set
sequence
[ "Fuzzy Hidden Markov Models for Indonesian Speech Classification", "A tutorial on hidden Markov models and selected applications in speech recognition", "Audio content analysis for online audiovisual data segmentation and classification" ]
[ "Fuzzy Hidden Markov Models for Indonesian Speech Classification", "Mixed Type Audio Classification with Support Vector Machine", "Digital Entrepreneurship of Born Digital and Grown Digital Firms: Comparing the Effectuation Process of Yihaodian and Suning" ]
[ "Fuzzy Hidden Markov Models for Indonesian Speech Classification", "Hidden Markov models for speech recognition", "Cantina: a content-based approach to detecting phishing web sites" ]
[ "Fuzzy Hidden Markov Models for Indonesian Speech Classification", "A tutorial on hidden Markov models and selected applications in speech recognition", "A 486k S/s CMOS time-domain smart temperature sensor with −0.85°C/0.78°C voltage-calibrated error" ]
[ "Fuzzy Hidden Markov Models for Indonesian Speech Classification", "A tutorial on hidden Markov models and selected applications in speech recognition", "Tracking Dengue Epidemics using Twitter Content Classification and Topic Modelling" ]
[ "Privacy-preserving social network publication against friendship attacks", "Randomizing Social Networks: a Spectrum Preserving Approach", "Introduction to Algorithms, Second Edition" ]
[ "Privacy-preserving social network publication against friendship attacks", "k-Anonymity: A Model for Protecting Privacy", "Misunderstandings between experimentalists and observationalists about causal inference" ]
[ "Privacy-preserving social network publication against friendship attacks", "A brief survey on anonymization techniques for privacy preserving publishing of social network data", "Image morphing for space-time interpolation" ]
[ "Privacy-preserving social network publication against friendship attacks", "Randomizing Social Networks: a Spectrum Preserving Approach", "When Subjects Interpret the Data: Social Media Non-use as a Case for Adapting the Delphi Method to CSCW" ]
[ "Privacy-preserving social network publication against friendship attacks", "Preserving Privacy in Social Networks Against Neighborhood Attacks", "A PAC-Bayesian Approach to Spectrally-Normalized Margin Bounds for Neural Networks" ]
[ "Metadating: Exploring the Romance and Future of Personal Data", "Fit4life: the design of a persuasive technology promoting healthy behavior and ideal weight", "Technology as Experience" ]
[ "Metadating: Exploring the Romance and Future of Personal Data", "Fit4life: the design of a persuasive technology promoting healthy behavior and ideal weight", "Forensic entomology and climatic change." ]
[ "Metadating: Exploring the Romance and Future of Personal Data", "Self-tracking cultures: towards a sociology of personal informatics", "SimFlex: Statistical Sampling of Computer System Simulation" ]
[ "Metadating: Exploring the Romance and Future of Personal Data", "Human-Data Interaction: The Human Face of the Data-Driven Society", "Crowd-squared: amplifying the predictive power of search trend data" ]
[ "Metadating: Exploring the Romance and Future of Personal Data", "Design requirements for technologies that encourage physical activity", "Cost benefits of ergonomic intervention in a hospital: a preliminary study using Oxenburgh's productivity model." ]
[ "On the impossibility of three-move blind signature schemes", "Optimal Security Proofs for PSS and Other Signature Schemes", "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes" ]
[ "On the impossibility of three-move blind signature schemes", "Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme", "Analyzing Social and Communication Network Structures of Social Bots and Humans" ]
[ "On the impossibility of three-move blind signature schemes", "Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme", "Provably Sound Browser-Based Enforcement of Web Session Integrity" ]
[ "On the impossibility of three-move blind signature schemes", "Optimal Security Proofs for PSS and Other Signature Schemes", "Dataflow design for optimal incremental SVM training" ]
