prompt
stringlengths 821
12.2k
| answer
stringlengths 0
339
|
|---|---|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the type of institution where the contributor of the 'Towards Automatic Content Quality Checks in Semantic Wikis - Position paper' paper is affiliated?
Context: Denny Vrandečić i10Index 42. Denny Vrandečić orcidId https://orcid.org/0000-0002-9593-2294. Denny Vrandečić name Denny Vrandečić. Denny Vrandečić alternativeName Denny Vrandečic. Denny Vrandečić alternativeName Denny Vrandecić. Denny Vrandečić alternativeName Denny Vrandecic. Denny Vrandečić alternativeName Denny Vrandečič. Denny Vrandečić alternativeName Denny Vrandečić. Denny Vrandecic link http://denny.vrandecic.de. Denny Vrandečić modified 2023-10-18. Denny Vrandečić worksCount 128. Anupriya Ankolekar and Denny Vrandecic: Kalpana - enabling client-side web personalization. (2008) authored by Denny Vrandecic. Denny Vrandečić alternativeName D. Vrandečić. Denny Vrandečić alternativeName D. Vrandecic. Denny Vrandecic link https://twitter.com/vrandezo'}. He lives with his wife and daughter in the Bay Area. He published modules for the German role-playing game The Dark Eye. In 2010, he visited the University of Southern California (ISI)
output format: answer
|
nonprofit
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In terms of i10Index, who has a higher score, Laura Waller or Mary L. Cummings?
Context: Mahmoud Elfar et al.: Platform for security-aware design of human-on-the-loop cyber-physical systems. (2017) authored by Mary L. Cummings. Mahmoud Elfar et al.: Security-Aware Synthesis of Human-UAV Protocols. (2019) authored by Mary L. Cummings. Erin Treacy Solovey et al.: CODA: Mobile interface for enabling safer navigation of unmanned aerial vehicles in real-world settings. (2021) authored by Mary L. Cummings. Andrew S. Clare et al.: Operator Object Function Guidance for a Real-Time Unmanned Vehicle Scheduling Algorithm. (2012) authored by Mary L. Cummings. Jason M. Rathje et al.: Human-Automation Collaboration in Occluded Trajectory Smoothing. (2013) authored by Mary L. Cummings. Erin Treacy Solovey et al.: Collision avoidance interface for safe piloting of unmanned vehicles using a mobile device. (2012) authored by Mary L. Cummings. Andrew S. Clare et al.: Influencing Trust for Human-Automation Collaborative Scheduling of Multiple Unmanned Vehicles. (2015) authored by Mary L. Cummings. Erin Treacy Solovey et al.: A Field Study of Multimodal Alerts for an Autonomous Threat Detection System. (2017) authored by Mary L. Cummings. Haibei Zhu et al.: Human Augmentation of UAV Cyber-Attack Detection. (2018) authored by Mary L. Cummings. Pierre C. P. Maere et al.: Assessing operator strategies for adjusting replan alerts in controlling multiple unmanned vehicles. (2010) authored by Mary L. Cummings. Luca F. Bertuccelli and Mary L. Cummings: Scenario-based robust scheduling for collaborative human-UAV visual search tasks. (2011) authored by Mary L. Cummings. Jacqueline M. Tappan et al.: Display Requirements for an Interactive Rail Scheduling Display. (2011) authored by Mary L. Cummings. Yves Boussemart et al.: Supervised vs. Unsupervised Learning for Operator State Modeling in Unmanned Vehicle Settings. (2011) authored by Mary L. Cummings'}. Her doctoral thesis was Designing Decision Support Systems for Revolutionary Command and Control Domains. U. " National Transportation Safety Board chair Jennifer Homendy surmised the Tesla advocates\' responses to be a "calculated attempt to distract from the real safety issues". Her appointment to the NHTSA was met with criticism from Tesla\'s CEO Elon Musk and personal harassment and death threats from Tesla advocates in response to her previous statements critical of Tesla. \nCummings later parted ways with NHTSA and joined George Mason University as a professor and director of Mason\'s Autonomy and Robotics Center
output format: answer
|
Laura Waller
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many publications does the contributor who published Data Flow Systems - Guest Editors' Introduction in Computer 1982 with Tilak Agerwala, have?
Context: Akshay Gaikwad et al.: True experimental reconstruction of quantum states and processes via convex optimization. (2021) authored by Arvind. . Arvind alternativeName Arvind Arvind. Michal Karczmarek et al.: A new synthesis procedure for atomic rules containing multi-cycle function blocks. (2014) authored by Arvind. Amit Devra et al.: Efficient experimental design of high-fidelity three-qubit quantum gates via genetic programming. (2018) authored by Arvind. . Arvind alternativeName . Arvind. . Arvind alternativeName Arvind. . Arvind name . Arvind. Geetu Narang et al.: A comparative study of system size dependence of the effect of non-unitary channels on different classes of quantum states. (2020) authored by Arvind. Akshay Gaikwad et al.: Efficient experimental characterization of quantum processes via compressed sensing on an NMR quantum processor. (2022) authored by Arvind. Sizhuo Zhang et al.: Weak Memory Models with Matching Axiomatic and Operational Definitions. (2017) authored by Arvind. Michal Karczmarek and Arvind: Synthesis from multi-cycle atomic actions as a solution to the timing closure problem. (2008) authored by Arvind. Arvind et al.: High-level synthesis: an essential ingredient for designing complex ASICs. (2004) authored by Arvind. Nirav Dave et al.: 802.11a transmitter: a case study in microarchitectural exploration. (2006) authored by Arvind. Hari Balakrishnan et al.: Rate Guarantees and Overload Protection in Input-Queued Switches. (2004) authored by Arvind. Arvind is Person. Amandeep Singh et al.: Experimentally identifying the entanglement class of pure tripartite states. (2018) authored by Arvind. Asif Khan et al.: Fast and cycle-accurate modeling of a multicore processor. (2012) authored by Arvind. Daniel L. Rosenband and Arvind: Modular scheduling of guarded atomic actions. (2004) authored by Arvind. Akanksha Gautam et al.: Experimental demonstration of the dynamics of quantum coherence evolving under a PT-symmetric Hamiltonian on an NMR quantum processor. (2022) authored by Arvind. Michael Pellauer et al.: Quick Performance Models Quickly: Closely-Coupled Partitioned Simulation on FPGAs. (2008) authored by Arvind He served as its president until his return to MIT in 2002. He served as chair from 1998 to 1999. , headquartered in Waltham, Massachusetts. \nArvind was the first to occupy the N. Sc. Sc. In 2000, Arvind took two years off from teaching at MIT to build Sandburst, Inc, a fabless manufacturing semiconductor company. I. T
output format: answer
|
604
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the nationality of the scholar who co-chaired the 2011 Symposium on Computational Geometry with Ferran Hurtado?
Context: Kevin Buchin et al.: Clusters in Aggregated Health Data. (2008) authored by Marc J. van Kreveld. Steven van Dijk et al.: Towards an evaluation of quality for names placement methods. (2002) authored by Marc J. van Kreveld. Emiel van Loon et al.: 10491 Results of the break-out group: Gulls Data. (2010) authored by Marc J. van Kreveld. Marc van Kreveld alternativeName van Kreveld. Marc. Marc van Kreveld name Marc van Kreveld. Marc van Kreveld alternativeName Marc Van Kreveld. Marc van Kreveld alternativeName Marc van Kreveld1. Marc van Kreveld alternativeName Marc Kreveld. Kevin Buchin et al.: Processing aggregated data: the location of clusters in health data. (2012) authored by Marc J. van Kreveld. Marc van Kreveld alternativeName Marc J. Van Kreveld. Marc van Kreveld alternativeName Marc J. van Kreveld. Marc van Kreveld alternativeName Marc J. Kreveld. Kor de Jong et al.: Scalability and composability of flow accumulation algorithms based on asynchronous many-tasks. (2022) authored by Marc J. van Kreveld. Siddharth Gupta et al.: Collision Detection for Modular Robots - it is easy to cause collisions and hard to avoid them. (2023) authored by Marc J. van Kreveld. Kor de Jong et al.: An environmental modelling framework based on asynchronous many-tasks: Scalability and usability. (2021) authored by Marc J. van Kreveld. Marc van Kreveld alternativeName MJ Marc van Kreveld. Mark H. Overmars et al.: Maintaining Range Trees in Secondary Memory. Part I: Partitions. (1990) authored by Marc J. van Kreveld. Mark de Berg et al.: 10491 Results of the break-out group: Aggregation. (2010) authored by Marc J. van Kreveld. Joep Hamersma et al.: Gourds: a sliding-block puzzle with turning. (2020) authored by Marc J. van Kreveld. Joep Hamersma et al.: Gourds: A Sliding-Block Puzzle with Turning. (2020) authored by Marc J. van Kreveld. Patrick Laube et al.: Spatial Support and Spatial Confidence for Spatial Association Rules. (2008) authored by Marc J. van Kreveld. Dan Halperin et al.: Space-Aware Reconfiguration. (2023) authored by Marc J. van Kreveld. Dan Halperin et al.: Space-Aware Reconfiguration. (2021) authored by Marc J. van Kreveld. Mees van de Kerkhof et al.: Design and Automated Generation of Japanese Picture Puzzles. (2019) authored by Marc J. van Kreveld. Lionov Wiratma et al.: An Experimental Evaluation of Grouping Definitions for Moving Entities. (2019) authored by Marc J. van Kreveld. Dan Halperin et al.: Space-Aware Reconfiguration. (2020) authored by Marc J. van Kreveld. Pankaj K. Agarwal et al.: Label placement by maximum independent set in rectangles. (1997) authored by Marc J. van Kreveld. Arthur van Goethem et al.: Grouping Time-Varying Data for Interactive Exploration. (2016) authored by Marc J. van Kreveld. Arthur van Goethem et al.: Grouping Time-varying Data for Interactive Exploration. (2016) authored by Marc J. van Kreveld. Marc van Kreveld alternativeName M. Van Kreveld. Pankaj K. Agarwal et al.: Label placement by maximum independent set in rectangles. (1998) authored by Marc J. van Kreveld. Marc van Kreveld alternativeName Mark van Kreveld. Marc van Kreveld alternativeName M.J. van Kreveld. Joachim Gudmundsson et al.: Efficient detection of motion patterns in spatio-temporal data sets. (2004) authored by Marc J. van Kreveld'}. D
output format: answer
|
Dutch
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the cited by count where the contributor of the article 'Exact performance analysis of multihop relaying systems operating in co-channel interference using the generalized transformed characteristic function' is affiliated?
Context: Norman C. Beaulieu is Creator. Norman C. Beaulieu is Person. N.C. Beaulieu name N.C. Beaulieu. N.C. Beaulieu alternativeName Norman Charles Beaulieu. N.C. Beaulieu alternativeName Norman Beaulieu. Norman C. Beaulieu primary affiliation University of Alberta, Edmonton, Canada. Norman C. Beaulieu affiliation University of Alberta, Edmonton, Canada. N.C. Beaulieu alternativeName Norman C. Beaulieu. N.C. Beaulieu alternativeName N. Beaulieu. Xuewei Zhang et al.: Energy-Efficient Caching for Scalable Videos in Heterogeneous Networks. (2018) authored by Norman C. Beaulieu. Xuewei Zhang et al.: Energy-Efficient Caching for Scalable Videos in Heterogeneous Networks. (2018) authored by Norman C. Beaulieu. Shaoyang Wang et al.: Joint Resource Management for MC-NOMA: A Deep Reinforcement Learning Approach. (2021) authored by Norman C. Beaulieu. Shaoyang Wang et al.: Joint Resource Management for MC-NOMA: A Deep Reinforcement Learning Approach. (2021) authored by Norman C. Beaulieu. N.C. Beaulieu alternativeName N. C. Beaulieu. N.C. Beaulieu 2YrMeanCitedness 2.3846154212951660156. Norman C. Beaulieu: Editorial "exceedingly well read". (2003) authored by Norman C. Beaulieu. N.C. Beaulieu orcidId https://orcid.org/0000-0001-9233-219X. Xuewei Zhang et al.: Economical Caching for Scalable Videos in Cache-Enabled Heterogeneous Networks. (2019) authored by Norman C. Beaulieu. Xuewei Zhang et al.: Economical Caching for Scalable Videos in Cache-enabled Heterogeneous Networks. (2019) authored by Norman C. Beaulieu. N.C. Beaulieu i10Index 299. N.C. Beaulieu is Author. N.C. Beaulieu citedByCount 16504. N.C. Beaulieu written paper amount in year2016: 16. N.C. Beaulieu written paper amount in year2016: 16. N.C. Beaulieu worksCount 797. Norman C. Beaulieu et al.: Editorial. (2008) authored by Norman C. Beaulieu. Norman C. Beaulieu et al.: Editorial. (2008) authored by Norman C. Beaulieu. Norman C. Beaulieu link https://en.wikipedia.org/wiki/Norman_C._Beaulieu. Ali Sharifkhani and Norman C. Beaulieu: Packet transmission scheduling algorithm for wireless sensor networks with energy limited mobile sink. (2009) authored by Norman C. Beaulieu. Norman C. Beaulieu link http://www.wikidata.org/entity/Q3343745. N.C. Beaulieu written paper amount in year2020: 8. N.C. Beaulieu written paper amount in year2020: 8. Norman C. Beaulieu and Cyril Leung: Optimal Detection of Hard-Limited Data Signals in Different Noise Environments. (1986) authored by Norman C. Beaulieu. Norman C. Beaulieu et al.: The Structure and Performance of an Optimal Continuous-Time Detector for Laplace Noise. (2013) authored by Norman C. Beaulieu. N.C. Beaulieu written paper amount in year2018: 7. N.C. Beaulieu written paper amount in year2018: 7. Ali Sharifkhani and Norman C. Beaulieu: A Mobile-Sink-Based Packet Transmission Scheduling Algorithm for Dense Wireless Sensor Networks. (2009) authored by Norman C. Beaulieu. N.C. Beaulieu written paper amount in year2013: 25. N.C. Beaulieu written paper amount in year2013: 25. Ying Hu et al.: The Energy-Aware Controller Placement Problem in Software Defined Networks. (2017) authored by Norman C. Beaulieu. Ali Sharifkhani and Norman C. Beaulieu: Packet Transmission Scheduling Algorithm for Dense Wireless Sensor Networks with Mobile Sink. (2009) authored by Norman C. Beaulieu. N.C. Beaulieu written paper amount in year2023: 0. N.C. Beaulieu written paper amount in year2023: 0. N.C. Beaulieu written paper amount in year2014: 22. N.C. Beaulieu written paper amount in year2014: 22. N.C. Beaulieu modified 2023-10-18. N.C. Beaulieu written paper amount in year2012: 27. N.C. Beaulieu written paper amount in year2012: 27. Yunfei Chen and Norman C. Beaulieu: Estimation of Ricean and Nakagami distribution parameters using noisy samples. (2004) authored by Norman C. Beaulieu. N.C. Beaulieu written paper amount in year2015: 28 Steacie Memorial Fellowship in 1999. , and Ph. "}. Sc. Sc. R
output format: answer
|
457083
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In which country did the writer of Squid: Enabling search in DHT-based systems receive a BE degree in Electronics and Telecommunications from?
Context: Zhe Wang et al.: Adaptive elasticity policies for staging-based in situ visualization. (2023) authored by Manish Parashar. Xiaolin Li and Manish Parashar: Hierarchical Partitioning Techniques for Structured Adaptive Mesh Refinement Applications. (2004) authored by Manish Parashar. Xiaolin Li et al.: Hierarchical Partitioning Techniques for Structured Adaptive Mesh Refinement (SAMR) Applications. (2002) authored by Manish Parashar. Jeremy Logan et al.: Skel: Generative Software for Producing Skeletal I/O Applications. (2011) authored by Manish Parashar. Daihou Wang et al.: HetroCV: Auto-tuning Framework and Runtime for Image Processing and Computer Vision Applications on Heterogeneous Platform. (2015) authored by Manish Parashar. Bo Zhang et al.: Optimizing Data Movement for GPU-Based In-Situ Workflow Using GPUDirect RDMA. (2023) authored by Manish Parashar. Sumir Chandra et al.: Enabling scalable parallel implementations of structured adaptive mesh refinement applications. (2007) authored by Manish Parashar. Ivan Rodero et al.: Energy-efficient application-aware online provisioning for virtualized clouds and data centers. (2010) authored by Manish Parashar. Zhe Wang et al.: An Adaptive Elasticity Policy For Staging Based In-Situ Processing. (2021) authored by Manish Parashar. Manish Parashar is Person. Jong Youl Choi et al.: TGE: Machine Learning Based Task Graph Embedding for Large-Scale Topology Mapping. (2017) authored by Manish Parashar. Hariharasudhan Viswanathan et al.: Energy-Aware Application-Centric VM Allocation for HPC Workloads. (2011) authored by Manish Parashar. Zhe Wang et al.: Facilitating Staging-based Unstructured Mesh Processing to Support Hybrid In-Situ Workflows. (2021) authored by Manish Parashar. Manish Parashar alternativeName Parashar Manish. Mingliang Wang et al.: Solving Sparse Linear Systems on NVIDIA Tesla GPUs. (2009) authored by Manish Parashar. Manish Parashar alternativeName Manish Parashar. Marc Gamell et al.: Evaluating Online Global Recovery with Fenix Using Application-Aware In-Memory Checkpointing Techniques. (2016) authored by Manish Parashar. Manish Parashar name Manish Parashar. Manish Parashar et al.: Towards Dynamic Data-Driven Optimization of Oil Well Placement. (2005) authored by Manish Parashar. Marc Gamell et al.: Scalable Failure Masking for Stencil Computations using Ghost Region Expansion and Cell to Rank Remapping. (2017) authored by Manish Parashar. Kevin Fauvel et al.: A Distributed Multi-Sensor Machine Learning Approach to Earthquake Early Warning. (2020) authored by Manish Parashar. Marc Gamell et al.: Modeling and Simulating Multiple Failure Masking Enabled by Local Recovery for Stencil-Based Applications at Extreme Scales. (2017) authored by Manish Parashar. Zeina Houmani et al.: Enabling microservices management for Deep Learning applications across the Edge-Cloud Continuum. (2021) authored by Manish Parashar. Shaohua Duan et al.: CoREC: Scalable and Resilient In-memory Data Staging for In-situ Workflows. (2020) authored by Manish Parashar. Francesc Guim et al.: Enabling GPU and Many-Core Systems in Heterogeneous HPC Environments Using Memory Considerations. (2010) authored by Manish Parashar. Zhe Wang et al.: Adaptive Placement of Data Analysis Tasks For Staging Based In-Situ Processing. (2021) authored by Manish Parashar. Bo Zhang et al.: Assembling Portable In-Situ Workflow from Heterogeneous Components using Data Reorganization. (2022) authored by Manish Parashar. Pradeep Subedi et al.: RISE: Reducing I/O Contention in Staging-based Extreme-Scale In-situ Workflows. (2021) authored by Manish Parashar. Fan Zhang et al.: In-situ Feature-Based Objects Tracking for Large-Scale Scientific Simulations. (2012) authored by Manish Parashar. Muhammad K. Ali et al.: Edge Enhanced Deep Learning System for Large-Scale Video Stream Analytics. (2018) authored by Manish Parashar. Yeliang Zhang et al.: Autonomic Proactive Runtime Partitioning Strategies for SAMR Applications. (2004) authored by Manish Parashar. Ioan Petri et al.: Modelling and Implementing Social Community Clouds. (2017) authored by Manish Parashar. Tong Jin et al.: Leveraging deep memory hierarchies for data staging in coupled data-intensive simulation workflows. (2014) authored by Manish Parashar. Lian Jiang et al.: Rule-Based Visualization in a Computational Steering Collaboratory. (2004) authored by Manish Parashar. Sumir Chandra et al.: Dynamic structured partitioning for parallel scientific applications with pointwise varying workloads. (2006) authored by Manish Parashar. Hector Klie et al.: Models, methods and middleware for grid-enabled multiphysics oil reservoir management. (2006) authored by Manish Parashar. Solomon Lasluisa et al.: In-situ feature-based objects tracking for data-intensive scientific and enterprise analytics workflows. (2015) authored by Manish Parashar. Marc Gamell et al.: Local recovery and failure masking for stencil-based applications at extreme scales. (2015) authored by Manish Parashar. Sumir Chandra and Manish Parashar: ARMaDA: An Adaptive Application-sensitive Partitioning Framework for SAMR Applications. (2002) authored by Manish Parashar. Jeremy Logan et al.: Understanding I/O Performance Using I/O Skeletal Applications. (2012) authored by Manish Parashar. Nina Amla et al.: NSF on Chien's Grand Challenge for Sustainability. (2023) authored by Manish Parashar. Ciprian Docan et al.: Experiments with Memory-to-Memory Coupling for End-to-End Fusion Simulation Workflows. (2010) authored by Manish Parashar. Zhe Wang et al.: Staging Based Task Execution for Data-driven, In-Situ Scientific Workflows. (2020) authored by Manish Parashar. Tahsin M. Kurç et al.: A simulation and data analysis system for large-scale, data-driven oil reservoir simulation studies. (2005) authored by Manish Parashar. Moustafa AbdelBaky et al.: Docker Containers across Multiple Clouds and Data Centers. (2015) authored by Manish Parashar. Shaohua Duan et al.: Scalable Data Resilience for In-memory Data Staging. (2018) authored by Manish Parashar. Xiaolin Li and Manish Parashar: Hybrid Runtime Management of Space-Time Heterogeneity for Parallel Structured Adaptive Applications. (2007) authored by Manish Parashar. Manish Parashar alternativeName M. Parashar. Marc Gamell et al.: Exploring Failure Recovery for Stencil-based Applications at Extreme Scales. (2015) authored by Manish Parashar. Manish Parashar is Creator These contributions continue to enable truly scalable SAMR applications and have led to realistic simulations of complex phenomena, such as colliding black-holes and neutron stars, forest fire propagation, and fluid flows in the human heart. Prior to joining the University of Utah, he was a faculty member at Rutgers University. '}. His research has included a theoretical framework for locality preserving distributed and dynamic data-structures for SAMR, programming abstractions that enable distributed, dynamically adaptive formulations to be directly expressed, and a family of innovative partitioning algorithms that incorporate system/applications characteristics, and mechanisms for actively managing SAMR grid-hierarchies
output format: answer
|
India
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many publications does the co-author of NDA estimation of SINR for QAM signals from University of Durham, UK have?
Context: Kasun T. Hemachandra and Norman C. Beaulieu: Relay Coordination Schemes for Two-Hop Networks: Two-Cell Case. (2015) authored by Norman C. Beaulieu. Yancun Chen et al.: Joint Source-Relay Design in a MIMO Two-Hop Power-Splitting-Based Relaying Network. (2015) authored by Norman C. Beaulieu. Golnaz Farhadi and Norman C. Beaulieu: Amplify-and-Forward Cooperative Systems with Fixed Gain Relays. (2008) authored by Norman C. Beaulieu. Yunfei Chen and Norman C. Beaulieu: New Partial Decision Combining Schemes for Spatial Diversity. (2010) authored by Norman C. Beaulieu. Kasun T. Hemachandra and Norman C. Beaulieu: Performance study of relay coordination schemes for two-hop networks: Two-cell case. (2015) authored by Norman C. Beaulieu. Yanwen Li et al.: A Simple Distributed Multihop Diversity Relaying Scheme Based on Repetition. (2011) authored by Norman C. Beaulieu. Aydin Behnad et al.: Generalized Analysis of Dual-Hop DF Opportunistic Relaying with Randomly Distributed Relays. (2013) authored by Norman C. Beaulieu. Hui Gao et al.: Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks. (2016) authored by Norman C. Beaulieu. Samy S. Soliman and Norman C. Beaulieu: Design factors for dual-hop AF systems with partial relay selection. (2014) authored by Norman C. Beaulieu. Kasun T. Hemachandra and Norman C. Beaulieu: Shared Relay Networks with Linear Receivers at the Relay: Two-Cell Case. (2014) authored by Norman C. Beaulieu. Pavel Loskot and Norman C. Beaulieu: Binary Repetition Codes and SPC Product Codes for Coded and Cooperative Diversity Systems. (2007) authored by Norman C. Beaulieu. Aydin Behnad et al.: Performance Analysis of Opportunistic Relaying in a Poisson Field of Amplify-and-Forward Relays. (2013) authored by Norman C. Beaulieu. Kasun T. Hemachandra and Norman C. Beaulieu: Outage Analysis of Opportunistic Scheduling in Dual-Hop Multiuser Relay Networks in the Presence of Interference. (2013) authored by Norman C. Beaulieu. Golnaz Farhadi and Norman C. Beaulieu: On the performance of amplify-and-forward cooperative systems with fixed gain relays. (2008) authored by Norman C. Beaulieu. Samy S. Soliman and Norman C. Beaulieu: The modified GTCF method and its application to multi-branch multihop relaying systems with full selection diversity. (2013) authored by Norman C. Beaulieu. Samy S. Soliman and Norman C. Beaulieu: Exact Analytical Solution for Dual-Hop and Opportunistic Dual-Hop AF Relaying Systems. (2012) authored by Norman C. Beaulieu. Xuewei Zhang et al.: Energy-Efficient Caching for Scalable Videos in Heterogeneous Networks. (2018) authored by Norman C. Beaulieu. Xuewei Zhang et al.: Energy-Efficient Caching for Scalable Videos in Heterogeneous Networks. (2018) authored by Norman C. Beaulieu. Jeremiah Hu and Norman C. Beaulieu: Performance Analysis of Distributed Spatial Diversity with Selection Combining. (2008) authored by Norman C. Beaulieu. Ramin Babaee and Norman C. Beaulieu: Optimal Outage Efficient Routing in Amplify-and-Forward Multihop Wireless Networks. (2010) authored by Norman C. Beaulieu. Golnaz Farhadi and Norman C. Beaulieu: A Decentralized Power Allocation Scheme for Amplify-And-Forward Multi-Hop Relaying Systems. (2010) authored by Norman C. Beaulieu. Kasun T. Hemachandra and Norman C. Beaulieu: Opportunistic scheduling in dual-hop multiuser relay networks in the presence of co-channel interference. (2012) authored by Norman C. Beaulieu. Norman C. Beaulieu and Gan Luan: Improving Simulation of Lognormal Sum Distributions with Hyperspace Replication. (2019) authored by Norman C. Beaulieu. Hongyan Cui et al.: Design and Realization of Cognitive Routing Resources Using Big Data Analysis in SDN. (2015) authored by Norman C. Beaulieu. Ali Sharifkhani and Norman C. Beaulieu: A Mobile-Sink-Based Packet Transmission Scheduling Algorithm for Dense Wireless Sensor Networks. (2009) authored by Norman C. Beaulieu. Norman C. Beaulieu: A Novel Generalized Framework for Performance Analysis of Selection Combining Diversity. (2013) authored by Norman C. Beaulieu. Young Gil Kim and Norman C. Beaulieu: Relay Advantage Criterion for Multihop Decode-and-Forward Relaying Systems. (2014) authored by Norman C. Beaulieu. Hesam Moharrer et al.: Cooperative Beamforming for Two-Hop Multi-Relay Decode-and-Forward Networks. (2015) authored by Norman C. Beaulieu. Xuewei Zhang et al.: Analysis and Optimization of Service Delay for Multi-quality Videos in Multi-tier Heterogeneous Network with Random Caching. (2020) authored by Norman C. Beaulieu. Samy S. Soliman and Norman C. Beaulieu: Dual-hop Vs multihop AF relaying systems. (2013) authored by Norman C. Beaulieu. Ali Sharifkhani and Norman C. Beaulieu: Packet Transmission Scheduling Algorithm for Dense Wireless Sensor Networks with Mobile Sink. (2009) authored by Norman C. Beaulieu. Zhigang Wen et al.: Joint Source and Relay Beamforming Design for Full-Duplex MIMO AF Relay SWIPT Systems. (2016) authored by Norman C. Beaulieu. Xuewei Zhang et al.: Economical Caching for Scalable Videos in Cache-Enabled Heterogeneous Networks. (2019) authored by Norman C. Beaulieu. Xuewei Zhang et al.: Economical Caching for Scalable Videos in Cache-enabled Heterogeneous Networks. (2019) authored by Norman C. Beaulieu. Haiyan Huang et al.: Underlay Cognitive Proactive DF Relay Networks with Multiple Primary Transmitters and Receivers. (2015) authored by Norman C. Beaulieu. Ramin Babaee and Norman C. Beaulieu: Power-Optimized Routing with Bandwidth Guarantee in Multihop Relaying Networks. (2011) authored by Norman C. Beaulieu. Norman C. Beaulieu: Switching Rates of Selection Diversity and Switch-And-Stay Diversity. (2008) authored by Norman C. Beaulieu. Golnaz Farhadi and Norman C. Beaulieu: Power-optimized amplify-and-forward multi-hop relaying systems. (2009) authored by Norman C. Beaulieu. Reza Nikjah and Norman C. Beaulieu: Exact Closed-Form Expressions for the Outage Probability and Ergodic Capacity of Decode-and-Forward Opportunistic Relaying. (2009) authored by Norman C. Beaulieu. Xuewei Zhang et al.: Analysis and Optimization of Service Delay for Multiquality Videos in Multitier Heterogeneous Network With Random Caching. (2021) authored by Norman C. Beaulieu. Navod Suraweera and Norman C. Beaulieu: Optimum Combining With Joint Relay and Antenna Selection for Multiple-Antenna Relays in the Presence of Co-Channel Interference. (2014) authored by Norman C. Beaulieu. Samy S. Soliman and Norman C. Beaulieu: The Bottleneck Effect of Rician Fading in Dissimilar Dual-Hop AF Relaying Systems. (2014) authored by Norman C. Beaulieu. Xiaodi Zhang and Norman C. Beaulieu: Quadrature sub-branch hybrid selection/maximal-ratio combining. (2004) authored by Norman C. Beaulieu. Dali Hu et al.: Outage Probability Analysis of Linear MANETs in Dual-Hop AF Systems With Noisy Relay and Interference-Limited Destination. (2016) authored by Norman C. Beaulieu. Ramin Babaee and Norman C. Beaulieu: Cross-Layer Design for Multihop Wireless Relaying Networks. (2010) authored by Norman C. Beaulieu. Reza Nikjah and Norman C. Beaulieu: Low Complexity Selection Cooperation Techniques Using Information Accumulation in Dual-Hop Relaying Networks. (2011) authored by Norman C. Beaulieu. Reza Nikjah and Norman C. Beaulieu: Low Complexity Selection Cooperation Techniques Using Information Accumulation in Dual-Hop Relaying Networks. (2011) authored by Norman C. Beaulieu. Ali Sharifkhani and Norman C. Beaulieu: Packet transmission scheduling algorithm for wireless sensor networks with energy limited mobile sink. (2009) authored by Norman C. Beaulieu. Sasan Haghani and Norman C. Beaulieu: On decorrelation in dual-branch diversity systems. (2009) authored by Norman C. Beaulieu. Mohammad Mohammadi Amiri et al.: Novel Beamforming Scheme for Multicasting in Cooperative Wireless Networks With a Multiple Antenna Relay. (2015) authored by Norman C. BeaulieuW. R. Sc. Sc. Y. D
output format: answer
|
5
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the organization type of the institution where the author of the paper 'Decentralized Autonomous Organization' is affiliated?
Context: Samer Hassan name Samer Hassan. Samer Hassan alternativeName Samer Hassan. Samer Hassan i10Index 31. Samer Hassan 0001 link https://samer.hassan.name/. Samer Hassan 0001 link https://samer.hassan.name/. Samer Hassan et al.: Deepening the Demographic Mechanisms in a Data-Driven Social Simulation of Moral Values Evolution. (2008) authored by Samer Hassan 0001. Samer Hassan modified 2023-10-18. Samer Hassan alternativeName S. Hassan'}. The main model built simulated the transition from modern values to postmodern values in Spain. g. e. British MP and Opposition Leader Ed Miliband showcased his research and its potential impact on policy. software agents with fuzzy logic, data mining, natural language processing, and microsimulation. "Wikichron", coled by Javier Arroyo, is a web tool to visualize MediaWiki community metrics, currently in production and available for third-parties. He also studied 3 years of Political Science at the distance learning university UNED
output format: answer
|
nonprofit
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the birth year of the author of the paper titled 'Between conjecture and memento: shaping a collective emotional perception of the future'?
Context: Johan Bollen et al.: A ranking and exploration service based on large-scale usage data. (2008) authored by Johan Bollen. Marko A. Rodriguez et al.: Using RDF to Model the Structure and Process of Systems (2007) authored by Johan Bollen. Johan Bollen and Luis M. Rocha: An Adaptive Systems Approach to the Implementation and Evaluation of Digital Library Recommendation Systems. (2000) authored by Johan Bollen. Michael L. Nelson et al.: User evaluation of the NASA technical report server recommendation service. (2004) authored by Johan Bollen. Johan Bollen and Francis Heylighen: A system to restructure hypertext networks into valid user models. (1998) authored by Johan Bollen. Frank McCown et al.: Evaluation of the NSDL and Google for Obtaining Pedagogical Resources. (2005) authored by Johan Bollen. Johan Bollen alternativeName Bollen Jc. Johan Bollen alternativeName Bollen Johan. Johan Bollen alternativeName Johan Bollen. Michael L. Nelson et al.: Archive Ingest and Handling Test: The Old Dominion University Approach. (2005) authored by Johan Bollen. Johan Bollen alternativeName JC Bollen. Aravind Elango et al.: Dynamic Linking of Smart Digital Objects Based on User Navigation Patterns (2004) authored by Johan Bollen. Johan Bollen: Group User Models for Personalized Hyperlink Recommendations. (2000) authored by Johan Bollen. Johan Bollen et al.: Mining Associative Relations from Website Logs and their Application to Context-Dependent Retrieval Using Spreading Activation. (1999) authored by Johan Bollen. Marko A. Rodriguez et al.: Automatic metadata generation using associative networks. (2009) authored by Johan Bollen. Johan Bollen name Johan Bollen In his free time, he DJs at the Root Cellar Lounge in Bloomington, Indiana. " He defended his Ph. g. He specializes in Deep House and Techno
output format: answer
|
1971
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many publications are associated with the author who wrote the article 'Pseudodihedral Potential of Protein Residues and the Prediction of Folding' in 1997?
Context: P. Arrigo et al.: The Identification of Locally Ordered Features an Completely unaligned Genomic Sequences by using an Unsupervised Neural Classifier. (1996) authored by Rita Casadio. Rita Casadio alternativeName Casadio Rita. Rita Casadio alternativeName Rita Casadio. Rita Casadio name Rita Casadio. Andrea Pierleoni et al.: PredGPI: a GPI-anchor predictor. (2008) authored by Rita Casadio. Rita Casadio is Person. Rita Casadio alternativeName R. Casadio. Rita Casadio is Creator. Rita Casadio primary affiliation University of Bologna, Italy. Rita Casadio member of University of Bologna. Samuele Bovo et al.: NET-GE: a web-server for NETwork-based human gene enrichment. (2016) authored by Rita Casadio. Piero Fariselli et al.: The WWWH of remote homolog detection: The state of the art. (2007) authored by Rita Casadio. Rita Casadio i10Index 184. Rita Casadio worksCount 502. Rita Casadio affiliation University of Bologna, Italy'}. \nShe earned her degree in Physics at the University of Bologna, Italy
output format: answer
|
149565
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: From which university did the contributor who authored Data service performance analysis in GPRS systems obtain a PhD degree?
Context: N. M. Mosharaf Kabir Chowdhury et al.: Virtual Network Embedding with Coordinated Node and Link Mapping. (2009) authored by Raouf Boutaba. Raouf Boutaba name Raouf Boutaba. Hongtaek Ju et al.: Editorial for special issue on "challenges and opportunities of Blockchain and Cryptocurrency". (2020) authored by Raouf Boutaba. Raouf Boutaba alternativeName Raouf Boutaba. Raouf Boutaba alternativeName Boutaba Raouf. Sonia Waharte and Raouf Boutaba: Dynamic cell-based MAC protocol for target detection applications in energy-constrained wireless networks. (2006) authored by Raouf Boutaba. Sonia Waharte and Raouf Boutaba: Dynamic Cell-based MAC Protocol for Target Detection Applications in Energy-Constrained Wireless Networks. (2004) authored by Raouf Boutaba. Ismail Djama et al.: Meet In the Middle Cross-Layer Adaptation for Audiovisual Content Delivery. (2008) authored by Raouf Boutaba. Rami Langar et al.: Towards Efficient Use of Radio Resources in Single Channel Wireless Mesh Networks. (2010) authored by Raouf Boutaba. Raouf Boutaba modified 2023-10-18. Nashid Shahriar et al.: Generalized Recovery From Node Failure in Virtual Network Embedding. (2017) authored by Raouf Boutaba. Nashid Shahriar et al.: Virtual Network Embedding With Guaranteed Connectivity Under Multiple Substrate Link Failures. (2020) authored by Raouf Boutaba. Mouna Hkimi et al.: Demands rescaling for resource and power allocation in cooperative femtocell networks. (2013) authored by Raouf Boutaba. Runlong Ye et al.: A Robust Cooperative Jamming Scheme for Secure UAV Communication via Intelligent Reflecting Surface. (2024) authored by Raouf Boutaba. Mosharaf Chowdhury et al.: ViNEYard: Virtual Network Embedding Algorithms With Coordinated Node and Link Mapping. (2012) authored by Raouf Boutaba. Chaima Zidi et al.: MC-UWMAC: A multi-channel MAC protocol for underwater sensor networks. (2017) authored by Raouf Boutaba. Nashid Shahriar et al.: ReNoVatE: Recovery from node failure in virtual network embedding. (2016) authored by Raouf Boutaba. Sahar Hoteit et al.: A bankruptcy game approach for resource allocation in cooperative femtocell networks. (2012) authored by Raouf Boutaba. Seyed Soheil Johari et al.: Anomaly Detection and Localization in NFV Systems: an Unsupervised Learning Approach. (2022) authored by Raouf Boutaba. Rami Langar et al.: Interferer Link-Aware Routing in Wireless Mesh Networks. (2010) authored by Raouf Boutaba. Nizar Bouabdallah et al.: Performance of Cognitive Radio-Based Wireless Mesh Networks. (2011) authored by Raouf Boutaba. Jin Xiao and Raouf Boutaba: Reconciling the Overlay and Underlay Tussle. (2014) authored by Raouf Boutaba. Nashid Shahriar et al.: Disruption-minimized Re-adaptation of Virtual Links in Elastic Optical Networks. (2020) authored by Raouf Boutaba. Shihabur Rahman Chowdhury et al.: Multi-Layer Virtual Network Embedding. (2018) authored by Raouf Boutaba. Nabeel Farooq Butt et al.: Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding. (2010) authored by Raouf Boutaba. Bassam Aoun and Raouf Boutaba: Max-Min Fair Capacity of Wireless Mesh Networks. (2006) authored by Raouf Boutaba. Yousri Daldoul et al.: Block Negative Acknowledgement protocol for reliable multicast in IEEE 802.11. (2016) authored by Raouf Boutaba. Rashid Mijumbi et al.: A Path Generation Approach to Embedding of Virtual Networks. (2015) authored by Raouf Boutaba. Rashid Mijumbi et al.: A Path Generation Approach to Embedding of Virtual Networks. (2015) authored by Raouf Boutaba. Yuhao Dong and Raouf Boutaba: Elasticoin: Low-Volatility Cryptocurrency with Proofs of Sequential Work. (2019) authored by Raouf Boutaba. Shihabur Rahman Chowdhury et al.: MULE: Multi-layer virtual network embedding. (2017) authored by Raouf Boutaba. Rami Langar et al.: An Operations Research Game Approach for Resource and Power Allocation in Cooperative Femtocell Networks. (2015) authored by Raouf Boutaba. Osman Salem et al.: Markov Models for Anomaly Detection in Wireless Body Area Networks for Secure Health Monitoring. (2021) authored by Raouf Boutaba. Raouf Boutaba alternativeName R. Boutaba. Sonia Waharte et al.: Interference-Aware Routing Metric for Improved Load Balancing in Wireless Mesh Networks. (2008) authored by Raouf Boutaba. Shihabur Rahman Chowdhury et al.: ReViNE: Reallocation of Virtual Network Embedding to eliminate substrate bottlenecks. (2017) authored by Raouf Boutaba. Bassam Aoun et al.: Gateway Placement Optimization in Wireless Mesh Networks With QoS Constraints. (2006) authored by Raouf Boutaba. Rami Langar et al.: Mobility-aware clustering algorithms with interference constraints in wireless mesh networks. (2009) authored by Raouf Boutaba. Mohammad Zangooei et al.: Flexible RAN Slicing in Open RAN With Constrained Multi-Agent Reinforcement Learning. (2024) authored by Raouf Boutaba. Raouf Boutaba i10Index 237. Fatma Bouabdallah et al.: Load-Balanced Routing Scheme for Energy-Efficient Wireless Sensor Networks. (2008) authored by Raouf Boutaba. Sonia Waharte et al.: Min-Max Congestion in Interference-Prone Wireless Mesh Networks. (2007) authored by Raouf Boutaba. Raouf Boutaba is Creator. Fatma Bouabdallah et al.: Collision Avoidance Energy Efficient Multi-Channel MAC Protocol for UnderWater Acoustic Sensor Networks. (2019) authored by Raouf Boutaba. Raouf Boutaba is Person. Nazih Salhab et al.: Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond. (2020) authored by Raouf Boutaba. Mirmojtaba Gharibi et al.: 3D traffic flow model for UAVs. (2019) authored by Raouf Boutaba. Md Mashrur Alam Khan et al.: SiMPLE: Survivability in multi-path link embedding. (2015) authored by Raouf Boutaba. Nashid Shahriar et al.: Joint backup capacity allocation and embedding for survivable virtual networks. (2017) authored by Raouf Boutaba. Jiaheng Xiong et al.: Adaptive Entanglement Routing for Quantum Networks with Cutoff. (2023) authored by Raouf Boutaba\nBoutaba was born in Tébessa, Algeria. On July 1, 2020, he became the eighth Director of the David R. He was awarded the 2014 McNaughton Gold Medal, IEEE Canada's highest honour. \nBoutaba received several other national and international awards, including the following:"}. Boutaba’s work on automated network management has been applied in various areas, including configuration, fault, and security management, and to various network technologies, including optical, wireless, and IP networks. {'author_wikipedia_text': "Raouf Boutaba (born December 31, 1966) is an Algerian Canadian computer scientist
output format: answer
|
Pierre and Marie Curie University
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many publications does the co-author at KAUST and creator of Point Cloud Instance Segmentation Using Probabilistic Embeddings have?
Context: Ildar Gilmutdinov et al.: Assessment of Material Layers in Building Walls Using GeoRadar. (2022) authored by Peter Wonka. Caigui Jiang et al.: Computational Design of Lightweight Trusses. (2021) authored by Peter Wonka. Caigui Jiang et al.: Computational Design of Lightweight Trusses. (2019) authored by Peter Wonka. Peter Wonka alternativeName Wonka Peter. Stefan Lienhard et al.: Design Transformations for Rule-based Procedural Modeling. (2017) authored by Peter Wonka. Peter Wonka alternativeName Peter Wonka. Shariq Farooq Bhat et al.: LooseControl: Lifting ControlNet for Generalized Depth Conditioning. (2023) authored by Peter Wonka. Peter Wonka name Peter Wonka. Przemyslaw Musialski et al.: A Survey of Urban Reconstruction. (2013) authored by Peter Wonka. Przemyslaw Musialski et al.: A Survey of Urban Reconstruction. (2012) authored by Peter Wonka. Ildar Gilmutdinov et al.: Assesment of material layers in building walls using GeoRadar. (2022) authored by Peter Wonka. Jing Ren et al.: Intuitive and Efficient Roof Modeling for Reconstruction and Synthesis. (2021) authored by Peter Wonka. Jing Ren et al.: Intuitive and efficient roof modeling for reconstruction and synthesis. (2021) authored by Peter Wonka. Jie Wang et al.: A Safe Screening Rule for Sparse Logistic Regression. (2013) authored by Peter Wonka. Jie Wang et al.: A Safe Screening Rule for Sparse Logistic Regression. (2014) authored by Peter Wonka. Chi-Han Peng et al.: Computational network design from functional specifications. (2016) authored by Peter Wonka. Chi-Han Peng et al.: Computational Network Design from Functional Specifications. (2015) authored by Peter Wonka. Peter Wonka alternativeName P. Wonka. Wamiq Reyaz Para et al.: COFS: Controllable Furniture layout Synthesis. (2022) authored by Peter Wonka. Michael Schwarz and Peter Wonka: Procedural Design of Exterior Lighting for Buildings with Complex Constraints. (2014) authored by Peter Wonka. Wamiq Reyaz Para et al.: COFS: COntrollable Furniture layout Synthesis. (2023) authored by Peter Wonka. Peter Wonka alternativeName P. R. Wonka. Anna Frühstück et al.: TileGAN: synthesis of large-scale non-homogeneous textures. (2019) authored by Peter Wonka. Anna Frühstück et al.: TileGAN: Synthesis of Large-Scale Non-Homogeneous Textures. (2019) authored by Peter Wonka. Yipeng Qin et al.: Do GAN Loss Functions Really Matter? (2018) authored by Peter Wonka. Markus Lipp et al.: Interactive Modeling of City Layouts using Layers of Procedural Content. (2011) authored by Peter Wonka. Chi-Han Peng et al.: Checkerboard patterns with black rectangles. (2019) authored by Peter Wonka. Ming Cui et al.: Color-to-gray conversion using ISOMAP. (2010) authored by Peter Wonka. Przemyslaw Musialski et al.: Symmetry-Based Façade Repair. (2009) authored by Peter Wonka. Michael Birsak et al.: Large-Scale Auto-Regressive Modeling Of Street Networks. (2022) authored by Peter Wonka. Markus Lipp et al.: Parallel Generation of L-Systems. (2009) authored by Peter Wonka. Yiqun Wang et al.: Isotropic Surface Remeshing without Large and Small Angles. (2022) authored by Peter Wonka. Markus Lipp et al.: Interactive visual editing of grammars for procedural architecture. (2008) authored by Peter Wonka. Wenming Wu et al.: MIQP-based Layout Design for Building Interiors. (2018) authored by Peter Wonka. Pascal Müller et al.: Image-based procedural modeling of facades. (2007) authored by Peter Wonka. Simon Haegler et al.: Grammar-based Encoding of Facades. (2010) authored by Peter Wonka'}. He was previously employed at the Arizona State University as an associate professor and is a recipient of the National Science Foundation Career Award
output format: answer
|
327
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where did the author who published A Dynamic Separator Algorithm receive his Ph.D. from?
