagery",
"Elements of Infor-mation Theory",
"Nonlinear analyses of wrinkles in a film bonded to a compliant substrate"
] |
[
"Eventually Returning to Strong Consistency",
"on scaling decentralized blockchains - ( a position paper ) .",
"Information propagation in the Bitcoin network"
] |
[
"Eventually Returning to Strong Consistency",
"Hybris: Robust Hybrid Cloud Storage",
"What’s So Different about Blockchain? — Blockchain is a Probabilistic State Machine"
] |
[
"Eventually Returning to Strong Consistency",
"Practical byzantine fault tolerance and proactive recovery",
"Speed-Security Tradeo s in Blockchain Protocols"
] |
[
"Eventually Returning to Strong Consistency",
"The Honey Badger of BFT Protocols",
"health by association ? social capital , social theory , and the political economy of public health ."
] |
[
"Eventually Returning to Strong Consistency",
"SCFS: a shared cloud-backed file system",
"A Comparison of Methods for Multiclass Support Vector Machines"
] |
[
"The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines",
"Security Issues in OAuth 2.0 SSO Implementations",
"Why phishing works"
] |
[
"The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines",
"Security Issues in OAuth 2.0 SSO Implementations",
"Falcons Concept Search: A Practical Search Engine for Web Ontologies"
] |
[
"The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines",
"The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems",
"LSTMs Exploit Linguistic Attributes of Data"
] |
[
"The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines",
"Towards a Formal Foundation of Web Security",
"DDRprog: A CLEVR Differentiable Dynamic Reasoning Programmer"
] |
[
"The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines",
"Towards a Formal Foundation of Web Security",
"Segmentation and extraction of brain injury lesions from MRI images: Matlab implementation"
] |
[
"Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation",
"Speaker verification using adapted Gaussian mixture models",
"Robust text-independent speaker identification using Gaussian mixture speaker models"
] |
[
"Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation",
"maximum likelihood from incomplete data via the em - algorithm plus discussions on the paper .",
"Terrain analysis in real-time strategy games: an integrated approach to choke point detection and region decomposition"
] |
[
"Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation",
"Speaker verification using adapted Gaussian mixture models",
"Recognition of Affect, Judgment, and Appreciation in Text"
] |
[
"Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation",
"maximum likelihood from incomplete data via the em - algorithm plus discussions on the paper .",
"A hardware Gaussian noise generator for channel code evaluation"
] |
[
"Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation",
"maximum likelihood from incomplete data via the em - algorithm plus discussions on the paper .",
"Skeletal and dentoalveolar changes after miniscrew-assisted rapid palatal expansion in young adults: A cone-beam computed tomography study"
] |
[
"Probably approximately correct learning in stochastic games with temporal logic specifications",
"Synthesis for multi-objective stochastic games: an application to autonomous urban driving",
"An Analysis of Model-Based Interval Estimation for Markov Decision Processes"
] |
[
"Probably approximately correct learning in stochastic games with temporal logic specifications",
"Probably Approximately Correct MDP Learning and Control With Temporal Logic Constraints",
"Detecting Ambiguities in Requirements Documents Using Inspections"
] |
[
"Probably approximately correct learning in stochastic games with temporal logic specifications",
"Probably Approximately Correct MDP Learning and Control With Temporal Logic Constraints",
"Skeletal and dentoalveolar changes after miniscrew-assisted rapid palatal expansion in young adults: A cone-beam computed tomography study"
] |
[
"Probably approximately correct learning in stochastic games with temporal logic specifications",
"Synthesis for multi-objective stochastic games: an application to autonomous urban driving",
"A propositional modal logic of time intervals"
] |
[
"Probably approximately correct learning in stochastic games with temporal logic specifications",
"Probably Approximately Correct MDP Learning and Control With Temporal Logic Constraints",
"Algorithmic Aspects of Inverse Problems Using Generative Models"
] |
[
"Dual Layer Secured Password Manager using Blowfish and LSB",
"A secure triple level encryption method using cryptography and steganography",
"A study of DES and Blowfish encryption algorithm"
] |
[
"Dual Layer Secured Password Manager using Blowfish and LSB",
"IMAGE ENCRYPTION AND DECRYPTION USING BLOWFISH ALGORITHM IN MATLAB",
"Cloud-based emerging services systems"
] |
[
"Dual Layer Secured Password Manager using Blowfish and LSB",
"IMAGE ENCRYPTION AND DECRYPTION USING BLOWFISH ALGORITHM IN MATLAB",
"Privacy Preserving Data Mining: Techniques, Classification and Implications - A Survey"
] |
[
"Dual Layer Secured Password Manager using Blowfish and LSB",
"A secure triple level encryption method using cryptography and steganography",
"A GPS/GIS method for travel mode detection in New York City"
] |
[
"Dual Layer Secured Password Manager using Blowfish and LSB",
"Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption",
"Fast K-means for Large Scale Clustering"
] |
[
"Optimization of sparse matrix-vector multiplication on emerging multicore platforms",
"Sparsity: Optimization Framework for Sparse Matrix Kernels",
"Using Linear Algebra for Intelligent Information Retrieval"
] |
[
"Optimization of sparse matrix-vector multiplication on emerging multicore platforms",
"Sparsity: Optimization Framework for Sparse Matrix Kernels",
"Sample size determination for bioequivalence assessment by means of confidence intervals."