[ "On the impossibility of three-move blind signature schemes", "Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme", "Deep Learning for Computer Vision: A Brief Review" ]
[ "PhysioDroid: Combining Wearable Health Sensors and Mobile Devices for a Ubiquitous, Continuous, and Personal Monitoring", "A View Of Cloud Computing", "A Real-Time QRS Detection Algorithm" ]
[ "PhysioDroid: Combining Wearable Health Sensors and Mobile Devices for a Ubiquitous, Continuous, and Personal Monitoring", "Smartphone App Use Among Medical Providers in ACGME Training Programs", "A CMOS 110-dB@40-kS/s programmable-gain chopper-stabilized third-order 2-1 cascade sigma-delta Modulator for low-power high-linearity automotive sensor ASICs" ]
[ "PhysioDroid: Combining Wearable Health Sensors and Mobile Devices for a Ubiquitous, Continuous, and Personal Monitoring", "Arrhythmia Identification with Two-Lead Electrocardiograms Using Artificial Neural Networks and Support Vector Machines for a Portable ECG Monitor System", "LITHIUM-ION BATTERY SYSTEMS:" ]
[ "PhysioDroid: Combining Wearable Health Sensors and Mobile Devices for a Ubiquitous, Continuous, and Personal Monitoring", "A View Of Cloud Computing", "A Gaussian Firefly Algorithm" ]
[ "PhysioDroid: Combining Wearable Health Sensors and Mobile Devices for a Ubiquitous, Continuous, and Personal Monitoring", "Smartphone App Use Among Medical Providers in ACGME Training Programs", "Consistent shape maps via semidefinite programming" ]
[ "Hit Song Science is Not Yet a Science", "Automatic Prediction of Hit Songs", "Semantic analysis of song lyrics" ]
[ "Hit Song Science is Not Yet a Science", "RWC Music Database: Popular, Classical and Jazz Music Databases", "fuzzy portfolio optimization under downside risk measures ." ]
[ "Hit Song Science is Not Yet a Science", "Automatic mood detection and tracking of music audio signals", "An extended VIKOR method based on prospect theory for multiple attribute decision making under interval type-2 fuzzy environment" ]
[ "Hit Song Science is Not Yet a Science", "Automatic mood detection and tracking of music audio signals", "Evidence for autosomal recessive inheritance in cerebral gigantism" ]
[ "Hit Song Science is Not Yet a Science", "Automatic mood detection and tracking of music audio signals", "unsupervised detection of regions of interest using iterative link analysis ." ]
[ "Auto pricing Strategy for Real time bidding in advertising: A dynamic programming approach", "Dynamic Programming and Optimal Control", "Design principles of massive, robust prediction systems" ]
[ "Auto pricing Strategy for Real time bidding in advertising: A dynamic programming approach", "Dynamic Programming and Optimal Control", "User interactions with everyday applications as context for just-in-time information access" ]
[ "Auto pricing Strategy for Real time bidding in advertising: A dynamic programming approach", "Real-time bidding for online advertising: measurement and analysis", "central fatigue : the serotonin hypothesis and beyond ." ]
[ "Auto pricing Strategy for Real time bidding in advertising: A dynamic programming approach", "Dynamic Programming and Optimal Control", "Content based image retrieval with LIRe" ]
[ "Auto pricing Strategy for Real time bidding in advertising: A dynamic programming approach", "Dynamic Programming and Optimal Control", "The Lower Nasal Base: An Anatomical Study" ]
[ "Simple convolutional neural network on image classification", "Gradient-Based Learning Applied to Document Recognition", "Replicated softmax: an undirected topic model" ]
[ "Simple convolutional neural network on image classification", "Deeply-Supervised Nets", "Approximating maximum independent set in bounded degree graphs" ]
[ "Simple convolutional neural network on image classification", "Gradient-Based Learning Applied to Document Recognition", "Security event analysis in XBee-based wireless mesh networks" ]
[ "Simple convolutional neural network on image classification", "Regularization of neural networks using dropconnect", "augmented reality oculus rift ." ]
[ "Simple convolutional neural network on image classification", "Multi-column Deep Neural Networks for Image Classification", "Efficient Representation of Low-Dimensional Manifolds using Deep Networks" ]
