set
sequence
[ "Class Label Enhancement via Related Instances", "dirt – discovery of inference rules from text .", "Extracting Collocations from Text Corpora" ]
[ "Class Label Enhancement via Related Instances", "Semantic Class Learning from the Web with Hyponym Pattern Linkage Graphs", "A systematic review of software architecture visualization techniques" ]
[ "Class Label Enhancement via Related Instances", "Toward Completeness in Concept Extraction and Classification", "Simulated Data Experiments for Time Series Classification Part 1: Accuracy Comparison with Default Settings" ]
[ "Class Label Enhancement via Related Instances", "Entity Extraction via Ensemble Semantics", "A survey of MAC based QoS implementations for WiMAX networks" ]
[ "Class Label Enhancement via Related Instances", "Unsupervised Named-Entity Extraction from the Web: An Experimental Study", "The capacity of the Hopfield associative memory" ]
[ "Scheduling slack time in fixed priority pre-emptive systems", "Aperiodic task scheduling for Hard-Real-Time systems", "Real-time scheduling theory and ADA" ]
[ "Scheduling slack time in fixed priority pre-emptive systems", "Fixed priority scheduling of periodic task sets with arbitrary deadlines", "Engineering mesenchymal stem cells to improve their exosome efficacy and yield for cell-free therapy" ]
[ "Scheduling slack time in fixed priority pre-emptive systems", "Aperiodic task scheduling for Hard-Real-Time systems", "Fast search in Hamming space with multi-index hashing" ]
[ "Scheduling slack time in fixed priority pre-emptive systems", "Aperiodic task scheduling for Hard-Real-Time systems", "The Foresighted Driver Model" ]
[ "Scheduling slack time in fixed priority pre-emptive systems", "Fixed priority scheduling of periodic task sets with arbitrary deadlines", "Exploiting Synergy Between Ontologies and Recommender Systems" ]
[ "Super-Scalar RAM-CPU Cache Compression", "A decomposition storage model", "The case for the reduced instruction set computer" ]
[ "Super-Scalar RAM-CPU Cache Compression", "A decomposition storage model", "Five Fingers Haptic Interface Robot HIRO: Design, Rendering, and Applications" ]
[ "Super-Scalar RAM-CPU Cache Compression", "A decomposition storage model", "Planar distributed structures with negative refractive index" ]
[ "Super-Scalar RAM-CPU Cache Compression", "A decomposition storage model", "Seven Principles of Goal Activation: A Systematic Approach to Distinguishing Goal Priming From Priming of Non-Goal Constructs:" ]
[ "Super-Scalar RAM-CPU Cache Compression", "A decomposition storage model", "Digital Stylometry: Linking Profiles Across Social Networks" ]
[ "Urban network analysis. A new toolbox for ArcGIS", "depthmap : a program to perform visibility graph analysis .", "Reformulating space syntax: the automatic definition and generation of axial lines and axial maps" ]
[ "Urban network analysis. A new toolbox for ArcGIS", "depthmap : a program to perform visibility graph analysis .", "Rotterdam Prostate Cancer Risk Calculator: Development and Usability Testing of the Mobile Phone App" ]
[ "Urban network analysis. A new toolbox for ArcGIS", "the network analysis of urban streets : a primal approach .", "The Foresighted Driver Model" ]
[ "Urban network analysis. A new toolbox for ArcGIS", "depthmap : a program to perform visibility graph analysis .", "Does the Mirror Neuron System and Its Impairment Explain Human Imitation and Autism" ]
[ "Urban network analysis. A new toolbox for ArcGIS", "depthmap : a program to perform visibility graph analysis .", "An Auditory Scene Analysis Approach to Monaural Speech Segregation" ]
[ "A Framework for Quality Assurance of Machine Learning Applications", "The meaning and use of the area under a receiver operating characteristic (ROC) curve.", "Basic principles of ROC analysis" ]
[ "A Framework for Quality Assurance of Machine Learning Applications", "An Introduction to Support Vector Machines and Other Kernel-based Learning Methods", "A 3-D Micromechanical Multi-Loop Magnetometer Driven Off-Resonance by an On-Chip Resonator" ]