Context: Dage Liu et al.: DNA Nanotubes: Construction and Characterization of Filaments Composed of TX-tile Lattice. (2002) authored by John H. Reif. Ashish Gehani and John H. Reif: Super-Resolution Video Analysis for Forensic Investigations. (2007) authored by John H. Reif. Akitoshi Yoshida et al.: Design and applications of a high-resolution insert head-mounted-display. (1995) authored by John H. Reif. Abeer Eshra et al.: DNA Hairpin Gate: A Renewable DNA Seesaw Motif Using Hairpins. (2017) authored by John H. Reif. John H. Reif and Sandeep Sen: Randomized Algorithms for Binary Search and Load Balancing on Fixed Connection Networks with Geometric Applications. (1994) authored by John H. Reif. John H. Reif: On the Impossibility of Interaction-Free Quantum Sensing for Small I/O Bandwidth. (2000) authored by John H. Reif. Urmi Majumder et al.: Activatable Tiles: Compact, Robust Programmable Assembly and Other Applications. (2007) authored by John H. Reif. Sandeep K. S. Gupta et al.: Generating Efficient Programs for Two-Level Memories from Tensor-products. (1995) authored by John H. Reif. John H. Reif name John H. Reif. John H. Reif alternativeName John Reif. Sudheer Sahu et al.: A Self-assembly Model of Time-Dependent Glue Strength. (2009) authored by John H. Reif. John H. Reif and Sandeep Sen: Randomized Algorithms for Binary Search and Load Balancing with Geometric Applications. (1990) authored by John H. Reif. Sudheer Sahu et al.: A Self-assembly Model of Time-Dependent Glue Strength. (2005) authored by John H. Reif. Urmi Majumder et al.: Activatable tiles for compact robust programmable molecular assembly and other applications. (2016) authored by John H. Reif. John H. Reif alternativeName John H. Reif. Shalin Shah and John H. Reif: Temporal DNA Barcodes: A Time-Based Approach for Single-Molecule Imaging. (2018) authored by John H. Reif. John H. Reif and Paul G. Spirakis: Probabilistic Bidding Gives Optimal Distributed Resource Allocation. (1984) authored by John H. Reif. Sotiris E. Nikoletseas et al.: Stochastic Graphs Have Short Memory: Fully Dynamic Connectivity in Poly-Log Expected Time. (1995) authored by John H. Reif. John H. Reif and Paul G. Spirakis: Real Time Resource Allocation in Distributed Systems. (1982) authored by John H. Reif. John H. Reif et al.: Design, Simulation, and Experimental Demonstration of Self-assembled DNA Nanostructures and Motors. (2004) authored by John H. Reif. Harish Chandran et al.: Tile Complexity of Linear Assemblies. (2012) authored by John H. Reif. Shalin Shah et al.: ExTemp: A computational and image-processing suite for extracting temporal barcodes. (2020) authored by John H. Reif. Urmi Majumder and John H. Reif: A Framework for Designing Novel Magnetic Tiles Capable of Complex Self-assemblies. (2008) authored by John H. Reif. John H. Reif and Paul G. Spirakis: Unbounded Speed Variability in Distributed Communication Systems. (1982) authored by John H. Reif. John H. Reif alternativeName J. Reif. Lars S. Nyland et al.: A Refinement Methodology for Developing Data-Parallel Applications. (1996) authored by John H. Reif. John H. Reif and Zheng Sun: On boundaries of highly visible spaces and applications. (2006) authored by John H. Reif. John H. Reif and Sudheer Sahu: Autonomous programmable DNA nanorobotic devices using DNAzymes. (2009) authored by John H. Reif. John H. Reif and Zheng Sun: On Boundaries of Highly Visible Spaces and Applications. (2003) authored by John H. Reif. John H. Reif alternativeName J. H. ReifS. S. A selection:'}. Reif and like him he has dual citizenship in USA and Austria. , which specializes in defense applications of DNA biotechnology. D
output format: answer
|
Harvard University
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the type of affiliation of the writer of 'Graphical Overlays: Using Layered Elements to Aid Chart Reading'?
Context: Kenrick Kin et al.: Proton: multitouch gestures as regular expressions. (2012) authored by Maneesh Agrawala. Maneesh Agrawala worksCount 274. Shruti Agarwal et al.: Detecting Deep-Fake Videos from Phoneme-Viseme Mismatches. (2020) authored by Maneesh Agrawala. Maneesh Agrawala alternativeName Agrawala Maneesh. Ayush Tewari et al.: Disentangled3D: Learning a 3D Generative Model with Disentangled Geometry and Appearance from Monocular Images. (2022) authored by Maneesh Agrawala. Ayush Tewari et al.: Disentangled3D: Learning a 3D Generative Model with Disentangled Geometry and Appearance from Monocular Images. (2022) authored by Maneesh Agrawala. Jane L. E et al.: Optimizing Portrait Lighting at Capture-Time Using a 360 Camera as a Light Probe. (2019) authored by Maneesh Agrawala. Maneesh Agrawala alternativeName Maneesh Agrawala. Maneesh Agrawala name Maneesh Agrawala. Maneesh Agrawala alternativeName M. Agrawala. Maneesh Agrawala link https://twitter.com/magrawala. Maneesh Agrawala i10Index 162. Duygu Ceylan et al.: Designing and fabricating mechanical automata from mocap sequences. (2013) authored by Maneesh Agrawala. Maneesh Agrawala 2YrMeanCitedness 5.7931032180786132812. Pravin Bhat et al.: Piecewise Image Registration in the Presence of Multiple Large Motions. (2006) authored by Maneesh Agrawala. Maneesh Agrawala modified 2023-10-18. Maneesh Agrawala is Person. Maneesh Agrawala h-index 59. Maneesh Agrawala citedByCount 11427. Evan Strasnick et al.: Coupling Simulation and Hardware for Interactive Circuit Debugging. (2021) authored by Maneesh Agrawala. Navin Chaddha et al.: Model-based compression for synthetic animations. (1996) authored by Maneesh Agrawala. Ohad Fried and Maneesh Agrawala: Puppet Dubbing. (2019) authored by Maneesh Agrawala. Ohad Fried and Maneesh Agrawala: Puppet Dubbing. (2019) authored by Maneesh Agrawala. Maneesh Agrawala link https://mathgenealogy.org/id.php?id=70984. Aner Ben-Artzi et al.: Efficient Shadows for Sampled Environment Maps. (2006) authored by Maneesh Agrawala. Evan Strasnick et al.: Pinpoint: A PCB Debugging Pipeline Using Interruptible Routing and Instrumentation. (2019) authored by Maneesh Agrawala. Maneesh Agrawala link https://dl.acm.org/profile/81100346089 He was a finalist in the 1990 Westinghouse Science Talent Search. \nHe received a B. He received a film credit for Pixar\'s A Bug\'s Life. S
output format: answer
|
company
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many scientific articles are linked to the affiliation in which the author of the publication 'The mysteries for continual growth of grey system theory' is associated with?
Context: Hongyang Li et al.: Low-Velocity Impact Localization on Composites Under Sensor Damage by Interpolation Reference Database and Fuzzy Evidence Theory. (2018) authored by Jeffrey Forrest. Zaiwu Gong et al.: The optimal priority models of the intuitionistic fuzzy preference relation and their application in selecting industries with higher meteorological sensitivity. (2011) authored by Jeffrey Forrest. Yong Liu et al.: Differentiated products pricing with consumer network acceptance in a dual-channel supply chain. (2020) authored by Jeffrey Forrest. Zaiwu Gong et al.: The optimal group consensus models for 2-tuple linguistic preference relations. (2013) authored by Jeffrey Forrest. Jinhong Yi et al.: A three-way decision approach with S-shaped utility function under Pythagorean fuzzy information. (2022) authored by Jeffrey Forrest. Jeffrey Yi‐Lin Forrest name Jeffrey Yi‐Lin Forrest. Jeffrey Yi‐Lin Forrest alternativeName Jeffrey Forrest. Qin Jiang et al.: A three-way conflict analysis model with decision makers' varying preferences. (2024) authored by Jeffrey Forrest. Jeffrey Yi‐Lin Forrest alternativeName Jeffrey Yi‐Lin Forrest. Jeffrey Forrest is Person From 1973 to 1985, he was an associate professor of electrical engineering at MIT, and in 1985, he was promoted to professor of electrical engineering. He became a Julius A. M. "}. D
output format: answer
|
2562
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the i10Index of the author of Modeling Business Processes with BPEL4WS in Modellierung in 2004 with Dieter Roller from University of Stuttgart, Institute of Architecture of Application Systems (IAAS)?
Context: Marie Salm et al.: Optimizing the Prioritization of Compiled Quantum Circuits by Machine Learning Approaches. (2022) authored by Frank Leymann. Marie Salm et al.: Prioritization of Compiled Quantum Circuits for Different Quantum Computers. (2022) authored by Frank Leymann. Alexander Mandl et al.: Linear Structure of Training Samples in Quantum Neural Network Applications. (2023) authored by Frank Leymann. Ulrich Flegel et al.: Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection. (2010) authored by Frank Leymann. Manuela Weigold et al.: Encoding patterns for quantum algorithms. (2021) authored by Frank Leymann. Manuela Weigold et al.: Expanding Data Encoding Patterns For Quantum Algorithms. (2021) authored by Frank Leymann. Marie Salm et al.: Automating the Comparison of Quantum Compilers for Quantum Circuits. (2021) authored by Frank Leymann. David Schumm et al.: A pattern language for costumes in films. (2012) authored by Frank Leymann. Michael Falkenthal et al.: Pattern research in the digital humanities: how data mining techniques support the identification of costume patterns. (2017) authored by Frank Leymann. Marc Hüffmeyer et al.: Authorization-aware HATEOAS. (2018) authored by Frank Leymann. Johannes Wettinger et al.: Collaborative gathering and continuous delivery of DevOps solutions through repositories. (2017) authored by Frank Leymann. Frank Leymann orcidId https://orcid.org/0000-0002-9123-259X. Michael Wurster et al.: TOSCA Lightning: An Integrated Toolchain for Transforming TOSCA Light into Production-Ready Deployment Technologies. (2020) authored by Frank Leymann. Karoline Saatkamp et al.: Topology Splitting and Matching for Multi-Cloud Deployments. (2017) authored by Frank Leymann. Frank Leymann alternativeName Leymann Frank. Ghareeb Falazi et al.: Transactional Properties of Permissioned Blockchains. (2019) authored by Frank Leymann. Ghareeb Falazi et al.: Transactional properties of permissioned blockchains. (2020) authored by Frank Leymann. Marina Bitsaki et al.: ChronicOnline: Implementing a mHealth solution for monitoring and early alerting in chronic obstructive pulmonary disease. (2017) authored by Frank Leymann. Frank Leymann name Frank Leymann. Benjamin Weder et al.: QProv: A provenance system for quantum computing. (2021) authored by Frank Leymann. Frank Leymann alternativeName Leymann. Johanna Barzen and Frank Leymann: Kostümsprache als Mustersprache: Vom analytischen Wert Formaler Sprachen und Muster in den Filmwissenschaften. (2014) authored by Frank Leymann. Vladimir Yussupov et al.: Serverless or Serverful? A Pattern-Based Approach for Exploring Hosting Alternatives. (2022) authored by Frank Leymann. Tobias Haberle et al.: The Connected Car in the Cloud: A Platform for Prototyping Telematics Services. (2015) authored by Frank Leymann. Michael Falkenthal et al.: On the algebraic properties of concrete solution aggregation. (2019) authored by Frank Leymann. Michael Wurster et al.: Cloud-native Deploy-ability: An Analysis of Required Features of Deployment Technologies to Deploy Arbitrary Cloud-native Applications. (2020) authored by Frank Leymann. Frank Leymann alternativeName Frank Leymann. Steve Strauch et al.: Cloud Data Patterns for Confidentiality. (2012) authored by Frank Leymann. Frank Leymann alternativeName F. Leymann. Benjamin Weder et al.: Provenance-Preserving Analysis and Rewrite of Quantum Workflows for Hybrid Quantum Algorithms. (2023) authored by Frank Leymann. Marie Salm et al.: How to Select Quantum Compilers and Quantum Computers Before Compilation. (2023) authored by Frank Leymann. Karolina Vukojevic-Haupt et al.: A Middleware-Centric Optimization Approach for the Automated Provisioning of Services in the Cloud. (2015) authored by Frank Leymann. Santiago Gomez Saez et al.: Evaluating Caching Strategies for Cloud Data Access Using an Enterprise Service Bus. (2014) authored by Frank Leymann. Manuela Weigold et al.: Patterns for Hybrid Quantum Algorithms. (2021) authored by Frank Leymann. Frank Steimle et al.: Extended provisioning, security and analysis techniques for the ECHO health data management system. (2017) authored by Frank Leymann. Pascal Hirmer et al.: Automatic Topology Completion of TOSCA-based Cloud Applications. (2014) authored by Frank Leymann. Lukasz Juszczyk et al.: CAGE: Customizable Large-Scale SOA Testbeds in the Cloud. (2010) authored by Frank Leymann. Frank Leymann citedByCount 14917. Karolina Vukojevic-Haupt et al.: Replicability of Dynamically Provisioned Scientific Experiments. (2014) authored by Frank Leymann. Felix Gemeinhardt et al.: Quantum Combinatorial Optimization in the NISQ Era: A Systematic Mapping Study. (2024) authored by Frank Leymann. Steve Strauch et al.: A Taxonomy for Cloud Data Hosting Solutions. (2011) authored by Frank Leymann. Johannes Wettinger et al.: Deployment Aggregates - A Generic Deployment Automation Approach for Applications Operated in the Cloud. (2014) authored by Frank Leymann. Tobias Binz et al.: Improve Resource-sharing through Functionality-preserving Merge of Cloud Application Topologies. (2013) authored by Frank Leymann. Srinath Perera et al.: A use case centric survey of Blockchain: status quo and future directions. (2019) authored by Frank Leymann. Johannes Wettinger et al.: Middleware-Oriented Deployment Automation for Cloud Applications. (2018) authored by Frank Leymann. Johannes Wettinger et al.: Compensation-Based vs. Convergent Deployment Automation for Services Operated in the Cloud. (2014) authored by Frank Leymann. Vladimir Yussupov et al.: On the Serverless Nature of Blockchains and Smart Contracts. (2020) authored by Frank Leymann. Frank Leymann et al.: Native Cloud Applications: Why Monolithic Virtualization Is Not Their Foundation. (2016) authored by Frank Leymann. Ghareeb Falazi et al.: Smart Contract Invocation Protocol (SCIP): A Protocol for the Uniform Integration of Heterogeneous Blockchain Smart Contracts. (2020) authored by Frank Leymann. Steve Strauch et al.: Transparent Access to Relational Databases in the Cloud using a Multi-tenant ESB. (2014) authored by Frank Leymann"}. {'author_wikipedia_text': "Michael C
output format: answer
|
262
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What kind of organization is the institution of the author who published 'SRL without Tears: An ILP Perspective'?
Context: Frieder Uhlig et al.: Transformer-Boosted Anomaly Detection with Fuzzy Hashes. (2022) authored by Kristian Kersting. Ahmed Jawad et al.: Where traffic meets DNA: mobility mining using biological sequence analysis revisited. (2011) authored by Kristian Kersting. Alejandro Molina et al.: Poisson Sum-Product Networks: A Deep Architecture for Tractable Multivariate Poisson Distributions. (2017) authored by Kristian Kersting. Mina Ameli et al.: Unsupervised Multi-sensor Anomaly Localization with Explainable AI. (2022) authored by Kristian Kersting. Zhao Xu et al.: Efficient Learning for Hashing Proportional Data. (2012) authored by Kristian Kersting. Mirwaes Wahabzada et al.: Automated interpretation of 3D laserscanned point clouds for plant organ segmentation. (2015) authored by Kristian Kersting. Maximilian Otte et al.: Generative Adversarial Neural Cellular Automata. (2021) authored by Kristian Kersting. Quentin Delfosse et al.: Boosting Object Representation Learning via Motion and Object Continuity. (2022) authored by Kristian Kersting. Quentin Delfosse et al.: Boosting Object Representation Learning via Motion and Object Continuity. (2023) authored by Kristian Kersting. Nandini Ramanan et al.: Discriminative Non-Parametric Learning of Arithmetic Circuits. (2020) authored by Kristian Kersting. Rudolph Triebel et al.: Robust 3D Scan Point Classification using Associative Markov Networks. (2006) authored by Kristian Kersting. Manuel Brack et al.: Distilling Adversarial Prompts from Safety Benchmarks: Report for the Adversarial Nibbler Challenge. (2023) authored by Kristian Kersting. Karl Stelzner et al.: Decomposing 3D Scenes into Objects via Unsupervised Volume Segmentation. (2021) authored by Kristian Kersting. Sophie Burkhardt et al.: Rule Extraction from Binary Neural Networks with Convolutional Rules for Model Validation. (2020) authored by Kristian Kersting. Sophie Burkhardt et al.: Rule Extraction From Binary Neural Networks With Convolutional Rules for Model Validation. (2021) authored by Kristian Kersting. Marion Neumann et al.: Erosion Band Features for Cell Phone Image Based Plant Disease Classification. (2014) authored by Kristian Kersting. Nils Thoma et al.: RECOWNs: Probabilistic Circuits for Trustworthy Time Series Forecasting. (2021) authored by Kristian Kersting. Lukas Struppek et al.: Leveraging Diffusion-Based Image Variations for Robust Training on Poisoned Data. (2023) authored by Kristian Kersting. Christian Plagemann et al.: Learning predictive terrain models for legged robot locomotion. (2008) authored by Kristian Kersting. Ahmed Jawad et al.: Biological Sequence Analysis meets Mobility Mining. (2011) authored by Kristian Kersting. Kristian Kersting et al.: Hierarchical Convex NMF for Clustering Massive Data. (2010) authored by Kristian Kersting. Steven Lang et al.: DAFNe: A One-Stage Anchor-Free Deep Model for Oriented Object Detection. (2021) authored by Kristian Kersting. Christopher Morris et al.: Faster Kernels for Graphs with Continuous Attributes via Hashing. (2016) authored by Kristian Kersting. Christopher Morris et al.: Faster Kernels for Graphs with Continuous Attributes via Hashing. (2016) authored by Kristian Kersting. Nils M. Kriege et al.: A unifying view of explicit and implicit feature maps of graph kernels. (2019) authored by Kristian Kersting. Shrutika Poyrekar et al.: A Deeper Empirical Analysis of CBP Algorithm: Grounding Is the Bottleneck. (2014) authored by Kristian Kersting. Amos Treiber et al.: CryptoSPN: Privacy-Preserving Sum-Product Network Inference. (2020) authored by Kristian Kersting. Amos Treiber et al.: CryptoSPN: Privacy-preserving Sum-Product Network Inference. (2020) authored by Kristian Kersting. Jens Behley et al.: Learning to hash logistic regression for fast 3D scan point classification. (2010) authored by Kristian Kersting. Viktor Pfanschilling et al.: Sum-Product Loop Programming: From Probabilistic Circuits to Loop Programming. (2022) authored by Kristian Kersting. Lukas Sommer et al.: Automatic Mapping of the Sum-Product Network Inference Problem to FPGA-Based Accelerators. (2018) authored by Kristian Kersting. Rafet Sifa et al.: Predicting Purchase Decisions in Mobile Free-to-Play Games. (2015) authored by Kristian Kersting. Xiaoting Shao et al.: Conditional sum-product networks: Modular probabilistic circuits via gate functions. (2022) authored by Kristian Kersting. Robert Peharz et al.: Einsum Networks: Fast and Scalable Learning of Tractable Probabilistic Circuits. (2020) authored by Kristian Kersting. Robert Peharz et al.: Einsum Networks: Fast and Scalable Learning of Tractable Probabilistic Circuits. (2020) authored by Kristian Kersting. Sriraam Natarajan et al.: Early Prediction of Coronary Artery Calcification Levels Using Machine Learning. (2013) authored by Kristian Kersting. Christian Plagemann et al.: A Bayesian regression approach to terrain mapping and an application to legged robot locomotion. (2009) authored by Kristian Kersting. Fabrizio Ventola et al.: Random Sum-Product Forests with Residual Links. (2019) authored by Kristian Kersting. Christoph Ide et al.: LTE Connectivity and Vehicular Traffic Prediction Based on Machine Learning Approaches. (2015) authored by Kristian Kersting. Sahil Sidheekh et al.: Probabilistic Flow Circuits: Towards Unified Deep Models for Tractable Probabilistic Inference. (2023) authored by Kristian Kersting. Alejandro Molina et al.: Mixed Sum-Product Networks: A Deep Architecture for Hybrid Domains. (2018) authored by Kristian Kersting. Robert Peharz et al.: Random Sum-Product Networks: A Simple and Effective Approach to Probabilistic Deep Learning. (2019) authored by Kristian Kersting. Jannik Kossen et al.: Structured Object-Aware Physics Prediction for Video Modeling and Planning. (2019) authored by Kristian Kersting. Xuan Xie et al.: Neuro-Symbolic Verification of Deep Neural Networks. (2022) authored by Kristian Kersting. Xuan Xie et al.: Neuro-Symbolic Verification of Deep Neural Networks. (2022) authored by Kristian Kersting. Jannik Kossen et al.: Structured Object-Aware Physics Prediction for Video Modeling and Planning. (2020) authored by Kristian Kersting. Xiaoting Shao et al.: Conditional Sum-Product Networks: Imposing Structure on Deep Probabilistic Architectures. (2019) authored by Kristian Kersting. Wolfgang Stammer et al.: Interactive Disentanglement: Learning Concepts by Interacting with their Prototype Representations. (2021) authored by Kristian Kersting. Wolfgang Stammer et al.: Interactive Disentanglement: Learning Concepts by Interacting with their Prototype Representations. (2022) authored by Kristian Kersting. Xiaoting Shao et al.: Conditional Sum-Product Networks: Imposing Structure on Deep Probabilistic Architectures. (2020) authored by Kristian Kersting in 2006. 5 million euros over five years. D. In 2019 he received the "Deutscher KI-Preis" ("German AI Award"), endowed with 100,000 euros, for his outstanding scientific achievements in the field of artificial intelligence
output format: answer
|
education
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: When did the author who published 'Capturing Knowledge about Drug-Drug Interactions to Enhance Treatment Effectiveness' graduate as a doctor in computer science?
Context: Pascal Hitzler et al.: The Semantic Web: ESWC 2019 Satellite Events - ESWC 2019 Satellite Events, Portorož, Slovenia, June 2-6, 2019, Revised Selected Papers (2019) edited by Maria-Esther Vidal. Farah Karim et al.: Semantic Enrichment of IoT Stream Data On-demand. (2018) authored by Maria-Esther Vidal. Fabrizio Orlandi et al.: Proceedings of the 7th Workshop on Managing the Evolution and Preservation of the Data Web (MEPDaW) co-located with the 20th International Semantic Web Conference (ISWC 2021), Virtual event, October 25th, 2021. (2022) edited by Maria-Esther Vidal. Anastasia Dimou et al.: Proceedings of the Workshop on Negative or Inconclusive Results in Semantic Web, NoISE 2015, Co-located with the 12th Extended Semantic Web Conference (ESWC 2015), Portoroz, Slovenia, June 1st, 2015. (2015) edited by Maria-Esther Vidal. Fathoni A. Musyaffa et al.: Classifying Data Heterogeneity within Budget and Spending Open Data. (2018) authored by Maria-Esther Vidal. Damien Graux et al.: Proceedings of the 8th Workshop on Managing the Evolution and Preservation of the Data Web (MEPDaW) co-located with the 21st International Semantic Web Conference (ISWC 2022), Virtual event, October 23rd, 2022. (2023) edited by Maria-Esther Vidal. Marlene Goncalves et al.: Ranking and Clustering Techniques to Support an Efficient E-Democracy. (2012) authored by Maria-Esther Vidal. Edelmira Pasarella et al.: Comparing MapReduce and Pipeline Implementations for Counting Triangles. (2016) authored by Maria-Esther Vidal. Daniel Izquierdo et al.: An Expressive and Efficient Solution to the Service Selection Problem. (2010) authored by Maria-Esther Vidal. Pascal Molli et al.: Semantic Web Collaborative Spaces - Second International Workshop, SWCS 2013, Montpellier, France, May 27, 2013, Third International Workshop, SWCS 2014, Trentino, Italy, October 19, 2014, Revised Selected and Invited Papers (2016) edited by Maria-Esther Vidal. Ioanna Lytra et al.: A big data architecture for managing oceans of data and maritime applications. (2017) authored by Maria-Esther Vidal. Stephanie Alibrandi et al.: D-FOPA: A Dynamic Final Object Pruning Algorithm to Efficiently Produce Skyline Points Over Data Streams. (2015) authored by Maria-Esther Vidal. Valentina Janev et al.: Reuse of Semantic Models for Emerging Smart Grids Applications. (2021) authored by Maria-Esther Vidal. Farah Karim et al.: Large-scale storage and query processing for semantic sensor data. (2017) authored by Maria-Esther Vidal. Fabrizio Orlandi et al.: Proceedings of the 6th Workshop on Managing the Evolution and Preservation of the Data Web (MEPDaW) co-located with the 19th International Semantic Web Conference (ISWC 2020), Virtual event (instead of Athens, Greece), November 1st, 2020. (2020) edited by Maria-Esther Vidal. Aldo Gangemi et al.: The Semantic Web - 15th International Conference, ESWC 2018, Heraklion, Crete, Greece, June 3-7, 2018, Proceedings (2018) edited by Maria-Esther Vidal. Muhammad Saleem et al.: Joint Proceedings of the QuWeDa and MEPDaW 2023: 7th Workshop on Storing, Querying and Benchmarking Knowledge Graphs and 9th Workshop on Managing the Evolution and Preservation of the Data Web co-located with 22nd International Semantic Web Conference (ISWC 2023), Athens, Greece, 6-10 November 2023. (2023) edited by Maria-Esther Vidal. Kemele M. Endris et al.: BOUNCER: Privacy-Aware Query Processing over Federations of RDF Datasets. (2018) authored by Maria-Esther Vidal. Eduardo Blanco et al.: Techniques to Produce Optimal Web Service Compositions. (2008) authored by Maria-Esther Vidal. Maribel Acosta et al.: SHEPHERD: A Shipping-Based Query Processor to Enhance SPARQL Endpoint Performance. (2014) authored by Maria-Esther Vidal. Ana Alvarado et al.: FOPA: A Final Object Pruning Algorithm to Efficiently Produce Skyline Points. (2013) authored by Maria-Esther Vidal. Zoé Lacroix et al.: Resource Discovery - 5th International Workshop, RED 2012, Co-located with the 9th Extended Semantic Web Conference, ESWC 2012, Heraklion, Greece, May 27, 2012, Revised Selected Papers (2013) edited by Maria-Esther Vidal. Samaneh Jozashoori et al.: EABlock: a declarative entity alignment block for knowledge graph creation pipelines. (2022) authored by Maria-Esther Vidal. Eduardo Blanco et al.: A Non-Chronological Backtracking Unfolding Algorithm for Transactional Web Service Composition. (2012) authored by Maria-Esther Vidal. Gabriela Montoya et al.: Efficient Query Processing for SPARQL Federations with Replicated Fragments. (2015) authored by Maria-Esther Vidal. Samaneh Jozashoori et al.: EABlock: A Declarative Entity Alignment Block for Knowledge Graph Creation Pipelines. (2021) authored by Maria-Esther Vidal. Pascal Molli et al.: Proceedings of the Third International Workshop on Semantic Web Collaborative Spaces co-located with the 13th International Semantic Web Conference (ISWC 2014), Riva del Garda, Italy, October 19, 2014. (2014) edited by Maria-Esther Vidal. Fathoni A. Musyaffa et al.: IOTA: Interlinking of heterogeneous multilingual open fiscal DaTA. (2020) authored by Maria-Esther Vidal. Farah Karim et al.: Compacting frequent star patterns in RDF graphs. (2020) authored by Maria-Esther Vidal. Farah Karim et al.: Compacting Frequent Star Patterns in RDF Graphs. (2020) authored by Maria-Esther Vidal. Maribel Acosta et al.: RDF-Hunter: Automatically Crowdsourcing the Execution of Queries Against RDF Data Sets. (2015) authored by Maria-Esther Vidal. Harsh Thakkar et al.: LITMUS: An Open Extensible Framework for Benchmarking RDF Data Management Solutions. (2016) authored by Maria-Esther Vidal. Farah Karim et al.: Compact Representations for Efficient Storage of Semantic Sensor Data. (2020) authored by Maria-Esther Vidal. Farah Karim et al.: Compact representations for efficient storage of semantic sensor data. (2021) authored by Maria-Esther Vidal. Fabio Ciravegna and Maria-Esther Vidal: Proceedings of the ISWC 2015 Doctoral Consortium Co-located with the 14th International Semantic Web Conference (ISWC 2015), Bethlehem, Pennsylvania, USA, October 12th, 2015. (2015) edited by Maria-Esther Vidal In 2011 she became the director of direction for faculty development of the Simón Bolívar University. [non-primary source needed]'}
output format: answer
|
2000
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In which year did Magnus Egerstedt join the University of California, Irvine?
Context: Tatsuya Miyano et al.: Primal-Dual Gradient Dynamics for Cooperative Unknown Payload Manipulation without Communication. (2020) authored by Magnus Egerstedt. Xu Chu Ding et al.: On-line adaptive optimal timing control of switched systems. (2009) authored by Magnus Egerstedt. Eric Squires et al.: Safety With Limited Range Sensing Constraints For Fixed Wing Aircraft. (2021) authored by Magnus Egerstedt. Eric Squires et al.: Safety With Limited Range Sensing Constraints For Fixed Wing Aircraft. (2020) authored by Magnus Egerstedt. Hassan Jaleel et al.: Duty cycle scheduling in dynamic sensor networks for controlling event detection probabilities. (2011) authored by Magnus Egerstedt. Tatsuya Miyano et al.: Distributed Force/Position Optimization Dynamics for Cooperative Unknown Payload Manipulation. (2020) authored by Magnus Egerstedt. Leandro G. Barajas et al.: Process control in a high-noise environment using a limited number of measurements. (2003) authored by Magnus Egerstedt. Yu Wang et al.: Differentially private objective functions in distributed cloud-based optimization. (2016) authored by Magnus Egerstedt. Tatsuya Miyano et al.: Passivity-Based Distributed Control for Cooperative Unknown Payload Manipulation with Sensing/Actuation Delays. (2022) authored by Magnus Egerstedt. Luis Guerrero-Bonilla et al.: Area Defense and Surveillance on Rectangular Regions Using Control Barrier Functions. (2021) authored by Magnus Egerstedt. Musad A. Haque et al.: Optimization of foraging multi-agent system front: A flux-based curve evolution method. (2011) authored by Magnus Egerstedt. Austin Jones et al.: Optimal Pesticide Scheduling in Precision Agriculture. (2016) authored by Magnus Egerstedt. Matthew T. Hale et al.: Asynchronous Multiagent Primal-Dual Optimization. (2017) authored by Magnus Egerstedt. Samuel Coogan et al.: Scaling the size of a multiagent formation via distributed feedback. (2011) authored by Magnus Egerstedt. Motoya Ohnishi et al.: Constraint learning for control tasks with limited duration barrier functions. (2021) authored by Magnus Egerstedt. Motoya Ohnishi et al.: Constraint Learning for Control Tasks with Limited Duration Barrier Functions. (2019) authored by Magnus Egerstedt. Paul Glotfelter et al.: A Nonsmooth Approach to Controller Synthesis for Boolean Specifications. (2021) authored by Magnus Egerstedt. Yousef Emam et al.: Data-Driven Robust Barrier Functions for Safe, Long-Term Operation. (2021) authored by Magnus Egerstedt. Yousef Emam et al.: Data-Driven Robust Barrier Functions for Safe, Long-Term Operation. (2022) authored by Magnus Egerstedt. Shun-Ichi Azuma et al.: Output-Based Optimal Timing Control of Switched Systems. (2006) authored by Magnus Egerstedt. Sebastian F. Ruf et al.: Herdability of Linear Systems Based on Sign Patterns and Graph Structures. (2019) authored by Magnus Egerstedt. Yousef Emam et al.: Safe Model-Based Reinforcement Learning Using Robust Control Barrier Functions. (2021) authored by Magnus Egerstedt. Matthew T. Hale et al.: Cloud-based centralized/decentralized multi-agent optimization with communication delays. (2015) authored by Magnus Egerstedt. Jonghoek Kim et al.: Battery Level Estimation of Mobile Agents under Communication Constraints. (2010) authored by Magnus Egerstedt. Yorai Wardi et al.: Performance regulation and tracking via lookahead simulation: Preliminary results and validation. (2017) authored by Magnus Egerstedt. Motoya Ohnishi et al.: Safety-aware Adaptive Reinforcement Learning with Applications to Brushbot Navigation. (2018) authored by Magnus Egerstedt. Leandro G. Barajas et al.: Modeling and Control of SMT Manufacturing Lines Using Hybrid Dynamic Systems. (2003) authored by Magnus Egerstedt. Anqi Li et al.: Stable, Concurrent Controller Composition for Multi-Objective Robotic Tasks. (2019) authored by Magnus Egerstedt. Anqi Li et al.: Stable, Concurrent Controller Composition for Multi-Objective Robotic Tasks. (2019) authored by Magnus Egerstedt. Vadim Azhmyakov et al.: On the LQ-based optimization techniques for impulsive hybrid control systems. (2010) authored by Magnus Egerstedt. Rosalba Galván-Guerra et al.: Optimization of multiagent systems with increasing state dimensions: Hybrid LQ approach. (2011) authored by Magnus Egerstedt. Rahul Chipalkatty et al.: Multi-pendulum synchronization using constrained agreement protocols. (2009) authored by Magnus Egerstedt. Mohamed Babaali et al.: An observer for linear systems with randomly-switching measurement equations. (2003) authored by Magnus Egerstedt. Hiroaki Kawashima et al.: Switching Control in DC-DC Converter Circuits: Optimizing Tracking-Energy Tradeoffs. (2012) authored by Magnus Egerstedt. Riku Funada et al.: Distributed Coverage Hole Prevention for Visual Environmental Monitoring with Quadcopters via Nonsmooth Control Barrier Functions. (2022) authored by Magnus Egerstedt. Xu Chu Ding et al.: Multi-UAV Convoy Protection: An Optimal Approach to Path Planning and Coordination. (2010) authored by Magnus Egerstedt. Riku Funada et al.: Distributed Coverage Hole Prevention for Visual Environmental Monitoring With Quadcopters Via Nonsmooth Control Barrier Functions. (2024) authored by Magnus Egerstedt. Eric Squires et al.: Composition of Safety Constraints With Applications to Decentralized Fixed-Wing Collision Avoidance. (2019) authored by Magnus Egerstedt. Axel Schild et al.: Orbital Control for a Class of Planar Impulsive Hybrid Systems with Controllable Resets. (2009) authored by Magnus Egerstedt. Anqi Li et al.: Formally Correct Composition of Coordinated Behaviors Using Control Barrier Certificates. (2018) authored by Magnus Egerstedt. Yiahao Zhou et al.: Control Theoretic Splines with Deterministic and Random Data. (2005) authored by Magnus Egerstedt. Tatsuya Ibuki et al.: Optimization-Based Distributed Flocking Control for Multiple Rigid Bodies. (2020) authored by Magnus Egerstedt. Chao Sun et al.: Robust finite-time connectivity preserving consensus tracking and formation control for multi-agent systems. (2017) authored by Magnus Egerstedt. Yorai Wardi et al.: A controlled-precision algorithm for mode-switching optimization. (2012) authored by Magnus Egerstedt. Luis Guerrero-Bonilla et al.: Ensured Continuous Surveillance Despite Sensor Transition Using Control Barrier Functions. (2022) authored by Magnus Egerstedt. Zak Costello et al.: On the construction of local interaction rules that perform global linear computation. (2015) authored by Magnus Egerstedt. Xu Chu Ding et al.: An optimal timing approach to controlling multiple UAVs. (2009) authored by Magnus Egerstedt. Amirreza Rahmani et al.: Optimal motion primitives for multi-UAV convoy protection. (2010) authored by Magnus Egerstedt. Philip Twu et al.: A measure of heterogeneity in multi-agent systems. (2014) authored by Magnus Egerstedt Sastry on the hybrid control of mobile robotics. thesis A Model of the Combined Planar Motion of the Human Head and Eye. The Robotarium provides researchers working on swarm robotics access to both ground and aerial robots. S. S. D
output format: answer
|
July 2021
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the number of scientific articles attributed to the institution where the author of 'Information Systems and Non-Governmental Development Organisations: Advocacy, Organisational Learning, and Accountability' works?
Context: David Lewis name David Lewis. David Lewis alternativeName David Lewis. David Lewis alternativeName David J. Lewis. David Lewis 2YrMeanCitedness 0.625. David Lewis modified 2023-10-18 This includes research on hypoxia in the Gulf of Mexico (the so-called Dead Zone) that results from the loss of nitrogen and phosphorus from fertilizer in agricultural areas far upstream from the Gulf, including Minnesota. In 1998, this work led to him being appointed to the White House Task Force on Hypoxia in the Gulf of Mexico, which was established in 1997. \nHe holds the W. Mulla's PhD dissertation was entitled “The molecular dynamics, specific surface area, crystal composition, and swelling of clay-water systems. E. Mulla’s work in precision agriculture includes the concept and development of management zones
output format: answer
|
53721
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What award was the author of the paper 'On the Existence of Minimal Realizations of Linear Dynamical Systems over Noetherian Integral Domains' awarded in 2022?
Context: Jared Miller et al.: Mediating Ribosomal Competition by Splitting Pools. (2021) authored by Eduardo D. Sontag. Jared Miller et al.: Mediating Ribosomal Competition by Splitting Pools. (2021) authored by Eduardo D. Sontag. Yoram Zarai et al.: Controlling the ribosomal density profile in mRNA translation. (2016) authored by Eduardo D. Sontag. Joao A. Ascensao et al.: Non-monotonic Response to Monotonic Stimulus: Regulation of Glyoxylate Shunt Gene-Expression Dynamics in Mycobacterium tuberculosis. (2016) authored by Eduardo D. Sontag. James M. Greene et al.: Control Structures of Drug Resistance in Cancer Chemotherapy. (2018) authored by Eduardo D. Sontag. Todd Riley et al.: The p53HMM algorithm: using profile hidden markov models to detect p53-responsive genes. (2009) authored by Eduardo D. Sontag. Filippo Menolascina et al.: In-vivo identification and control of aerotaxis in Bacillus subtilis. (2016) authored by Eduardo D. Sontag. Abdullah Hamadeh et al.: Fold-change detection as a chemotaxis model discrimination tool. (2012) authored by Eduardo D. Sontag. Muhammad Ali Al-Radhawi et al.: Stochastic multistationarity in a model of the hematopoietic stem cell differentiation network. (2018) authored by Eduardo D. Sontag. Bhaskar DasGupta et al.: Aggregation-based approaches to honey-pot searching with local sensory information. (2004) authored by Eduardo D. Sontag. Eduardo D. Sontag: Sigmoids Distinguish More Efficiently Than Heavisides. (1989) authored by Eduardo D. Sontag. Mahdiar Sadeghi et al.: Universal features of epidemic models under social distancing guidelines. (2021) authored by Eduardo D. Sontag. James M. Greene and Eduardo D. Sontag: Minimizing the infected peak utilizing a single lockdown: a technical result regarding equal peaks. (2022) authored by Eduardo D. Sontag. Patrick De Leenheer et al.: A Feedback Perspective for Chemostat Models with Crowding Effects. (2003) authored by Eduardo D. Sontag. Eduardo D. Sontag and Doron Zeilberger: A symbolic computation approach to a problem involving multivariate Poisson distributions. (2010) authored by Eduardo D. Sontag. Bhaskar DasGupta and Eduardo D. Sontag: Sample complexity for learning recurrent perceptron mappings. (1996) authored by Eduardo D. Sontag. Bhaskar DasGupta and Eduardo D. Sontag: Sample Complexity for Learning Recurrent Perceptron Mappings. (1995) authored by Eduardo D. Sontag. Bhaskar DasGupta et al.: Computational complexities of honey-pot searching with local sensory information. (2004) authored by Eduardo D. Sontag. Eduardo D. Sontag and Héctor J. Sussmann: Back propagation separates where perceptrons do. (1991) authored by Eduardo D. Sontag. Amelia G. White et al.: DevStaR: High-Throughput Quantification of C. elegans Developmental Stages. (2013) authored by Eduardo D. Sontag. Réka Albert et al.: A Novel Method for Signal Transduction Network Inference from Indirect Experimental Evidence. (2007) authored by Eduardo D. Sontag. Réka Albert et al.: A Novel Method for Signal Transduction Network Inference from Indirect Experimental Evidence. (2007) authored by Eduardo D. Sontag. Amelia G. White et al.: Rapid and accurate developmental stage recognition of C. elegans from high-throughput image data. (2010) authored by Eduardo D. Sontag. Muhammad Ali Al-Radhawi et al.: Long-Term Regulation of Prolonged Epidemic Outbreaks in Large Populations via Adaptive Control: A Singular Perturbation Approach. (2022) authored by Eduardo D. Sontag. Renée Koplon and Eduardo D. Sontag: Using Fourier-neural recurrent networks to fit sequential input/output data. (1997) authored by Eduardo D. Sontag. Eduardo D. Sontag alternativeName Eduardo Sontag. Muhammad Ali Al-Radhawi et al.: Multi-modality in gene regulatory networks with slow promoter kinetics. (2019) authored by Eduardo D. Sontag. Zahra Aminzare and Eduardo D. Sontag: Logarithmic Lipschitz norms and diffusion-induced instability (2012) authored by Eduardo D. Sontag. Jae Kyoung Kim and Eduardo D. Sontag: Reduction of multiscale stochastic biochemical reaction networks using exact moment derivation. (2017) authored by Eduardo D. Sontag In January 2018, Dr. 5% among 2% top scientists worldwide. In addition, Dr. \nResearch. His daughter Laura Kleiman is founder and CEO at Reboot Rx, and his son David Sontag leads the MIT Clinical Machine Learning Group. Sontag served as the head of the undergraduate Biomathematics Interdisciplinary Major, director of the Center for Quantitative Biology, and director of graduate studies of the Institute for Quantitative Biomedicine. '}
output format: answer
|
Richard E. Bellman Control Heritage Award
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In what year did the writer of Automatic Test Generation for the Analysis of a Real-Time System: Case Stud join the University of Pennsylvania?
Context: Deepak Gangadharan et al.: Bandwidth Optimal Data/Service Delivery for Connected Vehicles via Edges. (2018) authored by Insup Lee 0001. Wenchao Zhou et al.: Towards a data-centric view of cloud security. (2010) authored by Insup Lee 0001. Akshaj Gupta et al.: E-PODS: A Fast Heuristic for Data/Service Delivery in Vehicular Edge Computing. (2021) authored by Insup Lee 0001. Insup Lee alternativeName Insup Lee. Akshaj Gupta et al.: Global Edge Bandwidth Cost Gradient-based Heuristic for Fast Data Delivery to Connected Vehicles under Vehicle Overlaps. (2022) authored by Insup Lee 0001. Insup Lee et al.: Synthesis and Mapping Algorithms for a Reconfigurable Optical Interconnection Network. (1986) authored by Insup Lee 0001. Insup Lee name Insup Lee. Ramneet Kaur et al.: Predicting Out-of-Distribution Performance of Deep Neural Networks Using Model Conformance. (2023) authored by Insup Lee 0001. Claire Kendell et al.: GlucoScan: Noninvasive Glucose Monitoring Device. (2022) authored by Insup Lee 0001. Minsu Jo et al.: Toward a Hybrid Sensor Fusion Using Probabilistic and Abstract Sensor Models. (2016) authored by Insup Lee 0001. Radoslav Ivanov et al.: Attack-resilient sensor fusion. (2014) authored by Insup Lee 0001. Benjamin A. Kohl et al.: Evaluation and Enhancement of an Intraoperative Insulin Infusion Protocol via In-Silico Simulation. (2013) authored by Insup Lee 0001. Bong-Ho Kim et al.: Enhanced Split TCP with End-to-End Protocol Semantics over Wireless Networks. (2017) authored by Insup Lee 0001. Sooyong Jang et al.: Improving Classifier Confidence using Lossy Label-Invariant Transformations. (2020) authored by Insup Lee 0001. Shuo Li et al.: Towards PAC Multi-Object Detection and Tracking. (2022) authored by Insup Lee 0001. Sooyong Jang et al.: Improving Classifier Confidence using Lossy Label-Invariant Transformations. (2021) authored by Insup Lee 0001. Insup Lee 2YrMeanCitedness 1.7166666984558105469. Radoslav Ivanov et al.: Robust estimation using context-aware filtering. (2015) authored by Insup Lee 0001. Hung Nguyen et al.: LogSafe: Secure and Scalable Data Logger for IoT Devices. (2018) authored by Insup Lee 0001. Xiayan Ji et al.: iCareLoop: Closed-Loop Sensing and Intervention for Gerontological Social Isolation and Loneliness. (2023) authored by Insup Lee 0001. Xiayan Ji et al.: Short: Integrated Sensing Platform for Detecting Social Isolation and Loneliness In the Elderly Community. (2023) authored by Insup Lee 0001. Wenwen Si et al.: Angelic Patches for Improving Third-Party Object Detector Performance. (2023) authored by Insup Lee 0001. Insup Lee i10Index 227. Jian Chang et al.: TrustForge: Flexible access control for collaborative crowd-sourced environment. (2013) authored by Insup Lee 0001. Insup Lee h-index 48. Andrew G. West et al.: Spam mitigation using spatio-temporal reputations from blacklist history. (2010) authored by Insup Lee 0001. Hyo Jin Jo et al.: MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks. (2020) authored by Insup Lee 0001. Michael J. May et al.: Strong and Weak Policy Relations. (2009) authored by Insup Lee 0001. Bong-Ho Kim et al.: Advanced Split-TCP with End-to-End Protocol Semantics over Wireless Networks. (2016) authored by Insup Lee 0001. Radoslav Ivanov et al.: Estimation of Blood Oxygen Content Using Context-Aware Filtering. (2016) authored by Insup Lee 0001. Fanxin Kong et al.: Joint Rate Control and Demand Balancing for Electric Vehicle Charging. (2018) authored by Insup Lee 0001. Mengyu Liu et al.: Fail-Safe: Securing Cyber-Physical Systems against Hidden Sensor Attacks. (2022) authored by Insup Lee 0001. Kaustubh Sridhar et al.: Guaranteed Conformance of Neurosymbolic Models to Natural Constraints. (2023) authored by Insup Lee 0001. Kaustubh Sridhar et al.: Guaranteed Conformance of Neurosymbolic Models to Natural Constraints. (2022) authored by Insup Lee 0001. Insup Lee modified 2023-10-18. Nicola Bezzo et al.: A stochastic approach for attack resilient UAV motion planning. (2016) authored by Insup Lee 0001. Sangdon Park et al.: PAC Confidence Predictions for Deep Neural Network Classifiers. (2021) authored by Insup Lee 0001. Sangdon Park et al.: PAC Confidence Predictions for Deep Neural Network Classifiers. (2020) authored by Insup Lee 0001. Pardis Pashakhanloo et al.: PacJam: Securing Dependencies Continuously via Package-Oriented Debloating. (2022) authored by Insup Lee 0001. Yahan Yang et al.: In and Out-of-Domain Text Adversarial Robustness via Label Smoothing. (2023) authored by Insup Lee 0001. Yahan Yang et al.: In and Out-of-Domain Text Adversarial Robustness via Label Smoothing. (2022) authored by Insup Lee 0001. Kuk Jin Jang et al.: Memory Classifiers for Robust ECG Classification against Physiological Noise. (2023) authored by Insup Lee 0001. Andrew G. West et al.: Link spamming Wikipedia for profit. (2011) authored by Insup Lee 0001. Souradeep Dutta et al.: Exploring with Sticky Mittens: Reinforcement Learning with Expert Interventions via Option Templates. (2022) authored by Insup Lee 0001. Souradeep Dutta et al.: Exploring with Sticky Mittens: Reinforcement Learning with Expert Interventions via Option Templates. (2022) authored by Insup Lee 0001. Chaitanya Penubarthi et al.: Security in Sensor Networks for Medical Systems Torso Architecture. (2005) authored by Insup Lee 0001. Amanda Watson et al.: RT-ACL: Identification of High-Risk Youth Patients and their Most Significant Risk Factors to Reduce Anterior Cruciate Ligament Reinjury Risk. (2021) authored by Insup Lee 0001. Madhukar Anand et al.: Quantifying eavesdropping vulnerability in sensor networks. (2005) authored by Insup Lee 0001. Yahan Yang et al.: Understanding Calibration for Multilingual Question Answering Models. (2023) authored by Insup Lee 0001. Pengyuan Lu et al.: Zero-shot Task Preference Addressing Enabled by Imprecise Bayesian Continual Learning. (2023) authored by Insup Lee 0001 He is also the Director and co-founder of the PRECISE Center. "}
output format: answer
|
1983
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the cited by count of the academic institute of the creator of the 'Interview: Mahadev Satyanarayanan on Mobile and Pervasive Computing' paper?