[ "TrustStore: Making Amazon S3 Trustworthy with Services Composition", "Plutus: Scalable Secure File Sharing on Untrusted Storage", "Keying Hash Functions for Message Authentication" ]
[ "TrustStore: Making Amazon S3 Trustworthy with Services Composition", "SiRiUS: Securing Remote Untrusted Storage", "7SK RNA, a non-coding RNA regulating P-TEFb, a general transcription factor." ]
[ "TrustStore: Making Amazon S3 Trustworthy with Services Composition", "Plutus: Scalable Secure File Sharing on Untrusted Storage", "Non-contact ECG monitoring for automotive application" ]
[ "TrustStore: Making Amazon S3 Trustworthy with Services Composition", "SiRiUS: Securing Remote Untrusted Storage", "Ceritinib versus chemotherapy in patients with ALK-rearranged non-small-cell lung cancer previously given chemotherapy and crizotinib (ASCEND-5): a randomised, controlled, open-label, phase 3 trial" ]
[ "TrustStore: Making Amazon S3 Trustworthy with Services Composition", "Plutus: Scalable Secure File Sharing on Untrusted Storage", "Underwater Image Enhancement by Dehazing With Minimum Information Loss and Histogram Distribution Prior" ]
[ "Privacy-Preserving Crowdsourced Spectrum Sensing", "Mechanism Design via Differential Privacy", "mobihide : a mobilea peer - to - peer system for anonymous location - based queries ." ]
[ "Privacy-Preserving Crowdsourced Spectrum Sensing", "Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing", "Tricorder: building a program analysis ecosystem" ]
[ "Privacy-Preserving Crowdsourced Spectrum Sensing", "A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing", "novel design of intelligent internet - of - vehicles management system based on cloud - computing and internet - of - things ." ]
[ "Privacy-Preserving Crowdsourced Spectrum Sensing", "A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing", "EMAT phased array probe for detecting surface cracks" ]
[ "Privacy-Preserving Crowdsourced Spectrum Sensing", "A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing", "Computing and Applying Trust in Web-based Social Networks" ]
[ "Better Word Representations with Recursive Neural Networks for Morphology", "(Online) Subgradient Methods for Structured Prediction", "Parameter Estimation For Probabilistic Finite-State Transducers" ]
[ "Better Word Representations with Recursive Neural Networks for Morphology", "Semantic Compositionality through Recursive Matrix-Vector Spaces", "Insider Threat Detection using Stream Mining and Graph Mining" ]
[ "Better Word Representations with Recursive Neural Networks for Morphology", "Improving Word Representations via Global Context and Multiple Word Prototypes", "Biomimetic flexible robot arm design and kinematic analysis of a novel flexible robot arm" ]
[ "Better Word Representations with Recursive Neural Networks for Morphology", "Contrastive Estimation: Training Log-Linear Models On Unlabeled Data", "Optimizing preventive maintenance for mechanical components using genetic algorithms" ]
[ "Better Word Representations with Recursive Neural Networks for Morphology", "Semantic Compositionality through Recursive Matrix-Vector Spaces", "PayLess: A low cost network monitoring framework for Software Defined Networks" ]
[ "A Model of Proximity Control for Information-presenting Robots", "How may I serve you?: a robot companion approaching a seated person in a helping context", "Interactive robots as social partners and peer tutors for children: a field trial" ]
[ "A Model of Proximity Control for Information-presenting Robots", "A Human Aware Mobile Robot Motion Planner", "Phenotypic plasticity and the epigenetics of human disease" ]
[ "A Model of Proximity Control for Information-presenting Robots", "The development of Honda humanoid robot", "Systematic review of the literature on the treatment of children with late language emergence" ]
[ "A Model of Proximity Control for Information-presenting Robots", "Development and evaluation of interactive humanoid robots", "Operative vectors, anatomic distortion, fluid dynamics and the inherent effects of pneumatic insufflation encountered during transanal total mesorectal excision" ]
