prompt
stringlengths 821
12.2k
| answer
stringlengths 0
339
|
|---|---|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where did the author who received their first Ph.D degree in History from receive it from?
Context: Necip Fazil Ayan et al.: "Can you give me another word for hyperbaric?": Improving speech translation using targeted clarification questions. (2013) authored by Julia Hirschberg. Lin Ai et al.: Identifying the Popularity and Persuasiveness of Right- and Left-Leaning Group Videos on Social Media. (2021) authored by Julia Hirschberg. Lin Ai et al.: Exploring New Methods for Identifying False Information and the Intent Behind It on Social Media: COVID-19 Tweets. (2021) authored by Julia Hirschberg. Zixiaofan Yang et al.: Multimodal Indicators of Humor in Videos. (2019) authored by Julia Hirschberg. Prakhar Gupta et al.: DialGuide: Aligning Dialogue Model Behavior with Developer Guidelines. (2022) authored by Julia Hirschberg. Jiaxuan Zhang et al.: Multimodal Deception Detection Using Automatically Extracted Acoustic, Visual, and Lexical Features. (2020) authored by Julia Hirschberg. Prakhar Gupta et al.: DialGuide: Aligning Dialogue Model Behavior with Developer Guidelines. (2023) authored by Julia Hirschberg. Alex Liu et al.: Detecting Inappropriate Clarification Requests in Spoken Dialogue Systems. (2014) authored by Julia Hirschberg. Diane J. Litman et al.: Predicting User Reactions to System Error. (2001) authored by Julia Hirschberg. Mona T. Diab et al.: Proceedings of the First Workshop on Computational Approaches to Code Switching@EMNLP 2014, Doha, Qatar, October 25, 2014 (2014) edited by Julia Hirschberg. Yu-Wen Chen et al.: MultiPA: a multi-task speech pronunciation assessment system for a closed and open response scenario. (2023) authored by Julia Hirschberg. Mona T. Diab et al.: Proceedings of the Second Workshop on Computational Approaches to Code Switching@EMNLP 2016, Austin, Texas, USA, November 1, 2016 (2016) edited by Julia Hirschberg. Björn W. Schuller et al.: The INTERSPEECH 2016 Computational Paralinguistics Challenge: A Summary of Results. (2016) authored by Julia Hirschberg. Gustavo Aguilar et al.: Proceedings of the Third Workshop on Computational Approaches to Linguistic Code-Switching@ACL 2018, Melbourne, Australia, July 19, 2018 (2018) edited by Julia Hirschberg. Huyen Nguyen et al.: Acoustic-Prosodic, Lexical and Demographic Cues to Persuasiveness in Competitive Debate Speeches. (2021) authored by Julia Hirschberg. Shih-Fu Chang et al.: Report of 2017 NSF Workshop on Multimedia Challenges, Opportunities and Research Roadmaps. (2019) authored by Julia Hirschberg. Morgan Ulinski et al.: Evaluating the WordsEye Text-to-Scene System: Imaginative and Realistic Sentences. (2018) authored by Julia Hirschberg. Zehui Wu et al.: Multi-Modality Multi-Loss Fusion Network. (2023) authored by Julia Hirschberg. Svetlana Stoyanchev et al.: Modelling Human Clarification Strategies. (2013) authored by Julia Hirschberg. Jackson Liscombe et al.: Detecting certainness in spoken tutorial dialogues. (2005) authored by Julia Hirschberg. Bob Coyne et al.: Frame Semantics in Text-to-Scene Generation. (2010) authored by Julia Hirschberg. Shimei Pan et al.: Exploring features from natural language generation for prosody modeling. (2002) authored by Julia Hirschberg. Rolf Carlson et al.: Cues to upcoming Swedish prosodic boundaries: Subjective judgment studies and acoustic correlates. (2005) authored by Julia Hirschberg. Vinodkumar Prabhakaran et al.: A New Dataset and Evaluation for Belief/Factuality. (2015) authored by Julia Hirschberg. Abdullah Aman Tutul et al.: Human-AI Collaboration for the Detection of Deceptive Speech. (2023) authored by Julia Hirschberg. Ishaan Arora et al.: A Novel Methodology for Developing Automatic Harassment Classifiers for Twitter. (2020) authored by Julia Hirschberg. Kai-Zhan Lee et al.: A Comparison of Speaker-based and Utterance-based Data Selection for Text-to-Speech Synthesis. (2018) authored by Julia Hirschberg. Victor Soto et al.: Cross-language phrase boundary detection. (2013) authored by Julia HirschbergS. At Columbia, she and her students have continued and extended research on spoken dialogue systems (automatically detecting speech recognition errors and inappropriate system queries, modeling turn-taking behavior, dialogue entrainment, modeling and generating clarification dialogues); on the automatic classification of trust, charisma, deception and emotion from speech; on speech summarization; prosody translation, hedging behavior in text and speech, text-to-speech synthesis, and speech search in low resource languages. and Vida L. She was a leader in the development of the ToBI conventions for intonational description, which have been extended to numerous languages and which today are the most widely used standard for intonational annotation. W. She also has innovated in numerous other areas involving prosody and meaning, including the role of grammatical function and surface position in pitch accent location, the use of prosody in disambiguating cue phrases (discourse markers) with Diane Litman, the role of prosody in disambiguation in English, Italian, and Spanish with Cinzia Avesani and Pilar Prieto, and the automatic identification of speech recognition errors using prosodic information, At AT&T Labs she worked with Fernando Pereira, Steve Whittaker, and others on speech search and developing new interfaces for speech navigation
output format: answer
|
University of Michigan
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: From which institute did the writer of TUNNEX get his diploma?
Context: Matthias Prall et al.: Substituent effects on the Bergman cyclization of (Z)-1, 5-hexadiyne-3-enes: a systematic computational study. (2001) authored by Peter R. Schreiner. Horst M. Sulzbach et al.: NMR chemical shielding surface of N-Acetyl-N-Methylalaninamide: A density functional study. (1997) authored by Peter R. Schreiner. Peter R. Schreiner affiliation University of Georgia, Department of Chemistry, Athens, GA, USA. Amir Karton et al.: Heats of formation of platonic hydrocarbon cages by means of high-level thermochemical procedures. (2016) authored by Peter R. Schreiner. Sebastian Schwan et al.: Insights into molecular cluster materials with adamantane-like core structures by considering dimer interactions. (2023) authored by Peter R. Schreiner. Peter R. Schreiner name Peter R. Schreiner'}. He is one of the pioneers of organocatalysis, in which metal-containing catalysts are replaced by more environmentally friendly customized organic catalysts. \nSchreiner found a way to integrate nanodiamonds, which naturally occur in natural gas and petroleum but have nanoscale dimensions, into a coatings. As of 2022[update], his h-index is 73. Schreiner was German Chemical Society (GDCh) President from 2020 to 2021
output format: answer
|
University of Erlangen-Nuremberg
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the total publications cited by count for the organization of the author of 'Cross-Partisan Discussions on YouTube: Conservatives Talk to Liberals but Liberals Don't Talk to Conservatives'?
Context: Carol Moser et al.: Impulse Buying: Design Practices and Consumer Needs. (2019) authored by Paul Resnick. Randall Davis and Paul Resnick: Multiple Dimensions of Generalization In Model-Based Troubleshooting. (1993) authored by Paul Resnick. Tapan Khopkar et al.: Self-selection, slipping, salvaging, slacking, and stoning: the impacts of negative feedback at eBay. (2005) authored by Paul Resnick. Steve Oney et al.: Creating Guided Code Explanations with chat.codes. (2018) authored by Paul Resnick. Paul Resnick and Robert A. Virzi: Skip and scan: cleaning up telephone interface. (1992) authored by Paul Resnick. Chanda Phelan et al.: Some Prior(s) Experience Necessary: Templates for Getting Started With Bayesian Analysis. (2019) authored by Paul Resnick. Paul Resnick and Rahul Sami: Sybilproof transitive trust protocols. (2009) authored by Paul Resnick. Jeffrey K. MacKie-Mason et al.: Proceedings 8th ACM Conference on Electronic Commerce (EC-2007), San Diego, California, USA, June 11-15, 2007 (2007) edited by Paul Resnick. Nathan Oostendorp and Paul Resnick: Three recommender approaches to interface controls reduction. (2008) authored by Paul Resnick. Carol Moser et al.: No Such Thing as Too Much Chocolate: Evidence Against Choice Overload in E-Commerce. (2017) authored by Paul Resnick. Paul Resnick i10Index 97. Iman YeckehZaare et al.: Semester-level Spacing but Not Procrastination Affected Student Exam Performance. (2022) authored by Paul Resnick. Sean A. Munson et al.: Effects of Public Commitments and Accountability in a Technology-Supported Physical Activity Intervention. (2015) authored by Paul Resnick. Debra Lee Davis et al.: Including HCI and user experience (UX) methodologies in computing curricula (abstract only). (2014) authored by Paul Resnick. Shengwei Xu et al.: Spot Check Equivalence: an Interpretable Metric for Information Elicitation Mechanisms. (2024) authored by Paul Resnick'}. Resnick became an assistant professor at the University of Michigan in 1997, and subsequently became Associate Professor, Professor, and then Associate Dean. D
output format: answer
|
15529260
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many articles are cited by the institution where the contributor of 'Automated Lip Synchronized Speech Driven Facial Animation' works?
Context: Ertan Onur et al.: Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks. (2004) authored by Lale Akarun. Baris Evrim Demiröz et al.: Rectangle blanket problem: Binary integer linear programming formulation and solution algorithms. (2019) authored by Lale Akarun. Baris Evrim Demiröz et al.: Rectangle Blanket Problem: Binary integer linear programming formulation and solution algorithms. (2019) authored by Lale Akarun. Ertan Onur et al.: Coverage in Sensor Networks When Obstacles Are Present. (2006) authored by Lale Akarun. Salih Burak Göktürk et al.: Automated inspection of PCB's using a novel approach. (1999) authored by Lale Akarun. Ertan Onur et al.: Surveillance with wireless sensor networks in obstruction: Breach paths as watershed contours. (2010) authored by Lale Akarun. Baris Evrim Demiröz et al.: Affordable person detection in omnidirectional cameras using radial integral channel features. (2019) authored by Lale Akarun. Ertan Onur et al.: Surveillance Wireless Sensor Networks: Deployment Quality Analysis. (2007) authored by Lale Akarun. Hüseyin Temiz et al.: TurCoins: Turkish Republic Coin Dataset. (2021) authored by Lale Akarun. Merve Gül Kantarci et al.: A Survey of 3D Object Reconstruction Methods. (2022) authored by Lale Akarun. Lale Akarun name Lale Akarun. Lale Akarun alternativeName Lale Akarun. Lale Akarun et al.: A novel technique for data hiding in color paletted images. (2000) authored by Lale Akarun. Lale Akarun alternativeName Laie Akarun. Lale Akarun i10Index 67. Lale Akarun alternativeName Akarun Lale. Dogan Özdemir and Lale Akarun: Fuzzy VQ algorithms for color quantization. (1999) authored by Lale Akarun. Lale Akarun alternativeName L. Akarun. Dogan Özdemir and Lale Akarun: A fuzzy algorithm for color quantization of images. (2002) authored by Lale Akarun She completed a B. In 2012, she became vice rector of the university. \nLale Akarun was born on 10 March 1962 in Ankara
output format: answer
|
286954
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many articles are attributed to the institution where the creator of 'Co-evolutionary bidding strategies for buyers in electricity power markets' works?