Context: Liu Yang et al.: Learning distance metrics for interactive search-assisted diagnosis of mammograms. (2007) authored by Mahadev Satyanarayanan. Liu Yang et al.: A Boosting Framework for Visuality-Preserving Distance Metric Learning and Its Application to Medical Image Retrieval. (2010) authored by Mahadev Satyanarayanan. Wolfgang Richter et al.: Agentless Cloud-Wide Streaming of Guest File System Updates. (2014) authored by Mahadev Satyanarayanan. David C. Steere et al.: Efficient User-Level File Cache Management on the Sun Vnode Interface. (1990) authored by Mahadev Satyanarayanan. Haithem Turki et al.: Mega-NeRF: Scalable Construction of Large-Scale NeRFs for Virtual Fly-Throughs. (2021) authored by Mahadev Satyanarayanan. Peter J. Braam et al.: Porting the Coda File System to Windows. (1999) authored by Mahadev Satyanarayanan. Haithem Turki et al.: Mega-NeRF: Scalable Construction of Large-Scale NeRFs for Virtual Fly- Throughs. (2022) authored by Mahadev Satyanarayanan. Nilton Bila et al.: Jettison: efficient idle desktop consolidation with partial VM migration. (2012) authored by Mahadev Satyanarayanan. Puneet Kumar and Mahadev Satyanarayanan: Supporting Application-Specific Resolution in an Optimistically Replicated File System. (1993) authored by Mahadev Satyanarayanan. Yui-Wah Lee et al.: Operation-based Update Propagation in a Mobile File System. (1999) authored by Mahadev Satyanarayanan. Vahe Poladian et al.: Leveraging Resource Prediction for Anticipatory Dynamic Configuration. (2007) authored by Mahadev Satyanarayanan. John H. Howard et al.: Scale and Performance in a Distributed File System (Extended Abstract). (1987) authored by Mahadev Satyanarayanan. Ziqiang Feng et al.: Eureka: Edge-Based Discovery of Training Data for Machine Learning. (2019) authored by Mahadev Satyanarayanan. João Pedro Sousa et al.: A Software Infrastructure for User-Guided Quality-of-Service Tradeoffs. (2008) authored by Mahadev Satyanarayanan. Nilton Bila et al.: Energy-Oriented Partial Desktop Virtual Machine Migration. (2015) authored by Mahadev Satyanarayanan. Junjue Wang et al.: Bandwidth-Efficient Live Video Analytics for Drones Via Edge Computing. (2018) authored by Mahadev Satyanarayanan. Partho Nath et al.: Design Tradeoffs in Applying Content Addressable Storage to Enterprise-scale Systems Based on Virtual Machines. (2006) authored by Mahadev Satyanarayanan. John H. Howard et al.: Scale and Performance in a Distributed File System. (1988) authored by Mahadev Satyanarayanan. H. Andrés Lagar-Cavilla et al.: SnowFlock: Virtual Machine Cloning as a First-Class Cloud Primitive. (2011) authored by Mahadev Satyanarayanan. Shilpa Anna George et al.: Low-Bandwidth Self-Improving Transmission of Rare Training Data. (2023) authored by Mahadev Satyanarayanan. Ziqiang Feng et al.: Edge-Based Discovery of Training Data for Machine Learning. (2018) authored by Mahadev Satyanarayanan. Giao Thanh Nguyen et al.: A Trace-Based Approach for Modeling Wireless Channel Behavior. (1996) authored by Mahadev Satyanarayanan. Puneet Kumar and Mahadev Satyanarayanan: Log-Based Directory Resolution in the Coda File System. (1993) authored by Mahadev Satyanarayanan. Bhaskar Prasad Rimal et al.: Experimental Testbed for Edge Computing in Fiber-Wireless Broadband Access Networks. (2018) authored by Mahadev Satyanarayanan. Larry Huston et al.: Diamond: A Storage Architecture for Early Discard in Interactive Search. (2004) authored by Mahadev Satyanarayanan. Mahadev Satyanarayanan et al.: The ITC Distributed File System: Principles and Design. (1985) authored by Mahadev Satyanarayanan. Thomas C. Bressoud et al.: OpenCAS: A Flexible Architecture for Content Addressable Storage. (2004) authored by Mahadev Satyanarayanan. Nilton Bila et al.: The Case for Energy-Oriented Partial Desktop Migration. (2010) authored by Mahadev Satyanarayanan Only through interactive trial and error, with partial results to guide his progress, can a user converge on the best choice of features for a specific search. In a large enough system, unplanned outages of servers and network segments are practically impossible to avoid. e. This vulnerability is not just hypothetical, but indeed a fact of life in real-world deployments. Once users become critically dependent on files cached from servers, a server or network failure renders these files inaccessible and leaves clients crippled for the duration of the failure. By encapsulating the entire software environment in a VM (including, optionally, a software emulator for now-obsolete hardware), Olive preserves and dynamically reproduces the precise execution behavior of software. In mid-1989, AFS-3 was commercialized by Transarc Corporation and its evolution continued outside CMU. Coda also demonstrated bandwidth-adaptive weakly-connected operation over networks with low bandwidth, high latency or frequent failures. The NFS v4 network file system protocol standard has been extensively informed by the lessons of AFS. Instead of just delivering files, ISR enables entire computing environments (including the operating system and all applications) to be delivered from the cloud with perfect fidelity through on-demand caching to the edges of the Internet. Only edge computing can break this deadlock. One of the major challenges of digital archiving is the ability to preserve and accurately reproduce executable content across time periods of many decades (and eventually centuries). The concepts of multi-fidelity algorithms and predictive resource management that emerged from this work have also proved to be influential. Extensive first-hand experience with the AFS deployment at CMU showed that users are severely impacted by server and network failures. The design principles that were initially discovered and validated in the creation and evolution of AFS have influenced virtually all modern commercial distributed file systems, including Microsoft DFS, Google File System, Lustre File System, Ceph, and NetApp ONTAP. D. In real-time, the video stream is transmitted to a cloudlet and analyzed to identify the state of the assembly. Unfortunately, the features to extract for a given search are not known a priori. A series of implementations (ISR-1, ISR-2, ISR-3, and OpenISR) and associated deployments of ISR at CMU have investigated the implementation trade-offs in this space and demonstrated the real-world viability of this technology. This paper introduced the concept of cloudlets, which are small data-centers located at the network edge. To support this search workflow, the OpenDiamond platform provided a storage architecture for discard-based search that pipelines user control, feature extraction, and per-object indexing computation and result caching. A 2002 narrative retrospective, "The Evolution of Coda" traces its evolution and the lessons learned from it. ". For example, a NASA space probe to the edge of the solar system may take 30 years to reach its destination; software maintenance over such an extended period requires precise re-creation of the probe\'s onboard software environment
output format: answer
|
4774016
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many papers does the academic institution of the researcher who published 'A Reduced Multivariate Polynomial Based Neural Network Model Pattern Classifier for Freeway Incident Detection' have?
Context: Dipti Srinivasan et al.: Bidding and Cooperation Strategies for Electricity Buyers in Power Markets. (2016) authored by Dipti Srinivasan. Hui Li et al.: Optimal Planning of Dual-Zero Microgrid on an Island Toward Net-Zero Carbon Emission. (2024) authored by Dipti Srinivasan. Thillainathan Logenthiran and Dipti Srinivasan: LRGA for solving profit based generation scheduling problem in competitive environment. (2011) authored by Dipti Srinivasan. Satarupa Bal et al.: Novel Active Rectification for Extended ZVS Operation of Bidirectional Full Bridge DC/DC Converter for Energy Storage Application. (2018) authored by Dipti Srinivasan. Kulothungan Gnanasambandam et al.: Optimal Low Switching Frequency Pulsewidth Modulation of Current-Fed Three-Level Converter for Solar Power Integration. (2016) authored by Dipti Srinivasan. Thillainathan Logenthiran et al.: Optimal sizing of Distributed Energy Resources for integrated microgrids using Evolutionary Strategy. (2012) authored by Dipti Srinivasan. Pranjal Verma et al.: Information exchange based clustered differential evolution for constrained generation-transmission expansion planning. (2019) authored by Dipti Srinivasan. Congmiao Li et al.: Real-time scheduling of time-shiftable loads in smart grid with dynamic pricing and photovoltaic power generation. (2015) authored by Dipti Srinivasan. Devendra Patii et al.: High-frequency soft-switching LCC resonant current-fed DC/DC converter with high voltage gain for DC microgrid application. (2014) authored by Dipti Srinivasan. Dipti Srinivasan and Ly Trong Trung: Co-evolutionary bidding strategies for buyers in electricity power markets. (2011) authored by Dipti Srinivasan. Mandar Chitre and Dipti Srinivasan: Evaluating teaching effectiveness using quantitative student feedback. (2018) authored by Dipti Srinivasan. Dipti Srinivasan et al.: Evolving Cooperative Bidding Strategies in a Power Market. (2006) authored by Dipti Srinivasan. Satarupa Bal et al.: Naturally commutated current-fed three-phase bidirectional soft-switching DC-DC converter with new modulation technique. (2015) authored by Dipti Srinivasan. Anupam Trivedi et al.: Improved multi-objective evolutionary algorithm for day-ahead thermal generation scheduling. (2011) authored by Dipti Srinivasan. Anupam Trivedi et al.: Multi-objective siting and sizing of E charging stations in the distribution system. (2015) authored by Dipti Srinivasan. Monika et al.: Real-time display of data from a smart-grid on geographical map using a GIS tool and its role in optimization of game theory. (2015) authored by Dipti Srinivasan. Dipti Srinivasan and Dakun Woo: Evolving cooperative bidding strategies in a power market. (2008) authored by Dipti Srinivasan. Thillainathan Logenthiran et al.: Demand Side Management in Smart Grid Using Heuristic Optimization. (2012) authored by Dipti Srinivasan. Dipti Srinivasan alternativeName Dipti Srinivasan. Monika et al.: GIS as a tool for enhancing the optimization of demand side management in residential microgrid. (2015) authored by Dipti Srinivasan. Dipti Srinivasan alternativeName Srinivasan Dipti. Ce Shang et al.: NSGA-II for joint generation and voyage scheduling of an all-electric ship. (2016) authored by Dipti Srinivasan. Heng Deng et al.: A Simple Control Method for High-Performance UPS Inverters Through Output-Impedance Reduction. (2008) authored by Dipti Srinivasan. Rahul Mehta et al.: Smart Charging Strategies for Optimal Integration of Plug-In Electric Vehicles Within Existing Distribution System Infrastructure. (2018) authored by Dipti Srinivasan. Can Berk Saner et al.: An EV Charging Scheduling Methodology to Reduce Demand and Energy Charges in Industrial and Commercial Sites. (2022) authored by Dipti Srinivasan'}. D
output format: answer
|
198216
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the name of the spouse of the creator of What underlies rapid learning and systematic generalization in humans?
Context: James L. McClelland written paper amount in year2016: 1. James L. McClelland written paper amount in year2016: 1. James L. McClelland written paper amount in year2019: 5. James L. McClelland written paper amount in year2019: 5. James L. McClelland written paper amount in year2015: 2. James L. McClelland written paper amount in year2015: 2. James L. McClelland written paper amount in year2018: 4. James L. McClelland written paper amount in year2018: 4. James L. McClelland written paper amount in year2017: 2. James L. McClelland written paper amount in year2017: 2. James L. McClelland written paper amount in year2020: 9. James L. McClelland written paper amount in year2020: 9. James L. McClelland written paper amount in year2014: 3D. '}. He received a B
output format: answer
|
Heidi Marsha Feldman
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In which year was the author who published 'ELIXIR - A European Infrastructure for Biological Information: Challenges and Progress' appointed Director of the European Bioinformatics Institute?
Context: Janet M. Thornton alternativeName J. M. C. Thornton. Janet M. Thornton name Janet M. Thornton. Janet M. Thornton alternativeName J. M. Thornton. Janet M. Thornton alternativeName Janet Thornton. Janet M. Thornton alternativeName Thornton Jm. Janet M. Thornton alternativeName J. Thornton. Janet M. Thornton alternativeName JM Thornton. Janet M. Thornton alternativeName Jm Thornton. Janet M. Thornton alternativeName Janet M. Thornton. Janet M. Thornton is Person. Janet M. Thornton written paper amount in year2012: 12. Janet M. Thornton written paper amount in year2012: 12. Janet M. Thornton written paper amount in year2013: 12\nThornton attended Bury Grammar School until 1967, where she was head girl. '}. \n\nThornton was elected Fellow of the Royal Society (FRS) in 1999. Thornton is a supernumerary fellow of Churchill College, Cambridge. In the 1970s at Oxford (with M J Sternberg) she established clear and useful rules for the handedness of B-a-B units and demonstrated valid methods for prediction of the ordering of strands in B-sheets. She was awarded the Suffrage Science award in 2011. The Times named Thornton number 86 of their "Eureka 100" British scientists in 2010
output format: answer
|
2001
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many scientific articles are attributed to the institution where the creator of 'On the Banach spaces associated with multi-layer ReLU networks: Function representation, approximation theory and gradient descent dynamics' works?
Context: E Weinan 2YrMeanCitedness 5.3230767250061035156. Ling Lin et al.: A numerical method for the study of nucleation of ordered phases. (2010) authored by Weinan E. E Weinan alternativeName E. Weinan. E Weinan name E Weinan. E Weinan orcidId https://orcid.org/0000-0003-0272-9500. E Weinan alternativeName E Wei‐nan. E Weinan alternativeName E. W. Weinan. E Weinan modified 2023-10-18. Weinan E affiliation Beijing Institute of Big Data Research, China. E Weinan worksCount 422. Weinan E is Person. Guanhua Huang et al.: An Iteratively Parallel Generation Method with the Pre-Filling Strategy for Document-level Event Extraction. (2023) authored by Weinan E. Weinan E primary affiliation Beijing Institute of Big Data Research, China. E Weinan written paper amount in year2018: 24. E Weinan written paper amount in year2018: 24. Yaohua Zang et al.: A Machine Learning Enhanced Algorithm for the Optimal Landing Problem. (2022) authored by Weinan E. Weinan E affiliation Peking University, China5, no. , pp. Stat. D. '}. 5 (2002). Petersburg. \nE Weinan was born in Jingjiang, China. 1. 1 (2003): 87-132
output format: answer
|
193481
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Which author has less publications, the creator of QoS and reputation-aware service selection or the writer of A Discussion on the MDA Approach for Agent Development?
Context: Juán Pavón 2YrMeanCitedness 7.0999999046325683594. Juán Pavón name Juán Pavón. Juán Pavón alternativeName Pavon Juan. Juán Pavón alternativeName J. Gomez y Juan Pavon. Ghislain Atemezing et al.: The Delphi Process Applied to African Traditional Medicine. (2009) authored by Juan Pavón. Juán Pavón alternativeName Juán Pavón. Juán Pavón alternativeName Juan Pavón. Juán Pavón alternativeName Juan Pavòn. Juán Pavón alternativeName Juan Pavon. Juán Pavón alternativeName Joaquín Pérez Pavón. Ghislain Atemezing and Juan Pavón: An Ontology for African Traditional Medicine. (2008) authored by Juan Pavón. Juán Pavón modified 2023-10-18. Rubén Fuentes-Fernández et al.: Modelling Culture Through Social Activities. (2014) authored by Juan Pavón. Miguel Vázquez et al.: Rbbt: A Framework for Fast Bioinformatics Development with Ruby. (2010) authored by Juan Pavón. Juan Pavón affiliation Complutense University of Madrid, Spain. Juán Pavón alternativeName J. Pavón. Juán Pavón alternativeName J. Pavon. Juán Pavón i10Index 60. Juan Pavón primary affiliation Complutense University of Madrid, Spain. Emilio Serrano et al.: Intelligent data analysis applied to debug complex software systems. (2009) authored by Juan Pavón During the 10 years he worked for the company, he spent periods in Alcatel centers outside Spain, such as France (Lannion and Vélizy) and Belgium (Namur and Antwerp). He studied Computer Science at the Technical University of Madrid, graduating in 1985. Nowadays, he is full professor at the Universidad Complutense Madrid. g. g. it, INSISOC, SMAC. While doing this thesis, he worked as assistant professor at the same university. These first attempts were oriented to simulations intended to verify behavioral principles described by well-known laws, but not to explore simulations based on the use of big amounts of raw data. \nHe then returned to the academic world, as an Associate Professor at the Computer Science School of the Complutense University of Madrid (1997). He also held several management positions in the university, serving as Vice Dean for four years (1998–2002). \nPavón belongs to the first Spanish generation to get official studies in Computer Science, during the 1980s. This approach supports research in different areas characterized by the use of modeling languages and requiring flexibility to adapt these to new requirements. , urbanism and group work. After his PhD, he joined Alcatel-Lucent R&D team, where he worked for 10 years
output format: answer
|
Raouf Boutaba
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the i10Index of the scholar working at Microsoft, Online Service Division, Sunnyvale, CA, USA and published Multiple description scalable coding using wavelet-based motion compensated temporal filtering in ICIP (3) 2003?
Context: Yuanzhang Xiao et al.: Design and Analysis of Intervention Mechanisms in Power Control Games. (2011) authored by Mihaela van der Schaar. Yuanzhang Xiao et al.: Intervention in Power Control Games With Selfish Users. (2012) authored by Mihaela van der Schaar. Yuanzhang Xiao and Mihaela van der Schaar: Decentralized foresighted energy purchase and procurement with renewable generation and energy storage. (2014) authored by Mihaela van der Schaar. Yuanzhang Xiao and Mihaela van der Schaar: Optimal intervention for incentivizing the adoption of commercial electric vehicles. (2015) authored by Mihaela van der Schaar. Yuanzhang Xiao et al.: Intervention in Power Control Games With Selfish Users (2011) authored by Mihaela van der Schaar. Mihaela van der Schaar alternativeName Mihaela van der Schaarz. Yi Su and Mihaela van der Schaar: Conjectural Equilibrium in Water-Filling Games. (2009) authored by Mihaela van der Schaar. SaiDhiraj Amuru et al.: Bandit strategies for blindly attacking networks. (2017) authored by Mihaela van der Schaar. Mihaela van der Schaar name Mihaela van der Schaar. Yuanzhang Xiao and Mihaela van der Schaar: Dynamic Stochastic Demand Response With Energy Storage. (2021) authored by Mihaela van der Schaar. Yi Su and Mihaela van der Schaar: Conjectural Equilibrium in Water-filling Games (2008) authored by Mihaela van der Schaar. Mihaela van der Schaar alternativeName Mihaela Van Der Schaar. Boris van Breugel et al.: Membership Inference Attacks against Synthetic Data through Overfitting Detection. (2023) authored by Mihaela van der Schaar. Boris van Breugel et al.: Membership Inference Attacks against Synthetic Data through Overfitting Detection. (2023) authored by Mihaela van der Schaar. Yuanzhang Xiao and Mihaela van der Schaar: Distributed demand side management among foresighted decision makers in power networks. (2013) authored by Mihaela van der Schaar. Yuanzhang Xiao and Mihaela van der Schaar: Foresighted Demand Side Management. (2014) authored by Mihaela van der Schaar. James Jordon et al.: KnockoffGAN: Generating Knockoffs for Feature Selection using Generative Adversarial Networks. (2019) authored by Mihaela van der Schaar. Yu Zhang and Mihaela van der Schaar: Structure-Aware Stochastic Storage Management in Smart Grids. (2014) authored by Mihaela van der Schaar. Mihaela van der Schaar alternativeName Miliaela van der Schaar. Khoa Tran Phan et al.: Design and Analysis of Defection-Proof MAC Protocols Using a Repeated Game Framework. (2010) authored by Mihaela van der Schaar. Luca Canzian et al.: A Dynamic Network Formation Model for Understanding Bacterial Self-Organization into Micro-Colonies. (2014) authored by Mihaela van der Schaar. Luca Canzian et al.: A Dynamic Network Formation Model for Understanding Bacterial Self-Organization Into Micro-Colonies. (2015) authored by Mihaela van der Schaar. Mihaela van der Schaar alternativeName M. Van Der Schaar. Jie Xu and Mihaela van der Schaar: Incentive-compatible demand-side management for smart grids based on review strategies. (2015) authored by Mihaela van der Schaar. Chung-Kai Yu et al.: Reputation design for adaptive networks with selfish agents. (2013) authored by Mihaela van der Schaar. Yu Zhang and Mihaela van der Schaar: Structure-aware stochastic load management in smart grids. (2014) authored by Mihaela van der Schaar. Mihaela van der Schaar alternativeName Mikaela van der Schaar. Byung-Gook Kim et al.: Bidirectional energy trading for residential load scheduling and electric vehicles. (2013) authored by Mihaela van der Schaar. Alexis Bellot and Mihaela van der Schaar: Tree-based Bayesian Mixture Model for Competing Risks. (2018) authored by Mihaela van der Schaar. Mihaela van der Schaar 2YrMeanCitedness 0.0. Yu Zhang et al.: Designing Social Norm Based Incentive Schemes to Sustain Cooperation in a Large Community. (2011) authored by Mihaela van der Schaar. Ahmed M. Alaa and Mihaela van der Schaar: Demystifying Black-box Models with Symbolic Metamodels. (2019) authored by Mihaela van der Schaar. Yu Zhang and Mihaela van der Schaar: Strategic Learning and Robust Protocol Design for Online Communities with Selfish Users (2011) authored by Mihaela van der Schaar. Zhichu Lin and Mihaela van der Schaar: MAC Layer Jamming Mitigation Using a Game Augmented by Intervention. (2010) authored by Mihaela van der Schaar. Yuchao Qin et al.: Closing the loop in medical decision support by understanding clinical decision-making: A case study on organ transplantation. (2021) authored by Mihaela van der Schaar. Fangwen Fu et al.: Game-Theoretic Paradigm for Resource Management in Spectrum Agile Wireless Networks. (2006) authored by Mihaela van der Schaar. Ioana Bica et al.: Batch Inverse Reinforcement Learning Using Counterfactuals for Understanding Decision Making. (2020) authored by Mihaela van der Schaar. Tennison Liu et al.: GOGGLE: Generative Modelling for Tabular Data by Learning Relational Structure. (2023) authored by Mihaela van der Schaar. Boris van Breugel et al.: Can You Rely on Your Model Evaluation? Improving Model Evaluation with Synthetic Test Data. (2023) authored by Mihaela van der Schaar. Boris van Breugel et al.: Can You Rely on Your Model Evaluation? Improving Model Evaluation with Synthetic Test Data. (2023) authored by Mihaela van der Schaar. Linqi Song et al.: Demand Side Management in Smart Grids Using a Repeated Game Framework. (2014) authored by Mihaela van der Schaar. Hao Sun et al.: DAUX: a Density-based Approach for Uncertainty eXplanations. (2022) authored by Mihaela van der Schaar. Ahmed M. Alaa et al.: A Micro-foundation of Social Capital in Evolving Social Networks. (2015) authored by Mihaela van der Schaar. Alihan Hüyük et al.: Adaptive Experiment Design with Synthetic Controls. (2024) authored by Mihaela van der Schaar. Ahmed M. Alaa et al.: A Micro-Foundation of Social Capital in Evolving Social Networks. (2018) authored by Mihaela van der Schaar. Chien-Ju Ho et al.: Towards Social Norm Design for Crowdsourcing Markets. (2012) authored by Mihaela van der Schaar. Linqi Song et al.: Demand Side Management in Smart Grids using a Repeated Game Framework. (2013) authored by Mihaela van der Schaar. Yuanzhang Xiao and Mihaela van der Schaar: Repeated resource sharing among selfish players with imperfect binary feedback. (2012) authored by Mihaela van der Schaar. Yu Zhang and Mihaela van der Schaar: Robust Reputation Protocol Design for Online Communities: A Stochastic Stability Analysis. (2013) authored by Mihaela van der Schaar. Linqi Song et al.: Non-stationary demand side management method for smart grids. (2014) authored by Mihaela van der Schaar
output format: answer
|
118
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Who has been serving as the Editor-in-Chief of Mathematical Geosciences since 2007 in Canada?
Context: Mohammad Waqar Ali Asad and Roussos G. Dimitrakopoulos: Implementing a parametric maximum flow algorithm for optimal open pit mine design under uncertain supply and demand. (2013) authored by Roussos G. Dimitrakopoulos. Amina Lamghari et al.: A hybrid method based on linear programming and variable neighborhood descent for scheduling production in open-pit mines. (2015) authored by Roussos G. Dimitrakopoulos. Amina Lamghari and Roussos G. Dimitrakopoulos: A diversified Tabu search approach for the open-pit mine production scheduling problem with metal uncertainty. (2012) authored by Roussos G. Dimitrakopoulos. Zachary Levinson et al.: Simultaneous stochastic optimization of an open-pit mining complex with preconcentration using reinforcement learning. (2023) authored by Roussos G. Dimitrakopoulos. Amina Lamghari et al.: A variable neighbourhood descent algorithm for the open-pit mine production scheduling problem with metal uncertainty Open. (2014) authored by Roussos G. Dimitrakopoulos. Arja Jewbali and Roussos G. Dimitrakopoulos: Implementation of conditional simulation by successive residuals. (2011) authored by Roussos G. Dimitrakopoulos. Amina Lamghari and Roussos G. Dimitrakopoulos: Network-flow based algorithms for scheduling production in multi-processor open-pit mines accounting for metal uncertainty. (2016) authored by Roussos G. Dimitrakopoulos. Yanyan Mu et al.: Sparse image reconstruction by two phase RBM learning: Application to mine planning. (2015) authored by Roussos G. Dimitrakopoulos'}. He was selected to receive the William Christian Krumbein Medal in 2018 from the International Association for Mathematical Geosciences
output format: answer
|
Roussos Dimitrakopoulos
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Which university did the author with the publication 'Profit oriented multichannel resource management for integrated Internet and DVB-T network' earn a BS degree in Communication from?
Context: Zhisheng Niu modified 2023-10-18. Yaodan Xu et al.: SMDP-Based Dynamic Batching for Efficient Inference on GPU-Based Platforms. (2023) authored by Zhisheng Niu. Yaodan Xu et al.: SMDP-Based Dynamic Batching for Efficient Inference on GPU-Based Platforms. (2023) authored by Zhisheng Niu. Zhisheng Niu 2YrMeanCitedness 6.65714263916015625. Zhisheng Niu alternativeName Zhisheng Niu. Zhisheng Niu alternativeName Niu Zhisheng. Zhisheng Niu name Zhisheng Niu. Ruiqing Mao et al.: MoRFF: Multi-View Object Detection for Connected Autonomous Driving under Communication and Localization Limitations. (2023) authored by Zhisheng Niu. Wenqi Shi et al.: Improving Device-Edge Cooperative Inference of Deep Learning via 2-Step Pruning. (2019) authored by Zhisheng Niu. Wenqi Shi et al.: Improving Device-Edge Cooperative Inference of Deep Learning via 2-Step Pruning. (2019) authored by Zhisheng Niu. Zhisheng Niu is Person. Zhisheng Niu alternativeName Z. Niu. Yukuan Jia et al.: MASS: Mobility-Aware Sensor Scheduling of Cooperative Perception for Connected Automated Driving. (2023) authored by Zhisheng Niu. Yukuan Jia et al.: MASS: Mobility-Aware Sensor Scheduling of Cooperative Perception for Connected Automated Driving. (2023) authored by Zhisheng Niu. Jie Gong et al.: On precoding for overlapped clustering in a measured urban macrocellular environment. (2013) authored by Zhisheng Niu. Zhisheng Niu i10Index 170. Bohang Zhang et al.: Enhanced Sliding Window Superposition Coding for Industrial Automation. (2023) authored by Zhisheng Niu. Bohang Zhang et al.: Enhanced Sliding Window Superposition Coding for Industrial Automation. (2023) authored by Zhisheng Niu. Ruiqing Mao et al.: DOLPHINS: Dataset for Collaborative Perception enabled Harmonious and Interconnected Self-driving. (2022) authored by Zhisheng Niu. Ruiqing Mao et al.: DOLPHINS: Dataset for Collaborative Perception Enabled Harmonious and Interconnected Self-driving. (2022) authored by Zhisheng Niu. Shan Zhang et al.: How Many Small Cells Can be Turned Off via Vertical Offloading Under a Separation Architecture? (2015) authored by Zhisheng Niu. Shan Zhang et al.: How Many Small Cells Can Be Turned off via Vertical Offloading under a Separation Architecture? (2015) authored by Zhisheng Niu. Zhisheng Niu is Creator. Zhisheng Niu et al.: A vacation queue with setup and close-down times and batch Markovian arrival processes. (2003) authored by Zhisheng Niu. Zhiyuan Jiang et al.: SENATE: A Permissionless Byzantine Consensus Protocol in Wireless Networks. (2018) authored by Zhisheng Niu. Lehan Wang et al.: Timely Status Update Based on Urgency of Information with Statistical Context. (2020) authored by Zhisheng Niu. Zhisheng Niu h-index 51. Xi Zheng et al.: Beyond Age: Urgency of Information for Timeliness Guarantee in Status Update Systems. (2020) authored by Zhisheng Niu. Xi Zheng et al.: Beyond Age: Urgency of Information for Timeliness Guarantee in Status Update Systems. (2020) authored by Zhisheng Niu. Zhisheng Niu orcidId https://orcid.org/0000-0003-0420-2024. Zhiyuan Jiang et al.: Antenna-beam spatial transformation in c-RAN with large antenna arrays. (2017) authored by Zhisheng Niu. Jingzhou Sun et al.: Optimizing Task-Specific Timeliness With Edge-Assisted Scheduling for Status Update. (2023) authored by Zhisheng Niu. Jingzhou Sun et al.: Optimizing Task-Specific Timeliness With Edge-Assisted Scheduling for Status Update. (2023) authored by Zhisheng Niu. Zhiyuan Jiang et al.: SENATE: A Permissionless Byzantine Consensus Protocol in Wireless Networks for Real-Time Internet-of-Things Applications. (2020) authored by Zhisheng Niu. Sheng Zhou et al.: GreenDelivery: Proactive Content Caching and Push with Energy-Harvesting-based Small Cells. (2015) authored by Zhisheng Niu. Sheng Zhou et al.: GreenDelivery: proactive content caching and push with energy-harvesting-based small cells. (2015) authored by Zhisheng Niu. Hongbo Wu et al.: Random Access Protocol Design and Analysis for Neural Interfaces Under Non-Saturated Regime. (2023) authored by Zhisheng Niu. Zhisheng Niu link https://en.wikipedia.org/wiki/Zhisheng_Niu. Zhisheng Niu citedByCount 9052. Zexi Yang et al.: An Optimal Hysteretic Control Policy for Energy Saving in Cloud Computing. (2011) authored by Zhisheng Niu. Xi Zheng et al.: Context-Aware Information Lapse for Timely Status Updates in Remote Control Systems. (2019) authored by Zhisheng Niu. Xi Zheng et al.: Context-Aware Information Lapse for Timely Status Updates in Remote Control Systems. (2019) authored by Zhisheng Niu. Wenqi Shi et al.: Multi-user Co-inference with Batch Processing Capable Edge Server. (2022) authored by Zhisheng Niu. Zhisheng Niu written paper amount in year2013: 29. Zhisheng Niu written paper amount in year2013: 29. Lehan Wang et al.: A UoI-Optimal Policy for Timely Status Updates with Resource Constraint. (2021) authored by Zhisheng Niu. Zhisheng Niu written paper amount in year2012: 18. Zhisheng Niu written paper amount in year2012: 18S. You can help Wikipedia by expanding it
output format: answer
|
Beijing Jiaotong University
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the citizenship of the writer of 'Reference-dependent subjective expected utility'?
Context: Robert Sugden name Robert Sugden. Robert Sugden modified 2023-10-18. Robert Sugden 2YrMeanCitedness 0.90909093618392944336. Robert Sugden alternativeName Ryan Sugden. Robert Sugden alternativeName Robert Sugden.. Robert Sugden alternativeName Robert C. Sugden"}. In 2019, The Community of Advantage was awarded the Joseph B
output format: answer
|
English
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Which institute is the Jerry W. and Carol L. Levin Professor of Engineering affiliated with?
Context: Ray Zhang et al.: A New Framework for Registration of Semantic Point Clouds from Stereo and RGB-D Cameras. (2021) authored by Jessy W. Grizzle. Ray Zhang et al.: A New Framework for Registration of Semantic Point Clouds from Stereo and RGB-D Cameras. (2020) authored by Jessy W. Grizzle. Lu Gan et al.: Bayesian Spatial Kernel Smoothing for ScalableDense Semantic Mapping. (2019) authored by Jessy W. Grizzle. Lu Gan et al.: Bayesian Spatial Kernel Smoothing for Scalable Dense Semantic Mapping. (2020) authored by Jessy W. Grizzle. Yuxiao Chen et al.: Data-Driven Computation of Minimal Robust Control Invariant Set. (2018) authored by Jessy W. Grizzle. Jiunn-Kai Huang et al.: LiDARTag: A Real-Time Fiducial Tag System for Point Clouds. (2021) authored by Jessy W. Grizzle. Jiunn-Kai Huang et al.: Optimal Target Shape for LiDAR Pose Estimation. (2022) authored by Jessy W. Grizzle. Jiunn-Kai Huang et al.: Optimal Target Shape for LiDAR Pose Estimation. (2021) authored by Jessy W. Grizzle. Paulo Tabuada et al.: Data-driven control for feedback linearizable single-input systems. (2017) authored by Jessy W. Grizzle. Lu Gan et al.: Multitask Learning for Scalable and Dense Multilayer Bayesian Map Inference. (2023) authored by Jessy W. Grizzle. Kaveh Akbari Hamed and Jessy W. Grizzle: Event-Based Stabilization of Periodic Orbits for Underactuated 3-D Bipedal Robots With Left-Right Symmetry. (2014) authored by Jessy W. Grizzle. S.-T. Chung and J. W. Grizzle: Sampled-data observer error linearization. (1990) authored by Jessy W. Grizzle. Kaveh Akbari Hamed and Jessy W. Grizzle: Robust event-based stabilization of periodic orbits for hybrid systems: Application to an underactuated 3D bipedal robot. (2013) authored by Jessy W. Grizzle. Maani Ghaffari Jadidi et al.: Continuous Direct Sparse Visual Odometry from RGB-D Images. (2019) authored by Jessy W. Grizzle. Maani Ghaffari Jadidi et al.: Continuous Direct Sparse Visual Odometry from RGB-D Images. (2019) authored by Jessy W. Grizzle. Omar Harib et al.: Feedback Control of an Exoskeleton for Paraplegics: Toward Robustly Stable Hands-free Dynamic Walking. (2018) authored by Jessy W. Grizzle. Lu Gan et al.: Multi-Task Learning for Scalable and Dense Multi-Layer Bayesian Map Inference. (2021) authored by Jessy W. Grizzle. Dalila Djoudi et al.: A Path-Following Approach to Stable Bipedal Walking and Zero Moment Point Regulation. (2007) authored by Jessy W. Grizzle. Xiangru Xu et al.: Realizing simultaneous lane keeping and adaptive speed regulation on accessible mobile robot testbeds. (2017) authored by Jessy W. Grizzle. Jiunn-Kai Huang et al.: LiDARTag: A Real-Time Fiducial Tag using Point Clouds. (2019) authored by Jessy W. Grizzle. J. W. Grizzle and Jun-Mo Kang: Discrete-time control design with positive semi-definite Lyapunov functions. (2001) authored by Jessy W. Grizzle. Margaret Eva Mungai and Jessy W. Grizzle: Feedback Control Design for Robust Comfortable Sit-to-Stand Motions of 3D Lower-Limb Exoskeletons. (2021) authored by Jessy W. Grizzle'}. You can help Wikipedia by expanding it
output format: answer
|
University of Michigan
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the i10Index of the scholar working at Microsoft Research and published Non-visual information display using tactons in CHI Extended Abstracts 2004?
Context: Patrizia Di Campli San Vito et al.: Thermal Feedback for Simulated Lane Change Scenarios. (2019) authored by Stephen A. Brewster. Gang Li et al.: A Review of Electrostimulation-based Cybersickness Mitigations. (2020) authored by Stephen A. Brewster. Satvik Venkatesh et al.: Artificially Synthesising Data for Audio Classification and Segmentation to Improve Speech and Music Detection in Radio Broadcast. (2021) authored by Stephen A. Brewster. Satvik Venkatesh et al.: Artificially Synthesising Data for Audio Classification and Segmentation to Improve Speech and Music Detection in Radio Broadcast. (2021) authored by Stephen A. Brewster. Euan Freeman et al.: Enhancing physical objects with actuated levitating particles. (2019) authored by Stephen A. Brewster. Marcello Giordano et al.: Mid-Air Haptics for Control Interfaces. (2018) authored by Stephen A. Brewster. Ismo Rakkolainen et al.: A Survey of Mid-Air Ultrasound Haptics and Its Applications. (2021) authored by Stephen A. Brewster. Andrii Matviienko et al.: Comparing unimodal lane keeping cues for child cyclists. (2019) authored by Stephen A. Brewster. Graham A. Wilson et al.: Pressure-based menu selection for mobile devices. (2010) authored by Stephen A. Brewster. Graham A. Wilson et al.: Some like it hot: thermal feedback for mobile devices. (2011) authored by Stephen A. Brewster. Graham A. Wilson et al.: Tempera-tour, hot apps, cool widgets: thermal feedback for mobile devices. (2012) authored by Stephen A. Brewster. Graham A. Wilson et al.: Thermal Feedback Identification in a Mobile Environment. (2013) authored by Stephen A. Brewster. Gözel Shakeri et al.: Evaluating Haptic Feedback on a Steering Wheel in a Simulated Driving Scenario. (2016) authored by Stephen A. Brewster. John Williamson et al.: Social gravity: a virtual elastic tether for casual, privacy-preserving pedestrian rendezvous. (2010) authored by Stephen A. Brewster. Martin Halvey et al.: "Baby it's cold outside": the influence of ambient temperature and humidity on thermal feedback. (2012) authored by Stephen A. Brewster. Patrizia Di Campli San Vito et al.: Haptic Feedback for the Transfer of Control in Autonomous Vehicles. (2020) authored by Stephen A. Brewster. Philipp Wintersberger et al.: BikeSimWS: Workshop on Simulators, Scenarios, and Test Standard for Bicycle Research. (2023) authored by Stephen A. Brewster. Mark McGill et al.: PassengXR: A Low Cost Platform for Any-Car, Multi-User, Motion-Based Passenger XR Experiences. (2022) authored by Stephen A. Brewster. Graham A. Wilson et al.: Effects of Sound Type on Recreating the Trajectory of a Moving Source. (2015) authored by Stephen A. Brewster. Ian Oakley et al.: Solving multi-target haptic problems in menu interaction. (2001) authored by Stephen A. Brewster. Gang Li et al.: Resting-state EEG in the Vestibular Region Can Predict Motion Sickness Induced by a Motion-Simulated in-car VR Platform. (2023) authored by Stephen A. Brewster. Shaun Alexander Macdonald et al.: User Preferences for Calming Affective Haptic Stimuli in Social Settings. (2021) authored by Stephen A. Brewster. Euan Freeman et al.: Floating Widgets: Interaction with Acoustically-Levitated Widgets. (2017) authored by Stephen A. Brewster. Maxime Reynal et al.: Avoiding Collisions when Interacting with Levitating Particle Displays. (2020) authored by Stephen A. Brewster. Marilyn Rose McGee-Lennon et al.: Designing home care reminder systems: Lessons learned through co-design with older users. (2012) authored by Stephen A. Brewster. Mark McGill et al.: Who's the Fairest of Them All: Device Mirroring for the Connected Home. (2015) authored by Stephen A. Brewster. Patrizia Di Campli San Vito et al.: Investigation of Thermal Stimuli for Lane Changes. (2018) authored by Stephen A. Brewster. Patrizia Di Campli San Vito and Stephen Anthony Brewster: TempSeat: Investigating the Suitability of a Heated Car Seat for Feedback Purposes. (2022) authored by Stephen A. Brewster. Euan Freeman et al.: Towards In-Air Gesture Control of Household Appliances with Limited Displays. (2015) authored by Stephen A. Brewster. Mark McGill et al.: How to lose friends & alienate people: sharing control of a single-user TV system. (2014) authored by Stephen A. Brewster. Alexander Ng et al.: An Evaluation of Input Controls for In-Car Interactions. (2017) authored by Stephen A. Brewster. Gözel Shakeri et al.: May the Force Be with You: Ultrasound Haptic Feedback for Mid-Air Gesture Interaction in Cars. (2018) authored by Stephen A. Brewster. Gözel Shakeri et al.: Bimodal feedback for in-car mid-air gesture interaction. (2017) authored by Stephen A. Brewster. Dong-Bach Vo et al.: TactiHelm: Tactile Feedback in a Cycling Helmet for Collision Avoidance. (2021) authored by Stephen A. Brewster. Eric W. Cooper et al.: Haptic and Audio Interaction Design - 6th International Workshop, HAID 2011, Kusatsu, Japan, August 25-26, 2011. Proceedings (2011) edited by Stephen A. Brewster. Charlotte Magnusson et al.: Haptic and Audio Interaction Design - 7th International Conference, HAID 2012, Lund, Sweden, August 23-24, 2012. Proceedings (2012) edited by Stephen A. Brewster. Andrew Crossan et al.: A Horse Ovary Palpation Simulator for Veterinary Training. (2000) authored by Stephen A. Brewster. Laura Bajorunaite et al.: Virtual Reality in transit: how acceptable is VR use on public transport? (2021) authored by Stephen A. Brewster. David K. McGookin et al.: Studying digital graffiti as a location-based social network. (2014) authored by Stephen A. Brewster. David K. McGookin et al.: Shaking the dead: multimodal location based experiences for un-stewarded archaeological sites. (2012) authored by Stephen A. Brewster. David K. McGookin et al.: DigiGraff: considering graffiti as a location based social network. (2012) authored by Stephen A. Brewster. Stephen A. Brewster et al.: The 25th Annual International Conference on Mobile Computing and Networking, MobiCom 2019, Los Cabos, Mexico, October 21-25, 2019. (2019) edited by Stephen A. Brewster\nBrewster was elected a Fellow of the Royal Society of Edinburgh in March 2017. '}
output format: answer
|
141
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where did the writer of 'Speaker verification over the telephone' work as a senior research scientist?