[ "A Model of Proximity Control for Information-presenting Robots", "The development of Honda humanoid robot", "Z-Forcing: Training Stochastic Recurrent Networks" ]
[ "Introducing Wikidata to the Linked Data Web", "DBpedia -- A Crystallization Point for the Web of Data", "The Semantic Web\" in Scientific American" ]
[ "Introducing Wikidata to the Linked Data Web", "DBpedia -- A Crystallization Point for the Web of Data", "Social participation and survival at older ages: Is the effect driven by activity content or context?" ]
[ "Introducing Wikidata to the Linked Data Web", "Freebase: a collaboratively created graph database for structuring human knowledge", "LEARNING TO COLLABORATE FOR QUESTION ANSWERING AND ASKING" ]
[ "Introducing Wikidata to the Linked Data Web", "DBpedia -- A Crystallization Point for the Web of Data", "The Business Case for Corporate Sustainability: Literature Review and Research Options" ]
[ "Introducing Wikidata to the Linked Data Web", "DBpedia -- A Crystallization Point for the Web of Data", "An incremental constraint-based framework for task and motion planning" ]
[ "Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud", "Space/time trade-offs in hash coding with allowable errors", "Similarity Search in High Dimensions via Hashing" ]
[ "Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud", "Secure Conjunctive Keyword Search over Encrypted Data", "Text detection in stores using a repetition prior" ]
[ "Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud", "Secure Conjunctive Keyword Search over Encrypted Data", "A Microservice Architecture for the Intranet of Things and Energy in Smart Buildings: Research Paper" ]
[ "Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud", "Conjunctive, Subset, and Range Queries on Encrypted Data", "Early Prediction of Students' Grade Point Averages at Graduation: A Data Mining Approach." ]
[ "Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud", "Secure Ranked Keyword Search over Encrypted Cloud Data", "Workflow ControlFlow Patterns: A Revised View" ]
[ "Implementation of adaptive dorsiflexion and plantar flexion in active ankle foot orthosis", "Design, implementation and test results of a robust control method for a powered ankle foot orthosis (AFO)", "Active Orthoses for the Lower-Limbs: Challenges and State of the Art" ]
[ "Implementation of adaptive dorsiflexion and plantar flexion in active ankle foot orthosis", "Design, implementation and test results of a robust control method for a powered ankle foot orthosis (AFO)", "Applying High-Resolution Visible Imagery to Satellite Melt Pond Fraction Retrieval: A Neural Network Approach" ]
[ "Implementation of adaptive dorsiflexion and plantar flexion in active ankle foot orthosis", "Technologies for Powered Ankle-Foot Orthotic Systems: Possibilities and Challenges", "Combining Neural Network Forecasts on Wavelet-Transformed Time Series" ]
[ "Implementation of adaptive dorsiflexion and plantar flexion in active ankle foot orthosis", "Bio-inspired active soft orthotic device for ankle foot pathologies", "caring for a child with autism spectrum disorder and parents ' quality of life : application of the carerqol ." ]
[ "Implementation of adaptive dorsiflexion and plantar flexion in active ankle foot orthosis", "Bio-inspired active soft orthotic device for ankle foot pathologies", "8 amazing secrets for getting more clicks: detecting clickbaits in news streams using article informality" ]
[ "an architecture for scalable , universal speech recognition .", "the at & t - darpa communicator mixed - initiative spoken dialog system .", "An Algorithm that Learns What's in a Name" ]
[ "an architecture for scalable , universal speech recognition .", "the at & t - darpa communicator mixed - initiative spoken dialog system .", "Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends" ]
[ "an architecture for scalable , universal speech recognition .", "Normalization of Non-Standard Words", "FCNN: Fourier Convolutional Neural Networks" ]
[ "an architecture for scalable , universal speech recognition .", "the at & t - darpa communicator mixed - initiative spoken dialog system .", "analysis of cnn - based speech recognition system using raw speech as input ." ]
