set
sequence |
---|
[
"Fuzzy Hidden Markov Models for Indonesian Speech Classification",
"A tutorial on hidden Markov models and selected applications in speech recognition",
"Audio content analysis for online audiovisual data segmentation and classification"
] |
[
"Fuzzy Hidden Markov Models for Indonesian Speech Classification",
"Mixed Type Audio Classification with Support Vector Machine",
"Digital Entrepreneurship of Born Digital and Grown Digital Firms: Comparing the Effectuation Process of Yihaodian and Suning"
] |
[
"Fuzzy Hidden Markov Models for Indonesian Speech Classification",
"Hidden Markov models for speech recognition",
"Cantina: a content-based approach to detecting phishing web sites"
] |
[
"Fuzzy Hidden Markov Models for Indonesian Speech Classification",
"A tutorial on hidden Markov models and selected applications in speech recognition",
"A 486k S/s CMOS time-domain smart temperature sensor with −0.85°C/0.78°C voltage-calibrated error"
] |
[
"Fuzzy Hidden Markov Models for Indonesian Speech Classification",
"A tutorial on hidden Markov models and selected applications in speech recognition",
"Tracking Dengue Epidemics using Twitter Content Classification and Topic Modelling"
] |
[
"Privacy-preserving social network publication against friendship attacks",
"Randomizing Social Networks: a Spectrum Preserving Approach",
"Introduction to Algorithms, Second Edition"
] |
[
"Privacy-preserving social network publication against friendship attacks",
"k-Anonymity: A Model for Protecting Privacy",
"Misunderstandings between experimentalists and observationalists about causal inference"
] |
[
"Privacy-preserving social network publication against friendship attacks",
"A brief survey on anonymization techniques for privacy preserving publishing of social network data",
"Image morphing for space-time interpolation"
] |
[
"Privacy-preserving social network publication against friendship attacks",
"Randomizing Social Networks: a Spectrum Preserving Approach",
"When Subjects Interpret the Data: Social Media Non-use as a Case for Adapting the Delphi Method to CSCW"
] |
[
"Privacy-preserving social network publication against friendship attacks",
"Preserving Privacy in Social Networks Against Neighborhood Attacks",
"A PAC-Bayesian Approach to Spectrally-Normalized Margin Bounds for Neural Networks"
] |
[
"Metadating: Exploring the Romance and Future of Personal Data",
"Fit4life: the design of a persuasive technology promoting healthy behavior and ideal weight",
"Technology as Experience"
] |
[
"Metadating: Exploring the Romance and Future of Personal Data",
"Fit4life: the design of a persuasive technology promoting healthy behavior and ideal weight",
"Forensic entomology and climatic change."
] |
[
"Metadating: Exploring the Romance and Future of Personal Data",
"Self-tracking cultures: towards a sociology of personal informatics",
"SimFlex: Statistical Sampling of Computer System Simulation"
] |
[
"Metadating: Exploring the Romance and Future of Personal Data",
"Human-Data Interaction: The Human Face of the Data-Driven Society",
"Crowd-squared: amplifying the predictive power of search trend data"
] |
[
"Metadating: Exploring the Romance and Future of Personal Data",
"Design requirements for technologies that encourage physical activity",
"Cost benefits of ergonomic intervention in a hospital: a preliminary study using Oxenburgh's productivity model."