Context: Thiago Fraga-Silva et al.: Active learning based data selection for limited resource STT and KWS. (2015) authored by Lori Lamel. Thiago Fraga-Silva et al.: Improving data selection for low-resource STT and KWS. (2015) authored by Lori Lamel. Sebastian Schmiedeke et al.: Blip10000: a social video dataset containing SPUG content for tagging and retrieval. (2013) authored by Lori Lamel. James K. Baker et al.: DRAGON Systems Resource Management Benchmark Results February 1991. (1991) authored by Lori Lamel. Thiago Fraga-Silva et al.: Incorporating MLP features in the unsupervised training process. (2012) authored by Lori Lamel. Matthijs Douze et al.: The INRIA-LIM-VocR and AXES submissions to TrecVid 2014 Multimedia Event Detection. (2014) authored by Lori Lamel. Julien Despres et al.: Modeling northern and southern varieties of dutch for STT. (2009) authored by Lori Lamel. Mathilde Hutin et al.: Lenition and Fortition of Stop Codas in Romanian. (2020) authored by Lori Lamel. Jean-Luc Gauvain et al.: The LIMSI SDR System for TREC-9. (2000) authored by Lori Lamel. Ilya Oparin et al.: Improving Mandarin Chinese STT system with Random Forests language models. (2010) authored by Lori Lamel. William Hartmann et al.: Efficient rule scoring for improved grapheme-based lexicons. (2014) authored by Lori Lamel. Jean-Luc Gauvain et al.: The LIMSI SDR System for TREC-8. (1999) authored by Lori Lamel. Laurence Devillers et al.: Challenges in real-life emotion annotation and machine learning based detection. (2005) authored by Lori Lamel. Guangpu Huang et al.: An investigation into language model data augmentation for low-resourced STT and KWS. (2017) authored by Lori Lamel. Julien Law-To et al.: A Scalable Video Search Engine Based on Audio Content Indexing and Topic Segmentation (2011) authored by Lori Lamel. Langzhou Chen et al.: Using information retrieval methods for language model adaptation. (2001) authored by Lori Lamel. Petr Fousek et al.: Transcribing broadcast data using MLP features. (2008) authored by Lori Lamel. Filip Povolný et al.: Multimodal Emotion Recognition for AVEC 2016 Challenge. (2016) authored by Lori Lamel. Hélène Bonneau-Maynard et al.: A French version of the MIT-ATIS system: portability issues. (1993) authored by Lori Lamel. Lori Lamel modified 2023-10-18. Annie Rialland et al.: Parallel Corpora in Mboshi (Bantu C25, Congo-Brazzaville). (2018) authored by Lori Lamel. Mathilde Hutin et al.: Lénition et fortition des occlusives en coda finale dans deux langues romanes : le français et le roumain (Lenition and fortition of word-final stops in two Romance languages: French and Romanian). (2020) authored by Lori Lamel. Thiago Fraga-Silva et al.: Lattice-based unsupervised acoustic model training. (2011) authored by Lori Lamel. Guangpu Huang et al.: Machine translation based data augmentation for Cantonese keyword spotting. (2016) authored by Lori Lamel. Thomas Lavergne et al.: Automatic language identity tagging on word and sentence-level in multilingual text sources: a case-study on Luxembourgish. (2014) authored by Lori Lamel. Damianos G. Karakos et al.: Score normalization and system combination for improved keyword spotting. (2013) authored by Lori Lamel. Arseniy Gorin et al.: Language Model Data Augmentation for Keyword Spotting in Low-Resourced Training Conditions. (2016) authored by Lori Lamel. Langzhou Chen et al.: Unsupervised language model adaptation for broadcast news. (2003) authored by Lori Lamel. Ilya Oparin et al.: Large-Scale Language Modeling with Random Forests for Mandarin Chinese Speech-to-Text. (2010) authored by Lori Lamel. Viet Bac Le et al.: Developing STT and KWS systems using limited language resources. (2014) authored by Lori Lamel'}. D
output format: answer
|
French National Centre for Scientific Research (CNRS)
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the number of publications for the affiliation of the writer of 'Part II: texturing surfaces and geometry creation'?
Context: Wenhao Yu et al.: Policy Transfer with Strategy Optimization. (2018) authored by Greg Turk. Wenhao Yu et al.: Policy Transfer with Strategy Optimization. (2019) authored by Greg Turk. Wenhao Yu et al.: Preparing for the Unknown: Learning a Universal Policy with Online System Identification. (2017) authored by Greg Turk. Wenhao Yu et al.: Preparing for the Unknown: Learning a Universal Policy with Online System Identification. (2017) authored by Greg Turk. Jie Tan et al.: Stable Proportional-Derivative Controllers. (2011) authored by Greg Turk. Zackory Erickson et al.: Deep Haptic Model Predictive Control for Robot-Assisted Dressing. (2018) authored by Greg Turk. Zackory Erickson et al.: Deep Haptic Model Predictive Control for Robot-Assisted Dressing. (2017) authored by Greg Turk. Wenhao Yu et al.: Protective Policy Transfer. (2020) authored by Greg Turk. Wenhao Yu et al.: Protective Policy Transfer. (2021) authored by Greg Turk. Fabio Muratore et al.: Robot Learning From Randomized Simulations: A Review. (2022) authored by Greg Turk. Christopher Wojtan et al.: Keyframe control of complex particle systems using the adjoint method. (2006) authored by Greg Turk. Fabio Muratore et al.: Robot Learning from Randomized Simulations: A Review. (2021) authored by Greg Turk. Wenhao Yu et al.: Learning symmetric and low-energy locomotion. (2018) authored by Greg Turk. Zackory Erickson et al.: Characterizing Multidimensional Capacitive Servoing for Physical Human-Robot Interaction. (2023) authored by Greg Turk. Zackory Erickson et al.: Characterizing Multidimensional Capacitive Servoing for Physical Human-Robot Interaction. (2021) authored by Greg Turk. Yunbo Zhang et al.: Learning Novel Policies For Tasks. (2019) authored by Greg Turk. Yunbo Zhang et al.: Learning Novel Policies For Tasks. (2019) authored by Greg Turk I bought one of these bunnies. I was out shopping on University Avenue near the Stanford campus. Easter . I had range scanning on my mind, and these bunnies looked to be about the right shape and size for our . Even better, these bunnies were made of terra cotta (red clay), so they were red and diffuse. \nAfter receiving his Ph. He attended Santa Monica High School in the 1970s, where he was a member of the nonmusical group "The Olive Starlight Orchestra", along with David Linden, Keith Goldfarb, David Coons, Susan P. The original bunny still lives at Stanford
output format: answer
|
212578
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many scientific articles are attributed to the institution where the writer of 'Symmetry and Quantum Features in Optical Vortices' works?
Context: Davıd L. Andrews name Davıd L. Andrews. Davıd L. Andrews alternativeName Davıd L. Andrews. Davıd L. Andrews alternativeName D. L. Andrews. Davıd L. Andrews alternativeName D.L Andrews. Davıd L. Andrews alternativeName David Leslie AndrewsK. "}. In his spare time he is an active member of his local church, he paints landscapes, and he writes occasional poetry
output format: answer
|
51679
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the hIndex of the author of Hash Function Balance and its Impact on Birthday Attacks?
Context: Mihir Bellare and Amit Sahai: Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization. (2006) authored by Mihir Bellare. Mihir Bellare and Amit Sahai: Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. (1999) authored by Mihir Bellare. Mihir Bellare and Amit Sahai: Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. (1999) authored by Mihir Bellare. Mihir Bellare et al.: DupLESS: Server-Aided Encryption for Deduplicated Storage. (2013) authored by Mihir Bellare. Mihir Bellare name Mihir Bellare. Sriram Keelveedhi et al.: DupLESS: Server-Aided Encryption for Deduplicated Storage. (2013) authored by Mihir Bellare. Mihir Bellare alternativeName Bellare Mihir. Mihir Bellare primary affiliation University of California, San Diego, USA. Mihir Bellare et al.: Format-Preserving Encryption. (2009) authored by Mihir Bellare. Mihir Bellare et al.: Format-Preserving Encryption. (2009) authored by Mihir Bellare. Mihir Bellare alternativeName Mihir Bellare. Mihir Bellare i10Index 206. Mihir Bellare and Sriram Keelveedhi: Interactive Message-Locked Encryption and Secure Deduplication. (2015) authored by Mihir Bellare. Mihir Bellare and Sriram Keelveedhi: Interactive Message-Locked Encryption and Secure Deduplication. (2015) authored by Mihir Bellare. Mihir Bellare alternativeName M. Bellare. Mihir Bellare affiliation University of California, San Diego, USA. Mihir Bellare et al.: An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. (2004) authored by Mihir Bellare. Mihir Bellare and Adriana Palacio: Towards Plaintext-Aware Public-Key Encryption without Random Oracles. (2004) authored by Mihir Bellare. Mihir Bellare and Adriana Palacio: Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. (2004) authored by Mihir Bellare. Richard Beigel et al.: Languages that Are Easier than their Proofs (1991) authored by Mihir Bellare. Mihir Bellare et al.: An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem. (2003) authored by Mihir Bellare. Mihir Bellare et al.: Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. (2004) authored by Mihir Bellare. Mihir Bellare and Viet Tung Hoang: Identity-Based Format-Preserving Encryption. (2017) authored by Mihir Bellare. Mihir Bellare and Viet Tung Hoang: Identity-Based Format-Preserving Encryption. (2017) authored by Mihir Bellare. Mihir Bellare et al.: Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm. (2002) authored by Mihir Bellare. Mihir Bellare: A Technique for Upper Bounding the Spectral Norm with Applications to Learning. (1992) authored by Mihir Bellare. Mihir Bellare et al.: Key Insulation and Intrusion Resilience Over a Public Channel. (2009) authored by Mihir Bellare. Mihir Bellare et al.: Key Insulation and Intrusion Resilience over a Public Channel. (2009) authored by Mihir Bellare. Mihir Bellare creator note award (2009): Paris Kanellakis Award. Mihir Bellare member of University of California, San Diego. Mihir Bellare et al.: Efficient probabilistically checkable proofs and applications to approximations. (1993) authored by Mihir Bellare. Mihir Bellare et al.: Efficient probabilistic checkable proofs and applications to approximation. (1994) authored by Mihir Bellare. Mihir Bellare and Phillip Rogaway: The complexity of approximating a nonlinear program. (1995) authored by Mihir Bellare. Vivek Arte and Mihir Bellare: Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer. (2020) authored by Mihir Bellare. Vivek Arte and Mihir Bellare: Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer. (2020) authored by Mihir Bellare. Mihir Bellare et al.: Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. (2008) authored by Mihir Bellare. Mihir Bellare et al.: Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. (2008) authored by Mihir Bellare"}. He holds a Bachelor of Science degree from the California Institute of Technology and a Ph. Bellare has published a number of papers in the field of Format-Preserving Encryption
output format: answer
|
88
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Which institute has fewer publications, RWTH Aachen University or Hamburg University of Technology?
Context: Edward Rigdon et al.: Conflating Antecedents and Formative Indicators: A Comment on Aguirre-Urreta and Marakas. (2014) authored by Christian M. Ringle. Christian M. Ringle et al.: Response-Based Segmentation Using Finite Mixture Partial Least Squares - Theoretical Foundations and an Application to American Customer Satisfaction Index Data. (2010) authored by Christian M. Ringle. Christian M. Ringle et al.: Genetic algorithm segmentation in partial least squares structural equation modeling. (2014) authored by Christian M. Ringle. Christian M. Ringle et al.: Finite Mixture and Genetic Algorithm Segmentation in Partial Least Squares Path Modeling: Identification of Multiple Segments in Complex Path Models. (2008) authored by Christian M. Ringle. Christian M. Ringle is Person. Christian M. Ringle name Christian M. Ringle"}. He is one of the co-founders and co-developers of SmartPLS, a Java-based software package for composite-based structural equation modeling using the partial least squares path modeling method
output format: answer
|
Hamburg University of Technology
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: From which institute did the author who published the paper titled 'Robot therapy pets get a starring role in Lightyear and in real life' graduate from?
Context: Sahra Ghalebikesabi et al.: Deep Generative Pattern-Set Mixture Models for Nonignorable Missingness. (2021) authored by Christopher C. Holmes. Sahra Ghalebikesabi et al.: Deep Generative Missingness Pattern-Set Mixture Models. (2021) authored by Christopher C. Holmes. Alexander Camuto et al.: Asymmetric Heavy Tails and Implicit Bias in Gaussian Noise Injections. (2021) authored by Christopher C. Holmes. Alexander Camuto et al.: Asymmetric Heavy Tails and Implicit Bias in Gaussian Noise Injections. (2021) authored by Christopher C. Holmes. Babak Hodjat et al.: PRETSL: Distributed Probabilistic Rule Evolution for Time-Series Classification. (2016) authored by Christopher C. Holmes. Tammo Rukat et al.: Probabilistic Boolean Tensor Decomposition. (2018) authored by Christopher C. Holmes. Alexander Camuto et al.: Explicit Regularisation in Gaussian Noise Injections. (2020) authored by Christopher C. Holmes. Alexander Camuto et al.: Explicit Regularisation in Gaussian Noise Injections. (2020) authored by Christopher C. Holmes. Tammo Rukat et al.: TensOrMachine: Probabilistic Boolean Tensor Decomposition. (2018) authored by Christopher C. Holmes. Christopher C. Holmes and Bani K. Mallick: Bayesian wavelet networks for nonparametric regression. (2000) authored by Christopher C. Holmes. Stephen J. Roberts et al.: Minimum-Entropy Data Partitioning Using Reversible Jump Markov Chain Monte Carlo. (2001) authored by Christopher C. Holmes. Michalis K. Titsias et al.: Statistical Inference in Hidden Markov Models using $k$-segment Constraints. (2013) authored by Christopher C. Holmes. Sahra Ghalebikesabi et al.: Quasi-Bayesian nonparametric density estimation via autoregressive predictive updates. (2023) authored by Christopher C. Holmes"}. You can help Wikipedia by expanding it
output format: answer
|
Texas A&M University
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Prior to moving to UNAM, what institution did the contributor of 'On Convex Quadrangulations of Point Sets on the Plane' work at for many years?
Context: Jorge Urrutia alternativeName Jorge Vicente González Urrutia. Jorge Urrutia alternativeName Urrutia Jorge. Jorge Urrutia name Jorge Urrutia. Jorge Urrutia alternativeName Jorge Urrutia. Jorge Urrutia alternativeName J. Urrutia. Jurek Czyzowicz et al.: Local Edge Colouring of Yao-Like Subgraphs of Unit Disk Graphs. (2007) authored by Jorge Urrutia. Jurek Czyzowicz et al.: Local edge colouring of Yao-like subgraphs of Unit Disk Graphs. (2009) authored by Jorge Urrutia. Constantinos Georgiou et al.: Distributed Dynamic Storage in Wireless Networks. (2005) authored by Jorge Urrutia. Jorge Urrutia 2YrMeanCitedness 0.20000000298023223877. Jurek Czyzowicz et al.: Searching for a Non-adversarial, Uncooperative Agent on a Cycle. (2017) authored by Jorge Urrutia. Jurek Czyzowicz et al.: Searching for a non-adversarial, uncooperative agent on a cycle. (2020) authored by Jorge Urrutia. Jorge Urrutia member of Universidad Nacional Autónoma de México. Victor Neumann-Lara et al.: A note on minimally 3-connected graphs. (2004) authored by Jorge Urrutia. Jorge Urrutia worksCount 403. Jorge Urrutia i10Index 82. Sergey Bereg et al.: Optimal placement of base stations in border surveillance using limited capacity drones. (2022) authored by Jorge Urrutia. Sergey Bereg et al.: Optimal Placement of Base Stations in Border Surveillance using Limited Capacity Drones. (2022) authored by Jorge Urrutia. Jurek Czyzowicz et al.: Local Algorithms for Dominating and Connected Dominating Sets of Unit Disk Graphs with Location Aware Nodes. (2008) authored by Jorge Urrutia. Paul Boone et al.: Morelia Test: Improving the Efficiency of the Gabriel Test and Face Routing in Ad-Hoc Networks. (2004) authored by Jorge Urrutia. Alberto Negro et al.: Efficient Distributed Selection with Bounded Messages. (1997) authored by Jorge Urrutia. Victor Neumann-Lara et al.: Uniquely colourable m-dichromatic oriented graphs. (1986) authored by Jorge Urrutia. Jan van Leeuwen et al.: Guessing Games and Distributed Computations in Synchronous Networks. (1987) authored by Jorge Urrutia. Jorge Urrutia is Person. Jorge Urrutia modified 2023-10-18. José Miguel Díaz-Báñez et al.: Min-energy broadcast in mobile ad hoc networks with restricted motion. (2012) authored by Jorge Urrutia. Jorge Urrutia is Creator. Mikhail J. Atallah et al.: Finding a minimum independent dominating set in a permutation graph. (1988) authored by Jorge Urrutia. Sergey Bereg et al.: Failure and Communication in a Synchronized Multi-drone System. (2021) authored by Jorge Urrutia. Victor Neumann-Lara et al.: A note on covering the edges of a graph with bonds. (1999) authored by Jorge Urrutia. Jurek Czyzowicz et al.: Local 7-coloring for planar subgraphs of unit disk graphs. (2011) authored by Jorge Urrutia. Jurek Czyzowicz et al.: Local 7-Coloring for Planar Subgraphs of Unit Disk Graphs. (2008) authored by Jorge Urrutia. Vladimir Estivill-Castro et al.: On the chromatic number of tree graphs. (2000) authored by Jorge Urrutia Read. '}
output format: answer
|
University of Ottawa
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In which year did the author receive his Ph.D. in computer science?
Context: Rajeev Alur et al.: Space-efficient Query Evaluation over Probabilistic Event Streams. (2020) authored by Rajeev Alur. Sebastian Burckhardt et al.: CheckFence: checking consistency of concurrent data types on relaxed memory models. (2007) authored by Rajeev Alur. Kishor Jothimurugan et al.: Robust Subtask Learning for Compositional Generalization. (2023) authored by Rajeev Alur. Kishor Jothimurugan et al.: Robust Subtask Learning for Compositional Generalization. (2023) authored by Rajeev Alur. Rajeev Alur et al.: Compositional and symbolic synthesis of reactive controllers for multi-agent systems. (2018) authored by Rajeev Alur. Rajeev Alur et al.: Policy Synthesis and Reinforcement Learning for Discounted LTL. (2023) authored by Rajeev Alur. Rajeev Alur et al.: Policy Synthesis and Reinforcement Learning for Discounted LTL. (2023) authored by Rajeev Alur. Houssam Abbas et al.: Quantitative Regular Expressions for Monitoring Cardiac Arrhythmias. (2018) authored by Rajeev Alur. Rajeev Alur et al.: Compositional Synthesis of Reactive Controllers for Multi-agent Systems. (2016) authored by Rajeev Alur. Kishor Jothimurugan et al.: Abstract Value Iteration for Hierarchical Reinforcement Learning. (2020) authored by Rajeev Alur. Kishor Jothimurugan et al.: Abstract Value Iteration for Hierarchical Reinforcement Learning. (2021) authored by Rajeev Alur. Rajeev Alur and Nimit Singhania: Precise piecewise affine models from input-output data. (2014) authored by Rajeev Alur. Rajeev Alur and Arun Chandrashekharapuram: Dispatch sequences for embedded control models. (2007) authored by Rajeev Alur. Rajeev Alur et al.: Counter-Example Guided Predicate Abstraction of Hybrid Systems. (2003) authored by Rajeev Alur. Rajeev Alur and Arun Chandrashekharapuram: Dispatch Sequences for Embedded Control Models. (2005) authored by Rajeev Alur. Wonhong Nam et al.: Automatic symbolic compositional verification by learning assumptions. (2008) authored by Rajeev Alur. Rajeev Alur et al.: Compositional Synthesis with Parametric Reactive Controllers. (2016) authored by Rajeev Alur. Luan Viet Nguyen et al.: REAFFIRM: Model-Based Repair of Hybrid Systems for Improving Resiliency. (2020) authored by Rajeev Alur. Luan Viet Nguyen et al.: REAFFIRM: Model-Based Repair of Hybrid Systems for Improving Resiliency. (2019) authored by Rajeev Alur. Konstantinos Mamouras et al.: StreamQRE: modular specification and efficient evaluation of quantitative queries over streaming data. (2017) authored by Rajeev Alur. Yifei Yuan et al.: NetEgg: A Scenario-Based Programming Toolkit for SDN Policies. (2018) authored by Rajeev Alur. Sebastian Burckhardt et al.: Bounded Model Checking of Concurrent Data Types on Relaxed Memory Models: A Case Study. (2006) authored by Rajeev Alur. Zhihao Jiang et al.: Modeling and Verification of a Dual Chamber Implantable Pacemaker. (2012) authored by Rajeev Alur. Rajeev Alur and Thomas A. Henzinger: Local Liveness for Compositional Modeling of Fair Reactive Systems. (1995) authored by Rajeev Alur. Rajeev Alur et al.: Automatic Completion of Distributed Protocols with Symmetry. (2015) authored by Rajeev Alur. Rajeev Alur et al.: Automatic Completion of Distributed Protocols with Symmetry. (2015) authored by Rajeev Alur. Rajeev Alur et al.: Pattern-Based Refinement of Assume-Guarantee Specifications in Reactive Synthesis. (2015) authored by Rajeev Alur. Rajeev Alur et al.: Model-Checking of Correctness Conditions for Concurrent Objects. (2000) authored by Rajeev Alur. Rajeev Alur et al.: Exploiting Behavioral Hierarchy for Efficient Model Checking. (2002) authored by Rajeev Alur. Rajeev Alur et al.: Counterexample-guided predicate abstraction of hybrid systems. (2006) authored by Rajeev Alur. Rajeev Alur et al.: DReX: A Declarative Language for Efficiently Evaluating Regular String Transformations. (2015) authored by Rajeev Alur. Anton Xue et al.: Chordal Sparsity for Lipschitz Constant Estimation of Deep Neural Networks. (2022) authored by Rajeev Alur. Anton Xue et al.: Chordal Sparsity for Lipschitz Constant Estimation of Deep Neural Networks. (2022) authored by Rajeev Alur. Kishor Jothimurugan et al.: A Composable Specification Language for Reinforcement Learning Tasks. (2019) authored by Rajeev Alur. Kishor Jothimurugan et al.: A Composable Specification Language for Reinforcement Learning Tasks. (2020) authored by Rajeev Alur. Rajeev Alur et al.: Model-Checking of Correctness Conditions for Concurrent Objects. (1996) authored by Rajeev Alur. Rajeev Alur et al.: Compositional modeling and refinement for hierarchical hybrid systems. (2006) authored by Rajeev Alur. Luan Viet Nguyen et al.: Detecting security leaks in hybrid systems with information flow analysis. (2019) authored by Rajeev Alur. Rajeev Alur: Efficient Formal Verification of Hierarchical Descriptions. (1998) authored by Rajeev Alur\nProf. "}
output format: answer
|
1991
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In which year was the scholar who authored 'Analysis of the impact of sensor noise on formation flying control' named a Fellow of the American Institute of Aeronautics and Astronautics?
Context: Han-Lim Choi et al.: Potential Game-Theoretic Analysis of a Market-Based Decentralized Task Allocation Algorithm. (2014) authored by Jonathan P. How. Luke B. Johnson et al.: Decentralized Task Allocation Using Local Information Consistency Assumptions. (2017) authored by Jonathan P. How. Alborz Geramifard et al.: Batch-iFDD for Representation Expansion in Large MDPs. (2013) authored by Jonathan P. How. Alborz Geramifard et al.: Batch-iFDD for Representation Expansion in Large MDPs. (2013) authored by Jonathan P. How. Yulun Tian et al.: Resource-Aware Algorithms for Distributed Loop Closure Detection with Provable Performance Guarantees. (2018) authored by Jonathan P. How. Yulun Tian et al.: Resource-Aware Algorithms for Distributed Loop Closure Detection with Provable Performance Guarantees. (2019) authored by Jonathan P. How. Noam Buckman et al.: Partial Replanning for Decentralized Dynamic Task Allocation. (2018) authored by Jonathan P. How. Dong-Ki Kim et al.: Game-Theoretical Perspectives on Active Equilibria: A Preferred Solution Concept over Nash Equilibria. (2022) authored by Jonathan P. How. Luca F. Bertuccelli and Jonathan P. How: Estimation of non-stationary Markov Chain transition models. (2008) authored by Jonathan P. How. Samir Wadhwania et al.: Policy Distillation and Value Matching in Multiagent Reinforcement Learning. (2019) authored by Jonathan P. How. Samir Wadhwania et al.: Policy Distillation and Value Matching in Multiagent Reinforcement Learning. (2019) authored by Jonathan P. How. Yulun Tian et al.: A Resource-Aware Approach to Collaborative Loop Closure Detection with Provable Performance Guarantees. (2019) authored by Jonathan P. How. Yulun Tian et al.: A resource-aware approach to collaborative loop-closure detection with provable performance guarantees. (2021) authored by Jonathan P. How. Yulun Tian et al.: Block-Coordinate Minimization for Large SDPs with Block-Diagonal Constraints. (2019) authored by Jonathan P. How. Hongchuan Wei et al.: Information value in nonparametric Dirichlet-process Gaussian-process (DPGP) mixture models. (2016) authored by Jonathan P. How. Trong Nghia Hoang et al.: Near-Optimal Adversarial Policy Switching for Decentralized Asynchronous Multi-Agent Systems. (2018) authored by Jonathan P. How. Trong Nghia Hoang et al.: Near-Optimal Adversarial Policy Switching for Decentralized Asynchronous Multi-Agent Systems. (2017) authored by Jonathan P. How. Trevor Campbell et al.: Streaming, Distributed Variational Inference for Bayesian Nonparametrics. (2015) authored by Jonathan P. How. Trevor Campbell et al.: Streaming, Distributed Variational Inference for Bayesian Nonparametrics. (2015) authored by Jonathan P. How. Bernard Michini et al.: Bayesian Nonparametric Reward Learning From Demonstration. (2015) authored by Jonathan P. How. Han-Lim Choi et al.: Consensus-Based Decentralized Auctions for Robust Task Allocation. (2009) authored by Jonathan P. How. Shayegan Omidshafiei et al.: Deep Decentralized Multi-task Multi-Agent Reinforcement Learning under Partial Observability. (2017) authored by Jonathan P. How. Shayegan Omidshafiei et al.: Deep Decentralized Multi-task Multi-Agent Reinforcement Learning under Partial Observability. (2017) authored by Jonathan P. How. Dong-Ki Kim et al.: Learning Hierarchical Teaching Policies for Cooperative Agents. (2020) authored by Jonathan P. How. Marwa Abdulhai et al.: Context-Specific Representation Abstraction for Deep Option Learning. (2021) authored by Jonathan P. How. Marwa Abdulhai et al.: Context-Specific Representation Abstraction for Deep Option Learning. (2022) authored by Jonathan P. How. Christopher Amato et al.: Modeling and Planning with Macro-Actions in Decentralized POMDPs. (2019) authored by Jonathan P. How. Trevor Campbell et al.: Multiagent allocation of Markov decision process tasks. (2013) authored by Jonathan P. How. Lena M. Downes et al.: Wide-Area Geolocalization with a Limited Field of View Camera in Challenging Urban Environments Dataset. (2023) authored by Jonathan P. How. N. Kemal Ure et al.: Adaptive Planning for Markov Decision Processes with Uncertain Transition Models via Incremental Feature Dependency Discovery. (2012) authored by Jonathan P. How. Sameera S. Ponda et al.: Risk allocation strategies for distributed chance-constrained task allocation. (2013) authored by Jonathan P. How. Luke B. Johnson et al.: Allowing non-submodular score functions in distributed task allocation. (2012) authored by Jonathan P. How. Han-Lim Choi et al.: Decentralized task allocation for heterogeneous teams with cooperation constraints. (2010) authored by Jonathan P. How. Yu Fan Chen et al.: Decoupled multiagent path planning via incremental sequential convex programming. (2015) authored by Jonathan P. How. Yulun Tian et al.: Near-Optimal Budgeted Data Exchange for Distributed Loop Closure Detection. (2018) authored by Jonathan P. How. Yulun Tian et al.: Near-Optimal Budgeted Data Exchange for Distributed Loop Closure Detection. (2018) authored by Jonathan P. How. Daniel S. Levine and Jonathan P. How: Quantifying Nonlocal Informativeness in High-Dimensional, Loopy Gaussian Graphical Models. (2014) authored by Jonathan P. How. Shayegan Omidshafiei et al.: Learning to Teach in Cooperative Multiagent Reinforcement Learning. (2018) authored by Jonathan P. How. Jesus Tordesillas and Jonathan P. How: MINVO Basis: Finding Simplexes with Minimum Volume Enclosing Polynomial Curves. (2020) authored by Jonathan P. How. Shayegan Omidshafiei et al.: Learning to Teach in Cooperative Multiagent Reinforcement Learning. (2019) authored by Jonathan P. How. Vishnu Desaraju and Jonathan P. How: Decentralized path planning for multi-agent teams with complex constraints. (2012) authored by Jonathan P. How. Sharan Raja et al.: Communication-Aware Consensus-Based Decentralized Task Allocation in Communication Constrained Environments. (2022) authored by Jonathan P. How. Jesus Tordesillas and Jonathan P. How: MINVO Basis: Finding Simplexes with Minimum Volume Enclosing Polynomial Curves. (2022) authored by Jonathan P. How. Stewart Jamieson et al.: Multi-Robot Distributed Semantic Mapping in Unfamiliar Environments through Online Matching of Learned Representations. (2021) authored by Jonathan P. How. Stewart Jamieson et al.: Multi-Robot Distributed Semantic Mapping in Unfamiliar Environments through Online Matching of Learned Representations. (2021) authored by Jonathan P. How. Dong-Ki Kim et al.: A Policy Gradient Algorithm for Learning to Learn in Multiagent Reinforcement Learning. (2021) authored by Jonathan P. How. Dong-Ki Kim et al.: A Policy Gradient Algorithm for Learning to Learn in Multiagent Reinforcement Learning. (2020) authored by Jonathan P. How. Jacqueline Ankenbauer et al.: Global Localization in Unstructured Environments Using Semantic Object Maps Built from Various Viewpoints. (2023) authored by Jonathan P. How. Jacqueline Ankenbauer et al.: Global Localization in Unstructured Environments using Semantic Object Maps Built from Various Viewpoints. (2023) authored by Jonathan P. How. Emily M. Craparo et al.: Throughput Optimization in Mobile Backbone Networks. (2011) authored by Jonathan P. How"}. D. You can help Wikipedia by expanding it. Chan-Woo Park and Dr
output format: answer
|
2016
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Who has more worksCount, A. A. Fraeman or Kenneth A. De Jong?
Context: Uday Kamath et al.: An Evolutionary Algorithm Approach for Feature Generation from Sequence Data and Its Application to DNA Splice Site Prediction. (2012) authored by Kenneth A. De Jong. Uday Kamath et al.: Selecting predictive features for recognition of hypersensitive sites of regulatory genomic sequences with an evolutionary algorithm. (2010) authored by Kenneth A. De Jong. Uday Kamath et al.: An evolutionary-based approach for feature generation: Eukaryotic promoter recognition. (2011) authored by Kenneth A. De Jong. Uday Kamath et al.: Feature and Kernel Evolution for Recognition of Hypersensitive Sites in DNA Sequences. (2010) authored by Kenneth A. De Jong. Emmanuel Sapin et al.: Mapping Multiple Minima in Protein Energy Landscapes with Evolutionary Algorithms. (2015) authored by Kenneth A. De Jong. Benjamin W. Wah et al.: Report on Workshop on High Performance Computing and Communications for Grand Challenge Applications: Computer Vision, Speech and Natural Language Processing, and Artificial Intelligence. (1993) authored by Kenneth A. De Jong. Uday Kamath et al.: SAX-EFG: an evolutionary feature generation framework for time series classification. (2014) authored by Kenneth A. De Jong. Uday Kamath et al.: EML: A Scalable, Transparent Meta-Learning Paradigm for Big Data Applications. (2019) authored by Kenneth A. De Jong. Kexin Chen et al.: Differential Spatial Representations in Hippocampal CA1 and Subiculum Emerge in Evolved Spiking Neural Networks. (2021) authored by Kenneth A. De Jong. Rida E. Moustafa et al.: A GA-Based Method for Function Approximation Using Adaptive Interpolation. (2000) authored by Kenneth A. De Jong. Emmanuel Sapin et al.: Modeling protein structural transitions as a multiobjective optimization problem. (2017) authored by Kenneth A. De Jong. Jerzy W. Bala et al.: Using Genetic Algorithms to Improve the Performance of Classification Rules Produced by Symolic Inductive Methods. (1991) authored by Kenneth A. De Jong. Mohamad M. Awad and Kenneth A. De Jong: Optimization of spectral signatures selection using multi-objective genetic algorithms. (2011) authored by Kenneth A. De Jong. Alden H. Wright et al.: Foundations of Genetic Algorithms, 8th International Workshop, FOGA 2005, Aizu-Wakamatsu City, Japan, January 5-9, 2005, Revised Selected Papers (2005) edited by Kenneth A. De Jong. Emmanuel Sapin et al.: Path-based Guidance of an Evolutionary Algorithm in Mapping a Fitness Landscape and its Connectivity. (2016) authored by Kenneth A. De Jong. Emmanuel Sapin et al.: From Optimization to Mapping: An Evolutionary Algorithm for Protein Energy Landscapes. (2018) authored by Kenneth A. De Jong. Uday Kamath et al.: A Two-Stage Evolutionary Approach for Effective Classification of hypersensitive DNA Sequences. (2011) authored by Kenneth A. De Jong. Emmanuel Sapin et al.: An evolutionary algorithm to model structural excursions of a protein. (2017) authored by Kenneth A. De Jong. Brian S. Olson et al.: Off-lattice protein structure prediction with homologous crossover. (2013) authored by Kenneth A. De Jong. Uday Kamath et al.: A Spatial EA Framework for Parallelizing Machine Learning Methods. (2012) authored by Kenneth A. De Jong. Pawel A. Stefanski et al.: An object-oriented toolkit for evolutionary algorithms. (1995) authored by Kenneth A. De Jong. Ahmed Bin Zaman et al.: Adaptive Stochastic Optimization to Improve Protein Conformation Sampling. (2023) authored by Kenneth A. De Jong He became a faculty member at George Mason University in 1984. in 1975 with a dissertation on genetic algorithms
output format: answer
|
Kenneth A. De Jong
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In which country was the author who authored Enabling the use of context in interactive applications born?
Context: Anind K. Dey 2YrMeanCitedness 3.7222223281860351562. Prerna Chikersal et al.: Detecting Depression and Predicting its Onset Using Longitudinal Symptoms Captured by Passive Sensing: A Machine Learning Approach With Robust Feature Selection. (2021) authored by Anind K. Dey. Paul Baumann et al.: Quantifying the Uncertainty of Next-Place Predictions. (2016) authored by Anind K. Dey. Anind K. Dey h-index 66. Anind K. Dey modified 2023-10-18. Brian D. Ziebart et al.: Learning Selectively Conditioned Forest Structures with Applications to DBNs and Classification. (2007) authored by Anind K. Dey. Brian D. Ziebart et al.: Learning Selectively Conditioned Forest Structures with Applications to DBNs and Classification (2012) authored by Anind K. Dey. Christian Koehler et al.: TherML: occupancy prediction for thermostat control. (2013) authored by Anind K. Dey. Hongbo Ni et al.: Automated recognition of hypertension through overnight continuous HRV monitoring. (2018) authored by Anind K. Dey. Anind K. Dey alternativeName Anind Dey. Brian D. Ziebart et al.: Probabilistic pointing target prediction via inverse optimal control. (2012) authored by Anind K. Dey. Anind K. Dey i10Index 211. Anind K. Dey alternativeName Dey Anind. Brian D. Ziebart et al.: Planning-based prediction for pedestrians. (2009) authored by Anind K. Dey. Chen Qian et al.: Prediction of Hospital Readmission from Longitudinal Mobile Data Streams. (2021) authored by Anind K. Dey. Varun Jain et al.: Depression Estimation Using Audiovisual Features and Fisher Vector Encoding. (2014) authored by Anind K. Dey. Afsaneh Doryab et al.: Modeling Biobehavioral Rhythms with Passive Sensing in the Wild: A Case Study to Predict Readmission Risk after Pancreatic Surgery. (2019) authored by Anind K. Dey. Senaka Buthpitiya et al.: Soft Authentication with Low-Cost Signatures. (2014) authored by Anind K. Dey. Anind K. Dey alternativeName A. Dey. Wilhelm Kleiminger et al.: Using unlabeled Wi-Fi scan data to discover occupancy patterns of private households. (2013) authored by Anind K. Dey. Senaka Buthpitiya et al.: n-Gram Geo-trace Modeling. (2011) authored by Anind K. Dey. Julian Ramos Rojas et al.: Sampling techniques to improve big data exploration. (2017) authored by Anind K. Dey. Anind K. Dey alternativeName Anind K. Dey. Choonsung Shin et al.: Serendipity-empowered path planning for predictive task completion. (2015) authored by Anind K. Dey. Anind K. Dey alternativeName A. K. Dey. Yasaman S. Sefidgar et al.: Passively-sensed Behavioral Correlates of Discrimination Events in College Students. (2019) authored by Anind K. Dey. Anind K. Dey written paper amount in year2021: 21. Anind K. Dey written paper amount in year2021: 21. Yuuki Nishiyama et al.: Senbay: a platform for instantly capturing, integrating, and restreaming of synchronized multiple sensor-data stream. (2018) authored by Anind K. Dey. Brian D. Ziebart et al.: Maximum Entropy Inverse Reinforcement Learning. (2008) authored by Anind K. Dey. Anind K. Dey written paper amount in year2016: 27. Anind K. Dey written paper amount in year2016: 27. Anind K. Dey link https://mathgenealogy.org/id.php?id=78267. Xuhai Xu et al.: Mental-LLM: Leveraging Large Language Models for Mental Health Prediction via Online Text Data. (2024) authored by Anind K. Dey. Christian Koehler et al.: Indoor-ALPS: an adaptive indoor location prediction system. (2014) authored by Anind K. Dey'}. S. S. In 2007, he received the W. As of August 2023, Jain\'s h-index on Google Scholar is 211 and Bengio\'s is 224
output format: answer
|
Canada
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many works has the author of What is a flag for? Social media reporting tools and the vocabulary of complaint?
Context: Kate Crawford name Kate Crawford. Margarita Boyarskaya et al.: Overcoming Failures of Imagination in AI Infused System Development and Deployment. (2020) authored by Kate Crawford 0002. Kate Crawford i10Index 55. Kate Crawford alternativeName Kate Crawford. Kate Crawford alternativeName K. Crawford. Kate Crawford alternativeName K G Crawford'}. \nCrawford has a PhD from the University of Sydney. \nIn 2019 she was the inaugural holder of the AI & Justice visiting chair at École Normale Supérieure in Paris, in partnership with the Fondation Abeona. She was a Fellow of the Centre for Policy Development and in March 2008 she was selected as one of 1000 Australians to attend the Australia 2020 Summit in Canberra on 19–20 April 2008. \nCrawford was previously part of the Canberra electronic music duo B(if)tek (along with Nicole Skeltys) and released three albums between 1998 and 2003
output format: answer
|
159
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: When was the author of 'Efficient Algorithms for Finding Minimum Spanning Forests of Hierarchically Defined Graphs' born?
Context: Katarzyna Bozek et al.: Analysis of Physicochemical and Structural Properties Determining HIV-1 Coreceptor Usage. (2013) authored by Thomas Lengauer. Mazen Ahmad et al.: Entropy gain due to water release upon ligand binding. (2014) authored by Thomas Lengauer. Iris Antes et al.: DynaPred: A structure and sequence based method for the prediction of MHC class I binding peptide sequences and conformations. (2006) authored by Thomas Lengauer. Kirsten Roomp et al.: Predicting MHC class I epitopes in large datasets. (2010) authored by Thomas Lengauer. Thomas Lengauer member of University Hospital Cologne. Thomas Lengauer 2YrMeanCitedness 1.6521738767623901367. Hongbo Zhu et al.: NOXclass: prediction of protein-protein interaction types. (2006) authored by Thomas Lengauer. Thomas Lengauer alternativeName Lengauer Thomas. Mario Albrecht et al.: Disease-associated variants in PYPAF1 and NOD2 result in similar alterations of conserved sequence. (2003) authored by Thomas Lengauer. Niko Beerenwinkel et al.: Geno2pheno: Interpreting Genotypic HIV Drug Resistance Tests. (2001) authored by Thomas Lengauer. Steffen Bickel et al.: Multi-task learning for HIV therapy screening. (2008) authored by Thomas Lengauer. Thomas Lengauer primary affiliation University Hospital Cologne, Germany. Jasmina Bogojeska et al.: History-alignment models for bias-aware prediction of virological response to HIV combination therapy. (2012) authored by Thomas Lengauer. Andreas Kämper et al.: Fully Automated Flexible Docking of Ligands into Flexible Synthetic Receptors Using Forward and Inverse Docking Strategies. (2006) authored by Thomas Lengauer. Thomas Lengauer affiliation University Hospital Cologne, Germany. Nico Pfeifer and Thomas Lengauer: Improving HIV coreceptor usage prediction in the clinic using hints from next-generation sequencing data. (2012) authored by Thomas Lengauer. Thomas Lengauer alternativeName Thomas Lengauer. Andreas Hahn et al.: Confirmation of human protein interaction data by human expression data. (2005) authored by Thomas Lengauer. Thomas Lengauer name Thomas Lengauer. Andreas Schlicker et al.: A new measure for functional similarity of gene products based on Gene Ontology. (2006) authored by Thomas Lengauer. Oliver Sander et al.: Structural Descriptors of gp120 V3 Loop for the Prediction of HIV-1 Coreceptor Usage. (2007) authored by Thomas Lengauer. Michal Rosen-Zvi et al.: Selecting anti-HIV therapies based on a variety of genomic and clinical factors. (2008) authored by Thomas Lengauer. Hagen Blankenburg et al.: DASMI: exchanging, annotating and assessing molecular interaction data. (2009) authored by Thomas Lengauer. Kirsten Roomp et al.: Arevir: A Secure Platform for Designing Personalized Antiretroviral Therapies Against HIV. (2006) authored by Thomas Lengauer. Jörg Rahnenführer et al.: Estimating cancer survival and clinical outcome based on genetic tumor progression scores. (2005) authored by Thomas Lengauer. Thomas Lengauer modified 2023-10-18"}. rer. nat. In 2014 he received the Hector Science Award. In 2010 he was awarded the AIDS Research Award of the Heinz-Ansmann Foundation, together with Rolf Kaiser and Marc Oette. Since 2019 he has been part-time affiliated with the Institute of Virology at Cologne University
output format: answer
|
12 November 1952
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Who supervised the author of 'A quantum-inspired classical algorithm for recommendation systems' for her thesis dissertation in 2018?
Context: Ewin Tang alternativeName E Tang. Ewin Tang alternativeName Tang Ewin. Ewin Tang alternativeName Ewin Tang. Ewin Tang name Ewin Tang. Ewin Tang i10Index 6 Tang\'s first experience of research involved working on in vivo imaging for biomedical research such as optical probes to view polarised macrophages during foreign body reactions,[pub 1] bacterial infection,[pub 2] fibrin deposition,[pub 3] and real-time detection of neutrophil responses. \nTang skipped the fourth, fifth, and sixth grades in order to enroll at the University of Texas at Austin at the age of 14. '}. 0 grade-point average. \nIn the same year, Tang began her Ph. [pub 4] In 2014 Tang was awarded an Davidson Fellow Honorable Mention for her work on an optical imaging probe for real-time detection of infection
output format: answer
|
Scott Aaronson
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where did the Fellow of the Institute of Electrical and Electronics Engineers in 2013, for contributions to software architecture, come from?
Context: Nabor Chagas Mendonça et al.: Developing Self-Adaptive Microservice Systems: Challenges and Directions. (2021) authored by David Garlan. Javier Cámara et al.: Stochastic game analysis and latency awareness for proactive self-adaptation. (2014) authored by David Garlan. Javier Cámara et al.: The uncertainty interaction problem in self-adaptive systems. (2022) authored by David Garlan. Nabor C. Mendonça et al.: Developing Self-Adaptive Microservice Systems: Challenges and Directions. (2019) authored by David Garlan. Gabriel A. Moreno et al.: Proactive self-adaptation under uncertainty: a probabilistic model checking approach. (2015) authored by David Garlan. Mohammed N. Alharbi et al.: A Probabilistic Model for Effective Explainability Based on Personality Traits. (2021) authored by David Garlan. Nianyu Li et al.: Explanations for human-on-the-loop: a probabilistic model checking approach. (2020) authored by David Garlan. Gabriel A. Moreno et al.: Efficient Decision-Making under Uncertainty for Proactive Self-Adaptation. (2016) authored by David Garlan. Pedro Mendes et al.: Hyper-parameter Tuning for Adversarially Robust Models. (2023) authored by David Garlan. David Garlan et al.: Proceedings of the First Workshop on Self-Healing Systems, WOSS 2002, Charleston, South Carolina, USA, November 18-19, 2002 (2002) edited by David Garlan. Vahe Poladian et al.: Dynamic Configuration of Resource-Aware Services. (2004) authored by David Garlan. Mohammed N. Alharbi et al.: A Probabilistic Model for Personality Trait Focused Explainability. (2021) authored by David Garlan. Javier Cámara et al.: Reasoning About Sensing Uncertainty in Decision-Making for Self-adaptation. (2017) authored by David Garlan. Javier Cámara et al.: Analyzing Self-Adaptation Via Model Checking of Stochastic Games. (2013) authored by David Garlan. Nabor C. Mendonça et al.: Model-Based Analysis of Microservice Resiliency Patterns. (2020) authored by David Garlan. Gabriel A. Moreno et al.: Uncertainty reduction in self-adaptive systems. (2018) authored by David Garlan. Jürgen Dingel et al.: Towards a Formal Treatment of Implicit Invocation Using Rely/Guarantee Reasoning. (1998) authored by David Garlan. Gabriel A. Moreno et al.: Flexible and Efficient Decision-Making for Proactive Latency-Aware Self-Adaptation. (2018) authored by David Garlan. Roykrong Sukkerd et al.: Towards explainable multi-objective probabilistic planning. (2018) authored by David Garlan. Javier Cámara et al.: Analyzing Latency-Aware Self-Adaptation Using Stochastic Games and Simulations. (2016) authored by David Garlan. Javier Cámara et al.: MOSAICO: offline synthesis of adaptation strategy repertoires with flexible trade-offs. (2018) authored by David Garlan. Rebekka Wohlrab and David Garlan: A negotiation support system for defining utility functions for multi-stakeholder self-adaptive systems. (2023) authored by David Garlan. David Garlan et al.: Model Checking Publish-Subscribe Systems. (2003) authored by David Garlan. Javier Cámara et al.: Reasoning about sensing uncertainty and its reduction in decision-making for self-adaptation. (2018) authored by David Garlan. Changjian Zhang et al.: Robustification of Behavioral Designs against Environmental Deviations. (2023) authored by David Garlan. Betty H. C. Cheng et al.: Proceedings of the 2006 international workshop on Self-adaptation and self-managing systems, SEAMS 2006, Shanghai, China, May 21-22, 2006 (2006) edited by David Garlan. Thomas J. Glazier et al.: Analyzing Resilience Properties of Different Topologies of Collective Adaptive Systems. (2015) authored by David Garlan. Roykrong Sukkerd et al.: Tradeoff-Focused Contrastive Explanation for MDP Planning. (2020) authored by David Garlan. Roykrong Sukkerd et al.: Tradeoff-Focused Contrastive Explanation for MDP Planning. (2020) authored by David Garlan. Md. Abir Hossen et al.: CaRE: Finding Root Causes of Configuration Issues in Highly-Configurable Robots. (2023) authored by David Garlan. Md. Abir Hossen et al.: CaRE: Finding Root Causes of Configuration Issues in Highly-Configurable Robots. (2023) authored by David Garlan. Ashutosh Pandey et al.: Hybrid Planning for Decision Making in Self-Adaptive Systems. (2016) authored by David Garlan. Rebekka Wohlrab and David Garlan: Defining Utility Functions for Multi-Stakeholder Self-Adaptive Systems. (2021) authored by David Garlan. Rebekka Wohlrab and David Garlan: Defining Utility Functions for Multi-stakeholder Self-adaptive Systems. (2021) authored by David Garlan. Ashutosh Pandey et al.: Hybrid Planning Using Learning and Model Checking for Autonomous Systems. (2020) authored by David Garlan'}. You can help Wikipedia by expanding it
output format: answer
|
C
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the name of the spouse of the contributor of Stable gain-scheduling on endogenous signals article?