Context: Yunrui Bi et al.: Single intersection signal control based on Type-2 fuzzy logic. (2013) authored by Dipti Srinivasan. Dipti Srinivasan et al.: Reduced multivariate polynomial-based neural network for automated traffic incident detection. (2008) authored by Dipti Srinivasan. Dipti Srinivasan et al.: Evaluation of adaptive neural network models for freeway incident detection. (2004) authored by Dipti Srinivasan. Dipti Srinivasan et al.: Adaptive neural network models for automatic incident detection on freeways. (2005) authored by Dipti Srinivasan. Dan Zhang et al.: Distributed Filtering for Discrete-Time T-S Fuzzy Systems With Incomplete Measurements. (2018) authored by Dipti Srinivasan. Dipti Srinivasan et al.: Hybrid Neuro-Fuzzy Technique for Automated Traffic Incident Detection. (2006) authored by Dipti Srinivasan. Xin Jin et al.: Classification of freeway traffic patterns for incident detection using constructive probabilistic neural networks. (2001) authored by Dipti Srinivasan. P. G. Balaji and Dipti Srinivasan: Type-2 fuzzy logic based urban traffic management. (2011) authored by Dipti Srinivasan. Dipti Srinivasan and Vishal Sharma: A Reduced Multivariate Polynomial Based Neural Network Model Pattern Classifier for Freeway Incident Detection. (2007) authored by Dipti Srinivasan. Hamzeh Asgharnezhad et al.: Objective Evaluation of Deep Uncertainty Predictions for COVID-19 Detection. (2020) authored by Dipti Srinivasan. Yunrui Bi et al.: Optimal Type-2 Fuzzy System For Arterial Traffic Signal Control. (2018) authored by Dipti Srinivasan. Roohallah Alizadehsani et al.: Handling of uncertainty in medical data using machine learning and probability theory techniques: A review of 30 years (1991-2020). (2020) authored by Dipti Srinivasan. Hussain Mohammed Dipu Kabir et al.: Neural Network Training for Uncertainty Quantification Over Time-Range. (2021) authored by Dipti Srinivasan. Balaji Parasumanna Gokulan and Dipti Srinivasan: Distributed Geometric Fuzzy Multiagent Urban Traffic Signal Control. (2010) authored by Dipti Srinivasan. Mandar Chitre and Dipti Srinivasan: Evaluating teaching effectiveness using quantitative student feedback. (2018) authored by Dipti Srinivasan. Tai-Kia Tan et al.: A Bimodal Palmprint Verification System. (2006) authored by Dipti Srinivasan. Willson Amalraj Arokiasami et al.: Vector directed path generation and tracking for autonomous unmanned aerial/ ground vehicles. (2016) authored by Dipti Srinivasan. Balaji Parasumanna Gokulan and Dipti Srinivasan: Distributed multi-agent type-2 fuzzy architecture for urban traffic signal control. (2009) authored by Dipti Srinivasan. Dipti Srinivasan et al.: Traffic incident detection using particle swarm optimization. (2003) authored by Dipti Srinivasan. Dipti Srinivasan 2YrMeanCitedness 7.4200000762939453125. Dan Zhang et al.: Asynchronous State Estimation for Discrete-Time Switched Complex Networks With Communication Constraints. (2018) authored by Dipti Srinivasan. Dipti Srinivasan et al.: Neural Networks for Real-Time Traffic Signal Control. (2006) authored by Dipti Srinivasan. Hussain Mohammed Dipu Kabir et al.: SpinalNet: Deep Neural Network with Gradual Input. (2020) authored by Dipti Srinivasan. Afshar Shamsi Jokandan et al.: An Uncertainty-Aware Transfer Learning-Based Framework for COVID-19 Diagnosis. (2021) authored by Dipti Srinivasan. Dipti Srinivasan et al.: Automated time table generation using multiple context reasoning for university modules. (2002) authored by Dipti Srinivasan She earned a master\'s degree there in 1991 and completed a Ph. in 1994
output format: answer
|
198216
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where was the sociologist who directed the Social Dynamics Laboratory born?
Context: Sterling Williams-Ceci et al.: Trustworthiness Evaluations of Search Results: The Impact of Rank and Misinformation. (2023) authored by Michael W. Macy. Michael W. Macy alternativeName Michael W. Macy. Michael W. Macy name Michael W. Macy. Michael W. Macy i10Index 69. Michael W. Macy alternativeName Michael Macy. Michael W. Macy modified 2023-10-18. Michael W. Macy written paper amount in year2016: 7. Michael W. Macy written paper amount in year2016: 7. Michael W. Macy alternativeName M. W Macy'}. and his M. D. I
output format: answer
|
Clarksville, Tennessee
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the number of publications for the institution where the writer of the 'A stochastic control approach to coding with feedback over degraded broadcast channels' article is affiliated?
Context: Anjulie S. Agrusa et al.: A Deep Convolutional Neural Network Approach to Classify Normal and Abnormal Gastric Slow Wave Initiation From the High Resolution Electrogastrogram. (2020) authored by Todd P. Coleman. Armen A. Gharibans et al.: High-Resolution Electrogastrogram: A Novel, Noninvasive Method for Determining Gastric Slow-Wave Direction and Speed. (2017) authored by Todd P. Coleman. Dae Y. Kang et al.: Scalable Microfabrication Procedures for Adhesive-Integrated Flexible and Stretchable Electronic Sensors. (2015) authored by Todd P. Coleman. Sandya Subramanian and Todd P. Coleman: Automated classification of sleep and wake from single day triaxial accelerometer data. (2022) authored by Todd P. Coleman. Anjulie S. Agrusa et al.: Robust Methods to Detect Abnormal Initiation in the Gastric Slow Wave from Cutaneous Recordings. (2020) authored by Todd P. Coleman. Anjulie S. Agrusa et al.: Robust Regression and Optimal Transport Methods to Predict Gastrointestinal Disease Etiology From High Resolution EGG and Symptom Severity. (2022) authored by Todd P. Coleman. Marcelo Aguilar-Rivera et al.: Smart Electronic Eyedrop Bottle for Unobtrusive Monitoring of Glaucoma Medication Adherence. (2020) authored by Todd P. Coleman. Lennart Langouche et al.: Data-driven noise modeling of digital DNA melting analysis enables prediction of sequence discriminating power. (2021) authored by Todd P. Coleman. Todd P. Coleman name Todd P. Coleman. Sandya Subramanian et al.: Exploring the aperiodic nature of parasympathetic activity during sleep in idiopathic gastroparesis. (2023) authored by Todd P. Coleman. Todd P. Coleman modified 2023-10-18. Marcelo Aguilar-Rivera et al.: Wireless Heart Sensor for Capturing Cardiac Orienting Response for Prediction of Neurodevelopmental Delay in Infants. (2022) authored by Todd P. Coleman. Todd P. Coleman i10Index 55. Todd P. Coleman alternativeName Todd Coleman. Todd P. Coleman 2YrMeanCitedness 1.4285714626312255859{'author_wikipedia_text': 'Anita Coleman is an Indian American academic librarian, faculty and researcher in digital libraries. Anita Coleman is also the founder of an interdisciplinary open access repository, dLIST - Digital Library of Information Science and Technology
output format: answer
|
383525
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many papers are cited by the affiliation where the creator of 'Measuring packet reordering' is associated with?
Context: Enze Liu et al.: No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. (2023) authored by Stefan Savage. Stefan Savage name Stefan Savage. Clifford W. Mercer et al.: Processor Capacity Reserves: Operating System Support for Multimedia Applications. (1994) authored by Stefan Savage. Stefan Savage alternativeName Stefan Savage. Yuvraj Agarwal et al.: SleepServer: A Software-Only Approach for Reducing the Energy Consumption of PCs within Enterprise Environments. (2010) authored by Stefan Savage. Stefan Savage alternativeName S. Savage. Alexander Gamero-Garrido et al.: Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research. (2017) authored by Stefan Savage. Scott Yilek et al.: When private keys are public: results from the 2008 Debian OpenSSL vulnerability. (2009) authored by Stefan Savage. Stefan Savage et al.: Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs. (1997) authored by Stefan Savage. Mehran Bozorgi et al.: Beyond heuristics: learning to classify vulnerabilities and predict exploits. (2010) authored by Stefan Savage. Harsha V. Madhyastha et al.: scc: cluster storage provisioning informed by application characteristics and SLAs. (2012) authored by Stefan Savage. David Y. Wang et al.: Search + Seizure: The Effectiveness of Interventions on SEO Campaigns. (2014) authored by Stefan Savage. Stefan Savage alternativeName Stefan R. Savage. Ariana Mirian et al.: Hack for Hire: Exploring the Emerging Market for Account Hijacking. (2019) authored by Stefan Savage. Ariana Mirian et al.: An Empirical Analysis of Enterprise-Wide Mandatory Password Updates. (2023) authored by Stefan Savage. Stefan Savage et al.: Eraser: A Dynamic Data Race Detector for Multithreaded Programs. (1997) authored by Stefan Savage. Frank Li et al.: You've Got Vulnerability: Exploring Effective Vulnerability Notifications. (2016) authored by Stefan Savage. Gautam Akiwate et al.: Risky BIZness: risks derived from registrar name management. (2021) authored by Stefan Savage. Audrey Randall et al.: The Challenges of Blockchain-Based Naming Systems for Malware Defenders. (2022) authored by Stefan Savage. Ariana Mirian et al.: Web feature deprecation: a case study for chrome. (2019) authored by Stefan Savage. Elie Bursztein et al.: Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild. (2014) authored by Stefan Savage. Sushma Nagesh Bannur et al.: Judging a site by its content: learning the textual, structural, and visual features of malicious web pages. (2011) authored by Stefan Savage. Stefan Savage is Person'}. D. In 2022, he was elected to the National Academy of Engineering. 11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions, which introduced practical attacks on 802. IP traceback is a major open networking research question, with significant implications towards DDOS mitigation: if IP traffic can be traced, Internet Service Providers can track down and halt DDOS floods
output format: answer
|
11594457
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the i10Index of the scholar at IDA Center for Communications Research, Princeton, NJ, USA and co-author of An Application of Factoring?