[ "A Framework for Quality Assurance of Machine Learning Applications", "An Introduction to Support Vector Machines and Other Kernel-based Learning Methods", "GPU ray tracing with rayforce" ]
[ "A Framework for Quality Assurance of Machine Learning Applications", "An Introduction to Support Vector Machines and Other Kernel-based Learning Methods", "Cistus ladanifer L. Shrub is Rich in Saturated and Branched Chain Fatty Acids and their Concentration Increases in the Mediterranean Dry Season" ]
[ "A Framework for Quality Assurance of Machine Learning Applications", "Automated Software Test Data Generation", "Intelligent sleep stage mining service with smartphones" ]
[ "Cyber Threat Intelligence", "A data mining framework for building intrusion detection models", "The KDD process for extracting useful knowledge from volumes of data" ]
[ "Cyber Threat Intelligence", "The Nature of Statistical Learning Theory", "Effect of proton pump inhibitors on magnesium balance: is there a link to cardiovascular risk?" ]
[ "Cyber Threat Intelligence", "The Nature of Statistical Learning Theory", "Blood Aspiration Test for Cosmetic Fillers to Prevent Accidental Intravascular Injection in the Face." ]
[ "Cyber Threat Intelligence", "The Nature of Statistical Learning Theory", "Intrinsic representation of tangent vectors and vector transports on matrix manifolds" ]
[ "Cyber Threat Intelligence", "COMPARATIVE STUDY OF ATTRIBUTE SELECTION USING GAIN RATIO AND CORRELATION BASED FEATURE SELECTION", "Behavioral Analysis of Docker Swarm Under DoS/ DDoS Attack" ]
[ "An Automated Attendance System based on NFC&X-Bee Technologies with a Remote Database", "A Students Attendance System Using QR Code", "Automatic attendance recording system using mobile telephone" ]
[ "An Automated Attendance System based on NFC&X-Bee Technologies with a Remote Database", "A Students Attendance System Using QR Code", "The incommensurability of nursing as a practice and the customer service model: an evolutionary threat to the discipline" ]
[ "An Automated Attendance System based on NFC&X-Bee Technologies with a Remote Database", "A Students Attendance System Using QR Code", "Raman microscopy of bone." ]
[ "An Automated Attendance System based on NFC&X-Bee Technologies with a Remote Database", "A Students Attendance System Using QR Code", "Review of electronic transport models for thermoelectric materials" ]
[ "An Automated Attendance System based on NFC&X-Bee Technologies with a Remote Database", "A Students Attendance System Using QR Code", "Variational Bayes for Hierarchical Mixture Models" ]
[ "Selecting training data for cross-corpus speech emotion recognition: Prototypicality vs. generalization", "The WEKA data mining software: an update", "A New Emotion Database: Considerations, Sources and Scope" ]
[ "Selecting training data for cross-corpus speech emotion recognition: Prototypicality vs. generalization", "OpenEAR — Introducing the munich open-source emotion and affect recognition toolkit", "Voice Helper: A Mobile Assistive System for Visually Impaired Persons" ]
[ "Selecting training data for cross-corpus speech emotion recognition: Prototypicality vs. generalization", "The WEKA data mining software: an update", "Privacy is dead, long live privacy" ]
[ "Selecting training data for cross-corpus speech emotion recognition: Prototypicality vs. generalization", "A database of german emotional speech", "DCAN: Deep Contour-Aware Networks for Accurate Gland Segmentation" ]
[ "Selecting training data for cross-corpus speech emotion recognition: Prototypicality vs. generalization", "Getting started with SUSAS: a speech under simulated and actual stress database.", "Power Quality Control and Design of Power Converter for Variable-Speed Wind Energy Conversion System with Permanent-Magnet Synchronous Generator" ]
[ "Deep Reinforcement Learning for Green Security Game with Online Information", "Human-level control through deep reinforcement learning", "Reinforcement Learning in Finite MDPs: PAC Analysis" ]