] |
[
"On the impossibility of three-move blind signature schemes",
"Optimal Security Proofs for PSS and Other Signature Schemes",
"Public-Key Cryptosystems Based on Composite Degree Residuosity Classes"
] |
[
"On the impossibility of three-move blind signature schemes",
"Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme",
"Analyzing Social and Communication Network Structures of Social Bots and Humans"
] |
[
"On the impossibility of three-move blind signature schemes",
"Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme",
"Provably Sound Browser-Based Enforcement of Web Session Integrity"
] |
[
"On the impossibility of three-move blind signature schemes",
"Optimal Security Proofs for PSS and Other Signature Schemes",
"Dataflow design for optimal incremental SVM training"
] |
[
"On the impossibility of three-move blind signature schemes",
"Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme",
"Deep Learning for Computer Vision: A Brief Review"
] |
[
"PhysioDroid: Combining Wearable Health Sensors and Mobile Devices for a Ubiquitous, Continuous, and Personal Monitoring",
"A View Of Cloud Computing",
"A Real-Time QRS Detection Algorithm"
] |
[
"PhysioDroid: Combining Wearable Health Sensors and Mobile Devices for a Ubiquitous, Continuous, and Personal Monitoring",
"Smartphone App Use Among Medical Providers in ACGME Training Programs",
"A CMOS 110-dB@40-kS/s programmable-gain chopper-stabilized third-order 2-1 cascade sigma-delta Modulator for low-power high-linearity automotive sensor ASICs"
] |
[
"PhysioDroid: Combining Wearable Health Sensors and Mobile Devices for a Ubiquitous, Continuous, and Personal Monitoring",
"Arrhythmia Identification with Two-Lead Electrocardiograms Using Artificial Neural Networks and Support Vector Machines for a Portable ECG Monitor System",
"LITHIUM-ION BATTERY SYSTEMS:"
] |
[
"PhysioDroid: Combining Wearable Health Sensors and Mobile Devices for a Ubiquitous, Continuous, and Personal Monitoring",
"A View Of Cloud Computing",
"A Gaussian Firefly Algorithm"
] |
[
"PhysioDroid: Combining Wearable Health Sensors and Mobile Devices for a Ubiquitous, Continuous, and Personal Monitoring",
"Smartphone App Use Among Medical Providers in ACGME Training Programs",
"Consistent shape maps via semidefinite programming"
] |
[
"Hit Song Science is Not Yet a Science",
"Automatic Prediction of Hit Songs",
"Semantic analysis of song lyrics"
] |
[
"Hit Song Science is Not Yet a Science",
"RWC Music Database: Popular, Classical and Jazz Music Databases",
"fuzzy portfolio optimization under downside risk measures ."
] |
[
"Hit Song Science is Not Yet a Science",
"Automatic mood detection and tracking of music audio signals",
"An extended VIKOR method based on prospect theory for multiple attribute decision making under interval type-2 fuzzy environment"
] |
[
"Hit Song Science is Not Yet a Science",
"Automatic mood detection and tracking of music audio signals",
"Evidence for autosomal recessive inheritance in cerebral gigantism"
] |
[
"Hit Song Science is Not Yet a Science",
"Automatic mood detection and tracking of music audio signals",
"unsupervised detection of regions of interest using iterative link analysis ."
] |
[
"Auto pricing Strategy for Real time bidding in advertising: A dynamic programming approach",
"Dynamic Programming and Optimal Control",
"Design principles of massive, robust prediction systems"
] |
[
"Auto pricing Strategy for Real time bidding in advertising: A dynamic programming approach",
"Dynamic Programming and Optimal Control",
"User interactions with everyday applications as context for just-in-time information access"
] |
[
"Auto pricing Strategy for Real time bidding in advertising: A dynamic programming approach",
"Real-time bidding for online advertising: measurement and analysis",
"central fatigue : the serotonin hypothesis and beyond ."
] |
[
"Auto pricing Strategy for Real time bidding in advertising: A dynamic programming approach",
"Dynamic Programming and Optimal Control",
"Content based image retrieval with LIRe"
] |
[
"Auto pricing Strategy for Real time bidding in advertising: A dynamic programming approach",
"Dynamic Programming and Optimal Control",
"The Lower Nasal Base: An Anatomical Study"
] |
[
"Simple convolutional neural network on image classification",
"Gradient-Based Learning Applied to Document Recognition",
"Replicated softmax: an undirected topic model"
] |
[
"Simple convolutional neural network on image classification",
"Deeply-Supervised Nets",
"Approximating maximum independent set in bounded degree graphs"
] |
[
"Simple convolutional neural network on image classification",
"Gradient-Based Learning Applied to Document Recognition",
"Security event analysis in XBee-based wireless mesh networks"
] |
[
"Simple convolutional neural network on image classification",
"Regularization of neural networks using dropconnect",
"augmented reality oculus rift ."