Context: Changbo Chen et al.: Computing with semi-algebraic sets: Relaxation techniques and effective boundaries. (2013) authored by James H. Davenport. David Lavender et al.: Voronoi diagrams of set-theoretic solid models. (1992) authored by James H. Davenport. James H. Davenport and Fadoua Ghourabi: 7th International Symposium on Symbolic Computation in Software Science, SCSS 2016, Tokyo, Japan, March 28-31, 2016 (2016) edited by James H. Davenport. Erika Ábrahám et al.: Deciding the consistency of non-linear real arithmetic constraints with a conflict driven search using cylindrical algebraic coverings. (2021) authored by James H. Davenport. Akshar Nair et al.: On Benefits of Equality Constraints in Lex-Least Invariant CAD. (2019) authored by James H. Davenport. Erika Ábrahám et al.: Deciding the Consistency of Non-Linear Real Arithmetic Constraints with a Conflict Driven Search Using Cylindrical Algebraic Coverings. (2020) authored by James H. Davenport. Changbo Chen et al.: Computing with semi-algebraic sets represented by triangular decomposition. (2011) authored by James H. Davenport. Changbo Chen et al.: Triangular decomposition of semi-algebraic systems. (2013) authored by James H. Davenport. Akshar Nair et al.: Curtains in CAD: Why Are They a Problem and How Do We Fix Them? (2020) authored by James H. Davenport. Changbo Chen et al.: Triangular decomposition of semi-algebraic systems. (2010) authored by James H. Davenport. Simon et al.: Language Choice in Introductory Programming Courses at Australasian and UK Universities. (2018) authored by James H. Davenport. Changbo Chen et al.: Triangular Decomposition of Semi-algebraic Systems (2010) authored by James H. Davenport. Jasper Nalbach et al.: Levelwise construction of a single cylindrical algebraic cell. (2022) authored by James H. Davenport. Erika Ábrahám et al.: Satisfiability Checking meets Symbolic Computation (Project Paper). (2016) authored by James H. Davenport. Raina Mason et al.: A Global Survey of Introductory Programming Courses. (2024) authored by James H. Davenport. Erika Ábrahám et al.: SC2: Satisfiability Checking Meets Symbolic Computation - (Project Paper). (2016) authored by James H. Davenport. Russell J. Bradford et al.: Truth Table Invariant Cylindrical Algebraic Decomposition by Regular Chains. (2014) authored by James H. Davenport. Russell J. Bradford et al.: Truth Table Invariant Cylindrical Algebraic Decomposition by Regular Chains. (2014) authored by James H. Davenport. Zongyan Huang et al.: A comparison of three heuristics to choose the variable ordering for CAD. (2014) authored by James H. Davenport. Jasper Nalbach et al.: Levelwise construction of a single cylindrical algebraic cell. (2024) authored by James H. Davenport. Matthew England et al.: Problem formulation for truth-table invariant cylindrical algebraic decomposition by incremental triangular decomposition. (2014) authored by James H. Davenport. Matthew England et al.: Problem Formulation for Truth-Table Invariant Cylindrical Algebraic Decomposition by Incremental Triangular Decomposition. (2014) authored by James H. Davenport. Russell J. Bradford et al.: Cylindrical algebraic decompositions for boolean combinations. (2013) authored by James H. Davenport. Saif Al-Kuwari et al.: Cryptographic Hash Functions: Recent Design Trends and Security Notions. (2011) authored by James H. Davenport. David J. Wilson et al.: A "Piano Movers" Problem Reformulated. (2013) authored by James H. Davenport. David J. Wilson et al.: A "Piano Movers" Problem Reformulated. (2013) authored by James H. Davenport. James H. Davenport et al.: Proceedings of the 2019 on International Symposium on Symbolic and Algebraic Computation, ISSAC 2019, Beijing, China, July 15-18, 2019. (2019) edited by James H. Davenport. Russell J. Bradford et al.: Truth Table Invariant Cylindrical Algebraic Decomposition. (2014) authored by James H. Davenport. Russell J. Bradford et al.: Truth table invariant cylindrical algebraic decomposition. (2016) authored by James H. Davenport. Erika Ábrahám et al.: New Perspectives in Symbolic Computation and Satisfiability Checking (Dagstuhl Seminar 22072). (2022) authored by James H. Davenport"}. He went to Grenoble for a year, before taking a post at the University of Bath in 1983. \nIn 1969, the team that developed the automated teller machine in the United Kingdom at IBM Hursley used parts from that project to build an IBM School Computer. This was in recognition of his pioneering and ongoing work in computer algebra systems and theory of symbolic computation
output format: answer
|
67
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: The author with more worksCount, Gauss M. Cordeiro or Yvonne Rogers?
Context: Ashild Kummen et al.: MotionInput v2.0 supporting DirectX: A modular library of open-source gesture-based machine learning and computer vision methods for interacting and controlling existing software with a webcam. (2021) authored by Yvonne Rogers. Dagmar Kern et al.: Enhancing Navigation Information with Tactile Output Embedded into the Steering Wheel. (2009) authored by Yvonne Rogers. Leon Reicherts et al.: Extending Chatbots to Probe Users: Enhancing Complex Decision-Making Through Probing Conversations. (2022) authored by Yvonne Rogers. Jon Bird et al.: Low-fi skin vision: a case study in rapid prototyping a sensory substitution system. (2009) authored by Yvonne Rogers. Lisa Koeman et al.: "Everyone Is Talking about It!": A Distributed Approach to Urban Voting Technology and Visualisations. (2015) authored by Yvonne Rogers. Steven Houben et al.: Roam-IO: Engaging with People Tracking Data through an Interactive Physical Data Installation. (2019) authored by Yvonne Rogers. Roman Rädle et al.: HuddleLamp: Spatially-Aware Mobile Displays for Ad-hoc Around-the-Table Collaboration. (2014) authored by Yvonne Rogers. Nuno Otero et al.: Learning Interaction Patterns Using Diagrams Varying in Level and Type of Interactivity. (2005) authored by Yvonne Rogers. Vaiva Kalnikaité et al.: How to nudge in Situ: designing lambent devices to deliver salient information in supermarkets. (2011) authored by Yvonne Rogers. James A. Landay et al.: UbiComp 2011: Ubiquitous Computing, 13th International Conference, UbiComp 2011, Beijing, China, September 17-21, 2011, Proceedings (2011) edited by Yvonne Rogers. Roman Rädle et al.: Demonstrating HuddleLamp: Spatially-Aware Mobile Displays for Ad-hoc Around-the-Table Collaboration. (2014) authored by Yvonne Rogers. Ana Javornik et al.: 'What lies behind the filter?' Uncovering the motivations for using augmented reality (AR) face filters on social media and their effect on well-being. (2022) authored by Yvonne Rogers. Roman Rädle et al.: Spatially-aware or Spatially-agnostic?: Elicitation and Evaluation of User-Defined Cross-Device Interactions. (2015) authored by Yvonne Rogers. Ana Javornik et al.: Revealing the Shopper Experience of Using a "Magic Mirror" Augmented Reality Make-Up Application. (2016) authored by Yvonne Rogers. Hamed S. Alavi et al.: The Five Strands of Living Lab: A Literature Study of the Evolution of Living Lab Concepts in HCI. (2020) authored by Yvonne Rogers. Matt Jones et al.: Proceedings of the 19th International Conference on Human-Computer Interaction with Mobile Devices and Services, MobileHCI 2017, Vienna, Austria, September 4-7, 2017 (2017) edited by Yvonne Rogers. Edward Tse et al.: Next generation of HCI and education: workshop on UI technologies and educational pedagogy. (2010) authored by Yvonne Rogers. Tammy Toscos et al.: "What's your number?": A survey of how parents and teens cope with diabetes in the context of technology support. (2011) authored by Yvonne Rogers. Hamed S. Alavi et al.: Introduction to Human-Building Interaction (HBI): Interfacing HCI with Architecture and Urban Design. (2019) authored by Yvonne Rogers. Paul Marshall et al.: Using F-formations to analyse spatial patterns of interaction in physical environments. (2011) authored by Yvonne Rogers. Wolfgang Prinz et al.: Proceedings of the Seventh European Conference on Computer Supported Cooperative Work, 16-20 September 2001, Bonn, Germany (2001) edited by Yvonne Rogers. Katie A. Siek et al.: When Do We Eat? An Evaluation of Food Items Input into an Electronic Food Monitoring Application. (2006) authored by Yvonne Rogers. Ondrej Miksik et al.: Building Proactive Voice Assistants: When and How (not) to Interact. (2020) authored by Yvonne Rogers. Stefan Kreitmayer et al.: UniPad: orchestrating collaborative activities through shared tablets and an integrated wall display. (2013) authored by Yvonne Rogers. Constantinos Timinis et al.: Designing Remote Patient Monitoring Technologies for Post-operative Home Cancer Recovery: The Role of Reassurance. (2023) authored by Yvonne Rogers. Ana Javornik et al.: An experimental study on the role of augmented reality content type in an outdoor site exploration. (2019) authored by Yvonne Rogers. Nadine Wagener et al.: The Role of Mobile and Virtual Reality Applications to Support Well-Being: An Expert View and Systematic App Review. (2021) authored by Yvonne Rogers. Paul Marshall et al.: Rethinking 'multi-user': an in-the-wild study of how groups approach a walk-up-and-use tabletop interface. (2011) authored by Yvonne Rogers. Steven Houben et al.: Physikit: Data Engagement Through Physical Ambient Visualizations in the Home. (2016) authored by Yvonne Rogers One of the projects was "Ambient Wood", encouraging children to explore biological processes in a forest using wireless probes. \nRogers worked on a project using ambient light to nudge people to take the stairs rather than the elevator. \nRogers was a principal investigator for the ICRI project in collaboration with Intel
output format: answer
|
Yvonne Rogers
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Who has a higher works count, the author of Editorial Announcement or the author of Oppressed species can form a winning pair in a multi-species ecosystem paper?