[ "Deep Reinforcement Learning for Green Security Game with Online Information", "A Comprehensive Survey of Multi-Agent Reinforcement Learning", "Simultaneous Hallucination and Recognition of Low-Resolution Faces Based on Singular Value Decomposition" ]
[ "Deep Reinforcement Learning for Green Security Game with Online Information", "Reinforcement Learning: An Introduction", "Morphologic response to changes in neuromuscular patterns experimentally induced by altered modes of respiration" ]
[ "Deep Reinforcement Learning for Green Security Game with Online Information", "Deep Reinforcement Learning with Double Q-learning", "Malignant hyperthermia, a Scandinavian update." ]
[ "Deep Reinforcement Learning for Green Security Game with Online Information", "Reinforcement Learning: An Introduction", "The FGF23/KLOTHO Regulatory Network and Its Roles in Human Disorders." ]
[ "Constrained band selection for hyperspectral imagery", "Elements of Infor-mation Theory", "Pattern classification and scene analysis" ]
[ "Constrained band selection for hyperspectral imagery", "Hyperspectral image classification and dimensionality reduction: an orthogonal subspace projection approach", "extreme cerebrospinal fluid amyloid beta levels identify family with late - onset alzheimer ' s disease presenilin 1 mutation ." ]
[ "Constrained band selection for hyperspectral imagery", "Elements of Infor-mation Theory", "Process implications of social networking-based requirements negotiation tools" ]
[ "Constrained band selection for hyperspectral imagery", "A fast iterative algorithm for implementation of pixel purity index", "A High-Throughput and Compact Hardware Implementation for the Reconstruction Loop in HEVC Intra Encoding" ]
[ "Constrained band selection for hyperspectral imagery", "Elements of Infor-mation Theory", "Nonlinear analyses of wrinkles in a film bonded to a compliant substrate" ]
[ "Eventually Returning to Strong Consistency", "on scaling decentralized blockchains - ( a position paper ) .", "Information propagation in the Bitcoin network" ]
[ "Eventually Returning to Strong Consistency", "Hybris: Robust Hybrid Cloud Storage", "What’s So Different about Blockchain? — Blockchain is a Probabilistic State Machine" ]
[ "Eventually Returning to Strong Consistency", "Practical byzantine fault tolerance and proactive recovery", "Speed-Security Tradeo s in Blockchain Protocols" ]
[ "Eventually Returning to Strong Consistency", "The Honey Badger of BFT Protocols", "health by association ? social capital , social theory , and the political economy of public health ." ]
[ "Eventually Returning to Strong Consistency", "SCFS: a shared cloud-backed file system", "A Comparison of Methods for Multiclass Support Vector Machines" ]
[ "The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines", "Security Issues in OAuth 2.0 SSO Implementations", "Why phishing works" ]
[ "The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines", "Security Issues in OAuth 2.0 SSO Implementations", "Falcons Concept Search: A Practical Search Engine for Web Ontologies" ]
[ "The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines", "The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems", "LSTMs Exploit Linguistic Attributes of Data" ]
[ "The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines", "Towards a Formal Foundation of Web Security", "DDRprog: A CLEVR Differentiable Dynamic Reasoning Programmer" ]
[ "The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines", "Towards a Formal Foundation of Web Security", "Segmentation and extraction of brain injury lesions from MRI images: Matlab implementation" ]
[ "Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation", "Speaker verification using adapted Gaussian mixture models", "Robust text-independent speaker identification using Gaussian mixture speaker models" ]
[ "Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation", "maximum likelihood from incomplete data via the em - algorithm plus discussions on the paper .", "Terrain analysis in real-time strategy games: an integrated approach to choke point detection and region decomposition" ]