Context: Sandipan Mishra et al.: Control of high-resolution Electrohydrodynamic jet printing. (2010) authored by Andrew G. Alleyne. Douglas A. Bristow and Andrew G. Alleyne: A High Precision Motion Control System With Application to Microscale Robotic Deposition. (2006) authored by Andrew G. Alleyne. Christopher T. Aksland et al.: Graph-Based Electro-Mechanical Modeling of a Hybrid Unmanned Aerial Vehicle for Real-Time Applications. (2019) authored by Andrew G. Alleyne. Douglas A. Bristow and Andrew G. Alleyne: A manufacturing system for microscale robotic deposition. (2003) authored by Andrew G. Alleyne. Christopher T. Aksland and Andrew G. Alleyne: Experimental Model and Controller Validation for a Series Hybrid Unmanned Aerial Vehicle. (2020) authored by Andrew G. Alleyne. Sarah G. Garrow et al.: Integrated Modeling for Battery Electric Vehicle Transcritical Thermal Management System. (2018) authored by Andrew G. Alleyne. Andrew G. Alleyne et al.: Motion control for magnetic micro-scale manipulation. (2013) authored by Andrew G. Alleyne. Philip M. Renkert and Andrew G. Alleyne: Component-Based Design Optimization of Multirotor Aircraft. (2022) authored by Andrew G. Alleyne. Kasper Vinther et al.: A learning based precool algorithm for utilization of foodstuff as thermal energy storage. (2013) authored by Andrew G. Alleyne. Pamela J. Tannous et al.: Dynamic temperature estimation of power electronics systems. (2017) authored by Andrew G. Alleyne. Andrew G. Alleyne and Rui Liu: Systematic control of a class of nonlinear systems with application to electrohydraulic cylinder pressure control. (2000) authored by Andrew G. Alleyne. Justin P. Koeln et al.: Hierarchical Control of Aircraft Electro-Thermal Systems. (2020) authored by Andrew G. Alleyne. Danian Zheng and Andrew G. Alleyne: Learning control of an electro-hydraulic injection molding machine with smoothed fill-to-pack transition. (2000) authored by Andrew G. Alleyne. Andrew G. Alleyne name Andrew G. Alleyne. Ugo Rosolia et al.: Autonomous Vehicle Control: A Nonconvex Approach for Obstacle Avoidance. (2017) authored by Andrew G. Alleyne. David J. Hoelzle et al.: Iterative Learning Control for robotic deposition using machine vision. (2008) authored by Andrew G. Alleyne. Philip M. Renkert and Andrew G. Alleyne: Dynamic Component-Based Design Optimization of Multirotor Aircraft*. (2023) authored by Andrew G. Alleyne. Christopher T. Aksland et al.: Hierarchical Predictive Control of an Unmanned Aerial Vehicle Integrated Power, Propulsion, and Thermal Management System. (2023) authored by Andrew G. Alleyne. Herschel C. Pangborn et al.: Hierarchical Hybrid MPC for Management of Distributed Phase Change Thermal Energy Storage. (2020) authored by Andrew G. Alleyne After participating in the Defense Science Study Group, run by the Institute for Defense Analysis, he served on the U. Fisher Professor in Engineering and Director of the National Science Foundation Engineering Research Center on Power Optimization of Electro Thermal Systems at the University of Illinois Urbana-Champaign. After college he joined NASA\'s Jet Propulsion Laboratory in Pasadena, CA where he worked on a comet nucleus sample return mission. Alleyne worked with the Air Force Research Laboratory to create the Aircraft Transient Thermal Modeling and Optimization toolbox. His efforts toward teaching and mentoring diversity was recognized by the UIUC Larine Y. For his undergraduate education he studied mechanical and aerospace engineering at Princeton University and graduated magna cum laude in 1989. Air Force Scientific Advisory Board as well as National Academies Board on Army Research and Development. The Mechanical and Industrial Engineering department was renamed the Mechanical Science and Engineering (MechSE) department. For experimental systems, he has developed the platform and process control for electro-hydrodynamic jet printing; which allows for the precise printing of wide variety materials and has seen commercial adoption. In 2011–2012, he held a National Research Council Fellowship and worked at the Air Force Research Laboratory in Dayton, OH
output format: answer
|
Marianne Alleyne
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where did the Norwegian scientist focusing on numerical analysis obtain his MSc degree?
Context: Aslak Tveito alternativeName Aslak Tveito. Aslak Tveito alternativeName A. Tveito. Aslak Tveito name Aslak Tveito. Aslak Tveito and Glenn T. Lines: Computing Characterizations of Drugs for Ion Channels and Receptors Using Markov Models (2016) authored by Aslak Tveito. Karoline Horgmo Jæger et al.: A computational method for identifying an optimal combination of existing drugs to repair the action potentials of SQT1 ventricular myocytes. (2021) authored by Aslak Tveito. Karoline Horgmo Jæger et al.: Computational prediction of drug response in short QT syndrome type 1 based on measurements of compound effect in stem cell-derived cardiomyocytes. (2021) authored by Aslak Tveito. Aslak Tveito is Creator"}. A complete publication list can be found at Google Scholar. \nTveito joined the Simula Research Laboratory upon its establishment in 2001 and has been its Managing Director since 2002
output format: answer
|
University of Oslo
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many papers were published by Charles A. Bouman's academic institution?
Context: Benjamin J. Foster et al.: Multi-target tracking with an event-based vision sensor and a partial-update GMPHD filter. (2019) authored by Charles A. Bouman. Guangzhi Cao et al.: Weak signal detection in hyperspectral imagery using sparse matrix transform (smt) covariance estimation. (2009) authored by Charles A. Bouman. Yandong Guo et al.: Binary image compression using conditional entropy-based dictionary design and indexing. (2013) authored by Charles A. Bouman. G. M. Dilshan P. Godaliyadda et al.: A Framework for Dynamic Image Sampling Based on Supervised Learning (SLADS). (2017) authored by Charles A. Bouman. Mohammad Samin Nur Chowdhury et al.: Autonomous Polycrystalline Material Decomposition For Hyperspectral Neutron Tomography. (2023) authored by Charles A. Bouman. Minerva M. Yeung et al.: Storage and Retrieval for Image and Video Databases VII, San Jose, CA, USA, January 26-29, 1999 (1999) edited by Charles A. Bouman. Cüneyt M. Taskiran et al.: ViBE video database system: an update and further studies. (2000) authored by Charles A. Bouman. Cüneyt M. Taskiran et al.: Stochastic Models of Video Structure for Program Genre Detection. (2003) authored by Charles A. Bouman. Zeeshan Nadir et al.: Gaussian mixture prior models for imaging of flow cross sections from sparse hyperspectral measurements. (2015) authored by Charles A. Bouman. Alberto Albiol et al.: Face Detection for Pseudo-Semantic Labeling in Video Databases. (1999) authored by Charles A. Bouman. Pengchong Jin et al.: Joint metal artifact reduction and segmentation of CT images using dictionary-based image prior and continuous-relaxed potts model. (2015) authored by Charles A. Bouman. Jianing Wei et al.: Fast Space-Varying Convolution Using Matrix Source Coding With Applications to Camera Stray Light Reduction. (2014) authored by Charles A. Bouman. Jeffery H. Fischer et al.: Wide-band packet radio for multipath environments. (1988) authored by Charles A. Bouman. Haitao Xue et al.: A color quantization algorithm based on minimization of modified Lp norm error in a CIELAB space. (2012) authored by Charles A. Bouman. Leonardo R. Bachega et al.: Distributed Signal Decorrelation and Detection in Multi View Camera Networks Using the Vector Sparse Matrix Transform. (2015) authored by Charles A. Bouman. Tak-Shing Wong et al.: Image Enhancement Using the Hypothesis Selection Filter: Theory and Application to JPEG Decoding. (2013) authored by Charles A. Bouman. Maribel Figuera et al.: A new approach to JBIG2 binary image compression. (2007) authored by Charles A. Bouman. James Theiler et al.: Sparse Matrix Transform for Hyperspectral Image Processing. (2011) authored by Charles A. Bouman. Guangzhi Cao et al.: High dimensional regression using the sparse matrix transform (SMT). (2010) authored by Charles A. Bouman. Hengzhou Ding et al.: Semi-automatic object geometry estimation for image personalization. (2010) authored by Charles A. Bouman. G. M. Dilshan P. Godaliyadda et al.: A Framework for Dynamic Image Sampling Based on Supervised Learning. (2018) authored by Charles A. Bouman. Yandong Guo et al.: Text line detection based on cost optimized local text line direction estimation. (2015) authored by Charles A. Bouman. Gregery T. Buzzard et al.: Plug-and-Play Unplugged: Optimization-Free Reconstruction Using Consensus Equilibrium. (2018) authored by Charles A. Bouman. Gregery T. Buzzard et al.: Plug-and-Play Unplugged: Optimization Free Reconstruction using Consensus Equilibrium. (2017) authored by Charles A. Bouman. Jisang Yoo et al.: The Nonlinear Prefiltering and Difference of Estimates Approaches to Edge Detection: Applications of Stack Filters. (1993) authored by Charles A. Bouman. Khalid W. Khawaja et al.: Automated Assembly Inspection Using a Multiscale Algorithm Trained on Synthetic Images. (1994) authored by Charles A. Bouman. Daniel Tretter et al.: A multiscale stochastic image model for automated inspection. (1995) authored by Charles A. Bouman. Diyu Yang et al.: An Edge Alignment-Based Orientation Selection Method for Neutron Tomography. (2023) authored by Charles A. Bouman. Alberto Albiol et al.: A Simple and Efficient Face Detection Algorithm for Video Database Applications. (2000) authored by Charles A. Bouman. Guangzhi Cao et al.: The Sparse Matrix Transform for Covariance Estimation and Analysis of High Dimensional Signals. (2011) authored by Charles A. Bouman. G. M. Dilshan Godaliyadda et al.: A model-based framework for fast dynamic image sampling. (2014) authored by Charles A. Bouman. Ruoqiao Zhang et al.: Gaussian mixture Markov random field for image denoising and reconstruction. (2013) authored by Charles A. Bouman. Hani Almansouri et al.: Ultrasonic Model-Based Iterative Reconstruction with Spatially Variant Regularization for One-Sided Non-Destructive Evaluation. (2018) authored by Charles A. Bouman. Soumendu Majee et al.: Multi-Slice Fusion for Sparse-View and Limited-Angle 4D CT Reconstruction. (2021) authored by Charles A. Bouman. Amirkoushyar Ziabari et al.: Physics-Based Regularizer for Joint Soft Segmentation and Reconstruction of Electron Microscopy Images of Polycrystalline Microstructures. (2019) authored by Charles A. Bouman'}. \n\nThis article about an American electrical engineer is a stub
output format: answer
|
149401
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What award did the computer scientist who won a gold medal for the West German team at the International Olympiad in Informatics in 1989 receive?
Context: Shih-Chun You et al.: Low Trace-Count Template Attacks on 32-bit Implementations of ASCON AEAD. (2023) authored by Markus G. Kuhn. Shih-Chun You and Markus G. Kuhn: Single-Trace Fragment Template Attack on a 32-Bit Implementation of Keccak. (2021) authored by Markus G. Kuhn. Andrew D. McDonald and Markus G. Kuhn: StegFS: A Steganographic File System for Linux. (1999) authored by Markus G. Kuhn. Markus G. Kuhn: Electromagnetic Eavesdropping Risks of Flat-Panel Displays. (2004) authored by Markus G. Kuhn. Omar Choudary and Markus G. Kuhn: Template Attacks on Different Devices. (2014) authored by Markus G. Kuhn. Omar Choudary and Markus G. Kuhn: Template Attacks on Different Devices. (2014) authored by Markus G. Kuhn. Saar Drimer and Markus G. Kuhn: A Protocol for Secure Remote Updates of FPGA Configurations. (2009) authored by Markus G. Kuhn. Markus G. Kuhn: Signal Authentication in Trusted Satellite Navigation Receivers. (2010) authored by Markus G. Kuhn. Omar Choudary and Markus G. Kuhn: Efficient Template Attacks. (2013) authored by Markus G. Kuhn'}. He developed the Stirmark test for digital watermarking schemes, the OTPW one-time password system, and headed the project that extended the X11 misc-fixed fonts to Unicode
output format: answer
|
gold medal
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the number of publications for the affiliation of the 'A maximum likelihood N-camera stereo algorithm' writer?
Context: Jieqing Ai et al.: A Stern-based Collusion-Secure Software Watermarking Algorithm and Its Implementation. (2007) authored by Ingemar J. Cox. Vishwa Vinay et al.: Can constrained relevance feedback and display strategies help users retrieve items on mobile devices? (2006) authored by Ingemar J. Cox. Vasileios Lampos et al.: Assessing the impact of a health intervention via user-generated Internet content. (2015) authored by Ingemar J. Cox. Isabel Bennett et al.: Go local: The key to controlling the COVID-19 pandemic in the post lockdown era. (2020) authored by Ingemar J. Cox. Vishwa Vinay et al.: Evaluating Relevance Feedback and Display Strategies for Searching on Small Displays. (2004) authored by Ingemar J. Cox. William Mayor and Ingemar J. Cox: On unstructured distributed search over BitTorrent. (2013) authored by Ingemar J. Cox. Ingemar J. Cox: i-sense - Early Warning Sensing Systems for Infectious Diseases. (2015) authored by Ingemar J. Cox. Vasileios Lampos et al.: Inferring the Socioeconomic Status of Social Media Users Based on Behaviour and Language. (2016) authored by Ingemar J. Cox. Ingemar J. Cox and Jean-Paul M. G. Linnartz: Some general methods for tampering with watermarks. (1998) authored by Ingemar J. Cox. Jianhan Zhu et al.: Risk-Aware Information Retrieval. (2009) authored by Ingemar J. Cox. Vaclav Petricek et al.: The web structure of e-government - developing a methodology for quantitative evaluation. (2006) authored by Ingemar J. Cox. Ingemar J. Cox: C++ language support for guaranteed initialization, safe termination and error recovery in robotics. (1988) authored by Ingemar J. Cox. Michael Morris et al.: Neural network models for influenza forecasting with associated uncertainty using Web search activity trends. (2023) authored by Ingemar J. Cox. Ingemar J. Cox and Narain H. Gehani: Concurrent Programming and Robotics. (1989) authored by Ingemar J. Cox. Ingemar J. Cox alternativeName Ingemar Cox. Bin Zou et al.: Transfer Learning for Unsupervised Influenza-like Illness Models from Online Search Data. (2019) authored by Ingemar J. Cox. Elad Yom-Tov et al.: Learning About Health and Medicine from Internet Data. (2015) authored by Ingemar J. Cox. Brian Brost et al.: Multi-Dueling Bandits and Their Application to Online Ranker Evaluation. (2016) authored by Ingemar J. Cox. Brian Brost et al.: Multi-Dueling Bandits and Their Application to Online Ranker Evaluation. (2016) authored by Ingemar J. Cox. Mehdi Hosseini et al.: Measuring the Variability in Effectiveness of a Retrieval System. (2010) authored by Ingemar J. Cox. Ingemar J. Cox and Narain H. Gehani: Exception Handling in Robotics. (1989) authored by Ingemar J. Cox. Ingemar J. Cox alternativeName Ingemar J. Cox. Mehdi Hosseini et al.: An uncertainty-aware query selection model for evaluation of IR systems. (2012) authored by Ingemar J. Cox From 1997 to 1999, he served as Chief Technical Officer of Signafy, Inc. "}. D. He received his B. on Information Security
output format: answer
|
263105
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many articles are attributed to the affiliation in which the creator of 'Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning' is working?
Context: Burak Erbagci et al.: A 32kB secure cache memory with dynamic replacement mapping in 65nm bulk CMOS. (2015) authored by Ruby B. Lee. Daniel F. Zucker et al.: Hardware and software cache prefetching techniques for MPEG benchmarks. (2000) authored by Ruby B. Lee. Daniel F. Zucker et al.: An Automated Method for Software Controlled Cache Prefetching. (1998) authored by Ruby B. Lee. Ruby B. Lee et al.: Refining Instruction Set Architecture for High-Performance Multimedia Processing in Constrained Environments. (2002) authored by Ruby B. Lee. Tianwei Zhang et al.: CloudShelter: Protecting Virtual Machines' Memory Resource Availability in Clouds. (2017) authored by Ruby B. Lee. Chun Hok Ho et al.: Tuning instruction customisation for reconfigurable system-on-chip. (2009) authored by Ruby B. Lee. Xiao Yang and Ruby B. Lee: PLX FP: an efficient floating-point instruction set for 3D graphics. (2004) authored by Ruby B. Lee. Daniel F. Zucker et al.: A Comparison of Hardware Prefetching Techniques for Mulimedia Benchmarks. (1996) authored by Ruby B. Lee. Hao Wu et al.: Cloud Server Benchmarks for Performance Evaluation of New Hardware Architecture. (2016) authored by Ruby B. Lee. Ruby B. Lee and A. Murat Fiskiran: PLX: a fully subword-parallel instruction set architecture for fast scalable multimedia processing. (2002) authored by Ruby B. Lee. Vasudev Bhaskaran et al.: Algorithmic and architectural enhancements for real-time MPEG-1 decoding on a general purpose RISC workstation. (1995) authored by Ruby B. Lee. Yedidya Hilewitz et al.: Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. (2008) authored by Ruby B. Lee. Hao Wu et al.: Cloud Server Benchmark Suite for Evaluating New Hardware Architectures. (2017) authored by Ruby B. Lee. Zhijie Jerry Shi et al.: Alternative application-specific processor architectures for fast arbitrary bit permutations. (2008) authored by Ruby B. Lee. Reouven Elbaz et al.: TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. (2007) authored by Ruby B. Lee. Yedidya Hilewitz and Ruby B. Lee: Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors. (2008) authored by Ruby B. Lee. Alice Yu et al.: Performance Enhancement of H.263 Encoder Based on Zero Coefficient Prediction. (1997) authored by Ruby B. Lee. Ruby B. Lee et al.: Single-Cycle Bit Permutations with MOMR Execution. (2005) authored by Ruby B. Lee. A. Murat Fiskiran and Ruby B. Lee: Evaluating Instruction Set Extensions for Fast Arithmetic on Binary Finite Fields. (2004) authored by Ruby B. Lee. Tianwei Zhang et al.: Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation. (2016) authored by Ruby B. Lee. Eric Keller et al.: NoHype: virtualized cloud infrastructure without the virtualization. (2010) authored by Ruby B. Lee. Yedidya Hilewitz and Ruby B. Lee: A New Basis for Shifters in General-Purpose Processors for Existing and Advanced Bit Manipulations. (2009) authored by Ruby B. Lee. Adi Fuchs and Ruby B. Lee: Disruptive prefetching: impact on side-channel attacks and cache designs. (2015) authored by Ruby B. Lee'}. She moved to Princeton as the Hamrick Professor in 1998, becoming at that time one of only three female full professors in engineering at Princeton, and the only one to hold an endowed chair. She was elected as a member of the American Academy of Arts and Sciences in 2020
output format: answer
|
148866
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many times has the author of the paper 'Interfaces For Wearable Computers' been cited?
Context: Daniel Kohlsdorf et al.: Feature Learning and Automatic Segmentation for Dolphin Communication Analysis. (2016) authored by Thad Starner. Thad Starner name Thad Starner. Thad Starner alternativeName Thad Starner. Thad Starner alternativeName Thad Starner. Kihwan Kim et al.: Localization and 3D reconstruction of urban scenes using GPS. (2008) authored by Thad Starner. Thad Starner 2YrMeanCitedness 2.0666666030883789062. Raphael Gontijo Lopes et al.: Data-Free Knowledge Distillation for Deep Neural Networks. (2017) authored by Thad Starner. Thad Starner et al.: The Locust Swarm: An Enviromentally-Powered, Networkless Location and Messaging System. (1997) authored by Thad Starner. Thad Starner alternativeName Thad Eugene Starner. Thad Starner is Person. David Minnen et al.: Detecting Subdimensional Motifs: An Efficient Algorithm for Generalized Multivariate Pattern Discovery. (2007) authored by Thad Starner. Tracy L. Westeyn et al.: Designing toys with automatic play characterization for supporting the assessment of a child's development. (2008) authored by Thad Starner. Thad Starner alternativeName Thad E. Starner. Thad Starner alternativeName T. Starner. Thad Starner alternativeName T.E. Starner. David Minnen et al.: Discovering Multivariate Motifs using Subsequence Density Estimation and Greedy Mixture Learning. (2007) authored by Thad Starner. Pei Yin et al.: Discriminative feature selection for hidden Markov models using Segmental Boosting. (2008) authored by Thad Starner. Daniel Kohlsdorf et al.: Probabilistic extraction and discovery of fundamental units in dolphin whistles. (2014) authored by Thad Starner. Thad Starner link https://twitter.com/thadstarner. Thad Starner modified 2023-10-18. Alex Pentland et al.: View-based and modular eigenspaces for face recognition. (1994) authored by Thad Starner. David M. Krum et al.: Evaluation of a Multimodal Interface for 3D Terrain Visualization. (2002) authored by Thad Starner. Daniel Kohlsdorf et al.: An Auto Encoder For Audio Dolphin Communication. (2020) authored by Thad Starner. Daniel Kohlsdorf et al.: An Auto Encoder For Audio Dolphin Communication. (2020) authored by Thad Starner. Juyoung Lee et al.: Automated Data Gathering and Training Tool for Personalized "Itchy Nose". (2018) authored by Thad Starner. Pei Yin et al.: Learning the basic units in American Sign Language using discriminative segmental feature selection. (2009) authored by Thad Starner. Junyu Chen et al.: First Bite/Chew: distinguish different types of food by first biting/chewing and the corresponding hand movement. (2023) authored by Thad Starner. Thad Starner orcidId https://orcid.org/0000-0001-8442-7842. Thad Starner h-index 55. Nivedita Arora et al.: SATURN: Technical and Design Challenges of Building a Self-sustaining Sound and Vibration Sensing Material. (2019) authored by Thad Starner. Angela Vujic et al.: MoodLens: towards improving nonverbal emotional expression with an in-lens fiber optic display. (2016) authored by Thad Starner. India Irish et al.: Managing the Chaos: Approaches to Navigating Discussion Forums for Instructional Staff. (2023) authored by Thad StarnerS. S. S. D. '}. \nStarner graduated from Dallastown Area High School in York PA in 1987 with honors
output format: answer
|
15861
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many papers does the institution where the author who published 'A visual introduction to information theory' works have?
Context: Laura Waller alternativeName Laura Waller. Laura Waller name Laura Waller. Laura Waller alternativeName Laura A. Waller. Cem Yalcin et al.: 19.3 A MEMS-Based Dynamic Light Focusing System for Single-Cell Precision in optogenetics. (2021) authored by Laura Waller. Kyrollos Yanny et al.: Miniscope3D: optimized single-shot miniature 3D fluorescence microscopy. (2020) authored by Laura Waller. Lei Tian et al.: Computational microscopy: illumination coding and nonlinear optimization enables Gigapixel 3D phase imaging. (2017) authored by Laura Waller. Laura Waller alternativeName L. Waller. Jingshan Zhong et al.: Nonlinear Optimization Algorithm for Partially Coherent Phase Retrieval and Source Recovery. (2016) authored by Laura Waller. Amit P. S. Kohli et al.: Wavefront Randomization Improves Deconvolution. (2024) authored by Laura Waller She was one of the MIT EECS Rising Stars for 2018. She was awarded tenure at University of California, Berkeley in 2016. \nWaller is from Kingston, Ontario. "}. Waller was awarded the SPIE Early Career Achievement Award in Academia in January 2018
output format: answer
|
317415
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where did the author of the publication 'On a Novel Class of integrable ODEs Related to the Painlevé equations' earn a PhD degree?
Context: Athanassios S. Fokas et al.: Evolution of methacrylate distribution during wood saturation. (2005) authored by Athanassios S. Fokas. A. S. Fokas alternativeName A. S Fokas. Athanassios S. Fokas and H. Madala: Emerging Patterns and Computational Design of Filter Cellular Automata. (1993) authored by Athanassios S. Fokas. Nicholas E. Protonotarios et al.: A Spline Approach to Parallel-Hole Collimator Deblurring for aSRT-Reconstructed SPECT Images. (2019) authored by Athanassios S. Fokas. A. S. Fokas alternativeName Fokas As. A. S. Fokas name A. S. Fokas. A. S. Fokas alternativeName A. Fokas. A. S. Fokas 2YrMeanCitedness 2.0588235855102539062 M. \nI. He also has a son, Alexander, from his first marriage to Allison Pearce. '}
output format: answer
|
Caltech
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the average two years citedness of the writer of Guest Editorial: Media processing: a new design target?
Context: Yu-Yuan Chen et al.: A software-hardware architecture for self-protecting data. (2012) authored by Ruby B. Lee. Zecheng He et al.: Detecting Zero-day Controller Hijacking Attacks on the Power-Grid with Enhanced Deep Learning. (2018) authored by Ruby B. Lee. Xiao Yang and Ruby B. Lee: PLX FP: an efficient floating-point instruction set for 3D graphics. (2004) authored by Ruby B. Lee. Reouven Elbaz et al.: TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. (2007) authored by Ruby B. Lee. Jeffrey S. Dwoskin et al.: A framework for testing hardware-software security architectures. (2010) authored by Ruby B. Lee. Zecheng He et al.: Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning. (2019) authored by Ruby B. Lee. Tian Lan et al.: Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks. (2009) authored by Ruby B. Lee. Jakub Szefer et al.: Cyber defenses for physical attacks and insider threats in cloud computing. (2014) authored by Ruby B. Lee. Tianwei Zhang et al.: Security verification of hardware-enabled attestation protocols. (2012) authored by Ruby B. Lee. Reouven Elbaz et al.: Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. (2009) authored by Ruby B. Lee. Ruby B. Lee et al.: Cryptography Efficient Permutation Instructions for Fast Software. (2001) authored by Ruby B. Lee. Guangyuan Hu et al.: SoK: Hardware Defenses Against Speculative Execution Attacks. (2021) authored by Ruby B. Lee. Guangyuan Hu et al.: SoK: Hardware Defenses Against Speculative Execution Attacks. (2023) authored by Ruby B. Lee. Zecheng He et al.: CloudShield: Real-time Anomaly Detection in the Cloud. (2023) authored by Ruby B. Lee. Jakub Szefer et al.: General-purpose FPGA platform for efficient encryption and hashing. (2010) authored by Ruby B. Lee. Nachiketh R. Potlapally et al.: Satisfiability-based framework for enabling side-channel attacks on cryptographic software. (2006) authored by Ruby B. Lee. Tianwei Zhang et al.: CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds. (2016) authored by Ruby B. Lee. Yedidya Hilewitz and Ruby B. Lee: Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors. (2008) authored by Ruby B. Lee. A. Murat Fiskiran and Ruby B. Lee: Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution. (2004) authored by Ruby B. Lee. Zecheng He and Ruby B. Lee: CloudShield: Real-time Anomaly Detection in the Cloud. (2021) authored by Ruby B. Lee. Guangyuan Hu et al.: Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks. (2020) authored by Ruby B. Lee. Zhenghong Wang et al.: Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC. (2007) authored by Ruby B. Lee. Tianwei Zhang et al.: Practical and Scalable Security Verification of Secure Architectures. (2021) authored by Ruby B. Lee'}. She moved to Princeton as the Hamrick Professor in 1998, becoming at that time one of only three female full professors in engineering at Princeton, and the only one to hold an endowed chair. Hamrick Professor in Engineering and Professor of Electrical and Computer Engineering at Princeton University
output format: answer
|
1.0
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the i10Index of the researcher who published Statistical physics of crime: A review in CoRR in the year 2014?
Context: Raman Manivannan et al.: Design of Resilient Reliable Dissipativity Control for Systems With Actuator Faults and Probabilistic Time-Delay Signals via Sampled-Data Approach. (2020) authored by Matjaz Perc. Kang Liu et al.: Tilt Correction Toward Building Detection of Remote Sensing Images. (2021) authored by Matjaz Perc. Andrej Tibaut et al.: Interoperability requirements for automated manufacturing systems in construction. (2016) authored by Matjaz Perc. Lei Liu et al.: Aperiodically intermittent stochastic stabilization via discrete time or delay feedback control. (2019) authored by Matjaz Perc. Xiaodi Li et al.: Switching Laws Design for Stability of Finite and Infinite Delayed Switched Systems With Stable and Unstable Modes. (2018) authored by Matjaz Perc. Kang Liu et al.: Density saliency for clustered building detection and population capacity estimation. (2021) authored by Matjaz Perc. Bartu Yesilkaya et al.: Manifold learning methods for the diagnosis of ovarian cancer. (2022) authored by Matjaz Perc. Matjaž Perc alternativeName Matjaž Perc. Matjaž Perc alternativeName Matjaz Perc. Matjaž Perc alternativeName Perc Matjaž. Matjaž Perc alternativeName Perc Matjaz. Jinsen Zhuang et al.: Synchronization Analysis for Stochastic Delayed Multilayer Network With Additive Couplings. (2020) authored by Matjaz Perc. Shirin Panahi et al.: Optimal synchronization of circulant and non-circulant oscillators. (2021) authored by Matjaz Perc. Erivelton G. Nepomuceno et al.: Detecting unreliable computer simulations of recursive functions with interval extensions. (2018) authored by Matjaz Perc. Okan Erkaymaz et al.: Performance of small-world feedforward neural networks for the diagnosis of diabetes. (2017) authored by Matjaz Perc. Matjaž Perc alternativeName Matja Z Perc. Andraz Stozer et al.: Functional Connectivity in Islets of Langerhans from Mouse Pancreas Tissue Slices. (2013) authored by Matjaz Perc. Mohadeseh Shafiei et al.: Time delayed chemical synapses and synchronization in multilayer neuronal networks with ephaptic inter-layer coupling. (2020) authored by Matjaz Perc. Zhouchao Wei et al.: Bifurcation analysis of two disc dynamos with viscous friction and multiple time delays. (2019) authored by Matjaz Perc. Ziwei Dong et al.: A Distributed Dynamic Event-Triggered Algorithm With Linear Convergence Rate for the Economic Dispatch Problem. (2023) authored by Matjaz Perc. Matjaž Perc alternativeName Matjalz Perc. Nenad Cus-Babic et al.: Supply-chain transparency within industrialized construction projects. (2014) authored by Matjaz Perc In 2015, Matjaž Perc established the Complex Systems Center Maribor. "}. \nFor a full list see Matjaž Perc's ORCID page. In 2010 he became head of the Institute of Physics at the University of Maribor, and in 2011 he became full Professor of Physics
output format: answer
|
417
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What kind of organization is the institution of the author who published 'Dynamics of aesthetic appreciation'?
Context: Claus-Christian Carbon modified 2023-10-18. Jonas Witt et al.: A Divide-Align-Conquer Strategy for Program Synthesis. (2023) authored by Claus-Christian Carbon. Claus-Christian Carbon name Claus-Christian Carbon. Claus-Christian Carbon alternativeName CCC. Claus-Christian Carbon alternativeName Carbon Cc. Claus-Christian Carbon alternativeName Claus Carbon. Claus-Christian Carbon i10Index 105'}. Since 2009 she has headed the laboratory of computational and quantitative biology
output format: answer
|
education
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Whose institute has a higher number of publication citations, University of Florida or University of California, Irvine?
Context: Khuong Vo et al.: P2E-WGAN: ECG waveform synthesis from PPG with conditional wasserstein generative adversarial networks. (2021) authored by Nikil D. Dutt. Khuong Vo et al.: Composing Graphical Models with Generative Adversarial Networks for EEG Signal Modeling. (2022) authored by Nikil D. Dutt. Jayram Moorkanikara Nageswaran et al.: Towards reverse engineering the brain: Modeling abstractions and simulation frameworks. (2010) authored by Nikil D. Dutt. Delaram Amiri et al.: Context-Aware Sensing via Dynamic Programming for Edge-Assisted Wearable Systems. (2020) authored by Nikil D. Dutt. Kyoungwoo Lee et al.: Data Partitioning Techniques for Partially Protected Caches to Reduce Soft Error Induced Failures. (2008) authored by Nikil D. Dutt. Mingoo Ji et al.: Demand Layering for Real-Time DNN Inference with Minimized Memory Usage. (2022) authored by Nikil D. Dutt. Mingoo Ji et al.: Demand Layering for Real-Time DNN Inference with Minimized Memory Usage. (2022) authored by Nikil D. Dutt. Salar Jafarlou et al.: ECG Biosignal Deidentification Using Conditional Generative Adversarial Networks. (2022) authored by Nikil D. Dutt. Santanu Sarma et al.: Sense-making from Distributed and Mobile Sensing Data: A Middleware Perspective. (2014) authored by Nikil D. Dutt. Abbas BanaiyanMofrad et al.: Protecting caches against multi-bit errors using embedded erasure coding. (2015) authored by Nikil D. Dutt. Sudeep Pasricha et al.: Floorplan-aware automated synthesis of bus-based communication architectures. (2005) authored by Nikil D. Dutt. Seyed Amir Hossein Aqajari et al.: Context-Aware Stress Monitoring using Wearable and Mobile Technologies in Everyday Settings. (2024) authored by Nikil D. Dutt. Ali Tazarv et al.: Active Reinforcement Learning for Personalized Stress Monitoring in Everyday Settings. (2023) authored by Nikil D. Dutt. Ali Tazarv et al.: Active Reinforcement Learning for Personalized Stress Monitoring in Everyday Settings. (2023) authored by Nikil D. Dutt. Milad Asgari Mehrabadi et al.: Novel Blood Pressure Waveform Reconstruction from Photoplethysmography using Cycle Generative Adversarial Networks. (2022) authored by Nikil D. Dutt. Milad Asgari Mehrabadi et al.: Novel Blood Pressure Waveform Reconstruction from Photoplethysmography using Cycle Generative Adversarial Networks. (2022) authored by Nikil D. Dutt. Kyoungwoo Lee et al.: Partitioning techniques for partially protected caches in resource-constrained embedded systems. (2010) authored by Nikil D. Dutt. Alexandru Nicolau et al.: Dynamic Common Sub-Expression Elimination during Scheduling in High-Level Synthesis. (2002) authored by Nikil D. Dutt. Arman Anzanpour et al.: Energy-efficient and Reliable Wearable Internet-of-Things through Fog-Assisted Dynamic Goal Management. (2019) authored by Nikil D. Dutt. Ali Tazarv et al.: Personalized Stress Monitoring using Wearable Sensors in Everyday Settings. (2021) authored by Nikil D. Dutt. Ali Tazarv et al.: Personalized Stress Monitoring using Wearable Sensors in Everyday Settings. (2021) authored by Nikil D. Dutt. Emad Kasaeyan Naeini et al.: An Edge-Assisted and Smart System for Real-Time Pain Monitoring. (2019) authored by Nikil D. Dutt. Gu-Min Jeong et al.: Robust Face Recognition Against Soft-errors Using a Cross-layer Approach. (2016) authored by Nikil D. Dutt. Michael C. Avery et al.: Spiking neuron model of basal forebrain enhancement of visual attention. (2012) authored by Nikil D. Dutt. Sudeep Pasricha et al.: Constraint-driven bus matrix synthesis for MPSoC. (2006) authored by Nikil D. Dutt. Preeti Ranjan Panda et al.: Exploiting off-chip memory access modes in high-level synthesis. (1997) authored by Nikil D. Dutt. Hirak Jyoti Kashyap et al.: A Recurrent Neural Network Based Model of Predictive Smooth Pursuit Eye Movement in Primates. (2018) authored by Nikil D. Dutt. Jayram Moorkanikara Nageswaran et al.: Live Demonstration: Computing Spike-based Convolutions on GPUs. (2009) authored by Nikil D. Dutt. Arun Kejariwal et al.: Proxy-based task partitioning of watermarking algorithms for reducing energy consumption in mobile devices. (2004) authored by Nikil D. Dutt. Sina Shahhosseini et al.: Hybrid Learning for Orchestrating Deep Learning Inference in Multi-user Edge-cloud Networks. (2022) authored by Nikil D. Dutt. Sina Shahhosseini et al.: Hybrid Learning for Orchestrating Deep Learning Inference in Multi-user Edge-cloud Networks. (2022) authored by Nikil D. Dutt. David J. Kolson et al.: Ultra Fine-Grain Template-Driven Synthesis. (1994) authored by Nikil D. Dutt. Minyoung Kim et al.: xTune: A formal methodology for cross-layer tuning of mobile embedded systems. (2012) authored by Nikil D. Dutt. Sudeep Pasricha et al.: System-level PVT variation-aware power exploration of on-chip communication architectures. (2009) authored by Nikil D. Dutt. Aseem Gupta et al.: LEAF: A System Level Leakage-Aware Floorplanner for SoCs. (2007) authored by Nikil D. Dutt. Anupam Datta et al.: Satisfying Timing Constraints of Preemptive Real-Time Tasks through Task Layout Technique. (2001) authored by Nikil D. Dutt. Kyoungwoo Lee et al.: EAVE: Error-Aware Video Encoding Supporting Extended Energy/QoS Trade-offs for Mobile Embedded Systems. (2012) authored by Nikil D. Dutt. Arun Kejariwal et al.: Energy efficient watermarking on mobile devices using proxy-based partitioning. (2006) authored by Nikil D. Dutt. Kyoungwoo Lee et al.: Error-Exploiting Video Encoder to Extend Energy/QoS Tradeoffs for Mobile Embedded Systems. (2008) authored by Nikil D. Dutt. Aviral Shrivastava et al.: Operation tables for scheduling in the presence of incomplete bypassing. (2004) authored by Nikil D. Dutt. Hossein Tajik et al.: On Detecting and Using Memory Phases in Multimedia Systems. (2016) authored by Nikil D. Dutt. Liviu Codrut Stancu et al.: AVid: Annotation driven video decoding for hybrid memories. (2012) authored by Nikil D. Dutt. Luis Angel D. Bathen et al.: VaMV: Variability-aware Memory Virtualization. (2012) authored by Nikil D. Dutt. Amin Khajeh et al.: Cross-layer co-exploration of exploiting error resilience for video over wireless applications. (2008) authored by Nikil D. Dutt. Allen C.-H. Wu and Nikil D. Dutt: Guest editorial 11th international symposium on system-level synthesis and design (ISSS'98). (2000) authored by Nikil D. Dutt. Jeffrey L. Krichmar et al.: Neuromorphic modeling abstractions and simulation of large-scale cortical networks. (2011) authored by Nikil D. Dutt. Kyoungwoo Lee et al.: Mitigating soft error failures for multimedia applications by selective data protection. (2006) authored by Nikil D. Dutt. Delaram Amiri et al.: SIC-EDGE: Semantic Iterative ECG Compression for Edge-Assisted Wearable Systems. (2022) authored by Nikil D. Dutt. Henry Hoffmann et al.: Embodied Self-Aware Computing Systems. (2020) authored by Nikil D. Dutt. Sina Shahhosseini et al.: Towards Smart and Efficient Health Monitoring Using Edge-enabled Situational-awareness. (2021) authored by Nikil D. Dutt"}. S. He received a B
output format: answer
|
University of Florida
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In what year did Yvonne Rogers receive her PhD in human-computer interaction?
Context: Lisa Koeman et al.: "Everyone Is Talking about It!": A Distributed Approach to Urban Voting Technology and Visualisations. (2015) authored by Yvonne Rogers. Mara Balestrini et al.: Understanding sustained community engagement: a case study in heritage preservation in rural argentina. (2014) authored by Yvonne Rogers. William R. Hazlewood et al.: Bricolage and consultation: addressing new design challenges when building large-scale installations. (2010) authored by Yvonne Rogers. Leon Reicherts et al.: Extending Chatbots to Probe Users: Enhancing Complex Decision-Making Through Probing Conversations. (2022) authored by Yvonne Rogers. Vaiva Kalnikaité et al.: How to nudge in Situ: designing lambent devices to deliver salient information in supermarkets. (2011) authored by Yvonne Rogers. Ana Javornik et al.: 'What lies behind the filter?' Uncovering the motivations for using augmented reality (AR) face filters on social media and their effect on well-being. (2022) authored by Yvonne Rogers. Khaled Bachour et al.: Fast and frugal shopping challenge. (2012) authored by Yvonne Rogers. Ana Javornik et al.: An experimental study on the role of augmented reality content type in an outdoor site exploration. (2019) authored by Yvonne Rogers. Katie Seaborn et al.: Scaling Up to Tackle Low Levels of Urban Food Waste Recycling. (2020) authored by Yvonne Rogers. Mara Balestrini et al.: A City in Common: A Framework to Orchestrate Large-scale Citizen Engagement around Urban Issues. (2017) authored by Yvonne Rogers. Janet van der Linden et al.: Haptic reassurance in the pitch black for an immersive theatre experience. (2011) authored by Yvonne Rogers. Anijo P. Mathew et al.: Post-it note art: evaluating public creativity at a user generated art installation. (2011) authored by Yvonne Rogers. Hans-Christian Jetter et al.: Suspicious boxes and friendly aliens: exploring the physical design of urban sensing technology. (2014) authored by Yvonne Rogers. Keerthi Thomas et al.: Studying location privacy in mobile applications: 'predator vs. prey' probes. (2009) authored by Yvonne Rogers. Ana Javornik et al.: Revealing the Shopper Experience of Using a "Magic Mirror" Augmented Reality Make-Up Application. (2016) authored by Yvonne Rogers. Vaiva Kalnikaité et al.: Decision-making in the aisles: informing, overwhelming or nudging supermarket shoppers? (2013) authored by Yvonne Rogers. Sangita Ganesh et al.: FoodWorks: tackling fussy eating by digitally augmenting children's meals. (2014) authored by Yvonne Rogers. Matej Kaninsky et al.: Confronting People's Fears about Bats: Combining Multi-modal and Environmentally Sensed Data to Promote Curiosity and Discovery. (2018) authored by Yvonne Rogers. Shahram Izadi et al.: Dynamo: a public interactive surface supporting the cooperative sharing and exchange of media. (2003) authored by Yvonne Rogers. Dagmar Kern et al.: Enhancing Navigation Information with Tactile Output Embedded into the Steering Wheel. (2009) authored by Yvonne Rogers. Ashild Kummen et al.: MotionInput v2.0 supporting DirectX: A modular library of open-source gesture-based machine learning and computer vision methods for interacting and controlling existing software with a webcam. (2021) authored by Yvonne Rogers. Nadine Wagener et al.: The Role of Mobile and Virtual Reality Applications to Support Well-Being: An Expert View and Systematic App Review. (2021) authored by Yvonne Rogers. Stefan Kreitmayer et al.: From participatory to contributory simulations: changing the game in the classroom. (2012) authored by Yvonne Rogers. Stefan Kreitmayer et al.: Sharing bubbles: reflections on offline multi-surface scenarios. (2013) authored by Yvonne Rogers. María Pérez-Ortiz et al.: Watch Less and Uncover More: Could Navigation Tools Help Users Search and Explore Videos? (2022) authored by Yvonne Rogers. María Pérez-Ortiz et al.: Watch Less and Uncover More: Could Navigation Tools Help Users Search and Explore Videos? (2022) authored by Yvonne Rogers. Connie Golsteijn et al.: VoxBox: A Tangible Machine that Gathers Opinions from the Public at Events. (2015) authored by Yvonne Rogers. Constantinos Timinis et al.: Designing Remote Patient Monitoring Technologies for Post-operative Home Cancer Recovery: The Role of Reassurance. (2023) authored by Yvonne Rogers. Janet van der Linden et al.: Haptic lotus: a theatre experience for blind and sighted audiences. (2012) authored by Yvonne Rogers\nRogers worked on an augmented reality (AR) project to "try on" makeup and see how this AR influences buying decisions. One of the projects was "Ambient Wood", encouraging children to explore biological processes in a forest using wireless probes. \nHer publications include:'}
output format: answer
|
1988
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Which author has more publications, the creator of M-Width or the scholar who wrote the article entitled Seeing and feeling in robot-assisted surgery (Conference Presentation)?
Context: Erfu Yang et al.: System-Level Modeling and Multi-objective Evolutionary Design of Pipelined FFT Processors for Wireless OFDM Receivers. (2007) authored by Nick Barton. Erfu Yang et al.: Adaptive Formation Control and Bio-inspired Optimization of a Cluster-based Satellite Wireless Sensor Network. (2008) authored by Nick Barton. Nick Barton name Nick Barton. Nick Barton alternativeName Nick Barton. Erfu Yang et al.: Multi-objective evolutionary optimizations of a space-based reconfigurable sensor network under hard constraints. (2011) authored by Nick Barton. Erfu Yang et al.: Multi-Objective Evolutionary Optimizations of a Space-Based Reconfigurable Sensor Network under Hard Constraints. (2007) authored by Nick Barton\nIn 2007, Barton, along with Derek E. "}. G
output format: answer
|
Allison M. Okamura
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the hIndex of the writer of the paper titled 'Editorial' published in Quantum Inf. Comput. in the year 2003?
Context: Dongeek Shin et al.: Performance Analysis of Low-Flux Least-Squares Single-Pixel Imaging. (2016) authored by Jeffrey H. Shapiro. Christos Thrampoulidis et al.: Exploiting Occlusion in Non-Line-of-Sight Active Imaging. (2018) authored by Jeffrey H. Shapiro. Donald R. Greer et al.: Maximum-likelihood multiresolution laser radar range imaging. (1997) authored by Jeffrey H. Shapiro. Andrew Puryear et al.: Reciprocity-Enhanced Optical Communication Through Atmospheric Turbulence - Part II: Communication Architectures and Performance. (2013) authored by Jeffrey H. Shapiro. Guodong Xie et al.: Experiment turbulence compensation of 50-Gbaud/s orbital-angular-momentum QPSK signals using intensity-only based SPGD algorithm. (2014) authored by Jeffrey H. Shapiro. Dongeek Shin et al.: Single-Photon Depth Imaging Using a Union-of-Subspaces Model. (2015) authored by Jeffrey H. Shapiro. John J. Fratamico et al.: Adaptive Diversity Combining for Improved Millimeter Wave Communication through Rain. (1983) authored by Jeffrey H. Shapiro. Jeffrey H. Shapiro and Andrew Puryear: Reciprocity-Enhanced Optical Communication Through Atmospheric Turbulence - Part I: Reciprocity Proofs and Far-Field Power Transfer Optimization. (2012) authored by Jeffrey H. Shapiro. Jeffrey H. Shapiro and Thomas J. Green Jr.: Performance of split-window multipass-mean noise spectral estimators. (2000) authored by Jeffrey H. Shapiro He became a Julius A. M. , S. From 1970 to 1973, he was on the faculty of Case Western Reserve University. , and Ph
output format: answer
|
69
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the birthplace of the mathematician who authored K5-Subdivisions in Graphs?