Context: Raman Manivannan et al.: Design of Resilient Reliable Dissipativity Control for Systems With Actuator Faults and Probabilistic Time-Delay Signals via Sampled-Data Approach. (2020) authored by Matjaz Perc. Matjaž Perc alternativeName Matja$ check{ rm~z}$ Perc. Yingying Li et al.: Bogdanov-Takens singularity in the Hindmarsh-Rose neuron with time delay. (2019) authored by Matjaz Perc. Blaz Krese et al.: Experimental Observation of a Chaos-to-Chaos Transition in Laser droplet Generation. (2011) authored by Matjaz Perc. Erivelton G. Nepomuceno et al.: Detecting unreliable computer simulations of recursive functions with interval extensions. (2018) authored by Matjaz Perc. Matjaž Perc i10Index 417. Andrej Tibaut et al.: Interoperability requirements for automated manufacturing systems in construction. (2016) authored by Matjaz Perc. Shirin Panahi et al.: Optimal synchronization of circulant and non-circulant oscillators. (2021) authored by Matjaz Perc. Matjaž Perc alternativeName Matjalz Perc. Wenpo Yao et al.: Time irreversibility and amplitude irreversibility measures for nonequilibrium processes. (2021) authored by Matjaz Perc. Zhen Wang et al.: Chimeras in an adaptive neuronal network with burst-timing-dependent plasticity. (2020) authored by Matjaz Perc. Matjaž Perc member of China Medical University Hospital. Erivelton G. Nepomuceno et al.: Inconsistencies in Numerical Simulations of Dynamical Systems Using Interval Arithmetic. (2018) authored by Matjaz Perc. Kang Liu et al.: Tilt Correction Toward Building Detection of Remote Sensing Images. (2021) authored by Matjaz Perc. Matjaž Perc alternativeName Matja Z Perc. Honghui Zhang et al.: Synaptic plasticity induced transition of spike propagation in neuronal networks. (2013) authored by Matjaz Perc. Okan Erkaymaz et al.: Performance of small-world feedforward neural networks for the diagnosis of diabetes. (2017) authored by Matjaz Perc. Matjaž Perc alternativeName Perc Matjaž. Matjaž Perc alternativeName Perc Matjaz. Chi Huang et al.: Stability and Stabilization in Probability of Probabilistic Boolean Networks. (2021) authored by Matjaz Perc. Erivelton G. Nepomuceno et al.: Interval computing periodic orbits of maps using a piecewise approach. (2018) authored by Matjaz Perc. Nenad Cus-Babic et al.: Supply-chain transparency within industrialized construction projects. (2014) authored by Matjaz Perc In 2010 he became head of the Institute of Physics at the University of Maribor, and in 2011 he became full Professor of Physics. In 2015, Matjaž Perc established the Complex Systems Center Maribor. "}. In 2009 he received the Zois Certificate of Recognition for outstanding research achievements in theoretical physics
output format: answer
|
Matjaž Perc
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many scientific publications are attributed to the institution where 'Once and For All' author is affiliated?
Context: Bader Abu Radi and Orna Kupferman: Minimizing GFG Transition-Based Automata. (2019) authored by Orna Kupferman. Rastislav Bodík et al.: Software Synthesis, 06.12. - 11.12.2009 (2009) edited by Orna Kupferman. Shulamit Halamish and Orna Kupferman: Minimizing Deterministic Lattice Automata. (2015) authored by Orna Kupferman. Shulamit Halamish and Orna Kupferman: Minimizing Deterministic Lattice Automata. (2011) authored by Orna Kupferman. Shaull Almagor et al.: Minimizing Expected Cost Under Hard Boolean Constraints, with Applications to Quantitative Synthesis. (2016) authored by Orna Kupferman. Shaull Almagor et al.: Minimizing Expected Cost Under Hard Boolean Constraints, with Applications to Quantitative Synthesis. (2016) authored by Orna Kupferman. Shaull Almagor and Orna Kupferman: Latticed-LTL Synthesis in the Presence of Noisy Inputs. (2014) authored by Orna Kupferman. Shaull Almagor and Orna Kupferman: Latticed-LTL synthesis in the presence of noisy inputs. (2017) authored by Orna Kupferman. Benjamin Aminof et al.: Improved model checking of hierarchical systems. (2012) authored by Orna Kupferman. Orna Kupferman and Moshe Y. Vardi: Vacuity detection in temporal model checking. (2003) authored by Orna Kupferman. Bader Abu Radi and Orna Kupferman: Minimization and Canonization of GFG Transition-Based Automata. (2021) authored by Orna Kupferman. Benjamin Aminof et al.: Improved Model Checking of Hierarchical Systems. (2010) authored by Orna Kupferman. Orna Kupferman and Moshe Y. Vardi: Vacuity Detection in Temporal Model Checking. (1999) authored by Orna Kupferman. Bader Abu Radi and Orna Kupferman: Minimization of Automata for Liveness Languages. (2022) authored by Orna Kupferman. Guy Avni and Orna Kupferman: Stochastization of Weighted Automata. (2015) authored by Orna Kupferman. Benjamin Aminof et al.: Rigorous approximated determinization of weighted automata. (2013) authored by Orna Kupferman. Orna Grumberg et al.: A Game-Theoretic Approach to Simulation of Data-Parameterized Systems. (2014) authored by Orna Kupferman. Bader Abu Radi and Orna Kupferman: Minimization and Canonization of GFG Transition-Based Automata. (2022) authored by Orna Kupferman. Patricia Bouyer et al.: Reasoning about Quality and Fuzziness of Strategic Behaviours. (2019) authored by Orna Kupferman. Patricia Bouyer et al.: Reasoning about Quality and Fuzziness of Strategic Behaviours. (2019) authored by Orna Kupferman. Shulamit Halamish and Orna Kupferman: Approximating Deterministic Lattice Automata. (2012) authored by Orna Kupferman. Orna Grumberg et al.: An Automata-Theoretic Approach to Reasoning about Parameterized Systems and Specifications. (2013) authored by Orna Kupferman. Benjamin Aminof et al.: Rigorous Approximated Determinization of Weighted Automata. (2011) authored by Orna Kupferman. Patricia Bouyer et al.: Reasoning About Quality and Fuzziness of Strategic Behaviours. (2020) authored by Orna Kupferman. Orna Kupferman et al.: An automata-theoretic approach to branching-time model checking. (2000) authored by Orna Kupferman. Orna Bernholtz et al.: An Automata-Theoretic Approach to Branching-Time Model Checking (Extended Abstract). (1994) authored by Orna Kupferman. Orna Kupferman and Moshe Y. Vardi: An automata-theortetic approach to modular model checking. (2000) authored by Orna Kupferman. Shaull Almagor et al.: Synthesis of Controllable Nash Equilibria in Quantitative Objective Game. (2018) authored by Orna Kupferman. Orna Kupferman et al.: Model Checking Linear Properties of Prefix-Recognizable Systems. (2002) authored by Orna Kupferman. Shaull Almagor and Orna Kupferman: Max and Sum Semantics for Alternating Weighted Automata. (2011) authored by Orna Kupferman. Orna Kupferman: Model checking for Branching-Time temporal logics. (1995) authored by Orna Kupferman. Benjamin Aminof et al.: Reasoning About Systems with Transition Fairness. (2004) authored by Orna Kupferman. Shaull Almagor and Orna Kupferman: High-Quality Synthesis Against Stochastic Environments. (2016) authored by Orna Kupferman. Shaull Almagor and Orna Kupferman: High-Quality Synthesis Against Stochastic Environments. (2016) authored by Orna Kupferman"}. D. \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0 \xa0\nShe was a center co-director at InForMID (Tufts University Initiative for the Forecasting and Modeling of Infectious Diseases) as a researcher and lead in the area of mathematical modeling of infectious disease epidemiology
output format: answer
|
109213
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where was the author of A Gentle Introduction and Survey on Computing with Words (CWW) Methodologies born?
Context: Javier Andreu-Pérez name Javier Andreu-Pérez. Javier Andreu-Perez link https://www.essex.ac.uk/people/andre09407/javier-andreu-perez. Javier Andreu-Perez link https://www.essex.ac.uk/people/andre09407/javier-andreu-perez. Javier Andreu-Pérez alternativeName Javier Andreu Perez. Javier Andreu-Perez is Person. Javier Andreu-Perez link https://en.wikipedia.org/wiki/Javier_Andreu-Perez. Javier Andreu-Pérez h-index 14. Javier Andreu-Pérez alternativeName Javier Andreu‐Perez. Javier Andreu-Pérez alternativeName Javier Andreu‐Pérez. Javier Andreu-Pérez alternativeName J. Andreu‐Perez. Javier Andreu-Perez link https://andreuperez.netlify.app/. Mohammed Al-Zeyadi et al.: Deep Learning Towards Intelligent Vehicle Fault Diagnosis. (2020) authored by Javier Andreu-Perez\nAndreu-Perez was born in Malaga, Spain. Andreu-Perez was an invited faculty at the foundational (1st edition) Digital Rheumatology Day and annual international event organised by the swisse Foundation for Research into Musculoskeletal and Rheumatic Diseases (RMR). "}. During his childhood he spent time living in Essex (United Kingdom), where he later in life joined as an academic, at University of Essex. An international scheme that offered three-years funding support for researchers with an excellent scientific and leadership curriculum to perform research with public research institutions in Andalusia, Spain
output format: answer
|
Malaga, Spain
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Whose institution has a greater number of publications, the place where the author of 'Message from the program chair' works or the institute of the writer of 'Modelling the Efficacy of Auto-Internet Warnings to Reduce Demand for Child Exploitation Materials'?
Context: Ojas Parekh et al.: Constant-Depth and Subcubic-Size Threshold Circuits for Matrix Multiplication. (2020) authored by Cynthia A. Phillips. Ojas Parekh et al.: Constant-Depth and Subcubic-Size Threshold Circuits for Matrix Multiplication. (2018) authored by Cynthia A. Phillips. Sándor P. Fekete et al.: Geometric Hitting Set for Segments of Few Orientations. (2018) authored by Cynthia A. Phillips. Sándor P. Fekete et al.: Geometric Hitting Set for Segments of Few Orientations. (2016) authored by Cynthia A. Phillips. Sándor P. Fekete et al.: Geometric Hitting Set for Segments of Few Orientations. (2015) authored by Cynthia A. Phillips. Michael A. Bender et al.: k-Means Clustering on Two-Level Memory Systems. (2015) authored by Cynthia A. Phillips. James B. Aimone et al.: Provable Advantages for Graph Algorithms in Spiking Neural Networks. (2021) authored by Cynthia A. Phillips. Michael A. Bender et al.: Two-level main memory co-design: Multi-threaded algorithmic primitives, analysis, and simulation. (2017) authored by Cynthia A. Phillips. Michael A. Bender et al.: Two-Level Main Memory Co-Design: Multi-threaded Algorithmic Primitives, Analysis, and Simulation. (2015) authored by Cynthia A. Phillips. Cynthia A. Phillips and Bettina Speckmann: Proceedings of the Symposium on Algorithm Engineering and Experiments, ALENEX 2022, Alexandria, VA, USA, January 9-10, 2022 (2022) edited by Cynthia A. Phillips. Mary Cryan et al.: Approximation Algorithms for the Fixed-Topology Phylogenetic Number Problem. (1999) authored by Cynthia A. Phillips. Mary Cryan et al.: Approximation Algorithms for the Fixed-Topology Phylogenetic Number Problem. (1997) authored by Cynthia A. Phillips. James B. Aimone et al.: Dynamic Programming with Spiking Neural Computing. (2019) authored by Cynthia A. Phillips. Cynthia A. Phillips et al.: Massively Parallel Mixed-Integer Programming: Algorithms and Applications. (2006) authored by Cynthia A. Phillips. Michael A. Bender et al.: Anti-Persistence on Persistent Storage: History-Independent Sparse Tables and Dictionaries. (2016) authored by Cynthia A. Phillips She completed her Ph. \nRudin was a Finalist for 2017 Daniel H. \nRudin graduated summa cum laude from the University at Buffalo with a double major in mathematical physics and music theory in 1999. '}. D. Her PhD thesis answered a well-studied question of whether AdaBoost maximizes the L1 margin, which is a type of distance between a decision boundary and the data observation closest to it. \nRudin was named by Businessinsider
output format: answer
|
La Trobe University
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Which author has more publications, the author who published Equiarboreal graphs or the author of Feel the Difference: A Guide with Attitude!?