[ "Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation", "Speaker verification using adapted Gaussian mixture models", "Recognition of Affect, Judgment, and Appreciation in Text" ]
[ "Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation", "maximum likelihood from incomplete data via the em - algorithm plus discussions on the paper .", "A hardware Gaussian noise generator for channel code evaluation" ]
[ "Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation", "maximum likelihood from incomplete data via the em - algorithm plus discussions on the paper .", "Skeletal and dentoalveolar changes after miniscrew-assisted rapid palatal expansion in young adults: A cone-beam computed tomography study" ]
[ "Probably approximately correct learning in stochastic games with temporal logic specifications", "Synthesis for multi-objective stochastic games: an application to autonomous urban driving", "An Analysis of Model-Based Interval Estimation for Markov Decision Processes" ]
[ "Probably approximately correct learning in stochastic games with temporal logic specifications", "Probably Approximately Correct MDP Learning and Control With Temporal Logic Constraints", "Detecting Ambiguities in Requirements Documents Using Inspections" ]
[ "Probably approximately correct learning in stochastic games with temporal logic specifications", "Probably Approximately Correct MDP Learning and Control With Temporal Logic Constraints", "Skeletal and dentoalveolar changes after miniscrew-assisted rapid palatal expansion in young adults: A cone-beam computed tomography study" ]
[ "Probably approximately correct learning in stochastic games with temporal logic specifications", "Synthesis for multi-objective stochastic games: an application to autonomous urban driving", "A propositional modal logic of time intervals" ]
[ "Probably approximately correct learning in stochastic games with temporal logic specifications", "Probably Approximately Correct MDP Learning and Control With Temporal Logic Constraints", "Algorithmic Aspects of Inverse Problems Using Generative Models" ]
[ "Dual Layer Secured Password Manager using Blowfish and LSB", "A secure triple level encryption method using cryptography and steganography", "A study of DES and Blowfish encryption algorithm" ]
[ "Dual Layer Secured Password Manager using Blowfish and LSB", "IMAGE ENCRYPTION AND DECRYPTION USING BLOWFISH ALGORITHM IN MATLAB", "Cloud-based emerging services systems" ]
[ "Dual Layer Secured Password Manager using Blowfish and LSB", "IMAGE ENCRYPTION AND DECRYPTION USING BLOWFISH ALGORITHM IN MATLAB", "Privacy Preserving Data Mining: Techniques, Classification and Implications - A Survey" ]
[ "Dual Layer Secured Password Manager using Blowfish and LSB", "A secure triple level encryption method using cryptography and steganography", "A GPS/GIS method for travel mode detection in New York City" ]
[ "Dual Layer Secured Password Manager using Blowfish and LSB", "Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption", "Fast K-means for Large Scale Clustering" ]
[ "Optimization of sparse matrix-vector multiplication on emerging multicore platforms", "Sparsity: Optimization Framework for Sparse Matrix Kernels", "Using Linear Algebra for Intelligent Information Retrieval" ]
[ "Optimization of sparse matrix-vector multiplication on emerging multicore platforms", "Sparsity: Optimization Framework for Sparse Matrix Kernels", "Sample size determination for bioequivalence assessment by means of confidence intervals." ]
[ "Optimization of sparse matrix-vector multiplication on emerging multicore platforms", "Sparsity: Optimization Framework for Sparse Matrix Kernels", "QMaxSAT: A Partial Max-SAT Solver" ]
[ "Optimization of sparse matrix-vector multiplication on emerging multicore platforms", "Sparsity: Optimization Framework for Sparse Matrix Kernels", "Cyclodextrin-based pharmaceutics: past, present and future" ]
[ "Optimization of sparse matrix-vector multiplication on emerging multicore platforms", "Sparsity: Optimization Framework for Sparse Matrix Kernels", "Weakly Supervised Cyberbullying Detection Using Co-Trained Ensembles of Embedding Models" ]