] |
[
"Simple convolutional neural network on image classification",
"Multi-column Deep Neural Networks for Image Classification",
"Efficient Representation of Low-Dimensional Manifolds using Deep Networks"
] |
[
"TrustStore: Making Amazon S3 Trustworthy with Services Composition",
"Plutus: Scalable Secure File Sharing on Untrusted Storage",
"Keying Hash Functions for Message Authentication"
] |
[
"TrustStore: Making Amazon S3 Trustworthy with Services Composition",
"SiRiUS: Securing Remote Untrusted Storage",
"7SK RNA, a non-coding RNA regulating P-TEFb, a general transcription factor."
] |
[
"TrustStore: Making Amazon S3 Trustworthy with Services Composition",
"Plutus: Scalable Secure File Sharing on Untrusted Storage",
"Non-contact ECG monitoring for automotive application"
] |
[
"TrustStore: Making Amazon S3 Trustworthy with Services Composition",
"SiRiUS: Securing Remote Untrusted Storage",
"Ceritinib versus chemotherapy in patients with ALK-rearranged non-small-cell lung cancer previously given chemotherapy and crizotinib (ASCEND-5): a randomised, controlled, open-label, phase 3 trial"
] |
[
"TrustStore: Making Amazon S3 Trustworthy with Services Composition",
"Plutus: Scalable Secure File Sharing on Untrusted Storage",
"Underwater Image Enhancement by Dehazing With Minimum Information Loss and Histogram Distribution Prior"
] |
[
"Privacy-Preserving Crowdsourced Spectrum Sensing",
"Mechanism Design via Differential Privacy",
"mobihide : a mobilea peer - to - peer system for anonymous location - based queries ."
] |
[
"Privacy-Preserving Crowdsourced Spectrum Sensing",
"Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing",
"Tricorder: building a program analysis ecosystem"
] |
[
"Privacy-Preserving Crowdsourced Spectrum Sensing",
"A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing",
"novel design of intelligent internet - of - vehicles management system based on cloud - computing and internet - of - things ."
] |
[
"Privacy-Preserving Crowdsourced Spectrum Sensing",
"A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing",
"EMAT phased array probe for detecting surface cracks"
] |
[
"Privacy-Preserving Crowdsourced Spectrum Sensing",
"A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing",
"Computing and Applying Trust in Web-based Social Networks"
] |
[
"Better Word Representations with Recursive Neural Networks for Morphology",
"(Online) Subgradient Methods for Structured Prediction",
"Parameter Estimation For Probabilistic Finite-State Transducers"
] |
[
"Better Word Representations with Recursive Neural Networks for Morphology",
"Semantic Compositionality through Recursive Matrix-Vector Spaces",
"Insider Threat Detection using Stream Mining and Graph Mining"
] |
[
"Better Word Representations with Recursive Neural Networks for Morphology",
"Improving Word Representations via Global Context and Multiple Word Prototypes",
"Biomimetic flexible robot arm design and kinematic analysis of a novel flexible robot arm"
] |
[
"Better Word Representations with Recursive Neural Networks for Morphology",
"Contrastive Estimation: Training Log-Linear Models On Unlabeled Data",
"Optimizing preventive maintenance for mechanical components using genetic algorithms"
] |
[
"Better Word Representations with Recursive Neural Networks for Morphology",
"Semantic Compositionality through Recursive Matrix-Vector Spaces",
"PayLess: A low cost network monitoring framework for Software Defined Networks"
] |
[
"A Model of Proximity Control for Information-presenting Robots",
"How may I serve you?: a robot companion approaching a seated person in a helping context",
"Interactive robots as social partners and peer tutors for children: a field trial"
] |
[
"A Model of Proximity Control for Information-presenting Robots",
"A Human Aware Mobile Robot Motion Planner",
"Phenotypic plasticity and the epigenetics of human disease"
] |
[
"A Model of Proximity Control for Information-presenting Robots",
"The development of Honda humanoid robot",
"Systematic review of the literature on the treatment of children with late language emergence"
] |
[
"A Model of Proximity Control for Information-presenting Robots",
"Development and evaluation of interactive humanoid robots",
"Operative vectors, anatomic distortion, fluid dynamics and the inherent effects of pneumatic insufflation encountered during transanal total mesorectal excision"
] |
[
"A Model of Proximity Control for Information-presenting Robots",
"The development of Honda humanoid robot",
"Z-Forcing: Training Stochastic Recurrent Networks"
] |
[
"Introducing Wikidata to the Linked Data Web",
"DBpedia -- A Crystallization Point for the Web of Data",
"The Semantic Web\" in Scientific American"
] |
[
"Introducing Wikidata to the Linked Data Web",
"DBpedia -- A Crystallization Point for the Web of Data",
"Social participation and survival at older ages: Is the effect driven by activity content or context?"