Context: Naziya Hussaini and Ruth Aylett: A Step towards Modelling Group Behaviour in Autonomous Synthetic Characters. (2014) authored by Ruth Aylett. Stefanie Angerer et al.: MobComm: Using BDI-agents for the reconfiguration of mobile commissioning robots. (2010) authored by Ruth Aylett. Naziya Hussaini and Ruth Aylett: Modelling Group Behaviour in Autonomous Synthetic Characters. (2015) authored by Ruth Aylett. Katrin S. Lohan et al.: How can a robot signal its incapability to perform a certain task to humans in an acceptable manner? (2014) authored by Ruth Aylett. Ruth Aylett et al.: Intelligent Virtual Agents - 13th International Conference, IVA 2013, Edinburgh, UK, August 29-31, 2013. Proceedings (2013) edited by Ruth Aylett. Ruth Aylett et al.: HELP - A Hierarchical Execution-Led Planner for Robotic Domains. (1991) authored by Ruth Aylett. Marco Vala et al.: FearNot! demo: a virtual environment with synthetic characters to help bullying. (2007) authored by Ruth Aylett. Ruth Aylett et al.: Planning and Chemical Plant Operating Procedure Synthesis: A Case Study. (1997) authored by Ruth Aylett. Amol A. Deshmukh et al.: Managing social constraints on recharge behaviour for robot companions using memory. (2011) authored by Ruth Aylett. Amol A. Deshmukh and Ruth Aylett: Exploring socially intelligent recharge behaviour for human-robot interaction. (2014) authored by Ruth Aylett. Samuel Mascarenhas et al.: Modeling Culture in Intelligent Virtual Agents - From Theory to Implementation (Extended Abstract). (2016) authored by Ruth Aylett. Stefanie Angerer et al.: Self-Reconfiguration of Industrial Mobile Robots. (2010) authored by Ruth Aylett. Jonathan Gratch et al.: Intelligent Virtual Agents, 6th International Conference, IVA 2006, Marina Del Rey, CA, USA, August 21-23, 2006, Proceedings (2006) edited by Ruth Aylett. Patrícia Alves-Oliveira et al.: Towards dialogue dimensions for a robotic tutor in collaborative learning scenarios. (2014) authored by Ruth Aylett. Amol A. Deshmukh et al.: How Expressiveness of a Robotic Tutor is Perceived by Children in a Learning Environment. (2016) authored by Ruth Aylett. Ruth Aylett name Ruth Aylett. Ruth Aylett alternativeName Ruth Aylett. Themis Panayiotopoulos et al.: Intelligent Virtual Agents, 5th International Working Conference, IVA 2005, Kos, Greece, September 12-14, 2005, Proceedings (2005) edited by Ruth Aylett. Samuel Mascarenhas et al.: Modeling culture in intelligent virtual agents - From theory to implementation. (2016) authored by Ruth Aylett. Michael Kriegel et al.: Robots Meet IVAs: A Mind-Body Interface for Migrating Artificial Intelligent Agents. (2011) authored by Ruth Aylett. Ruth Aylett alternativeName Ruth S. Aylett. Mei Yii Lim et al.: Improving Adaptiveness in Autonomous Characters. (2008) authored by Ruth Aylett In 2004, she moved to her present position at Heriot-Watt University. She has served as one of the leaders of the Labour Party in Edinburgh Southern. '}. He developed prostate cancer, and died in 2018
output format: answer
|
Chris Godsil
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Comparing the hIndex of the author of 'Review and comparative assessment of similarity-based methods for prediction of drug-protein interactions in the druggable human proteome' with the creator of 'What underlies rapid learning and systematic generalization in humans', who has a lower hIndex?
Context: Lukasz Kurgan worksCount 314. Lukasz Kurgan written paper amount in year2019: 22. Lukasz Kurgan written paper amount in year2019: 22. Lukasz Kurgan written paper amount in year2016: 11. Lukasz Kurgan written paper amount in year2016: 11. Lukasz Kurgan member of Virginia Commonwealth University. Lukasz Kurgan written paper amount in year2018: 11. Lukasz Kurgan written paper amount in year2018: 11. Lukasz Kurgan written paper amount in year2021: 18. Lukasz Kurgan written paper amount in year2021: 18. Lukasz Kurgan written paper amount in year2012: 15. Lukasz Kurgan written paper amount in year2012: 15. Lukasz Kurgan written paper amount in year2023: 11. Lukasz Kurgan written paper amount in year2023: 11. Lukasz Kurgan written paper amount in year2022: 22Sc. degree in automation and robotics from the AGH University of Science and Technology in 1999. Kurgan earned his Ph. '}. S
output format: answer
|
Lukasz Kurgan
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many publications does the author who published Information voyeurism: social impact of physically large displays on information privacy with Desney S. Tan, have?
Context: Mary Czerwinski modified 2023-10-18. Patrick Baudisch et al.: Proceedings of the 18th Annual ACM Symposium on User Interface Software and Technology, Seattle, WA, USA, October 23-26, 2005 (2005) edited by Mary Czerwinski. Mary Czerwinski alternativeName Mary Czerwinski. Mary Czerwinski name Mary Czerwinski. Ken Perlin et al.: Proceedings of the 23rd Annual ACM Symposium on User Interface Software and Technology, New York, NY, USA, October 3-6, 2010 (2010) edited by Mary Czerwinski. Liu Wenyin et al.: Semi-Automatic Image Annotation. (2001) authored by Mary Czerwinski. Mary Czerwinski alternativeName Mary P. Czerwinski. Mary Czerwinski alternativeName M. Czerwinski. Javier Hernandez et al.: DeepFN: Towards Generalizable Facial Action Unit Recognition with Deep Face Normalization. (2022) authored by Mary Czerwinski. Robert DeLine et al.: Code Thumbnails: Using Spatial Memory to Navigate Source Code. (2006) authored by Mary Czerwinski. Javier Hernandez et al.: DeepFN: Towards Generalizable Facial Action Unit Recognition with Deep Face Normalization. (2021) authored by Mary Czerwinski. Harish Haresamudram et al.: Investigating Self-supervised Learning for Predicting Stress and Stressors from Passive Sensing. (2023) authored by Mary Czerwinski. Basak Alper et al.: Design Study of LineSets, a Novel Set Visualization Technique. (2011) authored by Mary Czerwinski. Akane Sano et al.: HealthAware: An advice system for stress, sleep, diet and exercise. (2015) authored by Mary Czerwinski. Mary Czerwinski 2YrMeanCitedness 3.2068965435028076172. George G. Robertson et al.: Visualization of mappings between schemas. (2005) authored by Mary Czerwinski. Mary Czerwinski written paper amount in year2012: 14. Mary Czerwinski written paper amount in year2012: 14. Mary Czerwinski written paper amount in year2013: 11. Mary Czerwinski written paper amount in year2013: 11. Mary Czerwinski written paper amount in year2021: 19. Mary Czerwinski written paper amount in year2021: 19. George G. Robertson et al.: Animated visualization of multiple intersecting hierarchies. (2002) authored by Mary Czerwinski. Desney S. Tan et al.: Exploring 3D navigation: combining speed-coupled flying with orbiting. (2001) authored by Mary Czerwinski. Mary Czerwinski is Creator. Ken Perlin et al.: Adjunct proceedings of the 23nd annual ACM symposium on User interface software and technology, UIST '10, New York, New York, USA, October 3-6, 2010 (2010) edited by Mary Czerwinski. Mary Czerwinski written paper amount in year2015: 11" In 2014, she also received the Distinguished Alumni award from Indiana University\'s Brain and Psychological Sciences department and will receive a Distinguished Alumni award from the College of Arts and Sciences from Indiana in February, 2018 Czerwinski was awarded the ACM SIGCHI Lifetime Service Award, was inducted into the CHI Academy, and became an ACM Distinguished Scientist in 2010. \nCzerwinski currently resides in Redmond, WA
output format: answer
|
348
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the average two years citedness of the writer of Sensor Validation Using Dynamic Belief Networks?