[ "Robust support vector regression networks for function approximation with outliers", "Support Vector Regression Machines", "Bagging Predictors" ]
[ "Robust support vector regression networks for function approximation with outliers", "Support Vector Regression Machines", "Automatic keyphrase extraction: An overview of the state of the art" ]
[ "Robust support vector regression networks for function approximation with outliers", "The Nature of Statistical Learning Theory", "Human intention inference and motion modeling using approximate E-M with online learning" ]
[ "Robust support vector regression networks for function approximation with outliers", "Support Vector Regression Machines", "On the Use of Deep Learning for Blind Image Quality Assessment" ]
[ "Robust support vector regression networks for function approximation with outliers", "Support Vector Regression Machines", "Transcend: Detecting Concept Drift in Malware Classification Models" ]
[ "A Submicrowatt 1.1-MHz CMOS Relaxation Oscillator With Temperature Compensation", "Analysis and Design of an Ultralow-Power CMOS Relaxation Oscillator", "Low-Voltage Low-Power CMOS Oscillator with Low Temperature and Process Sensitivity" ]
[ "A Submicrowatt 1.1-MHz CMOS Relaxation Oscillator With Temperature Compensation", "A 63,000 Q-factor relaxation oscillator with switched-capacitor integrated error feedback", "EPIC: Efficient Private Image Classification (or: Learning from the Masters)" ]
[ "A Submicrowatt 1.1-MHz CMOS Relaxation Oscillator With Temperature Compensation", "A 280nW, 100kHz, 1-cycle start-up time, on-chip CMOS relaxation oscillator employing a feedforward period control scheme", "Cognitive systems based on adaptive algorithms" ]
[ "A Submicrowatt 1.1-MHz CMOS Relaxation Oscillator With Temperature Compensation", "a 300 nw , 15 ppm / c , 20 ppm / v cmos voltage reference circuit consisting of subthreshold mosfets .", "Convex optimization" ]
[ "A Submicrowatt 1.1-MHz CMOS Relaxation Oscillator With Temperature Compensation", "A 63,000 Q-factor relaxation oscillator with switched-capacitor integrated error feedback", "Discriminating rapeseed varieties using computer vision and machine learning" ]
[ "A Discrete Model for Inelastic Deformation of Thin Shells", "Discrete Differential-Geometry Operators for Triangulated 2-Manifolds", "particle systems - a technique for modeling a class of fuzzy objects ." ]
[ "A Discrete Model for Inelastic Deformation of Thin Shells", "Animation of fracture by physical modeling", "Visualizing the Loss Landscape of Neural Nets" ]
[ "A Discrete Model for Inelastic Deformation of Thin Shells", "Discrete Differential-Geometry Operators for Triangulated 2-Manifolds", "Context Sensitive Spoken Language Understanding Using Role Dependent LSTM Layers" ]
[ "A Discrete Model for Inelastic Deformation of Thin Shells", "Animation of fracture by physical modeling", "Youth texting: Help or hindrance to literacy?" ]
[ "A Discrete Model for Inelastic Deformation of Thin Shells", "Discrete Differential-Geometry Operators for Triangulated 2-Manifolds", "stepper motor control using pulse width modulation ." ]
[ "Overview and open issues on penetration test", "Topological analysis of network attack vulnerability", "Scalable, graph-based network vulnerability analysis" ]
[ "Overview and open issues on penetration test", "Topological analysis of network attack vulnerability", "Weakly Supervised Cyberbullying Detection Using Co-Trained Ensembles of Embedding Models" ]
[ "Overview and open issues on penetration test", "Topological analysis of network attack vulnerability", "Accurate Singular Values of Bidiagonal Matrices" ]
[ "Overview and open issues on penetration test", "Topological analysis of network attack vulnerability", "Active and passive distraction using a head-mounted display helmet: effects on cold pressor pain in children." ]
[ "Overview and open issues on penetration test", "Topological analysis of network attack vulnerability", "Affective commitment to the organization : The contribution of perceived organizational support" ]