] |
[
"Introducing Wikidata to the Linked Data Web",
"Freebase: a collaboratively created graph database for structuring human knowledge",
"LEARNING TO COLLABORATE FOR QUESTION ANSWERING AND ASKING"
] |
[
"Introducing Wikidata to the Linked Data Web",
"DBpedia -- A Crystallization Point for the Web of Data",
"The Business Case for Corporate Sustainability: Literature Review and Research Options"
] |
[
"Introducing Wikidata to the Linked Data Web",
"DBpedia -- A Crystallization Point for the Web of Data",
"An incremental constraint-based framework for task and motion planning"
] |
[
"Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud",
"Space/time trade-offs in hash coding with allowable errors",
"Similarity Search in High Dimensions via Hashing"
] |
[
"Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud",
"Secure Conjunctive Keyword Search over Encrypted Data",
"Text detection in stores using a repetition prior"
] |
[
"Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud",
"Secure Conjunctive Keyword Search over Encrypted Data",
"A Microservice Architecture for the Intranet of Things and Energy in Smart Buildings: Research Paper"
] |
[
"Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud",
"Conjunctive, Subset, and Range Queries on Encrypted Data",
"Early Prediction of Students' Grade Point Averages at Graduation: A Data Mining Approach."
] |
[
"Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud",
"Secure Ranked Keyword Search over Encrypted Cloud Data",
"Workflow ControlFlow Patterns: A Revised View"
] |
[
"Implementation of adaptive dorsiflexion and plantar flexion in active ankle foot orthosis",
"Design, implementation and test results of a robust control method for a powered ankle foot orthosis (AFO)",
"Active Orthoses for the Lower-Limbs: Challenges and State of the Art"
] |
[
"Implementation of adaptive dorsiflexion and plantar flexion in active ankle foot orthosis",
"Design, implementation and test results of a robust control method for a powered ankle foot orthosis (AFO)",
"Applying High-Resolution Visible Imagery to Satellite Melt Pond Fraction Retrieval: A Neural Network Approach"
] |
[
"Implementation of adaptive dorsiflexion and plantar flexion in active ankle foot orthosis",
"Technologies for Powered Ankle-Foot Orthotic Systems: Possibilities and Challenges",
"Combining Neural Network Forecasts on Wavelet-Transformed Time Series"
] |
[
"Implementation of adaptive dorsiflexion and plantar flexion in active ankle foot orthosis",
"Bio-inspired active soft orthotic device for ankle foot pathologies",
"caring for a child with autism spectrum disorder and parents ' quality of life : application of the carerqol ."
] |
[
"Implementation of adaptive dorsiflexion and plantar flexion in active ankle foot orthosis",
"Bio-inspired active soft orthotic device for ankle foot pathologies",
"8 amazing secrets for getting more clicks: detecting clickbaits in news streams using article informality"
] |
[
"an architecture for scalable , universal speech recognition .",
"the at & t - darpa communicator mixed - initiative spoken dialog system .",
"An Algorithm that Learns What's in a Name"
] |
[
"an architecture for scalable , universal speech recognition .",
"the at & t - darpa communicator mixed - initiative spoken dialog system .",
"Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends"
] |
[
"an architecture for scalable , universal speech recognition .",
"Normalization of Non-Standard Words",
"FCNN: Fourier Convolutional Neural Networks"
] |
[
"an architecture for scalable , universal speech recognition .",
"the at & t - darpa communicator mixed - initiative spoken dialog system .",
"analysis of cnn - based speech recognition system using raw speech as input ."