Context: Russell Bates et al.: Segmentation of Vasculature From Fluorescently Labeled Endothelial Cells in Multi-Photon Microscopy Images. (2019) authored by J. Michael Brady. Rehan Ali et al.: Phase-Based Segmentation of Cells from Brightfield Microscopy. (2007) authored by J. Michael Brady. Rehan Ali et al.: Advanced phase-based segmentation of multiple cells from brightfield microscopy images. (2008) authored by J. Michael Brady. Nora Vogt et al.: Segmenting Hepatocellular Carcinoma in Multi-phase CT. (2020) authored by J. Michael Brady. Rehan Ali et al.: Automatic segmentation of adherent biological cell boundaries and nuclei from brightfield microscopy images. (2012) authored by J. Michael Brady. Bartlomiej W. Papiez et al.: Image-Based Artefact Removal in Laser Scanning Microscopy. (2020) authored by J. Michael Brady. Zhi-Yan Xie and J. Michael Brady: 2D phase-independent local features for texture segmentation. (1995) authored by J. Michael Brady. J. Wenjun Chi et al.: Segmentation of the bladder wall using coupled level set methods. (2011) authored by J. Michael Brady. George P. Ralli et al.: Segmentation of the Biliary Tree from MRCP Images via the Monogenic Signal. (2020) authored by J. Michael Brady. Yang Can Gong et al.: Texture Based Mammogram Classification and Segmentation. (2006) authored by J. Michael Brady. Candy P. S. Ho et al.: The reconstruction of microcalcification clusters in digital breast tomosynthesis. (2010) authored by J. Michael Brady. Benjamin Irving et al.: Pieces-of-parts for supervoxel segmentation with global context: Application to DCE-MRI tumour delineation. (2016) authored by J. Michael Brady. Benjamin Irving et al.: Pieces-of-parts for supervoxel segmentation with global context: Application to DCE-MRI tumour delineation. (2016) authored by J. Michael Brady. Tünde Szilágyi and Michael Brady: Feature Extraction from Cancer Images Using Local Phase Congruency: A Reliable Source of Image Descriptors. (2009) authored by J. Michael Brady. Candy P. S. Ho et al.: A Clustering Method for the Extraction of Microcalcifications Using Epipolar Curves in Digital Breast Tomosynthesis. (2010) authored by J. Michael Brady. Xiaobo Pan et al.: Enhancement and feature extraction for images of incised and ink texts. (2004) authored by J. Michael Brady. Vaclav Potesil et al.: Learning New Parts for Landmark Localization in Whole-Body CT Scans. (2014) authored by J. Michael Brady. Yang Can Gong and Michael Brady: Texture Based Segmentation of Breast DCE-MRI. (2008) authored by J. Michael Brady. Zhi-Yan Xie and Michael Brady: Texture Segmentation Using Local Energy in Wavelet Scale Space. (1996) authored by J. Michael Brady. Ged Ridgway et al.: Voxel-Wise Analysis of Paediatric Liver MRI. (2018) authored by J. Michael Brady. Marius George Linguraru et al.: A biologically inspired algorithm for microcalcification cluster detection. (2006) authored by J. Michael Brady. Tünde Szilágyi et al.: Phase congruency map driven brain tumour segmentation. (2015) authored by J. Michael Brady. Po Wang et al.: Application of 3D Local Phase Theory in Vessel Segmentation. (2009) authored by J. Michael Brady. Matthew Kelly et al.: Relating Intra-Tumor Heterogeneity to Morphology and Its Implications for Assessing Response to Therapy. (2007) authored by J. Michael Brady. Yasuyo Kita et al.: Correspondence between Different View Breast X Rays Using Curved Epipolar Lines. (2001) authored by J. Michael Brady. Benjamin Irving et al.: Automated Colorectal Tumour Segmentation in DCE-MRI Using Supervoxel Neighbourhood Contrast Characteristics. (2014) authored by J. Michael Brady. Candy P. S. Ho et al.: Microcalcification Detection in Digital Breast Tomosynthesis Using an Epipolar Curve Approach. (2010) authored by J. Michael Brady. Vaclav Potesil et al.: Improved Anatomical Landmark Localization in Medical Images Using Dense Matching of Graphical Models. (2010) authored by J. Michael Brady. Marta Wojciechowska et al.: Automated Detection of Cystic Lesions in Quantitative T1 Liver Images. (2018) authored by J. Michael Brady. Yasuyo Kita et al.: A CAD System for 3D Locating of Lesions in Mammogram. (2001) authored by J. Michael Brady. Marius George Linguraru et al.: Foveal Algorithm for the Detection of Microcalcification Clusters: A FROC Analysis. (2004) authored by J. Michael Brady. Nora Vogt et al.: A Deep-Learning Lesion Segmentation Model that Addresses Class Imbalance and Expected Low Probability Tissue Abnormalities in Pre and Postoperative Liver MRI. (2022) authored by J. Michael Brady. Vaclav Potesil et al.: Personalized Graphical Models for Anatomical Landmark Localization in Whole-Body Medical Images. (2015) authored by J. Michael Brady. Alex Darrell et al.: Accounting for Point Source Propagation Properties in 3D Fluorescence OPT. (2006) authored by J. Michael Brady. James Owler et al.: Comparison of Multi-atlas Segmentation and U-Net Approaches for Automated 3D Liver Delineation in MRI. (2019) authored by J. Michael Brady. Yasuyo Kita et al.: A CAD system for the 3D location of lesions in mammograms. (2002) authored by J. Michael Brady. Guofang Xiao et al.: Segmentation of Ultrasound B-mode Images with Intensity Inhomogeneity Correction. (2002) authored by J. Michael Brady. Guofang Xiao et al.: Non-rigid registration in 3D free-hand ultrasound imaging of the breast. (2001) authored by J. Michael Brady" --"Royal Society Terms, conditions and policies". 0 International License. He has been a Fellow of Keble College, Oxford, since 1985 and was elected a foreign associate member of the French Academy of Sciences in 2015. Brady was awarded Honorary Doctorates at the University of Essex (1996), University of Manchester (1998) the University of Southampton(1999) the University of Liverpool (1999), the Paul Sabatier University (Toulouse) (2000), Oxford Brookes University (2006), the University of York,[citation needed] and Changsha and Chongqing. Irene Friedlander from the disease. Brady was knighted in the 2004 New Year Honours for services to engineering. '}. 0 license. He went on to study at the Australian National University, where he was awarded a Doctor of Philosophy degree in 1970 for research into group theory supervised by László György Kovács
output format: answer
|
12.166667
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Whose two-year mean citedness is higher, the author of 'Data Driven Evolutionary Optimization of Complex Systems: Big Data Versus Small Data' or the author who published 'Classification Of Locally 2-Connected Compact Metric Spaces'?
Context: Carsten Thomassen name Carsten Thomassen. Carsten Thomassen alternativeName Carsten Thomassen. Carsten Thomassen worksCount 275. Carsten Thomassen i10Index 152. Carsten Thomassen is Person. Carsten Thomassen 2YrMeanCitedness 0.3125. Carsten Thomassen alternativeName C. Thomassen. Carsten Thomassen modified 2023-10-18. Carsten Thomassen written paper amount in year2015: 5. Carsten Thomassen written paper amount in year2015: 5. John Gimbel et al.: Fractional Coloring Methods with Applications to Degenerate Graphs and Graphs on Surfaces. (2019) authored by Carsten Thomassen. Carsten Thomassen et al.: The 3-flow conjecture, factors modulo k, and the 1-2-3-conjecture. (2016) authored by Carsten Thomassen. Carsten Thomassen written paper amount in year2013: 5. Carsten Thomassen written paper amount in year2013: 5. Carsten Thomassen orcidId https://orcid.org/0000-0003-0670-4079. Carsten Thomassen written paper amount in year2022: 0. Carsten Thomassen written paper amount in year2022: 0. Carsten Thomassen primary affiliation Technical University of Denmark. Carsten Thomassen written paper amount in year2014: 4. Carsten Thomassen written paper amount in year2014: 4. Carsten Thomassen written paper amount in year2016: 9. Carsten Thomassen written paper amount in year2016: 9. J. Adrian Bondy et al.: Density Conditions For Triangles In Multipartite Graphs. (2006) authored by Carsten Thomassen'}. D
output format: answer
|
Carsten Thomassen
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What position does the member of the senate of the Alpen-Adria-Universität Klagenfurt hold according to the information provided in the text?
Context: Midhat Jdeed et al.: Smart grid modeling and simulation - Comparing GridLAB-D and RAPSim via two Case studies. (2018) authored by Wilfried Elmenreich. Ekanki Sharma and Wilfried Elmenreich: A review on physical and data-driven based nowcasting methods using sky images. (2021) authored by Wilfried Elmenreich. Melanie Schranz et al.: Modelling a CPS Swarm System: A Simple Case Study. (2018) authored by Wilfried Elmenreich. Martin Schlager et al.: A Framework for Hardware-in-the-Loop Testing of an Integrated Architecture. (2007) authored by Wilfried Elmenreich. Dominik Egarter and Wilfried Elmenreich: EvoNILM: evolutionary appliance detection for miscellaneous household appliances. (2013) authored by Wilfried Elmenreich. Christoph Klemenjak et al.: Investigating the performance gap between testing on real and denoised aggregates in non-intrusive load monitoring. (2021) authored by Wilfried Elmenreich. Anita Sobe et al.: Replication for bio-inspired delivery in unstructured peer-to-peer networks. (2011) authored by Wilfried Elmenreich. Christoph Klemenjak et al.: Investigating the Performance Gap between Testing on Real and Denoised Aggregates in Non-Intrusive Load Monitoring. (2020) authored by Wilfried Elmenreich. Dominik Egarter et al.: Appliance State Estimation based on Particle Filtering. (2013) authored by Wilfried Elmenreich. Aida Mehdipour Pirbazari et al.: An Ensemble Approach for Multi-Step Ahead Energy Forecasting of Household Communities. (2021) authored by Wilfried Elmenreich. Sascha Einspieler et al.: Integrating time-triggered and event-triggered traffic in a hard real-time system. (2018) authored by Wilfried Elmenreich. Hafsa Bousbiat et al.: Ageing Safely in the Digital Era: A New Unobtrusive Activity Monitoring Framework Leveraging on Daily Interactions with Hand-Operated Appliances. (2022) authored by Wilfried Elmenreich. Christoph Klemenjak and Wilfried Elmenreich: On the applicability of correlation filters for appliance detection in smart meter readings. (2017) authored by Wilfried Elmenreich. Dominik Egarter et al.: Integration of Legacy Appliances into Home Energy Management Systems. (2014) authored by Wilfried Elmenreich. Dominik Egarter et al.: Integration of legacy appliances into home energy management systems. (2016) authored by Wilfried Elmenreich. Thomas Losert et al.: Fault-Tolerant Compensation of the Propagation Delay for Hard Real-Time Systems. (2005) authored by Wilfried Elmenreich. Martina Umlauft and Wilfried Elmenreich: QoS-aware ant routing with colored pheromones in wireless mesh networks. (2008) authored by Wilfried Elmenreich\n\nOne result of the work on self-organizing systems yielded an open-source research tool named FREVO. From 1999 to 2007 he was the chief developer of the time-triggered fieldbus protocol TTP/A and the Smart Transducer Interface standard. '}. He maintains the research blogs "Self-Organizing Networked Systems", "The Smart Grid" and "Networking Embedded Systems"
output format: answer
|
Senior Member of IEEE
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where did the American electrical engineer who published Pitch and Thrust Allocation for Full-Flight-Regime Control of Winged eVTOL UAVs study?
Context: Bryce B. Ready et al.: A Kalman-filter based Method for Creation of Super-resolved Mosaicks. (2006) authored by Randal W. Beard. David W. Casbeer and Randy W. Beard: Distributed information filtering using consensus filters. (2009) authored by Randal W. Beard. Matthew E. Argyle et al.: A Multi-Team Extension of the Consensus-Based Bundle Algorithm. (2011) authored by Randal W. Beard. Alex D. Jordan et al.: Offline GNSS/Camera Extrinsic Calibration Using RTK and Fiducials. (2023) authored by Randal W. Beard. Derek B. Kingston et al.: Consensus algorithms are input-to-state stable. (2005) authored by Randal W. Beard. Mark E. Petersen and Randal W. Beard: The Integrated Probabilistic Data Association Filter Adapted to Lie Groups. (2021) authored by Randal W. Beard. Mark E. Petersen and Randal W. Beard: The Integrated Probabilistic Data Association Filter Adapted to Lie Groups. (2023) authored by Randal W. Beard. Peter C. Niedfeldt et al.: Vehicle state estimation within a road network using a Bayesian filter. (2011) authored by Randal W. Beard. Randal W. Beard et al.: Galerkin approximations of the generalized Hamilton-Jacobi-Bellman equation. (1997) authored by Randal W. Beard. Wei Ren et al.: A survey of consensus problems in multi-agent coordination. (2005) authored by Randal W. Beard. Randal W. Beard alternativeName Randal W. Beard. Jacob H. White et al.: Extending Motion Detection to Track Stopped Objects in Visual Multi-Target Tracking. (2018) authored by Randal W. Beard. Randal W. Beard alternativeName R. W. Beard. Randal W. Beard alternativeName Randal Beard. Randal W. Beard name Randal W. Beard. Randal W. Beard alternativeName R. Beard. Clark N. Taylor et al.: Dynamic input consensus using integrators. (2011) authored by Randal W. Beard. Derek B. Kingston and Randal W. Beard: Discrete-time average-consensus under switching network topologies. (2006) authored by Randal W. Beard. Randal W. Beard h-index 53. Wei Ren and Randal W. Beard: Consensus seeking in multiagent systems under dynamically changing interaction topologies. (2005) authored by Randal W. Beard'}. You can help Wikipedia by expanding it
output format: answer
|
Brigham Young University
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where did the author who published Leaving Some Stones Unturned: Dynamic Feature Prioritization for Activity Detection in Streaming Video obtain her Master's degree?