[ "an architecture for scalable , universal speech recognition .", "Normalization of Non-Standard Words", "A frame based spoken dialog system for home care." ]
[ "A coarse-to-fine model for airport detection from remote sensing images using target-oriented visual saliency and CRF", "Texture-Based Airport Runway Detection", "Textural Features for Image Classification" ]
[ "A coarse-to-fine model for airport detection from remote sensing images using target-oriented visual saliency and CRF", "LSD: A Fast Line Segment Detector with a False Detection Control", "Rapid impairment of skeletal muscle glucose transport/phosphorylation by free fatty acids in humans." ]
[ "A coarse-to-fine model for airport detection from remote sensing images using target-oriented visual saliency and CRF", "LSD: A Fast Line Segment Detector with a False Detection Control", "Architecture design and implementation of the increasing radius - List sphere detector algorithm" ]
[ "A coarse-to-fine model for airport detection from remote sensing images using target-oriented visual saliency and CRF", "Texture-Based Airport Runway Detection", "An Architecture for the Forensic Analysis of Windows System Artifacts" ]
[ "A coarse-to-fine model for airport detection from remote sensing images using target-oriented visual saliency and CRF", "LSD: A Fast Line Segment Detector with a False Detection Control", "An Evaluation of Different Types of Blended Learning Activities in Higher Education" ]
[ "A Bayesian Nonparametric Approach for Multi-label Classification", "Nonparametric budgeted stochastic gradient descent", "Ensemble Methods in Machine Learning" ]
[ "A Bayesian Nonparametric Approach for Multi-label Classification", "A Review on Multi-Label Learning Algorithms", "A Hybrid Global Maximum Power Point Tracking Technique With Fast Convergence Speed for Partial-Shaded PV Systems" ]
[ "A Bayesian Nonparametric Approach for Multi-label Classification", "Stochastic Variational Inference", "Predicting retweet count using visual cues" ]
[ "A Bayesian Nonparametric Approach for Multi-label Classification", "Structured Stochastic Variational Inference", "Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks" ]
[ "A Bayesian Nonparametric Approach for Multi-label Classification", "Structured Stochastic Variational Inference", "A Survey on the Cryptographic Encryption Algorithms" ]
[ "Safe use of mobile devices in the cyberspace", "fear appeals and information security behaviors : an empirical study .", "Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating" ]
[ "Safe use of mobile devices in the cyberspace", "fear appeals and information security behaviors : an empirical study .", "Ceiling continuum arm with extensible pneumatic actuators for desktop workspace" ]
[ "Safe use of mobile devices in the cyberspace", "Android rooting: methods, detection, and evasion", "Pathologic Features of Fatal Falls From Height" ]
[ "Safe use of mobile devices in the cyberspace", "Android rooting: methods, detection, and evasion", "A temporal context-aware model for user behavior modeling in social media systems" ]
[ "Safe use of mobile devices in the cyberspace", "Android Security: A Survey of Issues, Malware Penetration, and Defenses", "Pareto Efficiency in Robust Optimization" ]
[ "Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links", "A macroscope in the redwoods", "An analysis of a large scale habitat monitoring application" ]
[ "Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links", "A macroscope in the redwoods", "Pivot Based Language Modeling for Improved Neural Domain Adaptation" ]
[ "Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links", "A macroscope in the redwoods", "Severe progressive obstructive cardiomyopathy and renal tubular dysfunction in Donohue syndrome with decreased insulin receptor autophosphorylation due to a novel INSR mutation" ]
[ "Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links", "A macroscope in the redwoods", "Risk Factors for Postoperative Nausea and Vomiting" ]
[ "Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links", "A macroscope in the redwoods", "Cloudlet Softwarization for Pervasive Healthcare" ]