] |
[
"an architecture for scalable , universal speech recognition .",
"Normalization of Non-Standard Words",
"A frame based spoken dialog system for home care."
] |
[
"A coarse-to-fine model for airport detection from remote sensing images using target-oriented visual saliency and CRF",
"Texture-Based Airport Runway Detection",
"Textural Features for Image Classification"
] |
[
"A coarse-to-fine model for airport detection from remote sensing images using target-oriented visual saliency and CRF",
"LSD: A Fast Line Segment Detector with a False Detection Control",
"Rapid impairment of skeletal muscle glucose transport/phosphorylation by free fatty acids in humans."
] |
[
"A coarse-to-fine model for airport detection from remote sensing images using target-oriented visual saliency and CRF",
"LSD: A Fast Line Segment Detector with a False Detection Control",
"Architecture design and implementation of the increasing radius - List sphere detector algorithm"
] |
[
"A coarse-to-fine model for airport detection from remote sensing images using target-oriented visual saliency and CRF",
"Texture-Based Airport Runway Detection",
"An Architecture for the Forensic Analysis of Windows System Artifacts"
] |
[
"A coarse-to-fine model for airport detection from remote sensing images using target-oriented visual saliency and CRF",
"LSD: A Fast Line Segment Detector with a False Detection Control",
"An Evaluation of Different Types of Blended Learning Activities in Higher Education"
] |
[
"A Bayesian Nonparametric Approach for Multi-label Classification",
"Nonparametric budgeted stochastic gradient descent",
"Ensemble Methods in Machine Learning"
] |
[
"A Bayesian Nonparametric Approach for Multi-label Classification",
"A Review on Multi-Label Learning Algorithms",
"A Hybrid Global Maximum Power Point Tracking Technique With Fast Convergence Speed for Partial-Shaded PV Systems"
] |
[
"A Bayesian Nonparametric Approach for Multi-label Classification",
"Stochastic Variational Inference",
"Predicting retweet count using visual cues"
] |
[
"A Bayesian Nonparametric Approach for Multi-label Classification",
"Structured Stochastic Variational Inference",
"Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks"
] |
[
"A Bayesian Nonparametric Approach for Multi-label Classification",
"Structured Stochastic Variational Inference",
"A Survey on the Cryptographic Encryption Algorithms"
] |
[
"Safe use of mobile devices in the cyberspace",
"fear appeals and information security behaviors : an empirical study .",
"Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating"
] |
[
"Safe use of mobile devices in the cyberspace",
"fear appeals and information security behaviors : an empirical study .",
"Ceiling continuum arm with extensible pneumatic actuators for desktop workspace"
] |
[
"Safe use of mobile devices in the cyberspace",
"Android rooting: methods, detection, and evasion",
"Pathologic Features of Fatal Falls From Height"
] |
[
"Safe use of mobile devices in the cyberspace",
"Android rooting: methods, detection, and evasion",
"A temporal context-aware model for user behavior modeling in social media systems"
] |
[
"Safe use of mobile devices in the cyberspace",
"Android Security: A Survey of Issues, Malware Penetration, and Defenses",
"Pareto Efficiency in Robust Optimization"
] |
[
"Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links",
"A macroscope in the redwoods",
"An analysis of a large scale habitat monitoring application"
] |
[
"Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links",
"A macroscope in the redwoods",
"Pivot Based Language Modeling for Improved Neural Domain Adaptation"
] |
[
"Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links",
"A macroscope in the redwoods",
"Severe progressive obstructive cardiomyopathy and renal tubular dysfunction in Donohue syndrome with decreased insulin receptor autophosphorylation due to a novel INSR mutation"
] |
[
"Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links",
"A macroscope in the redwoods",
"Risk Factors for Postoperative Nausea and Vomiting"
] |
[
"Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links",
"A macroscope in the redwoods",
"Cloudlet Softwarization for Pervasive Healthcare"
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.