] |
[
"Optimization of sparse matrix-vector multiplication on emerging multicore platforms",
"Sparsity: Optimization Framework for Sparse Matrix Kernels",
"QMaxSAT: A Partial Max-SAT Solver"
] |
[
"Optimization of sparse matrix-vector multiplication on emerging multicore platforms",
"Sparsity: Optimization Framework for Sparse Matrix Kernels",
"Cyclodextrin-based pharmaceutics: past, present and future"
] |
[
"Optimization of sparse matrix-vector multiplication on emerging multicore platforms",
"Sparsity: Optimization Framework for Sparse Matrix Kernels",
"Weakly Supervised Cyberbullying Detection Using Co-Trained Ensembles of Embedding Models"
] |
[
"Robust support vector regression networks for function approximation with outliers",
"Support Vector Regression Machines",
"Bagging Predictors"
] |
[
"Robust support vector regression networks for function approximation with outliers",
"Support Vector Regression Machines",
"Automatic keyphrase extraction: An overview of the state of the art"
] |
[
"Robust support vector regression networks for function approximation with outliers",
"The Nature of Statistical Learning Theory",
"Human intention inference and motion modeling using approximate E-M with online learning"
] |
[
"Robust support vector regression networks for function approximation with outliers",
"Support Vector Regression Machines",
"On the Use of Deep Learning for Blind Image Quality Assessment"
] |
[
"Robust support vector regression networks for function approximation with outliers",
"Support Vector Regression Machines",
"Transcend: Detecting Concept Drift in Malware Classification Models"
] |
[
"A Submicrowatt 1.1-MHz CMOS Relaxation Oscillator With Temperature Compensation",
"Analysis and Design of an Ultralow-Power CMOS Relaxation Oscillator",
"Low-Voltage Low-Power CMOS Oscillator with Low Temperature and Process Sensitivity"
] |
[
"A Submicrowatt 1.1-MHz CMOS Relaxation Oscillator With Temperature Compensation",
"A 63,000 Q-factor relaxation oscillator with switched-capacitor integrated error feedback",
"EPIC: Efficient Private Image Classification (or: Learning from the Masters)"
] |
[
"A Submicrowatt 1.1-MHz CMOS Relaxation Oscillator With Temperature Compensation",
"A 280nW, 100kHz, 1-cycle start-up time, on-chip CMOS relaxation oscillator employing a feedforward period control scheme",
"Cognitive systems based on adaptive algorithms"
] |
[
"A Submicrowatt 1.1-MHz CMOS Relaxation Oscillator With Temperature Compensation",
"a 300 nw , 15 ppm / c , 20 ppm / v cmos voltage reference circuit consisting of subthreshold mosfets .",
"Convex optimization"
] |
[
"A Submicrowatt 1.1-MHz CMOS Relaxation Oscillator With Temperature Compensation",
"A 63,000 Q-factor relaxation oscillator with switched-capacitor integrated error feedback",
"Discriminating rapeseed varieties using computer vision and machine learning"
] |
[
"A Discrete Model for Inelastic Deformation of Thin Shells",
"Discrete Differential-Geometry Operators for Triangulated 2-Manifolds",
"particle systems - a technique for modeling a class of fuzzy objects ."
] |
[
"A Discrete Model for Inelastic Deformation of Thin Shells",
"Animation of fracture by physical modeling",
"Visualizing the Loss Landscape of Neural Nets"
] |
[
"A Discrete Model for Inelastic Deformation of Thin Shells",
"Discrete Differential-Geometry Operators for Triangulated 2-Manifolds",
"Context Sensitive Spoken Language Understanding Using Role Dependent LSTM Layers"
] |
[
"A Discrete Model for Inelastic Deformation of Thin Shells",
"Animation of fracture by physical modeling",
"Youth texting: Help or hindrance to literacy?"
] |
[
"A Discrete Model for Inelastic Deformation of Thin Shells",
"Discrete Differential-Geometry Operators for Triangulated 2-Manifolds",
"stepper motor control using pulse width modulation ."
] |
[
"Overview and open issues on penetration test",
"Topological analysis of network attack vulnerability",
"Scalable, graph-based network vulnerability analysis"
] |
[
"Overview and open issues on penetration test",
"Topological analysis of network attack vulnerability",
"Weakly Supervised Cyberbullying Detection Using Co-Trained Ensembles of Embedding Models"
] |
[
"Overview and open issues on penetration test",
"Topological analysis of network attack vulnerability",
"Accurate Singular Values of Bidiagonal Matrices"
] |
[
"Overview and open issues on penetration test",
"Topological analysis of network attack vulnerability",
"Active and passive distraction using a head-mounted display helmet: effects on cold pressor pain in children."
] |
[
"Overview and open issues on penetration test",
"Topological analysis of network attack vulnerability",
"Affective commitment to the organization : The contribution of perceived organizational support"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.