Context: Carsten Thomassen alternativeName Carsten Thomassen. Carsten Thomassen 2YrMeanCitedness 0.3125. Carsten Thomassen name Carsten Thomassen. Carsten Thomassen alternativeName C. Thomassen. Carsten Thomassen modified 2023-10-18. Carsten Thomassen i10Index 152. Adel Alahmadi et al.: The maximum number of minimal codewords in long codes. (2013) authored by Carsten Thomassen. Carsten Thomassen worksCount 275. J. Adrian Bondy and Carsten Thomassen: A short proof of Meyniel's theorem. (1977) authored by Carsten Thomassen. Adel Alahmadi et al.: The maximum number of minimal codewords in long codes (2012) authored by Carsten Thomassen. Carsten Thomassen primary affiliation Technical University of Denmark. Adel Alahmadi et al.: Extending a perfect matching to a Hamiltonian cycle. (2015) authored by Carsten Thomassen. Carsten Thomassen affiliation Technical University of Denmark. Carsten Thomassen and Edward R. Scheinerman: Editorial. (1994) authored by Carsten Thomassen. Carsten Thomassen is Person. Carsten Thomassen scopus http://www.scopus.com/authid/detail.url?authorId=7004619578. Carsten Thomassen orcidId https://orcid.org/0000-0003-0670-4079. Carsten Thomassen h-index 52. Adel Alahmadi et al.: The maximum number of minimal codewords in an $[n,k]-$code (2012) authored by Carsten Thomassen. Carsten Thomassen: A Simpler Proof of the Excluded Minor Theorem for Higher Surfaces. (1997) authored by Carsten Thomassen. Adel Alahmadi et al.: The maximum number of minimal codewords in an [n, k][n, k]-code. (2013) authored by Carsten Thomassen. Jiaao Li et al.: The flow index and strongly connected orientations. (2018) authored by Carsten Thomassen. Carsten Thomassen: Group flow, complex flow, unit vector flow, and the (2+ε)-flow conjecture. (2014) authored by Carsten Thomassen'}. D
output format: answer
|
Grindsted
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the title of the work by Dr. Aggarwal that appeared on the cover of NATURE?
Context: Abubakr O. Al-Abbasi et al.: FastTrack: Minimizing Stalls for CDN-Based Over-the-Top Video Streaming Systems. (2021) authored by Vaneet Aggarwal. Abubakr O. Al-Abbasi et al.: Multi-Tier Caching Analysis in CDN-Based Over-the-Top Video Streaming Systems. (2019) authored by Vaneet Aggarwal. Abubakr O. Al-Abbasi et al.: Multi-tier Caching Analysis in CDN-based Over-the-top Video Streaming Systems. (2019) authored by Vaneet Aggarwal. Abubakr O. Al-Abbasi et al.: FastTrack: Minimizing Stalls for CDN-based Over-the-top Video Streaming Systems. (2018) authored by Vaneet Aggarwal. Yu Xiang et al.: Joint latency and cost optimization for erasurecoded data center storage. (2014) authored by Vaneet Aggarwal. Yu Xiang et al.: Joint Latency and Cost Optimization for Erasure-coded Data Center Storage. (2014) authored by Vaneet Aggarwal. Yu Xiang et al.: Joint Latency and Cost Optimization for Erasure-Coded Data Center Storage. (2016) authored by Vaneet Aggarwal. Rajarajan Sivaraj et al.: Mitigating macro-cell outage in LTE-Advanced deployments. (2015) authored by Vaneet Aggarwal. Mahadesh Panju et al.: Queueing Theoretic Models for Uncoded and Coded Multicast Wireless Networks With Caches. (2022) authored by Vaneet Aggarwal. Yu Xiang et al.: Differentiated latency in data center networks with erasure coded files through traffic engineering. (2016) authored by Vaneet Aggarwal. Yifan Shen et al.: Freeway: an order-less user-space framework for non-real-time applications. (2020) authored by Vaneet Aggarwal. Yifan Shen et al.: Freeway: An Order-less User-space Framework for Non-real-time Applications. (2020) authored by Vaneet Aggarwal. Yimeng Wang et al.: Learning-Based Online QoE Optimization in Multi-Agent Video Streaming. (2022) authored by Vaneet Aggarwal. Yu Xiang et al.: Optimizing Differentiated Latency in Multi-Tenant, Erasure-Coded Storage. (2017) authored by Vaneet Aggarwal. Guanghui Zhang et al.: Post-Streaming Wastage Analysis - A Data Wastage Aware Framework in Mobile Video Streaming. (2023) authored by Vaneet Aggarwal. Yu Xiang et al.: Differentiated Latency in Data Center Networks with Erasure Coded Files Through Traffic Engineering. (2019) authored by Vaneet Aggarwal. Guanghui Zhang et al.: A Unified Framework for Flexible Playback Latency Control in Live Video Streaming. (2021) authored by Vaneet Aggarwal. Abubakr O. Al-Abbasi et al.: TTLoC: Taming Tail Latency for Erasure-Coded Cloud Storage Systems. (2019) authored by Vaneet Aggarwal. Yu Xiang et al.: Multi-tenant Latency Optimization in Erasure-Coded Storage with Differentiated Services. (2015) authored by Vaneet Aggarwal. Vaneet Aggarwal et al.: Taming tail latency for erasure-coded, distributee storage systems. (2017) authored by Vaneet Aggarwal. Melissa Duarte et al.: Design and Characterization of a Full-Duplex Multiantenna System for WiFi Networks. (2014) authored by Vaneet Aggarwal. Eric Friedlander and Vaneet Aggarwal: Generalization of LRU Cache Replacement Policy with Applications to Video Streaming. (2018) authored by Vaneet Aggarwal. Fernando Stefanello et al.: Hybrid algorithms for placement of virtual machines across geo-separated data centers. (2019) authored by Vaneet Aggarwal. Fernando Stefanello et al.: A Biased Random-key Genetic Algorithm for Placement of Virtual Machines across Geo-Separated Data Centers. (2015) authored by Vaneet Aggarwal. Eric Friedlander and Vaneet Aggarwal: Generalization of LRU Cache Replacement Policy with Applications to Video Streaming. (2019) authored by Vaneet Aggarwal. Rutvij H. Jhaveri et al.: Fault-Resilience for Bandwidth Management in Industrial Software-Defined Networks. (2021) authored by Vaneet Aggarwal. Abubakr O. Al-Abbasi and Vaneet Aggarwal: TTLCache: Taming Latency in Erasure-Coded Storage Through TTL Caching. (2020) authored by Vaneet Aggarwal. Arnob Ghosh et al.: A Robust Algorithm for Tile-based 360-degree Video Streaming with Uncertain FoV Estimation. (2018) authored by Vaneet Aggarwal. Qinbo Bai et al.: Provably Sample-Efficient Model-Free Algorithm for MDPs with Peak Constraints. (2023) authored by Vaneet Aggarwal. Chinmayananda Arunachala et al.: Optimal Linear Broadcast Rates of the Two-Sender Unicast Index Coding Problem with Fully-Participated Interactions. (2018) authored by Vaneet Aggarwal. Ruijiu Mao et al.: Stochastic Non-preemptive Co-flow Scheduling with Time-Indexed Relaxation. (2018) authored by Vaneet Aggarwal. Ruijiu Mao et al.: Stochastic non-preemptive co-flow scheduling with time-indexed relaxation. (2018) authored by Vaneet Aggarwal. Alireza Vahid et al.: Interference management with mismatched partial channel state information. (2017) authored by Vaneet Aggarwal. Guanghui Zhang et al.: An Intelligent Learning Approach to Achieve Near-Second Low-Latency Live Video Streaming under Highly Fluctuating Networks. (2023) authored by Vaneet Aggarwal. Chao Tian et al.: Layered Exact-Repair Regenerating Codes via Embedded Error Correction and Block Designs. (2015) authored by Vaneet Aggarwal. Anis Elgabli et al.: Optimized Preference-Aware Multi-Path Video Streaming with Scalable Video Coding. (2020) authored by Vaneet Aggarwal. Anis Elgabli et al.: GroupCast: Preference-Aware Cooperative Video Streaming with Scalable Video Coding. (2018) authored by Vaneet Aggarwal. Mehdi Ashraphijuo et al.: On the Capacity and Degrees of Freedom Regions of Two-User MIMO Interference Channels With Limited Receiver Cooperation. (2014) authored by Vaneet Aggarwal. Divija Swetha Gadiraju et al.: Secure Regenerating Codes for Reducing Storage and Bootstrap Costs in Sharded Blockchains. (2020) authored by Vaneet Aggarwal. Divija Swetha Gadiraju et al.: Secure Regenerating Codes for Reducing Storage and Bootstrap Costs in Sharded Blockchains. (2020) authored by Vaneet Aggarwal. Anis Elgabli et al.: Optimized Preference-Aware Multi-path Video Streaming with Scalable Video Coding. (2018) authored by Vaneet Aggarwal. Achaleshwar Sahai et al.: Capacity of All Nine Models of Channel Output Feedback for the Two-User Interference Channel. (2013) authored by Vaneet Aggarwal. Chao Tian et al.: Exact-repair regenerating codes via layered erasure correction and block designs. (2013) authored by Vaneet Aggarwal. Anis Elgabli et al.: GroupCast: Preference-Aware Cooperative Video Streaming With Scalable Video Coding. (2019) authored by Vaneet Aggarwal. Hanhan Zhou et al.: Value Functions Factorization with Latent State Information Sharing in Decentralized Multi-Agent Policy Gradients. (2022) authored by Vaneet Aggarwal. Hanhan Zhou et al.: Value Functions Factorization With Latent State Information Sharing in Decentralized Multi-Agent Policy Gradients. (2023) authored by Vaneet Aggarwal. Yu Xiang et al.: Taming Latency in Data Center Networking with Erasure Coded Files. (2015) authored by Vaneet Aggarwal. Yimeng Wang et al.: DeepChunk: Deep Q-Learning for Chunk-Based Caching in Wireless Data Processing Networks. (2019) authored by Vaneet Aggarwal. Ajay Badita et al.: Single-Forking of Coded Subtasks for Straggler Mitigation. (2021) authored by Vaneet Aggarwal. Jiaqi Yao et al.: A Data-Driven Framework for TCP to Achieve Flexible QoS Control in Mobile Data Networks. (2023) authored by Vaneet AggarwalD. D. Purdue University awarded him the Most Impactful Faculty Innovator Award in 2021. He currently holds the position of Full Professor at Purdue University. and Ph
output format: answer
|
HADAR: Heat-Assisted Detection and Ranging
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In which year did the writer of 'Imaging of Single Transducer-Harmonic Motion Imaging-Derived Displacements at Several Oscillation Frequencies Simultaneously' receive a Fulbright U.S. Inter-country Award?
Context: Elisa E. Konofagou alternativeName Elisa Evgenia Konofagou. Elisa E. Konofagou alternativeName Elisa Konofagou. Elisa E. Konofagou alternativeName Konofagou Elisa. Elisa E. Konofagou is Creator. Elisa E. Konofagou alternativeName E.E Konofagou. Elisa E. Konofagou alternativeName Elisa E. Konofagou. Elisa E. Konofagou name Elisa E. Konofagou. Elisa E. Konofagou alternativeName E. Konofagou. Elisa E. Konofagou is PersonS. \nAwards received by Konofagou include:"}. Konofagou maintains several clinical collaborations with the Columbia Presbyterian Medical Center
output format: answer
|
2019
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In which year did the author who chaired ACM Hypertext 2010 participate in an experiment giving doctors online access to medical databases through a handheld iPAQ PC?
Context: Parke Godfrey et al.: WIREFRAME: Two-phase, Cost-based Optimization for Conjunctive Regular Path Queries. (2017) authored by Mark H. Chignell. Shengdong Zhao et al.: Elastic Hierarchies: Combining Treemaps and Node-Link Diagrams. (2005) authored by Mark H. Chignell. Mark Chignell modified 2023-10-18. Henry J. Moller et al.: Nature and Nurturance Across the Ages: Modest Means for Modern Times. (2019) authored by Mark H. Chignell. Mark Chignell name Mark Chignell. Danielle M. Lottridge et al.: Identifying Emotion through Implicit and Explicit Measures: Cultural Differences, Cognitive Load, and Immersion. (2012) authored by Mark H. Chignell. Jaturong Kongmanee et al.: Dual-Stage OOD Detection Learning with an Unsupervised Start. (2023) authored by Mark H. Chignell. Farzad Nejatimoharrami et al.: UI Design for an Engineering Process: Programming Experiments on a Liquid Handling Robot. (2017) authored by Mark H. Chignell. Weiwei Li et al.: A quantitative relationship between Application Performance Metrics and Quality of Experience for Over-The-Top video. (2018) authored by Mark H. Chignell. Zahid Abul-Basher et al.: TASWEET: Optimizing Disjunctive Path Queries in Graph Databases. (2017) authored by Mark H. Chignell. Mark H. Chignell et al.: Peak-end effects in video Quality of Experience. (2016) authored by Mark H. Chignell. Zahid Abul-Basher et al.: SwarmGuide: Towards Multiple-Query Optimization in Graph Databases. (2016) authored by Mark H. Chignell. Mark Chignell i10Index 87. Mark Chignell 2YrMeanCitedness 0.92500001192092895508. Peter A. Hancock and Mark H. Chignell: Adaptive function allocation by intelligent interfaces. (1993) authored by Mark H. Chignell. You Zhi Hu et al.: Impact of rewards on cognitive game performance: Competition with peers increases enjoyment in easy, but not difficult tasks. (2023) authored by Mark H. Chignell. Shadi Ghajar-Khosravi et al.: Simplifying the Task of Group Gift Giving. (2013) authored by Mark H. Chignell. Lu Wang et al.: Hierarchical Clustering of Multi-Study Depression Data Yields Four Symptom Clusters. (2021) authored by Mark H. Chignell. Michiaki Yasumura et al.: Game 2.0 and beyond: an interaction design approach to digital game evolution. (2008) authored by Mark H. Chignell. Fuqiang Gu et al.: A Survey on Deep Learning for Human Activity Recognition. (2022) authored by Mark H. Chignell. Daniela Rosu et al.: Knowledge-Based Provisioning of Goods and Services: Towards a Virtual Social Needs Marketplace. (2017) authored by Mark H. Chignell"}. \nIn 2003, Chignell founded Vocalage Inc
output format: answer
|
2003
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In which year did the author of the article 'The Deep Ritz method: A deep learning-based numerical algorithm for solving variational problems' become a full professor at Courant Institute, New York University?
Context: E Weinan alternativeName E Wei‐nan. E Weinan name E Weinan. E Weinan alternativeName E. Weinan. E Weinan orcidId https://orcid.org/0000-0003-0272-9500. E Weinan alternativeName E. W. Weinan. Weinan E affiliation Peking University, China. Haoshu Tian and Weinan E: Fire sale in financial networks. (2014) authored by Weinan E. E Weinan 2YrMeanCitedness 5.3230767250061035156. Weinan E is Creator. E Weinan worksCount 422. Weinan E link http://www.wikidata.org/entity/Q1276655. Weinan E is Person. Weinan E affiliation Beijing Institute of Big Data Research, China. Yucheng Yang et al.: The Knowledge Graph for Macroeconomic Analysis with Alternative Big Data. (2020) authored by Weinan E. E Weinan i10Index 224. Weinan E primary affiliation Beijing Institute of Big Data Research, China. E Weinan modified 2023-10-18 Stat. 5, no. , pp. '}. D. 1. Petersburg. " Physical Review B 66, no. 5 (2002). \nWeinan E, and Bjorn Engquist
output format: answer
|
1997
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the hIndex of the author of Christine A. Orengo?
Context: Linus Scheibenreif et al.: FunFam protein families improve residue level molecular function prediction. (2019) authored by Christine A. Orengo. Elena Rojano et al.: Assigning protein function from domain-function associations using DomFun. (2022) authored by Christine A. Orengo. Elena Rojano et al.: Associating Protein Domains with Biological Functions: A Tripartite Network Approach. (2019) authored by Christine A. Orengo. David A. Lee et al.: Novel Computational Protocols for Functionally Classifying and Characterising Serine Beta-Lactamases. (2016) authored by Christine A. Orengo. Alex L. Mitchell et al.: The InterPro protein families database: the classification resource after 15 years. (2015) authored by Christine A. Orengo. Corin Yeats et al.: The Gene3D Web Services: a platform for identifying, annotating and comparing structural domains in protein sequences. (2011) authored by Christine A. Orengo. Jonathan G. Lees et al.: FUN-L: gene prioritization for RNAi screens. (2015) authored by Christine A. Orengo. James E. Bray et al.: A practical and robust sequence search strategy for structural genomics target selection. (2004) authored by Christine A. Orengo. Anna E. Lobley et al.: FFPred: an integrated feature-based function prediction server for vertebrate proteomes. (2008) authored by Christine A. Orengo. Vaishali P. Waman et al.: The impact of structural bioinformatics tools and resources on SARS-CoV-2 research and therapeutic strategies. (2021) authored by Christine A. Orengo. Ian Sillitoe et al.: Genome3D: integrating a collaborative data pipeline to expand the depth and breadth of consensus protein structure annotation. (2020) authored by Christine A. Orengo. Jonathan G. Lees et al.: Gene3D: a domain-based resource for comparative genomics, functional annotation and protein network analysis. (2012) authored by Christine A. Orengo. Andrew P. Harrison et al.: Establishing a major cause of discrepancy in the calibration of Affymetrix GeneChips. (2007) authored by Christine A. Orengo. Michael Hirsch et al.: Improved Robustness in Time Series Analysis of Gene Expression Data by Polynomial Model Based Clustering. (2006) authored by Christine A. Orengo0 International License. ” --Royal Society Terms, conditions and policies at the Wayback Machine (archived 2016-11-11)"}. \nOrengo's research analyses genes, proteins and biological systems using computational methods to classify proteins into evolutionary families
output format: answer
|
19
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the cited by count for the academic institution of the author of the review published in 2012?
Context: Michael Bolin et al.: Automation and customization of rendered web pages. (2005) authored by Thomas D. Wilson 0001. Tom Wilson alternativeName Tom Wilson. Tom Wilson alternativeName Tom D. Wilson. Tom Wilson name Tom Wilson. T. D. Wilson: Review of: Tidwell, Jenifer. Designing interfaces. Sebastopol, CA: O'Reilly, 2006. (2006) authored by Thomas D. Wilson 0001. Tom Wilson alternativeName Thomas D. Wilson. T. D. Wilson: Review of: Ray, Erik T. Learning XML (2nd ed.) Sebastopol, CA: O'Reilly, 2003. xiv, 400, [1] p. ISBN 0-596-00420-6. (2003) authored by Thomas D. Wilson 0001. Tom Wilson alternativeName T.D Wilson. T. D. Wilson: Review of: Healy, Kieran. Data visualization: a practical introduction. Princeton, NJ: Princeton University Press, 2019. (2019) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Disk Drill PRO. Atlanta, GA: 508 Software LLC. (2016) authored by Thomas D. Wilson 0001. Tom Wilson alternativeName T. D. Wilson. Tom Wilson alternativeName T. Wilson. Tom Wilson alternativeName T D. Wilson. T. D. Wilson: Hacking the systems. Review of: Tara Calishain and Rael Dornfest, Google hacks; Paul Bausch, Amazon hacks. Preston Grall, Windows XP hacks. Sebastopol, CA: O'Reilly, 2003 (2003) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Galla, Preston. Windows XP Hacks: tips and tools for optimizing your OS. (2nd ed.) Sebastopol, CA: O'Reilly, 2005. (2005) authored by Thomas D. Wilson 0001. Tom Wilson alternativeName Taryn Wilson. T. D. Wilson: Review of: Kling, R., Rosenbaum, H. & Sawyer, S. Understanding and communicating social informatics: a framework for studying and teaching the human contexts of information and communication technologies. Medford, NJ: Information Today, Inc., 2005. (2006) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Dourish, Paul and Bell, Genevieve. Divining a digital future: mess and mythology in ubiquitous computing. Cambridge, MA: MIT Press, 2011. (2011) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Mulder, Steve and Yaar, Ziv. The user is always right: a practical guide to creating and using personas for the Web Second edition. Berkeley, CA: New Riders, 2007. (2008) authored by Thomas D. Wilson 0001. David K. Allen and T. D. Wilson: Action, interaction and the role of ambiguity in the introduction of mobile information systems in a UK Police Force. (2004) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Swinford, Echo Fixing PowerPoint annoyances. How to fix the most annoying things about your favorite presentation program. Sebastopol, CA: O'Reilly, 2006. (2006) authored by Thomas D. Wilson 0001. Walter Sujansky and Tom Wilson: DIRECT secure messaging as a common transport layer for reporting structured and unstructured lab results to outpatient providers. (2015) authored by Thomas D. Wilson 0001. Tom Wilson i10Index 60. Simon Waddington et al.: PERICLES - Promoting and Enhancing Reuse of Information throughout the Content Lifecycle taking account of Evolving Semantics : Poster - iPres 2013 - Lisbon. (2013) authored by Thomas D. Wilson 0001. Tom Wilson: Overcoming the barriers to the implementation of information system strategies. (1991) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Moggridge, Bill. Designing interactions. Cambridge, MA: The MIT Press, 2007. (2007) authored by Thomas D. Wilson 0001. T. D. Wilson: Simplicity, usability: secrets of Web design - Review of: Creative HTML design.2, by Lynda and William Weinman. Learning Web design: a beginner's guide to HTML, graphics, and beyond, by Jennifer Niederst. Don't make me think! A common sense approach to Web usability, by Steve Krug. Designing Web usability, by Jakob Nielsen. (2001) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Cravens, Jesse & Burtoft, Jeff. HTML5 hacks: tips & tools for creating interactive Web applications. Sebastopol, CA: O'Reilly, 2013. (2013) authored by Thomas D. Wilson 0001. Thomas D. Wilson and Elena Maceviciute: Information misbehaviour: modelling the motivations for the creation, acceptance and dissemination of misinformation. (2022) authored by Thomas D. Wilson 0001. Amanda Spink et al.: Modeling Users' Successive Searches in Digital Environments: A National Science Foundation/British Library Funded Study. (1998) authored by Thomas D. Wilson 0001. Tom Wilson: Workload Correlation and Visualization. (2010) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Broussard, Meredith. Artificial unintelligence. How computers misunderstand the world. Cambridge, MA: MIT Press, 2018. (2018) authored by Thomas D. Wilson 0001. Ana Maria Ramalho Correia and T. D. Wilson: The MSc in Information Management of the University of Sheffield taught in Portugal: an example of knowledge transfer in education. (1992) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Wyke-Smith, Charles Stylin' with CSS: a designer's guide, 2nd. ed. Berkeley, CA: New Riders, 2008. (2009) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Clark, David D. Designing an Internet. Cambridge, MA: MIT Press, 2018. (2019) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Strother, Judith B., Ulign, Jan M. & Fazal, Zohra (Eds.). Information overload: an international challenge for professional engineers and technical communicators. Hoboken, NY: John Wiley & Sons, Inc., 2012. (2012) authored by Thomas D. Wilson 0001. Ian Owens et al.: Training information services specialists in the less-favoured regions of the European Union (TRAIN-ISS). (1996) authored by Thomas D. Wilson 0001. Tom Wilson: Sixth IEEE International Conference on Consumer Electronics-Berlin [Conference Reports]. (2017) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Hertzfeld, Andy Revolution in the Valley: the insanely great story of how the Mac was made. Sebastopol, CA: O'Reilly, 2004. (2005) authored by Thomas D. Wilson 0001. T. D. Wilson et al.: The behaviour/practice debate. (2009) authored by Thomas D. Wilson 0001. Elena Maceviciute and T. D. Wilson: Information behaviour research and information systems development: the SHAMAN project, an example of collaboration. (2010) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Turkle, Sherry. (Ed.). The inner history of devices. Cambridge, MA: MIT Press, 2008. (2008) authored by Thomas D. Wilson 0001. T. D. Wilson: The languages of the Web - Review of: CSS Pocket Reference, by Eric A. Meyer. XHTML, by Chelsea Valentine & Chris Minnick. Learning XML, by Erik T. Ray. (2001) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Derrick Story. Digital photography hacks: 100 industrial-strength tips and tools. Sebastopol, CA: O'Reilly. 2004. xx, 309pp. ISBN 0-596-00666-7 (2004) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Gubrium, Jaber F. and Holstein, James A., eds. Handbook of interview research: context & method. Thousand Oaks, CA: Sage, 2002. xiii, 981 pp. ISBN 0-7619-1951-1. (2003) authored by Thomas D. Wilson 0001. Elena Maceviciute and Thomas D. Wilson: Digital Means for Reducing Digital Inequality: Literature Review. (2018) authored by Thomas D. Wilson 0001. Tom Wilson member of Glasgow Caledonian University. T. D. Wilson: Review of: Wainer, Howard. Picturing the uncertain world: how to understand, communicate, and control uncertainty through graphical display. Princeton, NJ: Princeton University Press, 2009. (2009) authored by Thomas D. Wilson 0001 There are four steps in the process, problem identification, problem definition, problem resolution, and solution statement. '}. At each step of the process, more information must be gathered in order to resolve the uncertainty of that step. The aim of the project was to increase the efficiency of Social Services workers in the management of information. Wilson and his team also observed social workers and their managers in their day-to-day tasks, to see what techniques were actually used to find, use and communicate information. \nThomas Daniel Wilson was born in 1935 at Shincliffe Station in County Durham, England. Thomas D. That, combined with lack of training in using the other information sources available, had led to a lack of organized information being used at Social Services offices. He left school at age 16 to work as a library assistant in Durham County Library
output format: answer
|
261427
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many publication citations does the academic organization of the author of 'Constrained weighted sum rate maximization for multicast service in downlink OFDMA' have?
Context: Ekram Hossain alternativeName Ekram. Hossain. Ekram Hossain alternativeName Hossain Ekram. Ekram Hossain alternativeName E. Hossain. Ekram Hossain name Ekram Hossain. Fatima Hussain et al.: Explainable Artificial Intelligence (XAI): An Engineering Perspective. (2021) authored by Ekram Hossain 0001. Amine Mezghani et al.: Nonlocal Reconfigurable Intelligent Surfaces for Wireless Communication: Modeling and Physical Layer Aspects. (2022) authored by Ekram Hossain 0001. Zaheer Khan et al.: An FPGA-Based Implementation of a Multifunction Environment Sensing Device for Shared Access With Rotating Radars. (2018) authored by Ekram Hossain 0001. Prabodini Semasinghe and Ekram Hossain: A cheat-proof power control policy for self-organizing full-duplex small cells. (2016) authored by Ekram Hossain 0001. Sudarshan Guruacharya and Ekram Hossain: Self-Sustainability of Energy Harvesting Systems: Concept, Analysis, and Design. (2018) authored by Ekram Hossain 0001. Sudarshan Guruacharya and Ekram Hossain: Self-Sustainability of Energy Harvesting Systems: Concept, Analysis, and Design. (2017) authored by Ekram Hossain 0001. Dinh Thai Hoang et al.: Charging and Discharging of Plug-In Electric Vehicles (PEVs) in Vehicle-to-Grid (V2G) Systems: A Cyber Insurance-Based Model. (2017) authored by Ekram Hossain 0001. Dinh Thai Hoang et al.: Charging and Discharging of Plug-In Electric Vehicles (PEVs) in Vehicle-to-Grid (V2G) Systems: A Cyber Insurance-Based Model. (2017) authored by Ekram Hossain 0001. Fatima Hussain et al.: Machine Learning in IoT Security: Current Solutions and Future Challenges. (2020) authored by Ekram Hossain 0001. Fatima Hussain et al.: Machine Learning in IoT Security: Current Solutions and Future Challenges. (2019) authored by Ekram Hossain 0001. Arup Barua et al.: Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey. (2022) authored by Ekram Hossain 0001. Sudarshan Guruacharya et al.: Battery Recharge Time of a Stochastic Linear and Nonlinear Energy Harvesting Systems. (2018) authored by Ekram Hossain 0001. Yulong Wang et al.: Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey. (2023) authored by Ekram Hossain 0001. Ekram Hossain 2YrMeanCitedness 6.5434784889221191406. Andell Anees Alexander et al.: Solar-powered ZigBee-based wireless motion surveillance: a prototype development and experimental results. (2008) authored by Ekram Hossain 0001. Shaohan Feng et al.: Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming. (2024) authored by Ekram Hossain 0001. Shaohan Feng et al.: Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming. (2022) authored by Ekram Hossain 0001. Ekram Hossain 0001 is Creator. Monowar Hasan et al.: Social Behavior in Bacterial Nanonetworks: Challenges and Opportunities. (2014) authored by Ekram Hossain 0001. Shiqiang Zhu et al.: Intelligent Computing: The Latest Advances, Challenges and Future. (2022) authored by Ekram Hossain 0001. Monowar Hasan et al.: Social behavior in bacterial nanonetworks: challenges and opportunities. (2015) authored by Ekram Hossain 0001. Xiao Lu et al.: Intelligent Reflecting Surface Enabled Covert Communications in Wireless Networks. (2020) authored by Ekram Hossain 0001. Ekram Hossain 0001 is Person. Uzma Siddique et al.: Adaptive in-band self-backhauling for full-duplex small cells. (2015) authored by Ekram Hossain 0001. Olga Galinina et al.: On feasibility of 5G-grade dedicated RF charging technology for wireless-powered wearables. (2016) authored by Ekram Hossain 0001. Olga Galinina et al.: On Feasibility of 5G-Grade Dedicated RF Charging Technology for Wireless-Powered Wearables. (2015) authored by Ekram Hossain 0001. Sudarshan Guruacharya et al.: On the Battery Recharge Time in a Stochastic Energy Harvesting System. (2017) authored by Ekram Hossain 0001. Wei Cai et al.: Guest Editorial Introduction to the Special Section on Collaborative Machine Learning for Next-Generation Intelligent Applications. (2022) authored by Ekram Hossain 0001. Athanasios V. Vasilakos et al.: Special Issue on Game Theory. (2010) authored by Ekram Hossain 0001. Mitchell Green et al.: Measurement of latency during real-time wireless video transmission for remote supervision of autonomous agricultural machines. (2021) authored by Ekram Hossain 0001. Angelo Vera Rivera et al.: A Blockchain Framework for Secure Task Sharing in Multi-access Edge Computing. (2020) authored by Ekram Hossain 0001. Angelo Vera Rivera et al.: A Blockchain Framework for Secure Task Sharing in Multi-Access Edge Computing. (2021) authored by Ekram Hossain 0001. Ekram Hossain modified 2023-10-18. Harrison Kurunathan et al.: Machine Learning-Aided Operations and Communications of Unmanned Aerial Vehicles: A Contemporary Survey. (2022) authored by Ekram Hossain 0001. Harrison Kurunathan et al.: Machine Learning-Aided Operations and Communications of Unmanned Aerial Vehicles: A Contemporary Survey. (2024) authored by Ekram Hossain 0001. Mohamed Akrout et al.: From Multilayer Perceptron to GPT: A Reflection on Deep Learning Research for Wireless Physical Layer. (2023) authored by Ekram Hossain 0001. Dun Yuan et al.: Realizing XR Applications Using 5G-Based 3D Holographic Communication and Mobile Edge Computing. (2023) authored by Ekram Hossain 0001. Javad Ahmadi-Shokouh et al.: Reflection Coefficient Measurement for House Flooring Materials at 57-64 GHz. (2009) authored by Ekram Hossain 0001. Dusit Niyato et al.: Sleep and Wakeup Strategies in Solar-Powered Wireless Sensor/Mesh Networks: Performance Analysis and Optimization. (2007) authored by Ekram Hossain 0001. Dusit Niyato et al.: Basics of Wireless Energy Harvesting and Transfer. (2016) authored by Ekram Hossain 0001. Amal Feriani et al.: Tracking Pandemics: A MEC-Enabled IoT Ecosystem with Learning Capability. (2020) authored by Ekram Hossain 0001. Siming Wang et al.: Permissioned Blockchain for Efficient and Secure Resource Sharing in Vehicular Edge Computing. (2019) authored by Ekram Hossain 0001. Ekram Hossain orcidId https://orcid.org/0000-0002-5932-6887. Jiawen Kang et al.: Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains. (2017) authored by Ekram Hossain 0001. Xiao Lu et al.: Intelligent Reflecting Surface (IRS)-Enabled Covert Communications in Wireless Networks. (2019) authored by Ekram Hossain 0001. Xiaolin Zhou et al.: Towards Quantum-Native Communication Systems: New Developments, Trends, and Challenges. (2023) authored by Ekram Hossain 0001"}. ) at the Bangladesh University of Engineering and Technology (BUET) in Dhaka, Bangladesh before going on to complete a Ph
output format: answer
|
2093625
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the number of publications for the academic institution of the author of the 'Key Derivation Algorithms' article?
Context: Bugra Gedik et al.: Lira: Lightweight, Region-aware Load Shedding in Mobile CQ Systems. (2007) authored by Ling Liu 0001. Liu Ling alternativeName Liu Ling. Bhuvan Bamba et al.: A motion-aware safe period-based framework for spatial alarm processing. (2010) authored by Ling Liu 0001. Sangeetha Seshadri et al.: A Systematic Approach to System State Restoration during Storage Controller Micro-Recovery. (2009) authored by Ling Liu 0001. Shicong Meng et al.: Resource-Aware Application State Monitoring. (2012) authored by Ling Liu 0001. Keke Chen and Ling Liu: Cluster Rendering of Skewed Datasets via Visualization. (2003) authored by Ling Liu 0001. Wenqi Wei et al.: Bitcoin Transaction Forecasting With Deep Network Representation Learning. (2021) authored by Ling Liu 0001. Wenqi Wei et al.: Bitcoin Transaction Forecasting with Deep Network Representation Learning. (2020) authored by Ling Liu 0001. Shicong Meng et al.: REMO: Resource-Aware Application State Monitoring for Large-Scale Distributed Systems. (2009) authored by Ling Liu 0001. Yakun Huang et al.: A Lightweight Collaborative Recognition System with Binary Convolutional Neural Network for Mobile Web Augmented Reality. (2019) authored by Ling Liu 0001. Bugra Gedik and Ling Liu: MobiEyes: A Distributed Location Monitoring Service Using Moving Location Queries. (2006) authored by Ling Liu 0001. Pei Ren et al.: Edge-Assisted Distributed DNN Collaborative Computing Approach for Mobile Web Augmented Reality in 5G Networks. (2020) authored by Ling Liu 0001. Sangeetha Seshadri et al.: A Fault-Tolerant Middleware Architecture for High-Availability Storage Services. (2007) authored by Ling Liu 0001. Hui Yan et al.: Data Offloading Enabled by Heterogeneous UAVs for IoT Applications Under Uncertain Environments. (2023) authored by Ling Liu 0001. Garry Froehlich et al.: Hooking into Object-Oriented Application Frameworks. (1997) authored by Ling Liu 0001. Dohee Kim et al.: Improving Time-Series Classification Accuracy Based on Temporal Feature Representation Learning Using CRU-LSTM Autoencoder. (2023) authored by Ling Liu 0001. Ling Liu et al.: Research on the Current Situation and Strategies of College Students' Online Learning Interaction and Satisfaction During the COVID-19 Pandemic. (2022) authored by Ling Liu 0001. Pei Ren et al.: Edge AR X5: An Edge-Assisted Multi-User Collaborative Framework for Mobile Web Augmented Reality in 5G and Beyond. (2022) authored by Ling Liu 0001. Liu Ling alternativeName Ling. Liu. Ka Ho Chow and Ling Liu: Robust Object Detection Fusion Against Deception. (2021) authored by Ling Liu 0001. Ka Ho Chow et al.: TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems. (2020) authored by Ling Liu 0001. Zhongwei Xie et al.: Learning Joint Embedding with Modality Alignments for Cross-Modal Retrieval of Recipes and Food Images. (2021) authored by Ling Liu 0001. Zhongwei Xie et al.: Learning Joint Embedding with Modality Alignments for Cross-Modal Retrieval of Recipes and Food Images. (2021) authored by Ling Liu 0001. Amit Warke et al.: Storage Service Orchestration with Container Elasticity. (2018) authored by Ling Liu 0001. Qi Zhang et al.: MemFlex: A Shared Memory Swapper for High Performance VM Execution. (2017) authored by Ling Liu 0001. Yuming Wang et al.: Effective Facial Obstructions Removal with Enhanced Cycle-Consistent Generative Adversarial Networks. (2018) authored by Ling Liu 0001. Rui Zhang et al.: Clustering Noisy Trajectories via Robust Deep Attention Auto-Encoders. (2019) authored by Ling Liu 0001. Ka Ho Chow et al.: Understanding Object Detection Through An Adversarial Lens. (2020) authored by Ling Liu 0001. Ka Ho Chow et al.: Understanding Object Detection Through an Adversarial Lens. (2020) authored by Ling Liu 0001. Ka Ho Chow et al.: Adversarial Objectness Gradient Attacks in Real-time Object Detection Systems. (2020) authored by Ling Liu 0001. Qinyuan Feng et al.: Vulnerabilities and countermeasures in context-aware social rating services. (2012) authored by Ling Liu 0001. Liu Ling name Liu Ling. Zhongwei Xie et al.: Cross-Modal Joint Embedding with Diverse Semantics. (2020) authored by Ling Liu 0001. Bugra Gedik et al.: MobiQual: QoS-aware Load Shedding in Mobile CQ Systems. (2008) authored by Ling Liu 0001. Liu Ling alternativeName L. Ling. Sung-Hyun Sim et al.: Bagging Recurrent Event Imputation for Repair of Imperfect Event Log With Missing Categorical Events. (2023) authored by Ling Liu 0001. Bugra Gedik et al.: Load Shedding in Mobile Systems with MobiQual. (2011) authored by Ling Liu 0001. Shicong Meng et al.: Monitoring continuous state violation in datacenters: Exploring the time dimension. (2010) authored by Ling Liu 0001. Pei Ren et al.: Distributed Edge System Orchestration for Web-Based Mobile Augmented Reality Services. (2023) authored by Ling Liu 0001. Gong Zhang et al.: Automated lookahead data migration in SSD-enabled multi-tiered storage systems. (2010) authored by Ling Liu 0001. Xiuquan Qiao et al.: Web AR: A Promising Future for Mobile Augmented Reality - State of the Art, Challenges, and Insights. (2019) authored by Ling Liu 0001. Shengchao Liu et al.: ChatGPT-powered Conversational Drug Editing Using Retrieval and Domain Feedback. (2023) authored by Ling Liu 0001. Mudhakar Srivatsa and Ling Liu: Countering Targeted File Attacks Using LocationGuard. (2005) authored by Ling Liu 0001. Wenqi Cao and Ling Liu: Hierarchical Orchestration of Disaggregated Memory. (2020) authored by Ling Liu 0001. Balaji Palanisamy et al.: Road network mix-zones for anonymous location based services. (2013) authored by Ling Liu 0001. Anand Murugappan and Ling Liu: An Energy Efficient Middleware Architecture for Processing Spatial Alarms on Mobile Clients. (2010) authored by Ling Liu 0001. Xiao-ke Zhu et al.: DLB: Deep Learning Based Load Balancing. (2021) authored by Ling Liu 0001. Bhuvan Bamba et al.: SLIM: A Scalable Location-Sensitive Information Monitoring Service. (2013) authored by Ling Liu 0001. Balaji Palanisamy and Ling Liu: Effective mix-zone anonymization techniques for mobile travelers. (2014) authored by Ling Liu 0001. Xiao-ke Zhu et al.: DLB: Deep Learning Based Load Balancing. (2019) authored by Ling Liu 0001'}. D
output format: answer
|
150877
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What award did the scholar who wrote HW/SW codesign techniques for dynamically reconfigurable architectures win in 2021?
Context: Aislan Gomide Foina et al.: Player Tracker - a tool to analyze sport players using RFID. (2010) authored by Rosa M. Badia. Vasilis Dialinos et al.: Implementing phylogenetic inference with GRID superscalar. (2005) authored by Rosa M. Badia. Javier Conejero et al.: Boosting Atmospheric Dust Forecast with PyCOMPSs. (2018) authored by Rosa M. Badia. Rosa M. Badía 2YrMeanCitedness 2.0731706619262695312. Pere Vergés et al.: Task-Level Checkpointing System for Task-Based Parallel Workflows. (2022) authored by Rosa M. Badia. Aislan Gomide Foina et al.: P-means, a parallel clustering algorithm for a heterogeneous multi-processor environment. (2011) authored by Rosa M. Badia. Rosa M. Badía name Rosa M. Badía. Marc Casas et al.: Automatic Phase Detection of MPI Applications. (2007) authored by Rosa M. Badia. Rosa M. Badía alternativeName Rosa. M. Badia. Rosa M. Badía alternativeName Rosa Maria Badia. Rosa M. Badía alternativeName Badia. Rosa M. Badía alternativeName Rosa María Pérez Badia. Rosa M. Badía alternativeName Rosa Badia. Rosa M. Badía alternativeName Rosa M. Badia. Rosa M. Badía alternativeName Rosa M. Badía. Aislan Gomide Foina et al.: G-Means Improved for Cell BE Environment. (2010) authored by Rosa M. Badia. Rafael Amaral et al.: Supporting biodiversity studies with the EUBrazilOpenBio Hybrid Data Infrastructure. (2015) authored by Rosa M. Badia. Marc Casas et al.: Extracting the optimal sampling frequency of applications using spectral analysis. (2011) authored by Rosa M. Badia. Pieter Bellens et al.: Parallel Implementation of the Integral Histogram. (2011) authored by Rosa M. Badia. Riccardo Cantini et al.: Block size estimation for data partitioning in HPC applications using machine learning techniques. (2022) authored by Rosa M. Badia. Riccardo Cantini et al.: Block size estimation for data partitioning in HPC applications using machine learning techniques. (2024) authored by Rosa M. Badia. Javier Álvarez Cid-Fuentes et al.: Efficient development of high performance data analytics in Python. (2020) authored by Rosa M. Badia. Marc Casas et al.: Automatic Phase Detection and Structure Extraction of MPI Applications. (2010) authored by Rosa M. Badia. Elvis Rojas et al.: A Study of Checkpointing in Large Scale Training of Deep Neural Networks. (2020) authored by Rosa M. Badia. Rosa M. Badía alternativeName R. Badia. Victor Anton et al.: Transparent Execution of Task-Based Parallel Applications in Docker with COMP Superscalar. (2017) authored by Rosa M. Badia. Rosa M. Badía alternativeName Badia Rm. Riccardo Tosi et al.: A Parallel Dynamic Asynchronous Framework for Uncertainty Quantification by Hierarchical Monte Carlo Algorithms. (2021) authored by Rosa M. Badia. Rosa M. Badía alternativeName R. M. Badia'}. D
output format: answer
|
HPDC Achievement Award
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the birth date of the creator of Chain Based Path Formation in Swarms of Robots?
Context: Arne Brutschy et al.: Costs and benefits of behavioral specialization. (2012) authored by Marco Dorigo. R. Aaij et al.: A Comparison of CPU and GPU Implementations for the LHCb Experiment Run 3 Trigger. (2022) authored by Marco Dorigo. Arne Brutschy et al.: Costs and Benefits of Behavioral Specialization. (2011) authored by Marco Dorigo. Marco Dorigo i10Index 124. Marco Dorigo primary affiliation Université libre de Bruxelles, IRIDIA, Belgium. Marco Dorigo affiliation Université libre de Bruxelles, IRIDIA, Belgium. Mauro Birattari and Marco Dorigo: How to assess and report the performance of a stochastic algorithm on a benchmark problem: mean or best result on a number of runs? (2007) authored by Marco Dorigo. Marco Dorigo and Enrico Sirtori: Alecsys: A Parallel Laboratory for Learning Classifier Systems. (1991) authored by Marco Dorigo. Tianjun Liao et al.: An ACO algorithm benchmarked on the BBOB noiseless function testbed. (2012) authored by Marco Dorigo. John H. Holland et al.: What Is a Learning Classifier System? (1999) authored by Marco Dorigo. Marco Dorigo member of Université Libre de Bruxelles. Marco Dorigo: Message-Based Bucket Brigade: An Algorithm for the Apportionment of Credit Problem. (1991) authored by Marco Dorigo. Thomas Halva Labella et al.: Efficiency and Task Allocation in Prey Retrieval. (2004) authored by Marco Dorigo. Manuele Brambilla et al.: A reliable distributed algorithm for group size estimation with minimal communication requirements. (2009) authored by Marco Dorigo. Marco Dorigo and Bernhard Schätz: Mapping a generator for neural network simulators to a transputer system (1990) authored by Marco Dorigo. Prasanna Balaprakash et al.: Estimation-based metaheuristics for the single vehicle routing problem with stochastic demands and customers. (2015) authored by Marco Dorigo. Marco Dorigo alternativeName Marco Dorigo. Mark Zlochin et al.: Model-Based Search for Combinatorial Optimization: A Critical Survey. (2004) authored by Marco Dorigo. Marco Dorigo is Person. Marco Dorigo et al.: Updating ACO Pheromones Using Stochastic Gradient Ascent and Cross-Entropy Methods. (2002) authored by Marco Dorigo. Marco Dorigo h-index 59. Marco Dorigo name Marco Dorigo. Touraj Soleymani et al.: Distributed constrained connectivity control for proximity networks based on a receding horizon scheme. (2015) authored by Marco Dorigo. Marco Dorigo: Using transputers to increase speed and flexibility of genetics-based machine learning systems. (1992) authored by Marco Dorigo. Marco Dorigo written paper amount in year2013: 4. Marco Dorigo written paper amount in year2013: 4. Marco Dorigo alternativeName Dorigo. Gabriele Valentini et al.: Self-organized collective decision making: the weighted voter model. (2014) authored by Marco Dorigo. Marco Dorigo: New Perspectives about Default Hierarchies Formation in Learning Classifier Systems. (1991) authored by Marco Dorigo. Roman Miletitch et al.: Information Aggregation Mechanisms in Social Odometry. (2013) authored by Marco Dorigo. Marco Dorigo alternativeName M. Dorigo. Marco Dorigo written paper amount in year2012: 12. Marco Dorigo written paper amount in year2012: 12. Marco Dorigo written paper amount in year2014: 1. Marco Dorigo written paper amount in year2014: 1. Marco Dorigo 2YrMeanCitedness 10.25 He is the recipient of an ERC Advanced Grant (2010). \nFor these contributions, in 2003 he was awarded the Marie Curie Research Excellence Award by the European Commission; on 22 November 2005, he was presented the Dr A
output format: answer
|
26 August 1961
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many total works does the author who contributed to the AAAI Fall Symposium: Dialog with Robots in 2010 have?