Context: Sukjin Han et al.: Shapes as Product Differentiation: Neural Network Embedding in the Analysis of Markets for Fonts. (2021) authored by Kristen Grauman. Kristen Grauman name Kristen Grauman. Kristen Grauman alternativeName Kristen Grauman. Kristen Grauman alternativeName Kristen Lorraine Grauman. Kristen Grauman alternativeName Kristen L Grauman. Kristen Grauman et al.: Virtual Visual Hulls: Example-Based 3D Shape Inference from Silhouettes. (2004) authored by Kristen Grauman. Anush K. Moorthy et al.: 3D Facial similarity: Automatic assessment versus perceptual judgments. (2010) authored by Kristen Grauman. Wei-Lin Hsiao and Kristen Grauman: Creating Capsule Wardrobes From Fashion Images. (2018) authored by Kristen Grauman. Wei-Lin Hsiao and Kristen Grauman: Creating Capsule Wardrobes from Fashion Images. (2017) authored by Kristen Grauman. Kristen Grauman alternativeName K. Grauman. Wei-Lin Hsiao et al.: Fashion++: Minimal Edits for Outfit Improvement. (2019) authored by Kristen Grauman. Wei-Lin Hsiao et al.: Fashion++: Minimal Edits for Outfit Improvement. (2019) authored by Kristen Grauman. Kristen Grauman et al.: Inferring 3D Structure with a Statistical Image-Based Shape Model. (2003) authored by Kristen Grauman. Hao Jiang and Kristen Grauman: Detangling People: Individuating Multiple Close People and Their Body Parts via Region Assembly. (2016) authored by Kristen Grauman. Andy Luong et al.: Reconstructing a fragmented face from a cryptographic identification protocol. (2013) authored by Kristen Grauman. Hao Jiang and Kristen Grauman: Detangling People: Individuating Multiple Close People and Their Body Parts via Region Assembly. (2017) authored by Kristen Grauman. Changan Chen et al.: Novel-View Acoustic Synthesis. (2023) authored by Kristen Grauman. Changan Chen et al.: Novel-View Acoustic Synthesis. (2023) authored by Kristen Grauman. Wei-Lin Hsiao and Kristen Grauman: Learning the Latent "Look": Unsupervised Discovery of a Style-Coherent Embedding from Fashion Images. (2017) authored by Kristen Grauman. Wei-Lin Hsiao and Kristen Grauman: Learning the Latent "Look": Unsupervised Discovery of a Style-Coherent Embedding from Fashion Images. (2017) authored by Kristen Grauman. Chun-Ju Yang et al.: Visual Question Answer Diversity. (2018) authored by Kristen Grauman. Jaechul Kim and Kristen Grauman: Asymmetric region-to-image matching for comparing images with generic object categories. (2010) authored by Kristen Grauman. Hui Wu et al.: Fashion IQ: A New Dataset Towards Retrieving Images by Natural Language Feedback. (2021) authored by Kristen Grauman. Sung Ju Hwang et al.: Semantic Kernel Forests from Multiple Taxonomies. (2012) authored by Kristen Grauman. Aron Yu and Kristen Grauman: Dense Supervision for Visual Comparisons via Synthetic Images. (2016) authored by Kristen Grauman. Danna Gurari et al.: Predicting Foreground Object Ambiguity and Efficiently Crowdsourcing the Segmentation(s). (2017) authored by Kristen Grauman. Danna Gurari et al.: Predicting Foreground Object Ambiguity and Efficiently Crowdsourcing the Segmentation(s). (2018) authored by Kristen Grauman. Aron Yu and Kristen Grauman: Semantic Jitter: Dense Supervision for Visual Comparisons via Synthetic Images. (2017) authored by Kristen Grauman. Zhenpei Yang et al.: Extreme Relative Pose Estimation for RGB-D Scans via Scene Completion. (2019) authored by Kristen Grauman. Zhenpei Yang et al.: Extreme Relative Pose Estimation for RGB-D Scans via Scene Completion. (2019) authored by Kristen Grauman. Yu-Chuan Su and Kristen Grauman: Kernel Transformer Networks for Compact Spherical Convolution. (2019) authored by Kristen Grauman. Yu-Chuan Su and Kristen Grauman: Kernel Transformer Networks for Compact Spherical Convolution. (2019) authored by Kristen Grauman. Devi Parikh and Kristen Grauman: Interactively building a discriminative vocabulary of nameable attributes. (2011) authored by Kristen Grauman. Dinesh Jayaraman et al.: Unsupervised learning through one-shot image-based shape reconstruction. (2017) authored by Kristen Grauman. Suyog Dutt Jain and Kristen Grauman: Click Carving: Interactive Object Segmentation in Images and Videos with Point Clicks. (2019) authored by Kristen Grauman. Yu-Chuan Su and Kristen Grauman: Kernel Transformer Networks for Compact Spherical Convolution. (2018) authored by Kristen Grauman. Jaechul Kim et al.: Deformable Spatial Pyramid Matching for Fast Dense Correspondences. (2013) authored by Kristen Grauman. Wei-Lin Hsiao and Kristen Grauman: Dressing for Diverse Body Shapes. (2019) authored by Kristen Grauman. Hanwen Jiang et al.: Few-View Object Reconstruction with Unknown Categories and Camera Poses. (2022) authored by Kristen Grauman. Kristen Grauman i10Index 188 She was promoted to Associate Professor with tenure in 2011. She was awarded an Office of Naval Research young investigator award in 2012. Sloan Foundation Fellow
output format: answer
|
Massachusetts Institute of Technology
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What award did Parkes receive prior to completing a Ph.D. in Computer and Information Science at the University of Pennsylvania in 2001?
Context: Nir Rosenfeld et al.: A Kernel of Truth: Determining Rumor Veracity on Twitter by Diffusion Pattern Alone. (2020) authored by David C. Parkes. Nir Rosenfeld et al.: A Kernel of Truth: Determining Rumor Veracity on Twitter by Diffusion Pattern Alone. (2020) authored by David C. Parkes. Loizos Michael et al.: Specifying and Monitoring Market Mechanisms Using Rights and Obligations. (2004) authored by David C. Parkes. Omer Nahum et al.: Decongestion by Representation: Learning to Improve Economic Welfare in Marketplaces. (2023) authored by David C. Parkes. Matheus V. X. Ferreira et al.: Dynamic Posted-Price Mechanisms for the Blockchain Transaction Fee Market (Invited Talk). (2021) authored by David C. Parkes. Matheus V. X. Ferreira et al.: Dynamic posted-price mechanisms for the blockchain transaction-fee market. (2021) authored by David C. Parkes. Matheus V. X. Ferreira et al.: Dynamic Posted-Price Mechanisms for the Blockchain Transaction-Fee Market. (2021) authored by David C. Parkes. Valentin Robu et al.: An Online Mechanism for Multi-Unit Demand and its Application to Plug-in Hybrid Electric Vehicle Charging. (2013) authored by David C. Parkes. Ian A. Kash et al.: Enabling Spectrum Sharing in Secondary Market Auctions. (2014) authored by David C. Parkes. Anshul Kothari et al.: Approximately-strategyproof and tractable multiunit auctions. (2005) authored by David C. Parkes. Anshul Kothari et al.: Approximately-strategyproof and tractable multi-unit auctions. (2003) authored by David C. Parkes. Paul Dütting et al.: Expressiveness and robustness of first-price position auctions. (2014) authored by David C. Parkes. Lin Padgham et al.: 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), Estoril, Portugal, May 12-16, 2008, Volume 1 (2008) edited by David C. Parkes. Lin Padgham et al.: 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), Estoril, Portugal, May 12-16, 2008, Volume 2 (2008) edited by David C. Parkes. Lin Padgham et al.: 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), Estoril, Portugal, May 12-16, 2008, Volume 3 (2008) edited by David C. Parkes. Paul Dütting et al.: Expressiveness and Robustness of First-Price Position Auctions. (2013) authored by David C. Parkes. Tonghan Wang et al.: Deep Contract Design via Discontinuous Piecewise Affine Neural Networks. (2023) authored by David C. Parkes. Paul Dütting et al.: Expressiveness and Robustness of First-Price Position Auctions. (2019) authored by David C. Parkes. Jens Witkowski and David C. Parkes: A Robust Bayesian Truth Serum for Small Populations. (2012) authored by David C. Parkes. Mohammad Taghi Hajiaghayi et al.: Adaptive limited-supply online auctions. (2004) authored by David C. Parkes. Zhou Fan et al.: Strategic Liquidity Provision in Uniswap V3. (2023) authored by David C. Parkes. Zhou Fan et al.: Differential Liquidity Provision in Uniswap v3 and Implications for Contract Design. (2022) authored by David C. Parkes. Sai Srivatsa Ravindranath et al.: Data Market Design through Deep Learning. (2023) authored by David C. Parkes. Sai Srivatsa Ravindranath et al.: Data Market Design through Deep Learning. (2023) authored by David C. Parkes. Mohammad Taghi Hajiaghayi et al.: Online auctions with re-usable goods. (2005) authored by David C. Parkes. Rediet Abebe et al.: Opinion Dynamics with Varying Susceptibility to Persuasion via Non-Convex Local Search. (2020) authored by David C. Parkes. Matthias Gerstgrasser et al.: CrowdPlay: Crowdsourcing Human Demonstrations for Offline Learning. (2022) authored by David C. Parkes. Zhou Fan et al.: Differential Liquidity Provision in Uniswap v3 and Implications for Contract Design✱. (2022) authored by David C. Parkes. Michael Neuder et al.: Strategic Liquidity Provision in Uniswap v3. (2021) authored by David C. Parkes. Florin Constantin and David C. Parkes: Self-correcting sampling-based dynamic multi-unit auctions. (2009) authored by David C. Parkes. Paul Dütting et al.: Optimal Auctions through Deep Learning. (2017) authored by David C. Parkes. Mark Klein et al.: Handling interdependent values in an auction mechanism for bandwidth allocation in tactical data networks. (2008) authored by David C. Parkes. Valentin Robu et al.: An Online Mechanism for Multi-speed Electric Vehicle Charging. (2011) authored by David C. Parkes. Arpit Agarwal et al.: Peer Prediction with Heterogeneous Users. (2017) authored by David C. Parkes. Hongyao Ma et al.: Social Choice with Non Quasi-linear Utilities. (2018) authored by David C. Parkes. Hongyao Ma et al.: Social Choice with Non Quasi-linear Utilities. (2018) authored by David C. Parkes. Paul Dütting et al.: Optimal auctions through deep learning. (2021) authored by David C. Parkes. Paul Duetting et al.: Optimal Auctions through Deep Learning. (2019) authored by David C. Parkes. Debmalya Mandal et al.: Peer Prediction with Heterogeneous Tasks. (2016) authored by David C. Parkes"}. (Boston, MA). He has worked on decentralized mechanism design as well as mechanism design in dynamic environments, where resources, participants, and information local to participants vary over time to embrace the real-world uncertainty. Eng. He is the George F. J. For Lent and Easter terms 2012 he was a distinguished visiting scholar at Christ's College, Cambridge. He was later appointed the George F
output format: answer
|
the Thouron Award
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the title of the article that introduced timed automata?