Context: Asish Ghoshal et al.: Test method for measuring station-keeping with unmanned marine vehicles using sonar or optical sensors. (2012) authored by Robin R. Murphy. Thomas Manzini et al.: Wireless Network Demands of Data Products from Small Uncrewed Aerial Systems at Hurricane Ian. (2023) authored by Robin R. Murphy. Thomas Manzini et al.: Wireless Network Demands of Data Products from Small Uncrewed Aerial Systems at Hurricane Ian. (2023) authored by Robin R. Murphy. Tashnim Chowdhury et al.: Comprehensive Semantic Segmentation on High Resolution UAV Imagery for Natural Disaster Damage Assessment. (2020) authored by Robin R. Murphy. Maryam Rahnemoonfar et al.: Comprehensive Semantic Segmentation on High Resolution UAV Imagery for Natural Disaster Damage Assessment. (2020) authored by Robin R. Murphy. Tashnim Chowdhury et al.: RescueNet: A High Resolution UAV Semantic Segmentation Benchmark Dataset for Natural Disaster Damage Assessment. (2022) authored by Robin R. Murphy. Robin R. Murphy name Robin R. Murphy. Justin Adams et al.: Use of Small Unmanned Aerial Systems for Tactical Response during Kilauea Volcano Lower East Rift Zone event. (2018) authored by Robin R. Murphy. Venkataraman Mahalingam et al.: A VLSI Architecture and Algorithm for Lucas-Kanade-Based Optical Flow Computation. (2010) authored by Robin R. Murphy. Trey Smith et al.: Path Coverage Optimization for USV with Side Scan Sonar for Victim Recovery. (2022) authored by Robin R. Murphy. Xuesu Xiao et al.: UAV assisted USV visual navigation for marine mass casualty incident response. (2017) authored by Robin R. Murphy. Serhan Yarkan et al.: Underground Mine Communications: A Survey. (2009) authored by Robin R. Murphy. Ananya Bal et al.: A Comparison of Point Cloud Registration Techniques for on-site Disaster Data from the Surfside Structural Collapse. (2022) authored by Robin R. Murphy. Brian W. Minten et al.: Low-order-complexity vision-based docking. (2001) authored by Robin R. Murphy. Jan Dufek et al.: Visual pose stabilization of tethered small unmanned aerial system to assist drowning victim recovery. (2017) authored by Robin R. Murphy. Robin R. Murphy alternativeName Robin Murphy. Xuesu Xiao et al.: Explicit-risk-aware Path Planning with Reward Maximization. (2019) authored by Robin R. Murphy. Robin R. Murphy alternativeName Robin R. Murphy. Jan Dufek et al.: Preventing Irrigation Canal Breaches Using Small Unmanned Aerial System with Multispectral Payload. (2019) authored by Robin R. Murphy. Siddharth Agarwal et al.: Characteristics of indoor disaster environments for small UASs. (2014) authored by Robin R. Murphy. Robin R. Murphy primary affiliation Texas A&M University, College Station, TX, USA. Traci A. Sarmiento et al.: Preliminary analysis of reconstructions from aerial images of disaster props. (2015) authored by Robin R. Murphy. Xuesu Xiao et al.: Indoor UAV Localization Using a Tether. (2018) authored by Robin R. Murphy. C. G. Leela Krishna and Robin R. Murphy: A review on cybersecurity vulnerabilities for unmanned aerial vehicles. (2017) authored by Robin R. Murphy. Daniel Majchrzak et al.: Motion Detection from Temporally Integrated Images. (2000) authored by Robin R. Murphy. Grant A. Wilde et al.: A man-packable unmanned surface vehicle for radiation localization and forensics. (2015) authored by Robin R. Murphy. Brian C. Zimmel et al.: Distributed Error Handling and HRI. (2004) authored by Robin R. Murphy. Brittany A. Duncan and Robin R. Murphy: Safety considerations for small Unmanned Aerial Systems with distributed users. (2014) authored by Robin R. Murphy. Maryam Rahnemoonfar et al.: Flooded Area Detection from Uav Images Based on Densely Connected Recurrent Neural Networks. (2018) authored by Robin R. Murphy. Robin R. Murphy alternativeName R. R. Murphy. Robin R. Murphy alternativeName R. Murphy. C. G. Leela Krishna et al.: Autonomous observation of multiple USVs from UAV while prioritizing camera tilt and yaw over UAV motion. (2017) authored by Robin R. Murphy. Brittany A. Duncan and Robin R. Murphy: A preliminary model for comfortable approach distance based on environmental conditions and personal factors. (2012) authored by Robin R. Murphy. Robin R. Murphy affiliation Texas A&M University, College Station, TX, USA. Jan Dufek and Robin R. Murphy: Visual pose estimation of USV from UAV to assist drowning victims recovery. (2016) authored by Robin R. Murphy\nMurphy was raised in Douglas, Georgia. She was an assistant professor at the Colorado School of Mines from 1992 to 1998, then moved to the University of South Florida as an associate professor in 1998 and was promoted to full professor in 2003. In 2008, Murphy moved to Texas A&M University
output format: answer
|
463
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many scientific articles are attributed to the institutional affiliation where the author of WoLLIC works?
Context: Rajeev Alur and Nimit Singhania: Precise piecewise affine models from input-output data. (2014) authored by Rajeev Alur. Anton Xue et al.: Parametric Chordal Sparsity for SDP-based Neural Network Verification. (2022) authored by Rajeev Alur. Rajeev Alur et al.: Pattern-Based Refinement of Assume-Guarantee Specifications in Reactive Synthesis. (2015) authored by Rajeev Alur. Rajeev Alur alternativeName Rohan Alur. Rajeev Alur and Mikhail Bernadsky: Bounded Model Checking for GSMP Models of Stochastic Real-Time Systems. (2006) authored by Rajeev Alur. Rajeev Alur and Arun Chandrashekharapuram: Dispatch sequences for embedded control models. (2007) authored by Rajeev Alur. Rajeev Alur alternativeName Rajeev Alur. Rajeev Alur: Tutorial I: Syntax-guided synthesis. (2013) authored by Rajeev Alur. Rajeev Alur and Arun Chandrashekharapuram: Dispatch Sequences for Embedded Control Models. (2005) authored by Rajeev Alur. Rajeev Alur et al.: Symbolic analysis for improving simulation coverage of Simulink/Stateflow models. (2008) authored by Rajeev Alur. Luan Viet Nguyen et al.: REAFFIRM: Model-Based Repair of Hybrid Systems for Improving Resiliency. (2020) authored by Rajeev Alur. Rajeev Alur and P. Madhusudan: Decision Problems for Timed Automata: A Survey. (2004) authored by Rajeev Alur. Rajeev Alur et al.: Model-Checking of Real-Time Systems: A Telecommunications Application (Experience Report). (1997) authored by Rajeev Alur. Luan Viet Nguyen et al.: REAFFIRM: Model-Based Repair of Hybrid Systems for Improving Resiliency. (2019) authored by Rajeev Alur. Rajeev Alur et al.: Model Checking Procedural Programs. (2018) authored by Rajeev Alur. Rajeev Alur name Rajeev Alur. Rajeev Alur et al.: A Framework for Transforming Specifications in Reinforcement Learning. (2021) authored by Rajeev Alur. Rajeev Alur et al.: Model-Checking of Correctness Conditions for Concurrent Objects. (2000) authored by Rajeev Alur. Radoslav Ivanov et al.: Verisig: verifying safety properties of hybrid systems with neural network controllers. (2018) authored by Rajeev Alur. Radoslav Ivanov et al.: Verisig: verifying safety properties of hybrid systems with neural network controllers. (2019) authored by Rajeev Alur. Rajeev Alur et al.: Model-Checking of Correctness Conditions for Concurrent Objects. (1996) authored by Rajeev Alur. Lei Shi et al.: Session-layer Attack Traffic Classification by Program Synthesis. (2020) authored by Rajeev Alur. P. Madhusudan et al.: Symbolic computational techniques for solving games. (2003) authored by Rajeev Alur. Rajeev Alur alternativeName Alur Rajeev. Konstantinos Kallas et al.: DiffStream: differential output testing for stream processing programs. (2020) authored by Rajeev Alur. Rajeev Alur et al.: A Framework for Transforming Specifications in Reinforcement Learning. (2022) authored by Rajeev Alur. Sebastian Burckhardt et al.: CheckFence: checking consistency of concurrent data types on relaxed memory models. (2007) authored by Rajeev Alur. Rajeev Alur et al.: On-the-Fly Reachability and Cycle Detection for Recursive State Machines. (2005) authored by Rajeev Alur. Wonhong Nam and Rajeev Alur: Learning-Based Symbolic Assume-Guarantee Reasoning with Automatic Decomposition. (2006) authored by Rajeev Alur. Rajeev Alur et al.: Model-Checking for Probabilistic Real-Time Systems (Extended Abstract). (1991) authored by Rajeev Alur. Rajeev Alur et al.: Compositional Synthesis with Parametric Reactive Controllers. (2016) authored by Rajeev Alur. Rajeev Alur: Keynote talk I: Syntax-guided synthesis. (2015) authored by Rajeev Alur. Sebastian Burckhardt et al.: Bounded Model Checking of Concurrent Data Types on Relaxed Memory Models: A Case Study. (2006) authored by Rajeev Alur. Rajeev Alur and Bow-Yaw Wang: "Next" Heuristic for On-the-Fly Model Checking. (1999) authored by Rajeev Alur. Rajeev Alur: Trends and Challenges in Algorithmic Software Verification. (2005) authored by Rajeev Alur. Rajeev Alur et al.: Symbolic computational techniques for solving games. (2005) authored by Rajeev Alur. Mikhail Bernadsky and Rajeev Alur: Symbolic Analysis for GSMP Models with One Stateful Clock. (2007) authored by Rajeev Alur. Rajeev Alur et al.: Search-based program synthesis. (2018) authored by Rajeev Alur. Rajeev Alur alternativeName R ALUR Alur was born in Pune. "}
output format: answer
|
24912
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many scientific articles are attributed to the author's institution for the publication Synthesis of Topologies with Minimum Total Expansion in 1987?
Context: Yiannis Kantaros et al.: VisionGuard: Runtime Detection of Adversarial Inputs to Perception Systems. (2020) authored by Insup Lee 0001. Yiannis Kantaros et al.: Real-time detectors for digital and physical adversarial inputs to perception systems. (2021) authored by Insup Lee 0001. Ramneet Kaur et al.: Detection of Adversarial Physical Attacks in Time-Series Image Data. (2023) authored by Insup Lee 0001. Mengyu Liu et al.: Fail-Safe: Securing Cyber-Physical Systems against Hidden Sensor Attacks. (2022) authored by Insup Lee 0001. Hyon-Young Choi et al.: Making DDS really real-time with openflow. (2016) authored by Insup Lee 0001. Esen Yel et al.: Assured Runtime Monitoring and Planning: Toward Verification of Neural Networks for Safe Autonomous Operations. (2020) authored by Insup Lee 0001. Jian Chang et al.: AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP. (2011) authored by Insup Lee 0001. Kuk Jin Jang et al.: Memory Classifiers for Robust ECG Classification against Physiological Noise. (2023) authored by Insup Lee 0001. Junkil Park et al.: Security of Cyber-Physical Systems in the Presence of Transient Sensor Faults. (2017) authored by Insup Lee 0001. Alexander Roederer et al.: Robust monitoring of hypovolemia in intensive care patients using photoplethysmogram signals. (2015) authored by Insup Lee 0001. Hyo Jin Jo et al.: MAuth-CAN: Masquerade-Attack-Proof Authentication for In-Vehicle Networks. (2020) authored by Insup Lee 0001. Junkil Park et al.: Sensor attack detection in the presence of transient faults. (2015) authored by Insup Lee 0001. Li Tan et al.: Model-based Testing and Monitoring for Hybrid Embedded Systems. (2004) authored by Insup Lee 0001. Lin Zhang et al.: Real-Time Data-Predictive Attack-Recovery for Complex Cyber-Physical Systems. (2023) authored by Insup Lee 0001. Sydney Pugh et al.: Curating Naturally Adversarial Datasets for Trustworthy AI in Healthcare. (2023) authored by Insup Lee 0001. Nicholas Stevens et al.: Smart alarms: multivariate medical alarm integration for post CABG surgery patients. (2012) authored by Insup Lee 0001. Moonjoo Kim et al.: Java-MaC: a Run-time Assurance Tool for Java Programs. (2001) authored by Insup Lee 0001. Wenwen Si et al.: Angelic Patches for Improving Third-Party Object Detector Performance. (2023) authored by Insup Lee 0001. Deepak Gangadharan et al.: Platform-Based Plug and Play of Automotive Safety Features: Challenges and Directions (Invited Paper). (2016) authored by Insup Lee 0001. Radoslav Ivanov et al.: Robust estimation using context-aware filtering. (2015) authored by Insup Lee 0001. Ivan Ruchkin et al.: Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabled Autonomous Systems - Position Paper. (2021) authored by Insup Lee 0001. Haoran Li et al.: Towards Virtualization-Agnostic Latency for Time-Sensitive Applications. (2021) authored by Insup Lee 0001. Maria Adamou et al.: Fair Real-Time Traffic Scheduling over a Wireless LA. (2001) authored by Insup Lee 0001. Hung Nguyen et al.: LogSafe: Secure and Scalable Data Logger for IoT Devices. (2018) authored by Insup Lee 0001. Sung-Soo Lim et al.: A Reliable, Safe, and Secure Run-Time Platform for Cyber Physical Systems. (2013) authored by Insup Lee 0001. Claire Kendell et al.: GlucoScan: Noninvasive Glucose Monitoring Device. (2022) authored by Insup Lee 0001. Nima Roohi et al.: Parameter Invariant Monitoring for Signal Temporal Logic. (2018) authored by Insup Lee 0001. James Weimer et al.: Resilient Parameter-Invariant Control with Application to Vehicle Cruise Control. (2013) authored by Insup Lee 0001. Chenyang Lu and Insup Lee: Editorial: Special issue on real-time wireless sensor networks. (2007) authored by Insup Lee 0001. Xiali Hei et al.: Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System. (2015) authored by Insup Lee 0001. Sangdon Park et al.: Resilient Linear Classification: An Approach to Deal with Attacks on Training Data. (2017) authored by Insup Lee 0001. Sangdon Park et al.: Resilient linear classification: an approach to deal with attacks on training data. (2017) authored by Insup Lee 0001. Amanda Watson et al.: RT-ACL: Identification of High-Risk Youth Patients and their Most Significant Risk Factors to Reduce Anterior Cruciate Ligament Reinjury Risk. (2021) authored by Insup Lee 0001. Sanjian Chen et al.: A Data-Driven Behavior Modeling and Analysis Framework for Diabetic Patients on Insulin Pumps. (2015) authored by Insup Lee 0001. Moonzoo Kim et al.: Java-MaC: A Run-Time Assurance Approach for Java Programs. (2004) authored by Insup Lee 0001. Deepthi Shashidhar et al.: Application of Python to AIMS Data to Analyze Intraoperative Hypotension through Pediatric Blood Pressure Curves. (2014) authored by Insup Lee 0001. Nima Roohi et al.: Self-Driving Vehicle Verification Towards a Benchmark. (2018) authored by Insup Lee 0001. Xiali Hei et al.: PIPAC: Patient infusion pattern based access control scheme for wireless insulin pump system. (2013) authored by Insup Lee 0001. Hyoung Seok Hong et al.: Data Flow Testing as Model Checking. (2003) authored by Insup Lee 0001. Yahan Yang et al.: Interpretable Detection of Distribution Shifts in Learning Enabled Cyber-Physical Systems. (2022) authored by Insup Lee 0001. Ramneet Kaur et al.: Detecting OODs as datapoints with High Uncertainty. (2021) authored by Insup Lee 0001. Akhilesh Gupta et al.: Class-Weighted Evaluation Metrics for Imbalanced Data Classification. (2020) authored by Insup Lee 0001. Hung Nguyen et al.: Cloud-Based Secure Logger for Medical Devices. (2016) authored by Insup Lee 0001. Jia Wang and Insup Lee: Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis. (2001) authored by Insup Lee 0001. Sooyong Jang et al.: Improving Classifier Confidence using Lossy Label-Invariant Transformations. (2020) authored by Insup Lee 0001. Lin Zhang et al.: Real-time Attack-recovery for Cyber-physical Systems Using Linear-quadratic Regulator. (2021) authored by Insup Lee 0001. Sanjian Chen et al.: Data-driven Adaptive Safety Monitoring Using Virtual Subjects in Medical Cyber-Physical Systems: A Glucose Control Case Study. (2016) authored by Insup Lee 0001. Miroslav Pajic et al.: Towards synthesis of platform-aware attack-resilient control systems: extended abstract. (2013) authored by Insup Lee 0001. Yazhou Tu et al.: Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors. (2018) authored by Insup Lee 0001. Yazhou Tu et al.: Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors. (2018) authored by Insup Lee 0001"}. S
output format: answer
|
34150
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many papers does the academic institution of the researcher who published 'Efficient and Reconfigurable Optimal Planning in Large-Scale Systems Using Hierarchical Finite State Machines' have?
Context: Kin Cheong Sou et al.: Data Attack Isolation in Power Networks Using Secure Voltage Magnitude Measurements. (2014) authored by Karl Henrik Johansson. Martin Lindström et al.: Power Injection Attacks in Smart Distribution Grids with Photovoltaics. (2020) authored by Karl Henrik Johansson. Martin Lindström et al.: Power Injection Attacks in Smart Distribution Grids with Photovoltaics. (2021) authored by Karl Henrik Johansson. André Teixeira et al.: Strategic stealthy attacks: The output-to-output ℓ2-gain. (2015) authored by Karl Henrik Johansson. Xingkang He et al.: How to Secure Distributed Filters Under Sensor Attacks. (2022) authored by Karl Henrik Johansson. Kin Cheong Sou et al.: Detection and identification of data attacks in power system. (2012) authored by Karl Henrik Johansson. Karl Henrik Johansson name Karl Henrik Johansson. Karl Henrik Johansson alternativeName Karl Henrik Johansson. Karl Henrik Johansson alternativeName Johansson. Karl Henrik Johansson alternativeName Johansson Kristian. Karl Henrik Johansson alternativeName Karl Johansson. Karl Henrik Johansson alternativeName K. Johansson. Karl Henrik Johansson alternativeName Kristian Johansson. Xingkang He et al.: How to Secure Distributed Filters Under Sensor Attacks? (2020) authored by Karl Henrik Johansson. Urszula Libal et al.: Dimensionality Reduction of Volterra Kernels by Tensor Decomposition using Higher-Order SVD. (2020) authored by Karl Henrik Johansson. Farhad Farokhi et al.: Private routing and ride-sharing using homomorphic encryption. (2020) authored by Karl Henrik Johansson. Piergiuseppe Di Marco et al.: Effects of Rayleigh-lognormal fading on IEEE 802.15.4 networks. (2013) authored by Karl Henrik Johansson. Karl Henrik Johansson alternativeName Karl H. Johansson. Karl Henrik Johansson alternativeName K. H. Johansson. James Weimer et al.: Distributed detection and isolation of topology attacks in power networks. (2012) authored by Karl Henrik Johansson. Julien M. Hendrickx et al.: Efficient Computations of a Security Index for False Data Attacks in Power Networks. (2014) authored by Karl Henrik Johansson. Weiguo Xia et al.: Structural balance and opinion separation in trust-mistrust social networks. (2016) authored by Karl Henrik Johansson. Weiguo Xia et al.: Structural Balance and Opinion Separation in Trust-Mistrust Social Networks. (2016) authored by Karl Henrik Johansson. Marco Fiorenzi et al.: Enhancing TCP Over HSDPA by Cross-Layer Signalling. (2007) authored by Karl Henrik Johansson. Hanxiao Liu et al.: An Online Approach to Physical Watermark Design. (2019) authored by Karl Henrik Johansson. Pan Gun Park et al.: Delay distribution analysis of Wireless Personal Area Networks. (2012) authored by Karl Henrik Johansson. Hanxiao Liu et al.: An Online Approach to Physical Watermark Design. (2020) authored by Karl Henrik Johansson. Frank J. Jiang et al.: SVEA: an experimental testbed for evaluating V2X use-cases. (2022) authored by Karl Henrik Johansson. Karl Henrik Johansson is Person. Niels Möller et al.: Supporting End-to-End Applications Over HSDPA by Cross-Layer Signalling. (2007) authored by Karl Henrik Johansson. Wei Chen et al.: On Spectral Properties of Signed Laplacians with Connections to Eventual Positivity. (2020) authored by Karl Henrik Johansson. Wei Chen et al.: On Spectral Properties of Signed Laplacians With Connections to Eventual Positivity. (2021) authored by Karl Henrik Johansson. D. Pacifico et al.: Improving TCP Performance During the Intra LTE Handover. (2009) authored by Karl Henrik Johansson. Song Fang et al.: Two-Way Coding and Attack Decoupling in Control Systems Under Injection Attacks. (2019) authored by Karl Henrik Johansson. Amr Alanwar et al.: Privacy Preserving Set-Based Estimation Using Partially Homomorphic Encryption. (2020) authored by Karl Henrik Johansson. Seyed Mehran Dibaji et al.: Secure Control of Wide-Area Power Systems: Confidentiality and Integrity Threats. (2018) authored by Karl Henrik Johansson. Elif Uysal et al.: Semantic Communications in Networked Systems: A Data Significance Perspective. (2022) authored by Karl Henrik Johansson. Kaveh Paridari et al.: Demand response for aggregated residential consumers with energy storage sharing. (2015) authored by Karl Henrik Johansson. Afrooz Ebadat et al.: Blind identification strategies for room occupancy estimation. (2015) authored by Karl Henrik Johansson. Niels Möller et al.: Using Radio Network Feedback to Improve TCP Performance over Cellular Networks. (2005) authored by Karl Henrik Johansson. Amr Alanwar et al.: Privacy-preserving set-based estimation using partially homomorphic encryption. (2023) authored by Karl Henrik Johansson. Lei Bao et al.: A Scheme for Joint Quantization, Error Protection and Feedback Control over Noisy Channels. (2007) authored by Karl Henrik Johansson. Wei Chen et al.: Characterizing the positive semidefiniteness of signed Laplacians via Effective Resistances. (2016) authored by Karl Henrik Johansson. Junsoo Kim et al.: Asymptotic Stabilization over Encrypted Data with Limited Controller Capacity and Time-varying Quantizer. (2022) authored by Karl Henrik Johansson. Chithrupa Ramesh et al.: Multiple access with attention-based tournaments for monitoring over wireless networks. (2009) authored by Karl Henrik Johansson. Benigno Zurita Ares et al.: Energy Consumption of Minimum Energy Coding in CDMA Wireless Sensor Networks. (2007) authored by Karl Henrik Johansson. Hanxiao Liu et al.: An On-line Design of Physical Watermarks. (2018) authored by Karl Henrik Johansson. Hanxiao Liu et al.: An On-line Design of Physical Watermarks. (2018) authored by Karl Henrik Johansson. Amr Alanwar et al.: Logical Zonotopes: A Set Representation for the Formal Verification of Boolean Functions. (2023) authored by Karl Henrik Johansson. Axel Janson et al.: Networked Multi-Virus Spread with a Shared Resource: Analysis and Mitigation Strategies. (2020) authored by Karl Henrik Johansson"}. He received the IFAC Outstanding Service Award 2023. \nKarl H. \nKarl H. He is Director of KTH Digital Futures
output format: answer
|
82515
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What was the subject of the author's first Ph.D degree?
Context: Necip Fazil Ayan et al.: "Can you give me another word for hyperbaric?": Improving speech translation using targeted clarification questions. (2013) authored by Julia Hirschberg. Gideon Mendels et al.: Improving speech recognition and keyword search for low resource languages using web data. (2015) authored by Julia Hirschberg. Lin Ai et al.: Identifying the Popularity and Persuasiveness of Right- and Left-Leaning Group Videos on Social Media. (2021) authored by Julia Hirschberg. Alex Liu et al.: Detecting Inappropriate Clarification Requests in Spoken Dialogue Systems. (2014) authored by Julia Hirschberg. Mona T. Diab et al.: Proceedings of the First Workshop on Computational Approaches to Code Switching@EMNLP 2014, Doha, Qatar, October 25, 2014 (2014) edited by Julia Hirschberg. Diane J. Litman et al.: Predicting User Reactions to System Error. (2001) authored by Julia Hirschberg. Mona T. Diab et al.: Proceedings of the Second Workshop on Computational Approaches to Code Switching@EMNLP 2016, Austin, Texas, USA, November 1, 2016 (2016) edited by Julia Hirschberg. Zehui Wu et al.: Multi-Modality Multi-Loss Fusion Network. (2023) authored by Julia Hirschberg. Yu-Wen Chen et al.: MultiPA: a multi-task speech pronunciation assessment system for a closed and open response scenario. (2023) authored by Julia Hirschberg. Zixiaofan Yang et al.: Multimodal Indicators of Humor in Videos. (2019) authored by Julia Hirschberg. Lin Ai et al.: Exploring New Methods for Identifying False Information and the Intent Behind It on Social Media: COVID-19 Tweets. (2021) authored by Julia Hirschberg. Zixiaofan Yang and Julia Hirschberg: Linguistically-Informed Training of Acoustic Word Embeddings for Low-Resource Languages. (2019) authored by Julia Hirschberg. Thamar Solorio et al.: Overview for the First Shared Task on Language Identification in Code-Switched Data. (2014) authored by Julia Hirschberg. Victor Soto et al.: Cross-language phrase boundary detection. (2013) authored by Julia Hirschberg. Jiaxuan Zhang et al.: Multimodal Deception Detection Using Automatically Extracted Acoustic, Visual, and Lexical Features. (2020) authored by Julia Hirschberg. Eli Pincus et al.: Exploring Features For Localized Detection of Speech Recognition Errors. (2013) authored by Julia Hirschberg. Victor Soto et al.: A comparison of multiple methods for rescoring keyword search lists for low resource languages. (2014) authored by Julia Hirschberg. Vinodkumar Prabhakaran et al.: A New Dataset and Evaluation for Belief/Factuality. (2015) authored by Julia Hirschberg. Andrej Ljolje et al.: Automatic speech segmentation for concatenative inventory selection. (1994) authored by Julia Hirschberg. Diane J. Litman et al.: Predicting Automatic Speech Recognition Performance Using Prosodic Cues. (2000) authored by Julia Hirschberg. Victor Soto et al.: Rescoring Confusion Networks for Keyword Search. (2014) authored by Julia Hirschberg. Shih-Fu Chang et al.: Report of 2017 NSF Workshop on Multimedia Challenges, Opportunities and Research Roadmaps. (2019) authored by Julia Hirschberg. Rivka Levitan et al.: Acoustic-prosodic entrainment in Slovak, Spanish, English and Chinese: A cross-linguistic comparison. (2015) authored by Julia Hirschberg. Huyen Nguyen et al.: Acoustic-Prosodic, Lexical and Demographic Cues to Persuasiveness in Competitive Debate Speeches. (2021) authored by Julia Hirschberg. Victor Soto and Julia Hirschberg: Crowdsourcing Universal Part-of-Speech Tags for Code-Switching. (2017) authored by Julia Hirschberg. Victor Soto and Julia Hirschberg: Crowdsourcing Universal Part-Of-Speech Tags for Code-Switching. (2017) authored by Julia Hirschberg. Bob Coyne et al.: Frame Semantics in Text-to-Scene Generation. (2010) authored by Julia Hirschberg. Prakhar Gupta et al.: DialGuide: Aligning Dialogue Model Behavior with Developer Guidelines. (2022) authored by Julia HirschbergS. She was a leader in the development of the ToBI conventions for intonational description, which have been extended to numerous languages and which today are the most widely used standard for intonational annotation. W. At Columbia, she and her students have continued and extended research on spoken dialogue systems (automatically detecting speech recognition errors and inappropriate system queries, modeling turn-taking behavior, dialogue entrainment, modeling and generating clarification dialogues); on the automatic classification of trust, charisma, deception and emotion from speech; on speech summarization; prosody translation, hedging behavior in text and speech, text-to-speech synthesis, and speech search in low resource languages. and Vida L. Corpora she and collaborators have collected include the Boston Directions Corpus, the Columbia SRI Colorado Deception Corpus, and the Columbia Games Corpus
output format: answer
|
History
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many papers does the academic institution of the writer of 'Labyrinth Chaos' have?
Context: Chunbiao Li et al.: Offset Boosting for Breeding Conditional Symmetry. (2018) authored by Julien Clinton Sprott. Hamed Ghomashchi et al.: Dynamic Patterns of Postural Fluctuations during Quiet standing: a Recurrence Quantification Approach. (2011) authored by Julien Clinton Sprott. Julien Clinton Sprott name Julien Clinton Sprott. Julien Clinton Sprott alternativeName Julien Clinton Sprott. Julien Clinton Sprott alternativeName Julien Sprott. Julien Clinton Sprott alternativeName Julien C. Sprott. Julien Clinton Sprott alternativeName Clint Sprott. Julien Clinton Sprott alternativeName Julien. C. Sprott. Julien Clinton Sprott alternativeName Julien SPROTT>. Julien Clinton Sprott is Person. Julien Clinton Sprott: A method for approximating missing data in spatial patterns. (2004) authored by Julien Clinton Sprott. Sajad Jafari et al.: Limitation of Perpetual Points for Confirming Conservation in Dynamical Systems. (2015) authored by Julien Clinton Sprott. Julien Clinton Sprott alternativeName J C. Sprott. Julien Clinton Sprott alternativeName J. C. Sprott His shows are available freely as streaming video from his website. \nClint Sprott was born on 16 September 1942 in Memphis, Tennessee
output format: answer
|
270460
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the highest academic degree held by the author of 'The rate variability-distortion (VD) curve of encoded video and its impact on statistical multiplexing'?
Context: Cui-Yu Kong et al.: Cloud-Based Charging Management of Heterogeneous Electric Vehicles in a Network of Charging Stations: Price Incentive Versus Capacity Expansion. (2022) authored by Martin Reisslein. Akhilesh S. Thyagaturu et al.: SDN-Based Smart Gateways (Sm-GWs) for Multi-Operator Small Cell Network Management. (2016) authored by Martin Reisslein. Nathan Johnson et al.: Semantically Modeling Cyber Influence Campaigns (CICs): Ontology Model and Case Studies. (2021) authored by Martin Reisslein. Athar Ali Khan et al.: Requirements, Design Challenges, and Review of Routing and MAC Protocols for CR-Based Smart Grid Systems. (2017) authored by Martin Reisslein. Amy M. Johnson et al.: Introductory Circuit Analysis Learning From Abstract and Contextualized Circuit Representations: Effects of Diagram Labels. (2014) authored by Martin Reisslein. Le Thanh Tan et al.: Multi-Timescale Actor-Critic Learning for Computing Resource Management With Semi-Markov Renewal Process Mobility. (2024) authored by Martin Reisslein. Hyo-Sik Yang et al.: MANET Routing with Provably Low Complexity Through Constant Density Clustering and Route Request Broadcast. (2007) authored by Martin Reisslein. Jochen W. Guck et al.: Model-based control plane for fast routing in industrial QoS network. (2015) authored by Martin Reisslein. Rashid Amin et al.: Hybrid SDN Networks: A Survey of Existing Approaches. (2018) authored by Martin Reisslein. Justus Rischke et al.: QR-SDN: Towards Reinforcement Learning States, Actions, and Rewards for Direct Flow Routing in Software-Defined Networks. (2020) authored by Martin Reisslein. Anu Mercian et al.: Upstream Polling Protocols for Flow Control in PON/xDSL Hybrid Access Networks. (2015) authored by Martin Reisslein. Ahmed Nasrallah et al.: Cyclic Queuing and Forwarding for Large Scale Deterministic Networks: A Survey. (2019) authored by Martin Reisslein. Mahshid Mehrabi et al.: Mobility- and Energy-Aware Cooperative Edge Offloading for Dependent Computation Tasks. (2021) authored by Martin Reisslein. Anu Mercian et al.: Upstream Polling Protocols for Flow Control in PON/xDSL Hybrid Access Networks. (2016) authored by Martin Reisslein. Zuo Xiang et al.: X-MAN: A Non-Intrusive Power Manager for Energy-Adaptive Cloud-Native Network Functions. (2022) authored by Martin Reisslein. Amy M. Johnson et al.: Learning from abstract and contextualized representations: The effect of verbal guidance. (2013) authored by Martin Reisslein. Amy M. Johnson et al.: Transitional feedback schedules during computer-based problem-solving practice. (2015) authored by Martin Reisslein. Martin Reisslein alternativeName Ramírez Martín. Gamze Ozogul et al.: Technological Literacy Learning With Cumulative and Stepwise Integration of Equations Into Electrical Circuit Diagrams. (2012) authored by Martin Reisslein. Martin Reisslein name Martin Reisslein. Martin Reisslein alternativeName Martín Ramírez. Elif Tasdemir et al.: SpaRec: Sparse Systematic RLNC Recoding in Multi-Hop Networks. (2021) authored by Martin Reisslein. Venkatraman Balasubramanian et al.: Intelligent Resource Management at the Edge for Ubiquitous IoT: An SDN-Based Federated Learning Approach. (2021) authored by Martin Reisslein. Simon Wunderlich et al.: Caterpillar RLNC (CRLNC): A Practical Finite Sliding Window RLNC Approach. (2017) authored by Martin Reisslein. Venkatraman Balasubramanian et al.: Reinforcing Cloud Environments via Index Policy for Bursty Workloads. (2020) authored by Martin Reisslein. Martin Reisslein alternativeName Martin Rd. Amy M. Johnson et al.: Animated agents in K-12 engineering outreach: Preferred agent characteristics across age levels. (2013) authored by Martin Reisslein. Athar Ali Khan et al.: Cognitive Radio for Smart Grids: Survey of Architectures, Spectrum Sensing Mechanisms, and Networking Protocols. (2016) authored by Martin Reisslein. Matthew Szeto et al.: B-AWARE: Blockage Aware RSU Scheduling for 5G Enabled Autonomous Vehicles. (2023) authored by Martin Reisslein. Jana Reisslein et al.: Integrating emerging topics through online team design in a hybrid communication networks course: Interaction patterns and impact of prior knowledge. (2005) authored by Martin Reisslein. Revak R. Tyagi et al.: Efficient delivery of frequent small data for U-healthcare applications over LTE-advanced networks. (2012) authored by Martin Reisslein He holds B. S
output format: answer
|
Ph.D.
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many publications does the contributor who published Perfect Squares as Concatenation of Consecutive Integers with Pantelimon Stanica at Am. Math. Mon. in 2019, have?
Context: Florian Luca et al.: Algebraic Model Checking for Discrete Linear Dynamical Systems. (2022) authored by Florian Luca. Christel Baier et al.: The Orbit Problem for Parametric Linear Dynamical Systems. (2021) authored by Florian Luca. Christel Baier et al.: The Orbit Problem for Parametric Linear Dynamical Systems. (2021) authored by Florian Luca. Florian Luca name Florian Luca. Florian Luca alternativeName Florian Luca. Florian Luca alternativeName Fabiana Bonesi De Luca. Florian Luca alternativeName Luca Florian. Florian Luca alternativeName Foroni Luca. Florian Luca alternativeName Luca Foroni. Florian Luca is Person. Florian Luca alternativeName F. Luca. Moubariz Z. Garaev et al.: On the Lower Bound of the Linear Complexity Over BBF_p of Sidelnikov Sequences. (2006) authored by Florian Luca. Florian Luca and Thato Mosima: On the Local Minima of the Order of Appearance Function. (2015) authored by Florian Luca. George Kenison et al.: On Positivity and Minimality for Second-Order Holonomic Sequences. (2021) authored by Florian Luca'}. You can help Wikipedia by expanding it
output format: answer
|
965
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the hIndex of Luis M. Rocha, the author of Introduction to the special issue on COMPLEX NETWORKS 2019?
Context: Artemy Kolchinsky et al.: Extraction of Pharmacokinetic Evidence of Drug-drug Interactions from the Literature. (2014) authored by Luis M. Rocha. Aehong Min et al.: Just In Time: Challenges and Opportunities of First Aid Care Information Sharing for Supporting Epileptic Seizure Response. (2021) authored by Luis M. Rocha. Rion Brattig Correia et al.: City-wide electronic health records reveal gender and age biases in administration of known drug-drug interactions. (2019) authored by Luis M. Rocha. Artemy Kolchinsky et al.: Evaluation of Linear Classifiers on Articles Containing Pharmacokinetic Evidence of Drug-Drug Interactions. (2013) authored by Luis M. Rocha. Zhiping Wang et al.: Literature mining on pharmacokinetics numerical data: A feasibility study. (2009) authored by Luis M. Rocha. Rion Brattig Correia et al.: City-wide Analysis of Electronic Health Records Reveals Gender and Age Biases in the Administration of Known Drug-Drug Interactions. (2018) authored by Luis M. Rocha. Artemy Kolchinsky et al.: Evaluation of linear classifiers on articles containing pharmacokinetic evidence of drug-drug interactions (2012) authored by Luis M. Rocha. Anália Lourenço et al.: A linear classifier based on entity recognition tools and a statistical approach to method extraction in the protein-protein interaction literature. (2011) authored by Luis M. Rocha. Chien-Feng Huang et al.: Agent-Based Model of Genotype Editing. (2007) authored by Luis M. Rocha. Anália Lourenço et al.: A Linear Classifier Based on Entity Recognition Tools and a Statistical Approach to Method Extraction in the Protein-Protein Interaction Literature (2011) authored by Luis M. Rocha. César A. Osuna-Gómez et al.: Using the APRI model for evaluating the intention in collaborative learning environments. (2004) authored by Luis M. Rocha. Heng-Yi Wu et al.: An integrated pharmacokinetics ontology and corpus for text mining. (2013) authored by Luis M. Rocha. Karin Verspoor et al.: Protein annotation as term categorization in the gene ontology using word proximity networks. (2005) authored by Luis M. Rocha. Anália Lourenço et al.: Correction: A linear classifier based on entity recognition tools and a statistical approach to method extraction in the protein-protein interaction literature. (2012) authored by Luis M. Rocha a strict genotype-phenotype separation. plus M. S. e. "}. \nDr
output format: answer
|
22
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In what year did the scholar who published Efficient communication in autonomous robot software receive their doctorate in mathematics?
Context: Tobias Ritter et al.: Decentralized Dynamic Data-Driven Monitoring of Dispersion Processes on Partitioned Domains. (2017) authored by Oskar von Stryk. Christian A. Schroth et al.: Multi-Person Localization and Vital Sign Estimation Radar Dataset. (2023) authored by Oskar von Stryk. Dorian Scholz et al.: Simulation and Experimental Evaluation of the Contribution of Biarticular Gastrocnemius Structure to Joint Synchronization in Human-Inspired Three-Segmented Elastic Legs. (2012) authored by Oskar von Stryk. Oskar von Stryk 2YrMeanCitedness 0.9166666865348815918. Katayon Radkhah et al.: Detailed dynamics modeling of BioBiped's monoarticular and biarticular tendon-driven actuation system. (2012) authored by Oskar von Stryk. Jochen Schuy et al.: Dimensioning and evaluation of the elastic element in a Variable Torsion Stiffness actuator. (2013) authored by Oskar von Stryk. Thomas Lens et al.: Dynamic modeling of elastic tendon actuators with tendon slackening. (2012) authored by Oskar von Stryk. Katrin Becker et al.: 3D Coverage Path Planning for Efficient Construction Progress Monitoring. (2022) authored by Oskar von Stryk. Katrin Becker et al.: 3D Coverage Path Planning for Efficient Construction Progress Monitoring. (2023) authored by Oskar von Stryk. Tobias Ritter et al.: Decentralized Dynamic Data-Driven Monitoring of Atmospheric Dispersion Processes. (2016) authored by Oskar von Stryk. Polona Caserman et al.: Real-time step detection using the integrated sensors of a head-mounted display. (2016) authored by Oskar von Stryk. Christoph Zelch et al.: Clustering of Motion Trajectories by a Distance Measure Based on Semantic Features. (2023) authored by Oskar von Stryk. Christoph Zelch et al.: Start State Selection for Control Policy Learning from Optimal Trajectories. (2023) authored by Oskar von Stryk. Philipp Beckerle et al.: Power-optimized stiffness and nonlinear position control of an actuator with Variable Torsion Stiffness. (2013) authored by Oskar von Stryk. Johannes Meyer et al.: A Semantic World Model for Urban Search and Rescue Based on Heterogeneous Sensors. (2010) authored by Oskar von Stryk. Torsten Butz et al.: A Parallel Optimization Scheme for Parameter Estimation in Motor Vehicle Dynamics (Research Note). (2000) authored by Oskar von Stryk. Jan-Philipp Stroscher et al.: Technical & Data Protection Aspects of a Smart Digital Control Center for Smart Cities. (2021) authored by Oskar von Stryk had launched. A. "}. Stryk is vice president of Robocup
output format: answer
|
1994
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the i10Index of the author that explored publishers' responses to the e-book phenomenon in 'small language' markets in 2016?
Context: Tom Wilson name Tom Wilson. Tom Wilson alternativeName Tom D. Wilson. Tom Wilson alternativeName Thomas D. Wilson. Tom Wilson alternativeName Tom Wilson. Tom Wilson member of Glasgow Caledonian University. Tom Wilson alternativeName Taryn Wilson. Tom Wilson alternativeName T. D. Wilson. Tom Wilson alternativeName T.D Wilson. Tom Wilson alternativeName T D. Wilson. Tom Wilson alternativeName T. Wilson. Thomas D. Wilson 0001 is Person. T. D. Wilson: Review of: Disk Drill PRO. Atlanta, GA: 508 Software LLC. (2016) authored by Thomas D. Wilson 0001. Tom Wilson modified 2023-10-18. Tom Wilson worksCount 360. T. D. Wilson: Review of: Ray, Erik T. Learning XML (2nd ed.) Sebastopol, CA: O'Reilly, 2003. xiv, 400, [1] p. ISBN 0-596-00420-6. (2003) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Sejnowski, Terrence J. The deep learning revolution Cambridge, MA: MIT Press, 2018. (2018) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Jones, R. Internet forensics. Sebastopol, CA: O'Reilly, 2005. (2006) authored by Thomas D. Wilson 0001. Tom Wilson citedByCount 4914. Thomas D. Wilson 0001 link http://www.wikidata.org/entity/Q7788804. Thomas D. Wilson 0001 affiliation University of Borås, Sweden. Tom Wilson 2YrMeanCitedness 2.3333332538604736328. T. D. Wilson: Review of: Galla, Preston. Windows XP Hacks: tips and tools for optimizing your OS. (2nd ed.) Sebastopol, CA: O'Reilly, 2005. (2005) authored by Thomas D. Wilson 0001. Thomas D. Wilson 0001 link https://en.wikipedia.org/wiki/Thomas_D._Wilson. Thomas D. Wilson 0001 primary affiliation University of Leeds, UK. Thomas D. Wilson 0001 is Creator. T. D. Wilson: Review of: Fairhurst, Michael. Biometrics: a very short introduction. Oxford: Oxford University Press, 2018. (2018) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Engeström, Y., Miettinen, R. & Punamäki, R-L. (Eds.) Perspectives in activity theory. Cambridge: Cambridge University Press, 1999. (2006) authored by Thomas D. Wilson 0001. Thomas D. Wilson 0001 affiliation University of Leeds, UK. T. D. Wilson et al.: Information Needs in Local Authority Social Services departments: a second Report on Project Iniss. (1979) authored by Thomas D. Wilson 0001. Thomas D. Wilson 0001 link http://informationr.net/tdw/. Thomas D. Wilson 0001 link http://informationr.net/tdw/. Tom Wilson orcidId https://orcid.org/0000-0003-4941-8443. T. D. Wilson: Review of: Cronin, Blaise. Cathedrals of learning: great and ancient universities of Western Europe Cambridge, MA: Chandos Publishing, 2016. (2017) authored by Thomas D. Wilson 0001. Michael Bolin et al.: Automation and customization of rendered web pages. (2005) authored by Thomas D. Wilson 0001. T. D. Wilson et al.: The behaviour/practice debate. (2009) authored by Thomas D. Wilson 0001. T. D. Wilson: Hacking the systems. Review of: Tara Calishain and Rael Dornfest, Google hacks; Paul Bausch, Amazon hacks. Preston Grall, Windows XP hacks. Sebastopol, CA: O'Reilly, 2003 (2003) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Dirksen, Julie. Design for how people learn. Berkeley, CA: New Riders, 2012. (2011) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Herrero, Leandro. New leaders wanted: now hiring! 12. kinds of people you must find, seduce, hire and create a job for. Beaconsfield: Meeting minds. 2007 (2007) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Tarapanoff, Kira (Ed.). Aprendizado organizacional. Curitiba, Brazil: Editora IBPEX, 2012. (2012) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Morville, Peter. Ambient findability. Sebastopol, CA: O'Reilly, 2005. (2006) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Galla, Preston. Windows XP Hacks: 100 industrial strength tips and tools. Sebastopol, CA: O'Reilly, 2003. (2005) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Campbell, James W.P. and Pryce, Will. The library: a world history London: Thames and Hudson, 2013. (2014) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Software review Onfolio. Academic and scientific. Version 2.02 Cambridge, MA: Onfolio, Inc., 2005. (2006) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Bostrom, Nick. Superintelligence: paths, dangers, strategies Oxford: Oxford University Press, 2017. (2017) authored by Thomas D. Wilson 0001. Zita Correia and T. D. Wilson: Factors influencing environmental scanning in the organizational context. (2001) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Gartner, Richard. Metadata: shaping knowledge from antiquity to the semantic web. Basel: Springer International Publishing AG, 2016. (2017) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Rosenberg, Daniel and Grafton, Anthony Cartographies of time. A history of the timeline.. New York, NY: Princeton Architectural Press, 2010. (2012) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Pogue, D., Zacker, C. & Zacker, L.J. Windows XP Pro: the missing manual. 2nd. ed. Sebastopol, CA: O'Reilly, 2004. (2005) authored by Thomas D. Wilson 0001\nThomas Daniel Wilson was born in 1935 at Shincliffe Station in County Durham, England. Following national service in the Royal Air Force he returned to Durham County Library and took the examinations of the Library Association to qualify as a professional librarian. There are four steps in the process, problem identification, problem definition, problem resolution, and solution statement. Thomas D. He left school at age 16 to work as a library assistant in Durham County Library. \nRecently, Dr. Wilson and his team also observed social workers and their managers in their day-to-day tasks, to see what techniques were actually used to find, use and communicate information. \nDr. \nDr
output format: answer
|
60
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What award did the author of 'Optimal distribution of incentives for public cooperation in heterogeneous interaction environments' receive in 2015?
Context: Bartu Yesilkaya et al.: Manifold learning methods for the diagnosis of ovarian cancer. (2022) authored by Matjaz Perc. Matjaž Perc alternativeName Matja$ check{ rm~z}$ Perc. Blaz Krese et al.: Experimental Observation of a Chaos-to-Chaos Transition in Laser droplet Generation. (2011) authored by Matjaz Perc. Marko Sterk et al.: Assessing the origin and velocity of Ca2+ waves in three-dimensional tissue: Insights from a mathematical model and confocal imaging in mouse pancreas tissue slices. (2021) authored by Matjaz Perc. Raman Manivannan et al.: Design of Resilient Reliable Dissipativity Control for Systems With Actuator Faults and Probabilistic Time-Delay Signals via Sampled-Data Approach. (2020) authored by Matjaz Perc. Yingying Li et al.: Bogdanov-Takens singularity in the Hindmarsh-Rose neuron with time delay. (2019) authored by Matjaz Perc. Matjaž Perc alternativeName Matjaž Perc. Matjaž Perc alternativeName Matjaz Perc. Matjaž Perc alternativeName Perc Matjaz. Matjaž Perc alternativeName Perc Matjaž. Matjaž Perc alternativeName Matjalz Perc. Matjaž Perc alternativeName Matja Z Perc. Matjaž Perc alternativeName M. Perc. Matjaž Perc member of China Medical University Hospital. Ju Huang et al.: Background Purification Framework With Extended Morphological Attribute Profile for Hyperspectral Anomaly Detection. (2021) authored by Matjaz Perc. Mahtab Mehrabbeik et al.: Synchronization in simplicial complexes of memristive Rulkov neurons. (2023) authored by Matjaz Perc. Dusan Fister et al.: Two robust long short-term memory frameworks for trading stocks. (2021) authored by Matjaz Perc. Matjaž Perc name Matjaž Perc. Matjaz Perc is Creator. Erivelton G. Nepomuceno et al.: Interval computing periodic orbits of maps using a piecewise approach. (2018) authored by Matjaz Perc. Matjaž Perc i10Index 417. Zhouchao Wei et al.: Bifurcation analysis of two disc dynamos with viscous friction and multiple time delays. (2019) authored by Matjaz Perc\nFor a full list see Matjaž Perc's ORCID page. "}. In 2010 he became head of the Institute of Physics at the University of Maribor, and in 2011 he became full Professor of Physics. By the number of citations, he is the most cited author of several physics journals including New Journal of Physics, Biosystems, Journal of the Royal Society Interface, Physical Review E
output format: answer
|
Young Scientist Award for Socio-and Econophysics
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What award did the author receive from the University of Cambridge in 2018?
Context: Yu Zhang and Mihaela van der Schaar: Structure-Aware Stochastic Storage Management in Smart Grids. (2014) authored by Mihaela van der Schaar. Linqi Song et al.: Non-stationary demand side management method for smart grids. (2014) authored by Mihaela van der Schaar. Fangwen Fu et al.: Game-Theoretic Paradigm for Resource Management in Spectrum Agile Wireless Networks. (2006) authored by Mihaela van der Schaar. Yi Su and Mihaela van der Schaar: A Simple Characterization of Strategic Behaviors in Broadcast Channels. (2008) authored by Mihaela van der Schaar. Mingshi Wang and Mihaela van der Schaar: Model-based joint source channel coding for subband video. (2006) authored by Mihaela van der Schaar. Ahmad Reza Fattahi et al.: Mechanism-based resource allocation for multimedia transmission over spectrum agile wireless networks. (2007) authored by Mihaela van der Schaar. Yuanzhang Xiao and Mihaela van der Schaar: Optimal foresighted packet scheduling and resource allocation for multi-user video transmission in 4G cellular networks. (2014) authored by Mihaela van der Schaar. Yi Su and Mihaela van der Schaar: A Simple Characterization of Strategic Behaviors in Broadcast Channels (2007) authored by Mihaela van der Schaar. Cong Shen and Mihaela van der Schaar: Optimal Resource Allocation for Multimedia Applications over Multiaccess Fading Channels. (2008) authored by Mihaela van der Schaar. Yu Zhang and Mihaela van der Schaar: Structure-aware stochastic load management in smart grids. (2014) authored by Mihaela van der Schaar. Xiaofeng Xu et al.: Adaptive error control for fine-granular-scalability video coding over IEEE 802.11 wireless LANs. (2003) authored by Mihaela van der Schaar. Linqi Song et al.: Demand Side Management in Smart Grids Using a Repeated Game Framework. (2014) authored by Mihaela van der Schaar. Linqi Song et al.: Demand Side Management in Smart Grids using a Repeated Game Framework. (2013) authored by Mihaela van der Schaar. Hsien-Po Shiang and Mihaela van der Schaar: Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications Over Cognitive Radio Networks. (2008) authored by Mihaela van der Schaar. Nesrine Changuel et al.: End-to-end stochastic scheduling of scalable video overtime-varying channels. (2010) authored by Mihaela van der Schaar. Yiannis Andreopoulos et al.: Scalable Resource Management for Video Streaming Over IEEE802.11A/E. (2006) authored by Mihaela van der Schaar. Hsien-Po Shiang and Mihaela van der Schaar: Information-Constrained Resource Allocation in Multicamera Wireless Surveillance Networks. (2010) authored by Mihaela van der Schaar. Wenchi Tu and Mihaela van der Schaar: Distributed Spectrum Allocation of Delay-Sensitive Users over Multi-User Multi-Carrier Networks. (2008) authored by Mihaela van der Schaar. Kishan Sudusinghe et al.: Model Based Design Environment for Data-driven Embedded Signal Processing Systems. (2014) authored by Mihaela van der Schaar. Hossein Bobarshad et al.: Analytical Modeling for Delay-Sensitive Video Over WLAN. (2012) authored by Mihaela van der Schaar. Yi Su and Mihaela van der Schaar: Resource Allocation for Multi-User Video Transmission over Multi-Carrier Networks. (2008) authored by Mihaela van der Schaar. Jaeok Park and Mihaela van der Schaar: Cognitive MAC Protocols Using Memory for Distributed Spectrum Sharing under Limited Spectrum Sensing (2009) authored by Mihaela van der Schaar. Saeedeh Parsaeefard et al.: Robust Power Control for Heterogeneous Users in Shared Unlicensed Bands. (2014) authored by Mihaela van der Schaar. Jaeok Park and Mihaela van der Schaar: Cognitive MAC Protocols Using Memory for Distributed Spectrum Sharing Under Limited Spectrum Sensing. (2011) authored by Mihaela van der Schaar. Juan J. Alcaraz and Mihaela van der Schaar: Intervention framework for counteracting collusion in spectrum leasing systems. (2014) authored by Mihaela van der Schaar. Hossein Bobarshad et al.: A Low-Complexity Analytical Modeling for Cross-Layer Adaptive Error Protection in Video Over WLAN. (2010) authored by Mihaela van der Schaar. Hayder Radha et al.: The MPEG-4 fine-grained scalable video coding method for multimedia streaming over IP. (2001) authored by Mihaela van der Schaar. Hsien-Po Shiang and Mihaela van der Schaar: Dynamic channel selection for multi-user video streaming over cognitive radio networks. (2008) authored by Mihaela van der Schaar. Mihaela van der Schaar et al.: Scalable MPEG-4 Video Coding with Graceful Packet-Loss Resilience over Bandwidth-Varying Networks. (2000) authored by Mihaela van der Schaar. Yiannis Andreopoulos and Mihaela van der Schaar: Generalized Phase Shifting for M-Band Discrete Wavelet Packet Transforms. (2007) authored by Mihaela van der Schaar. Yiannis Andreopoulos et al.: Failure-Aware, Open-Loop, Adaptive Video Streaming With Packet-Level Optimized Redundancy. (2006) authored by Mihaela van der Schaar. Kartik Ahuja et al.: Distributed Interference Management Policies for Heterogeneous Small Cell Networks. (2014) authored by Mihaela van der Schaar. Kartik Ahuja et al.: Distributed Interference Management Policies for Heterogeneous Small Cell Networks. (2015) authored by Mihaela van der Schaar. Mihaela van der Schaar et al.: Optimized Scalable Video Streaming over IEEE 802.11a/e HCCA Wireless Networks under Delay Constraints. (2006) authored by Mihaela van der Schaar. Nicholas Mastronarde et al.: To Relay or Not to Relay: Learning Device-to-Device Relaying Strategies in Cellular Networks. (2016) authored by Mihaela van der Schaar. Cong Shen and Mihaela van der Schaar: Optimal Resource Allocation in Wireless Multiaccess Video Transmissions. (2007) authored by Mihaela van der Schaar. Yuanzhang Xiao and Mihaela van der Schaar: Distributed spectrum sharing policies for selfish users with imperfect monitoring ability. (2012) authored by Mihaela van der Schaar. Sai Shankar N. and Mihaela van der Schaar: Performance Analysis of Video Transmission Over IEEE 802.11a/e WLANs. (2007) authored by Mihaela van der Schaar. Hsien-Po Shiang and Mihaela van der Schaar: Distributed Resource Management in Multihop Cognitive Radio Networks for Delay-Sensitive Transmission. (2009) authored by Mihaela van der Schaar. William R. Zame et al.: Cooperative Multi-Agent Learning and Coordination for Cognitive Radio Networks. (2014) authored by Mihaela van der Schaar. Hsien-Po Shiang et al.: Dynamic Resource Allocation of Delay Sensitive Users Using Interactive Learning over Multi-Carrier Networks. (2008) authored by Mihaela van der Schaar. Shih-Chung Su and Mihaela van der Schaar: On the Application of Game-Theoretic Mechanism Design for Resource Allocation in Multimedia Systems. (2008) authored by Mihaela van der Schaar. Yuanzhang Xiao and Mihaela van der Schaar: Distributed demand side management among foresighted decision makers in power networks. (2013) authored by Mihaela van der Schaar. Hsien-Po Shiang and Mihaela van der Schaar: Multi-user video streaming over multi-hop wireless networks: a distributed, cross-layer approach based on priority queuing. (2007) authored by Mihaela van der Schaar. Nicholas Mastronarde et al.: To Relay or Not to Relay: Learning Relaying Strategies in Cellular Device-to-Device Networks. (2013) authored by Mihaela van der Schaar. Mihaela van der Schaar et al.: Adaptive cross-layer protection strategies for robust scalable video transmission over 802.11 WLANs. (2003) authored by Mihaela van der Schaar. Jie Xu et al.: Non-Stationary Resource Allocation Policies for Delay-Constrained Video Streaming: Application to Video over Internet-of-Things-Enabled Networks. (2014) authored by Mihaela van der Schaar. Jie Xu et al.: Non-stationary Resource Allocation Policies for Delay-constrained Video Streaming: Application to Video over Internet-of-Things-enabled Networks. (2014) authored by Mihaela van der Schaar. Jie Xu and Mihaela van der Schaar: Incentive-compatible demand-side management for smart grids based on review strategies. (2015) authored by Mihaela van der Schaar. Sabrina Müller et al.: Context-Aware Proactive Content Caching With Service Differentiation in Wireless Networks. (2017) authored by Mihaela van der Schaar
output format: answer
|
the Oon Prize on Preventative Medicine
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many papers does the academic institution of the researcher who published 'Heuristic dynamic programming for mobile robot path planning based on Dyna approach' in 2016 have?
Context: Niklas Melton et al.: Meta-iCVI: Ensemble Validity Metrics for Concise Labeling of Correct, Under- or Over-Partitioning in Streaming Clustering. (2024) authored by Donald C. Wunsch II. Daniel B. Hier et al.: The visualization of Orphadata neurology phenotypes. (2023) authored by Donald C. Wunsch II. Emad W. Saad et al.: Advanced neural network training methods for low false alarm stock trend prediction. (1996) authored by Donald C. Wunsch II. Dacosta Yeboah et al.: An Explainable and Statistically Validated Ensemble Clustering Model Applied to the Identification of Traumatic Brain Injury Subgroups. (2020) authored by Donald C. Wunsch II. Charles C. Rawlins et al.: Prediction of Blockchain Transaction Fraud Using a Lightweight Generative Adversarial Network. (2023) authored by Donald C. Wunsch II. Ernst M. Kussul et al.: The random subspace coarse coding scheme for real-valued vectors. (1999) authored by Donald C. Wunsch II. Donald C. Wunsch and Daniel B. Hier: Subsumption reduces dataset dimensionality without decreasing performance of a machine learning classifier. (2021) authored by Donald C. Wunsch II. Lien A. Bui et al.: Heterogeneity in Blood Biomarker Trajectories After Mild TBI Revealed by Unsupervised Learning. (2022) authored by Donald C. Wunsch II. Raghavendra Kotikalapudi et al.: Associating Internet Usage with Depressive Behavior Among College Students. (2012) authored by Donald C. Wunsch II. Dao Lam et al.: Clustering Data of Mixed Categorical and Numerical Type With Unsupervised Feature Learning. (2015) authored by Donald C. Wunsch II. Ronit Das et al.: Cross-Market Price Difference Forecast Using Deep Learning for Electricity Markets. (2020) authored by Donald C. Wunsch II. Rohit Dua et al.: Detection of basal cell carcinoma using electrical impedance and neural networks. (2004) authored by Donald C. Wunsch II. Zachary Roy et al.: Exploratory Analysis of Concussion Recovery Trajectories using Multi-modal Assessments and Serum Biomarkers. (2020) authored by Donald C. Wunsch II. Dao Lam and Donald C. Wunsch: Video compressive sensing with 3-D Wavelet and 3-D Noiselet. (2012) authored by Donald C. Wunsch II. Tao Wu et al.: GNP Attack: Transferable Adversarial Examples via Gradient Norm Penalty. (2023) authored by Donald C. Wunsch II. Tao Wu et al.: GNP Attack: Transferable Adversarial Examples Via Gradient Norm Penalty. (2023) authored by Donald C. Wunsch II. Sima Azizi et al.: Schizophrenia Classification Using Resting State EEG Functional Connectivity: Source Level Outperforms Sensor Level. (2021) authored by Donald C. Wunsch II. Lei Meng et al.: Adaptive Scaling of Cluster Boundaries for Large-Scale Social Media Data Clustering. (2016) authored by Donald C. Wunsch II. Donald C. Wunsch alternativeName Donald Coolidge Wunsch. Sujit Subhash et al.: Predictive Modeling of Sports-Related Concussions using Clinical Assessment Metrics. (2020) authored by Donald C. Wunsch II. Islam Elnabarawy et al.: Survey of Privacy-Preserving Collaborative Filtering. (2020) authored by Donald C. Wunsch II. Tao Wu et al.: LRS: Enhancing Adversarial Transferability through Lipschitz Regularized Surrogate. (2024) authored by Donald C. Wunsch II. Emad W. Saad et al.: Efficient training techniques for classification with vast input space. (1999) authored by Donald C. Wunsch II. Tayo Obafemi-Ajayi et al.: Neuroimaging biomarkers of cognitive decline in healthy older adults via unified learning. (2017) authored by Donald C. Wunsch II. Witali L. Dunin-Barkowski et al.: Detection of Influence of Brain-Stem Neurons and Intra-Cranial Field Potentials on the Diaphragm Activity. (1998) authored by Donald C. Wunsch II. Tao Wu et al.: LRS: Enhancing Adversarial Transferability through Lipschitz Regularized Surrogate. (2023) authored by Donald C. Wunsch II. Tao Wu et al.: CR-SAM: Curvature Regularized Sharpness-Aware Minimization. (2024) authored by Donald C. Wunsch II. Tao Wu et al.: CR-SAM: Curvature Regularized Sharpness-Aware Minimization. (2023) authored by Donald C. Wunsch II. Tao Wu et al.: Black-Box Attack using Adversarial Examples: A New Method of Improving Transferability. (2023) authored by Donald C. Wunsch II. Alexander N. Gorban et al.: High order orthogonal tensor networks: information capacity and reliability. (1997) authored by Donald C. Wunsch II. Tayo Obafemi-Ajayi et al.: Genetic variant analysis of boys with Autism: A pilot study on linking facial phenotype to genotype. (2017) authored by Donald C. Wunsch IIS. S. Wunsch II is Mary K. ,'}
output format: answer
|
29228
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the average two years citedness of the scientist who worked on Survey of Non-facial/Non-verbal Affective Expressions for Appearance-Constrained Robots in 2008 with Cindy L. Bethel?
Context: Jan Dufek et al.: Preventing Irrigation Canal Breaches Using Small Unmanned Aerial System with Multispectral Payload. (2019) authored by Robin R. Murphy. Ananya Rao et al.: Analysis of Interior Rubble Void Spaces at Champlain Towers South Collapse. (2022) authored by Robin R. Murphy. Ananya Rao et al.: Analysis of Interior Rubble Void Spaces at Champlain Towers South Collapse. (2023) authored by Robin R. Murphy. Tashnim Chowdhury et al.: Comprehensive Semantic Segmentation on High Resolution UAV Imagery for Natural Disaster Damage Assessment. (2020) authored by Robin R. Murphy. Justin Adams et al.: Use of Small Unmanned Aerial Systems for Tactical Response during Kilauea Volcano Lower East Rift Zone event. (2018) authored by Robin R. Murphy. Maryam Rahnemoonfar et al.: Comprehensive Semantic Segmentation on High Resolution UAV Imagery for Natural Disaster Damage Assessment. (2020) authored by Robin R. Murphy. Maryam Rahnemoonfar et al.: Flooded Area Detection from Uav Images Based on Densely Connected Recurrent Neural Networks. (2018) authored by Robin R. Murphy. Brian C. Zimmel et al.: Distributed Error Handling and HRI. (2004) authored by Robin R. Murphy. Siddharth Agarwal et al.: Characteristics of indoor disaster environments for small UASs. (2014) authored by Robin R. Murphy. Thomas Manzini et al.: Wireless Network Demands of Data Products from Small Uncrewed Aerial Systems at Hurricane Ian. (2023) authored by Robin R. Murphy. Thomas Manzini et al.: Wireless Network Demands of Data Products from Small Uncrewed Aerial Systems at Hurricane Ian. (2023) authored by Robin R. Murphy. Tashnim Chowdhury et al.: RescueNet: A High Resolution UAV Semantic Segmentation Benchmark Dataset for Natural Disaster Damage Assessment. (2022) authored by Robin R. Murphy. C. G. Leela Krishna and Robin R. Murphy: A review on cybersecurity vulnerabilities for unmanned aerial vehicles. (2017) authored by Robin R. Murphy. Ananya Bal et al.: A Comparison of Point Cloud Registration Techniques for on-site Disaster Data from the Surfside Structural Collapse. (2022) authored by Robin R. Murphy. Venkataraman Mahalingam et al.: A VLSI Architecture and Algorithm for Lucas-Kanade-Based Optical Flow Computation. (2010) authored by Robin R. Murphy. Brittany A. Duncan and Robin R. Murphy: Safety considerations for small Unmanned Aerial Systems with distributed users. (2014) authored by Robin R. Murphy. Xuesu Xiao et al.: Benchmarking Tether-based UAV Motion Primitives. (2019) authored by Robin R. Murphy. Xuesu Xiao et al.: Benchmarking Tether-based UAV Motion Primitives. (2019) authored by Robin R. Murphy. Maryam Rahnemoonfar et al.: FloodNet: A High Resolution Aerial Imagery Dataset for Post Flood Scene Understanding. (2021) authored by Robin R. Murphy. Maryam Rahnemoonfar et al.: FloodNet: A High Resolution Aerial Imagery Dataset for Post Flood Scene Understanding. (2020) authored by Robin R. Murphy. Xuesu Xiao et al.: Indoor UAV Localization Using a Tether. (2018) authored by Robin R. Murphy. Serhan Yarkan et al.: Underground Mine Communications: A Survey. (2009) authored by Robin R. Murphy. Robin R. Murphy et al.: Use of a Small Unmanned Aerial System for the SR-530 Mudslide Incident near Oso, Washington. (2016) authored by Robin R. Murphy. Trey Smith et al.: Path Coverage Optimization for USV with Side Scan Sonar for Victim Recovery. (2022) authored by Robin R. Murphy. Asish Ghoshal et al.: Test method for measuring station-keeping with unmanned marine vehicles using sonar or optical sensors. (2012) authored by Robin R. Murphy. Ananya Bal et al.: Towards Automated Void Detection for Search and Rescue with 3D Perception. (2023) authored by Robin R. Murphy. C. G. Leela Krishna et al.: Autonomous observation of multiple USVs from UAV while prioritizing camera tilt and yaw over UAV motion. (2017) authored by Robin R. Murphy. Robin R. Murphy et al.: Two case studies and gaps analysis of flood assessment for emergency management with small unmanned aerial systems. (2016) authored by Robin R. Murphy. Grant A. Wilde et al.: A man-packable unmanned surface vehicle for radiation localization and forensics. (2015) authored by Robin R. Murphy. Xuesu Xiao et al.: Explicit-risk-aware Path Planning with Reward Maximization. (2019) authored by Robin R. Murphy. Brian W. Minten et al.: Low-order-complexity vision-based docking. (2001) authored by Robin R. Murphy. Matthew T. Long et al.: Distributed multi-agent diagnosis and recovery from sensor failures. (2003) authored by Robin R. Murphy. Xuesu Xiao et al.: UAV assisted USV visual navigation for marine mass casualty incident response. (2017) authored by Robin R. Murphy. Robin R. Murphy name Robin R. Murphy. Kevin S. Pratt et al.: CONOPS and autonomy recommendations for VTOL small unmanned aerial system based on Hurricane Katrina operations. (2009) authored by Robin R. Murphy\nMurphy was raised in Douglas, Georgia. "}. In 2008, Murphy moved to Texas A&M University
output format: answer
|
4.7
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the main focus of the author's research in information science?
Context: Tom Wilson alternativeName Tom Wilson. Tom Wilson alternativeName Taryn Wilson. Tom Wilson modified 2023-10-18. Tom Wilson alternativeName Tom D. Wilson. Tom Wilson name Tom Wilson. Tom Wilson alternativeName Thomas D. Wilson. T. D. Wilson: Review of: Disk Drill PRO. Atlanta, GA: 508 Software LLC. (2016) authored by Thomas D. Wilson 0001. Tom Wilson i10Index 60. Tom Wilson alternativeName T.D Wilson. Tom Wilson alternativeName T. Wilson. Tom Wilson alternativeName T. D. Wilson. Tom Wilson alternativeName T D. Wilson. T. D. Wilson: Review of: Innocenti, Perla Cultural networks in migrating heritage: intersencting theories and practices across Europe. Farnham, UK: Ashgate, 2015. (2015) authored by Thomas D. Wilson 0001. Michael Bolin et al.: Automation and customization of rendered web pages. (2005) authored by Thomas D. Wilson 0001. Tom Wilson member of Glasgow Caledonian University. Tom Wilson worksCount 360. T. D. Wilson: Review of: Carrott, James H. & Johnson, Brian David Vintage tomorrows Sebastopol, CA: O'Reilly, 2013. (2013) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Cronin, Blaise. Cathedrals of learning: great and ancient universities of Western Europe Cambridge, MA: Chandos Publishing, 2016. (2017) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Cronin, Blaise Bloomington days: town and gown in Middle America. Bloomington, IN: AuthorHouse, 2012. (2016) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Swinford, Echo Fixing PowerPoint annoyances. How to fix the most annoying things about your favorite presentation program. Sebastopol, CA: O'Reilly, 2006. (2006) authored by Thomas D. Wilson 0001. Tom Wilson orcidId https://orcid.org/0000-0003-4941-8443. Tom Wilson 2YrMeanCitedness 2.3333332538604736328. Tom Wilson: Sixth IEEE International Conference on Consumer Electronics-Berlin [Conference Reports]. (2017) authored by Thomas D. Wilson 0001. Tom Wilson written paper amount in year2013: 13. Tom Wilson written paper amount in year2013: 13. T. D. Wilson: Review of: Sejnowski, Terrence J. The deep learning revolution Cambridge, MA: MIT Press, 2018. (2018) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Galla, Preston. Windows XP Hacks: 100 industrial strength tips and tools. Sebastopol, CA: O'Reilly, 2003. (2005) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Steward, Sid PDF hacks: 100 industrial-strength tips & tools. Sebastopol, CA: O'Reilly, 2004. (2005) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Campbell, James W.P. and Pryce, Will. The library: a world history London: Thames and Hudson, 2013. (2014) authored by Thomas D. Wilson 0001. Walter Sujansky and Tom Wilson: DIRECT secure messaging as a common transport layer for reporting structured and unstructured lab results to outpatient providers. (2015) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Tidwell, Jenifer. Designing interfaces. Sebastopol, CA: O'Reilly, 2006. (2006) authored by Thomas D. Wilson 0001. Tom Wilson written paper amount in year2015: 8. Tom Wilson written paper amount in year2015: 8. Tom Wilson written paper amount in year2021: 6. Tom Wilson written paper amount in year2021: 6. T. D. Wilson: Review of: Ray, Erik T. Learning XML (2nd ed.) Sebastopol, CA: O'Reilly, 2003. xiv, 400, [1] p. ISBN 0-596-00420-6. (2003) authored by Thomas D. Wilson 0001. Thomas D. Wilson 0001 is Person. Tom Wilson written paper amount in year2012: 12. Tom Wilson written paper amount in year2012: 12. Pieta Eklund et al.: EURIDICE project: The evaluation of image database use in online learning. (2006) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Poibeau, Thierry. Machine translation Cambridge, MA: MIT Press, 2017. (2017) authored by Thomas D. Wilson 0001. Tom Wilson written paper amount in year2018: 8. Tom Wilson written paper amount in year2018: 8. Tom Wilson written paper amount in year2014: 9. Tom Wilson written paper amount in year2014: 9. Tom Wilson: The CE Society AdCom Election Procedure [Society News]. (2013) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Žižek, Slavoj. Like a thief in broad daylight. Power in the era of post-humanity London: Allen Lane, 2018. (2018) authored by Thomas D. Wilson 0001. Tom Wilson written paper amount in year2016: 118 million Swedish kronor ($1. '}. \nRecently, Dr. \nIn addition to this work, Dr. \nDr. \nDr. Following national service in the Royal Air Force he returned to Durham County Library and took the examinations of the Library Association to qualify as a professional librarian. Thomas D. In 2012, together with colleagues at the University of Borås and Gothenburg University, he was awarded a grant of 11
output format: answer
|
information management and information seeking behaviour
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many times has the writer of Enterprise Modeling in AI Mag. 1998 been cited?
Context: J. Christopher Beck et al.: Texture-Based Heuristics for Scheduling Revisited. (1997) authored by Mark S. Fox. Liming Bai et al.: SHINESeniors: Personalized services for active ageing-in-place. (2015) authored by Mark S. Fox. Daniela Rosu et al.: A virtual marketplace for goods and services for people with social needs. (2017) authored by Mark S. Fox. Daniela Rosu et al.: Knowledge-Based Provision of Goods and Services for People with Social Needs: Towards a Virtual Marketplace. (2017) authored by Mark S. Fox. J. Christopher Beck et al.: Beyond Contention: Extending Texture-Based Scheduling Heuristics. (1997) authored by Mark S. Fox. Daniela Rosu et al.: Knowledge-Based Provisioning of Goods and Services: Towards a Virtual Social Needs Marketplace. (2017) authored by Mark S. Fox. Mark S. Fox et al.: Techniques for Sensor-Based Diagnosis. (1983) authored by Mark S. Fox. Sean A. Bittle and Mark S. Fox: Learning and using hyper-heuristics for variable and value ordering in constraint satisfaction problems. (2009) authored by Mark S. Fox. Can A. Baykan and Mark S. Fox: Spatial synthesis by disjunctive constraint satisfaction. (1997) authored by Mark S. Fox. Mark S. Fox alternativeName Mark S. Fox. Norman M. Sadeh and Mark S. Fox: Variable and Value Ordering Heuristics for the Job Shop Scheduling Constraint Satisfaction Problem. (1996) authored by Mark S. Fox. Mark S. Fox alternativeName Mark. Fox. Neena Sathi et al.: Resource Configuration and Allocation-A Case Study of Constrained Heuristic Search. (1992) authored by Mark S. Fox. Jingwei Huang and Mark S. Fox: An ontology of trust: formal semantics and transitivity. (2006) authored by Mark S. Fox. Mark S. Fox name Mark S. Fox. Sara Diamond et al.: iCity: big data and visualization urban transportation strategies. (2018) authored by Mark S. Fox. James E. Mogush et al.: Treatment selection by constraint propagation a case study in cutting fluid selection. (1988) authored by Mark S. Fox Lancaster. Louis. Spatial normalization was essential to group averaging of brain images, which allowed increased signal-to-noise across multiple subjects and group-wise statistical analyses to be performed on individual coordinates. Once localized, a treatment brain region is targeted with the help of a robotic arm, which moves the TMS coil to the appropriate location
output format: answer
|
7727
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In which country is the author presently the Alexander von Humboldt Professor for Artificial Intelligence?
Context: Yaochu Jin alternativeName Y H Jin. Yaochu Jin alternativeName Y. Jin. Yaochu Jin alternativeName Yaoch Jin. Nitin Naik et al.: Evaluating Automatically Generated YARA Rules and Enhancing Their Effectiveness. (2020) authored by Yaochu Jin. Ataollah Ramezan Shirazi and Yaochu Jin: Regulated Morphogen Gradients for Target Surrounding and Adaptive Shape Formation. (2021) authored by Yaochu Jin. Yaochu Jin alternativeName Yaochu Jin. Yaochu Jin alternativeName Yanxia Jin. Ingo Paenke et al.: On the Influence of Phenotype Plasticity on Genotype Diversity. (2007) authored by Yaochu Jin. Yaochu Jin alternativeName Yan‐xia Jin. Yaochu Jin alternativeName YiFan Jin. Yaochu Jin alternativeName Yuan‐Jing Jin. Xin Ye et al.: A hybrid instance-intensive workflow scheduling method in private cloud environment. (2019) authored by Yaochu Jin. Minyang Chen et al.: A Decomposition Method for Both Additively and Nonadditively Separable Problems. (2023) authored by Yaochu Jin. Tao Zhang et al.: A cytokine network-inspired cooperative control system for multi-stage stretching processes in fiber production. (2015) authored by Yaochu Jin. Yaochu Jin name Yaochu Jin. Yaochu Jin alternativeName Jin Yanxia. Nitin Naik et al.: Augmented windows fuzzy firewall for preventing denial of service attack. (2017) authored by Yaochu Jin. Yaochu Jin alternativeName Jin Yaochu. Yaochu Jin alternativeName Jin Yan‐xia. Huaming Chen et al.: HIME: Mining and Ensembling Heterogeneous Information for Protein-Protein Interactions Prediction. (2020) authored by Yaochu Jin. Yu Chen et al.: Identification of Interaction Clusters Using a Semi-supervised Hierarchical Clustering Method. (2019) authored by Yaochu Jin. Till Steiner et al.: Global shape with morphogen gradients and motile polarized cells. (2009) authored by Yaochu Jin. Yuyan Han et al.: Evolutionary multi-objective blocking lot-streaming flow shop scheduling with interval processing time. (2016) authored by Yaochu Jin. Yuyan Han et al.: Evolutionary Multiobjective Blocking Lot-Streaming Flow Shop Scheduling With Machine Breakdowns. (2019) authored by Yaochu Jin. Yuyan Wang et al.: A tree ensemble-based two-stage model for advanced-stage colorectal cancer survival prediction. (2019) authored by Yaochu Jin. Lisa Schramm et al.: Emerged Coupling of Motor Control and Morphological Development in Evolution of Multi-cellular Animats. (2009) authored by Yaochu Jin. Yaochu Jin written paper amount in year2013: 22. Yaochu Jin written paper amount in year2013: 22. Yaochu Jin written paper amount in year2015: 22. Yaochu Jin written paper amount in year2015: 22. Xingyi Zhang et al.: Empirical analysis of a tree-based efficient non-dominated sorting approach for many-objective optimization. (2016) authored by Yaochu Jin. Yuping Yan et al.: HE-DKSAP: Privacy-Preserving Stealth Address Protocol via Additively Homomorphic Encryption. (2023) authored by Yaochu Jin. Shufen Qin et al.: A Performance Indicator-Based Infill Criterion for Expensive Multi-/Many-Objective Optimization. (2023) authored by Yaochu Jin. Yanling Jin et al.: An endocrine-based intelligent distributed cooperative algorithm for target tracking in wireless sensor networks. (2015) authored by Yaochu Jin. Guangshun Yao et al.: Endocrine-based coevolutionary multi-swarm for multi-objective workflow scheduling in a cloud system. (2017) authored by Yaochu Jin. Ricardo Cerri et al.: Reduction strategies for hierarchical multi-label classification in protein function prediction. (2016) authored by Yaochu Jin. Dujuan Wang et al.: A proactive scheduling approach to steel rolling process with stochastic machine breakdown. (2019) authored by Yaochu Jin. Yaochu Jin i10Index 292. Lianbo Ma et al.: Decomposition-Based Multiobjective Optimization for Variable-Length Mixed-Variable Pareto Optimization and Its Application in Cloud Service Allocation. (2023) authored by Yaochu Jin. Xin Ye et al.: User-oriented many-objective cloud workflow scheduling based on an improved knee point driven evolutionary algorithm. (2017) authored by Yaochu Jin. Shiqing Liu et al.: End-to-End Pareto Set Prediction with Graph Neural Networks for Multi-objective Facility Location. (2023) authored by Yaochu Jin. Shiqing Liu et al.: End-to-End Pareto Set Prediction with Graph Neural Networks for Multi-objective Facility Location. (2022) authored by Yaochu Jin. Yaochu Jin 2YrMeanCitedness 9.3008127212524414062. Sutong Wang et al.: An improved random forest-based rule extraction method for breast cancer diagnosis. (2020) authored by Yaochu Jin. Yajun Ru et al.: Sparse-attentive meta temporal point process for clinical decision support. (2022) authored by Yaochu Jin. Yaochu Jin written paper amount in year2012: 22. Yaochu Jin written paper amount in year2012: 22. Guoyang Xie et al.: Pushing the Limits of Fewshot Anomaly Detection in Industry Vision: Graphcore. (2023) authored by Yaochu Jin. Guoyang Xie et al.: Pushing the Limits of Fewshot Anomaly Detection in Industry Vision: Graphcore. (2023) authored by Yaochu Jin. Yaochu Jin written paper amount in year2014: 30, M. '}. -Ing
output format: answer
|
Germany
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What kind of fellowship has the author of 'Discrete-time randomized sampling' received?
Context: Yonina C. Eldar et al.: Orthogonal and projected orthogonal matched filter detection. (2004) authored by Alan V. Oppenheim. Yonina C. Eldar and Alan V. Oppenheim: Orthogonal matched filter detection. (2001) authored by Alan V. Oppenheim. Dennis Wei and Alan V. Oppenheim: Sparsity maximization under a quadratic constraint with applications in filter design. (2010) authored by Alan V. Oppenheim. Andrew C. Singer et al.: Detection and estimation of multiplexed soliton signals. (1999) authored by Alan V. Oppenheim. Joseph M. Winograd et al.: FFT-based incremental refinement of suboptimal detection. (1996) authored by Alan V. Oppenheim. Andrew C. Singer et al.: Codebook prediction: a nonlinear signal modeling paradigm. (1992) authored by Alan V. Oppenheim. Sefa Demirtas et al.: Exact and approximate polynomial decomposition methods for signal processing applications. (2013) authored by Alan V. Oppenheim. Webster P. Dove et al.: Knowledge-based pitch detection. (1983) authored by Alan V. Oppenheim. Sefa Demirtas and Alan V. Oppenheim: A Functional Composition Approach to Filter Sharpening and Modular Filter Design. (2015) authored by Alan V. Oppenheim. Sefa Demirtas and Alan V. Oppenheim: A Functional Composition Approach to Filter Sharpening and Modular Filter Design. (2016) authored by Alan V. Oppenheim. Sefa Demirtas et al.: Sensitivity of polynomial composition and decomposition for signal processing applications. (2012) authored by Alan V. Oppenheim. Sourav R. Dey et al.: Digital precompensation for faulty D/A converters: the "missing pixel" problem. (2004) authored by Alan V. Oppenheim. Matt S. Willsey et al.: Selecting the Lorenz parameters for Wideband Radar waveform Generation. (2011) authored by Alan V. Oppenheim. Tae H. Joo and Alan V. Oppenheim: Effects of FFT coefficient quantization on sinusoidal signal detection. (1988) authored by Alan V. Oppenheim. Evangelos E. Milios and Alan V. Oppenheim: The phase-only version of the LPC residual in speech coding. (1983) authored by Alan V. OppenheimS. S. Sc. and M
output format: answer
|
Guggenheim Fellow
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Whose institute has fewer publications, the author of Capturing Meaning or Cycle Lengths in Expanding Graphs creator?
Context: Dan Hefetz et al.: Fast Winning Strategies in Avoider-Enforcer Games. (2009) authored by Michael Krivelevich. Noga Alon et al.: Scalable Secure Storage when Half the System Is Faulty. (2000) authored by Michael Krivelevich. Michael Krivelevich name Michael Krivelevich. Noga Alon et al.: Scalable Secure Storage When Half the System Is Faulty. (2002) authored by Michael Krivelevich. Malgorzata Bednarska-Bzdega et al.: Manipulative Waiters with Probabilistic Intuition. (2016) authored by Michael Krivelevich. Noga Alon et al.: Addendum to "Scalable secure storage when half the system is faulty" [Inform. Comput 174 (2)(2002) 203-213]. (2007) authored by Michael Krivelevich. Dan Hefetz et al.: Avoider-Enforcer: The rules of the game. (2010) authored by Michael Krivelevich. Dan Hefetz et al.: Avoider-Enforcer: The Rules of the Game. (2009) authored by Michael Krivelevich. Michael Krivelevich alternativeName Michael Krivelevich. Dan Hefetz et al.: Avoider-Enforcer games. (2007) authored by Michael Krivelevich. Michael Krivelevich alternativeName M. Krivelevich. Joel Friedman et al.: Recognizing More Unsatisfiable Random k-SAT Instances Efficiently. (2005) authored by Michael Krivelevich. Noga Alon et al.: Regular Languages are Testable with a Constant Number of Queries. (2000) authored by Michael Krivelevich. Michael Krivelevich is Person. Noga Alon et al.: Testing Reed-Muller codes. (2005) authored by Michael Krivelevich. Noga Alon et al.: Regular Languages Are Testable with a Constant Number of Queries. (1999) authored by Michael Krivelevich. Michael Krivelevich et al.: The random k-matching-free process. (2018) authored by Michael Krivelevich. Andreas Goerdt and Michael Krivelevich: Efficient Recognition of Random Unsatisfiable k-SAT Instances by Spectral Methods. (2001) authored by Michael Krivelevich. Ido Ben-Eliezer et al.: Comparing the strength of query types in property testing: the case of testing k-colorability. (2008) authored by Michael Krivelevich. Asaf Ferber et al.: Efficient Winning Strategies in Random-Turn Maker-Breaker Games. (2017) authored by Michael Krivelevich. Noga Alon et al.: Small Sample Spaces Cannot Fool Low Degree Polynomials. (2008) authored by Michael Krivelevich. Michael Krivelevich et al.: Greedy Maximal Independent Sets via Local Limits. (2020) authored by Michael Krivelevich. Ido Ben-Eliezer et al.: Comparing the Strength of Query Types in Property Testing: The Case of Testing k-Colorability. (2010) authored by Michael Krivelevich. David Burshtein et al.: Upper bounds on the rate of LDPC Codes. (2002) authored by Michael Krivelevich. Noga Alon et al.: Generalized hashing and parent-identifying codes. (2003) authored by Michael Krivelevich. Oded Goldreich et al.: Hierarchy Theorems for Property Testing. (2008) authored by Michael Krivelevich. Oded Goldreich et al.: Hierarchy Theorems for Property Testing. (2012) authored by Michael Krivelevich. Noga Alon et al.: Testing Low-Degree Polynomials over GF(2(. (2003) authored by Michael Krivelevich. Asaf Ferber et al.: Biased games on random boards. (2015) authored by Michael Krivelevich. Ido Ben-Eliezer et al.: Comparing the strength of query types in property testing: The case of k-colorability. (2013) authored by Michael Krivelevich'}. \nKrivelevich received his PhD from Tel Aviv University in 1997 under the supervision of Noga Alon
output format: answer
|
Denny Vrandecic
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many citations are there for the institute of the author who published the 'Spatial Variability in Precision Agriculture' article?
Context: D. J. Mulla alternativeName D. Mulla. D. J. Mulla name D. J. Mulla. D. J. Mulla alternativeName D.J Mulla. D. J. Mulla alternativeName D. J. Mulla. D. J. Mulla alternativeName David Mulla. D. J. Mulla alternativeName David J. Mulla. D. J. Mulla i10Index 124E. \nHe holds the W. Until 2008, the meetings of the ICPA were hosted by the University of Minnesota. In 1998, this work led to him being appointed to the White House Task Force on Hypoxia in the Gulf of Mexico, which was established in 1997. Mulla's PhD dissertation was entitled “The molecular dynamics, specific surface area, crystal composition, and swelling of clay-water systems. {'author_wikipedia_text': "David J
output format: answer
|
9803467
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What accolade did the author of 'Finding the source of nonlinearity in a process with plant-wide oscillation' receive from Imperial College London in 2017?
Context: Waqas Ikram et al.: Towards a radio-controlled time synchronized wireless sensor network: A work in-progress paper. (2010) authored by Nina F. Thornhill. Dionysios P. Xenos et al.: Operational optimization of networks of compressors considering condition-based maintenance. (2016) authored by Nina F. Thornhill. Waqas Ikram and Nina F. Thornhill: Towards the development of a wireless network node lifetime calculation tool. (2013) authored by Nina F. Thornhill. Waqas Ikram et al.: Adaptive Multi-Channel Transmission Power Control for Industrial Wireless Instrumentation. (2014) authored by Nina F. Thornhill. Marta A. Zagorowska et al.: Load-Sharing Strategy Taking Account of Compressor Degradation. (2018) authored by Nina F. Thornhill. Marta A. Zagorowska et al.: Load-Sharing With Degradation Management in a Compressor Station. (2024) authored by Nina F. Thornhill. Nina F. Thornhill alternativeName Nina Thornhill. Nina F. Thornhill name Nina F. Thornhill. Nina F. Thornhill alternativeName Nina F Thornhill'}. D
output format: answer
|
President's Award for Excellence in Research Supervision
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Whose institute has more publications cited by count, the author who wrote the article with title 'The paradox of active users' or the writer of the publication 'Usage Bibliometrics'?
Context: Ryan Compton et al.: Detecting future social unrest in unprocessed Twitter data: "Emerging phenomena and big data". (2013) authored by Michael W. Macy. Yihui Ren et al.: Generative Modeling of Human Behavior and Social Interactions Using Abductive Analysis. (2018) authored by Michael W. Macy. Vanessa Cedeno-Mieles et al.: Mechanistic and data-driven agent-based models to explain human behavior in online networked group anagram games. (2019) authored by Michael W. Macy. Thomas Davidson et al.: Automated Hate Speech Detection and the Problem of Offensive Language. (2017) authored by Michael W. Macy. Thomas Davidson et al.: Automated Hate Speech Detection and the Problem of Offensive Language. (2017) authored by Michael W. Macy. Vanessa Cedeno-Mieles et al.: Networked experiments and modeling for producing collective identity in a group of human subjects using an iterative abduction framework. (2020) authored by Michael W. Macy. Aurora C. Schmidt et al.: Searching for explanations: testing social scientific methods in synthetic ground-truthed worlds. (2023) authored by Michael W. Macy. Yongren Shi et al.: Cultural Fault Lines and Political Polarization. (2017) authored by Michael W. Macy. Clay Fink et al.: Complex contagions and the diffusion of popular Twitter hashtags in Nigeria. (2016) authored by Michael W. Macy'}. S. and his M. and Ph
output format: answer
|
Michael W. Macy
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Which university did Stephanie Weirich attend for her graduate studies?
Context: Brian E. Aydemir et al.: Nominal Reasoning Techniques in Coq: (Extended Abstract). (2006) authored by Stephanie Weirich. Garrin Kimmell et al.: Equational reasoning about programs with general recursion and call-by-value semantics. (2012) authored by Stephanie Weirich. Miroslav Pajic et al.: Towards synthesis of platform-aware attack-resilient control systems: extended abstract. (2013) authored by Stephanie Weirich. Geoffrey Washburn and Stephanie Weirich: Boxes go bananas: Encoding higher-order abstract syntax with parametric polymorphism. (2008) authored by Stephanie Weirich. Chris Casinghino et al.: Step-Indexed Normalization for a Language with General Recursion (2012) authored by Stephanie Weirich. Geoffrey Washburn and Stephanie Weirich: Boxes go bananas: encoding higher-order abstract syntax with parametric polymorphism. (2003) authored by Stephanie Weirich. Aaron Stump et al.: Termination Casts: A Flexible Approach to Termination with General Recursion. (2010) authored by Stephanie Weirich. Cassia Torczon et al.: Effects and Coeffects in Call-By-Push-Value (Extended Version). (2023) authored by Stephanie Weirich. Dimitrios Vytiniotis et al.: Boxy types: inference for higher-rank types and impredicativity. (2006) authored by Stephanie Weirich. Aaron Stump et al.: Termination Casts: A Flexible Approach to Termination with General Recursion (2010) authored by Stephanie Weirich. Daniel S. Dantas et al.: PolyAML: a polymorphic aspect-oriented functional programming language. (2005) authored by Stephanie Weirich. Karl Crary et al.: Intensional polymorphism in type-erasure semantics. (2002) authored by Stephanie Weirich. Vilhelm Sjöberg et al.: Irrelevance, Heterogeneous Equality, and Call-by-value Dependent Type Systems (2012) authored by Stephanie Weirich. Yiyun Liu et al.: Internalizing Indistinguishability with Dependent Types. (2024) authored by Stephanie Weirich. Karl Crary et al.: Intensional Polymorphism in Type-Erasure Semantics. (1998) authored by Stephanie Weirich"}. \nWeirich's work on type inference has been incorporated into the Glasgow Haskell Compiler
output format: answer
|
Cornell University
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.