Context: Anton Xue et al.: Chordal Sparsity for Lipschitz Constant Estimation of Deep Neural Networks. (2022) authored by Rajeev Alur. Anton Xue et al.: Chordal Sparsity for Lipschitz Constant Estimation of Deep Neural Networks. (2022) authored by Rajeev Alur. Anton Xue et al.: Parametric Chordal Sparsity for SDP-based Neural Network Verification. (2022) authored by Rajeev Alur. Aditya Kanade et al.: Representation dependence testing using program inversion. (2010) authored by Rajeev Alur. Rajeev Alur alternativeName Rohan Alur. Zijiang Yang and Rajeev Alur: Variable Reuse for Efficient Image Computation. (2004) authored by Rajeev Alur. Rajeev Alur member of Philadelphia University. Kishor Jothimurugan et al.: Robust Subtask Learning for Compositional Generalization. (2023) authored by Rajeev Alur. Kishor Jothimurugan et al.: Robust Subtask Learning for Compositional Generalization. (2023) authored by Rajeev Alur. Aaditya Naik et al.: Relational Query Synthesis ⋈ Decision Tree Learning. (2023) authored by Rajeev Alur. Rajeev Alur primary affiliation University of Pennsylvania, Philadelphia, PA, USA. Rajeev Alur et al.: GPUDrano: Detecting Uncoalesced Accesses in GPU Programs. (2017) authored by Rajeev Alur. Rajeev Alur i10Index 230. Rajeev Alur affiliation University of Pennsylvania, Philadelphia, PA, USA. Rajeev Alur alternativeName R ALUR. Rajeev Alur is Person. Anton Xue et al.: Stability Guarantees for Feature Attributions with Multiplicative Smoothing. (2023) authored by Rajeev Alur. Anton Xue et al.: Stability Guarantees for Feature Attributions with Multiplicative Smoothing. (2023) authored by Rajeev Alur. Rajeev Alur alternativeName R. Alur. Rajeev Alur alternativeName Alur Rajeev. Rajeev Alur alternativeName Rajeev Alur. Rajeev Alur name Rajeev Alur. Rajeev Alur et al.: Visual Programming for Modeling and Simulation of Biomolecular Regulatory Networks. (2002) authored by Rajeev Alur. Rajeev Alur et al.: Hybrid Modeling and Simulation of Biomolecular Networks. (2001) authored by Rajeev Alur. Rajeev Alur et al.: Static detection of uncoalesced accesses in GPU programs. (2022) authored by Rajeev Alur. Rajeev Alur et al.: Modeling and analyzing biomolecular networks. (2002) authored by Rajeev Alur. Rajeev Alur and Mukund Raghothaman: Decision Problems for Additive Regular Functions. (2013) authored by Rajeev Alur. Rajeev Alur worksCount 448. Sela Mador-Haim et al.: Generating Litmus Tests for Contrasting Memory Consistency Models. (2010) authored by Rajeev Alur. Rajeev Alur 2YrMeanCitedness 1.0689655542373657227. Konstantinos Kallas et al.: Executing Microservice Applications on Serverless, Correctly. (2023) authored by Rajeev Alur. Aalok Thakkar et al.: Example-guided synthesis of relational queries. (2021) authored by Rajeev Alur. Zhihao Jiang et al.: Modeling and Verification of a Dual Chamber Implantable Pacemaker. (2012) authored by Rajeev Alur. Rajeev Alur and Mukund Raghothaman: Decision Problems for Additive Regular Functions (2013) authored by Rajeev Alur. Rajeev Alur et al.: Block-Size Independence for GPU Programs. (2018) authored by Rajeev Alur. Rajeev Alur et al.: Symbolic Compositional Verification by Learning Assumptions. (2005) authored by Rajeev Alur. Rajeev Alur citedByCount 29157. Rajeev Alur and Nimit Singhania: Precise piecewise affine models from input-output data. (2014) authored by Rajeev Alur. Rajeev Alur et al.: Space-efficient Query Evaluation over Probabilistic Event Streams. (2020) authored by Rajeev Alur He holds the title of Zisman Family Professor at UPenn since 2003. Alur was born in Pune
output format: answer
|
timed automata
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many publication citations does the institute of the researcher who publishes the 'Autonomous Manufacturing: Automating the Job-Shop' paper have?
Context: Mark S. Fox alternativeName Mark S. Fox. Mark S. Fox alternativeName Mark. Fox. Liming Bai et al.: SHINESeniors: Personalized services for active ageing-in-place. (2015) authored by Mark S. Fox. Mark S. Fox name Mark S. Fox. Mark S. Fox alternativeName M. S. Fox. Mark S. Fox alternativeName M. Fox. Mark S. Fox alternativeName Mark Stephen Fox. Mark S. Fox and Raj Reddy: Knowledge Guided Learning of Structural Descriptions. (1977) authored by Mark S. Fox. Mark S. Fox and Jack Mostow: Maximal Consistent Interpretations of Errorful Data in Hierarchically Modeled Domains. (1977) authored by Mark S. Fox. Jingwei Huang and Mark S. Fox: An ontology of trust: formal semantics and transitivity. (2006) authored by Mark S. Fox. Bart Gajderowicz et al.: Compass Event, Client, and Service Ontology: A Design Pattern for Social Services. (2022) authored by Mark S. Fox. Yetian Wang and Mark S. Fox: Households, The Homeless and Slums Towards a Standard for Representing City Shelter Open Data. (2017) authored by Mark S. Fox. Henry M. Kim et al.: A Measurement Ontology Generalizable for Emerging Domain Applications on the Semantic Web. (2009) authored by Mark S. Fox. Henry M. Kim et al.: A Measurement Ontology Generalizable for Emerging Domain Applications on the Semantic Web. (2007) authored by Mark S. Fox. Daniela Rosu et al.: Compass Needs Ontology: A Design Pattern for Representing Needs in Social Work. (2022) authored by Mark S. Fox. Mark S. Fox is Person. Zhongxiu Wang and Mark S. Fox: Expenditure, revenue and taxes - Towards a standard for representing city finance open data. (2016) authored by Mark S. Fox'}. Spatial normalization was essential to group averaging of brain images, which allowed increased signal-to-noise across multiple subjects and group-wise statistical analyses to be performed on individual coordinates. Lancaster. Louis
output format: answer
|
13992487
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the title of Andrea Moro's first novel?
Context: Paolo Lorusso et al.: Asymmetries in Extraction From Nominal Copular Sentences: a Challenging Case Study for NLP Tools. (2019) authored by Andrea Moro 0003. Marco Tettamanti et al.: Neural Correlates for the Acquisition of Natural Language Syntax. (2002) authored by Andrea Moro 0003. Marco Tettamanti et al.: Negation in the brain: Modulating action representations. (2008) authored by Andrea Moro 0003. Matteo Greco et al.: False perspectives on human language: why statistics needs linguistics. (2023) authored by Andrea Moro 0003. Andrea Moro: Impossible Languages and the Architecture of Human Grammars. (2019) authored by Andrea Moro 0003 dynamic antisymmetry) according to which movement is the effect of a symmetry-breaking process in the computational system that underlies syntax. For a non-technical synthesis of these discoveries and a critical discussion see "Impossible Languages" which received the honourable mention at the PROSE Awards. D. The core idea is that humans ignore the only indisputable fact concerning language, namely its linear structure, and compute grammar on the sole basis of hierarchical structures recursively generated. He highlights that this linguistic racism was at the origin of the myth of Aryan race and the devastating results it had on civilisation. '}. noun phrases while crucially factoring sound out. at the University of Padua; he has been visiting a scientist several times at MIT, first with a Fulbright grant, then at Harvard
output format: answer
|
Il segreto di Pietramala
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: When comparing the citedByCount of authors who published 'Background to and perspectives on possibilistic graphical models' and 'Attractors for fractional differential problems of transition to turbulent flows', whose count is greater?
Context: Juan J. Nieto name Juan J. Nieto. Juan J. Nieto alternativeName J Juan Nieto. Juan J. Nieto alternativeName Juan J. Nieto. Juan J. Nieto alternativeName Juan José Nieto. Juan J. Nieto alternativeName Juan Jose Nieto. Juan J. Nieto alternativeName J.J Nieto. Juan J. Nieto alternativeName J. J. Nieto. Juan J. Nieto alternativeName Juan NİETO. Juan J. Nieto alternativeName Juan Nieto. Juan J. Nieto alternativeName J. Nieto. Juan J. Nieto i10Index 257. Juan J. Nieto affiliation King Abdulaziz University, Jeddah, Saudi Arabia. Helena Andrade et al.: The number of reduced alignments between two DNA sequences. (2014) authored by Juan J. Nieto. Sajede Harraz et al.: Protected Quantum Teleportation Through Noisy Channel by Weak Measurement and Environment-Assisted Measurement. (2022) authored by Juan J. Nieto. Juan J. Nieto modified 2023-10-18"}. In 2016, Nieto was admitted as a Fellow of the Royal Galician Academy of Sciences
output format: answer
|
Juan J. Nieto
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the hIndex of the scholar affiliated with Google Inc., New York, NY, USA and published Scalable Protocols for Authenticated Group Key Exchange in 2003?
Context: Yan Huang et al.: Amortizing Garbled Circuits. (2014) authored by Jonathan Katz. Yan Huang et al.: Amortizing Garbled Circuits. (2015) authored by Jonathan Katz. Yevgeniy Dodis et al.: Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited. (2017) authored by Jonathan Katz. Yupeng Zhang et al.: vRAM: Faster Verifiable RAM with Program-Independent Preprocessing. (2018) authored by Jonathan Katz. Chun Guo et al.: Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting). (2019) authored by Jonathan Katz. Chun Guo et al.: Better Concrete Security for Half-Gates Garbling (in the Multi-instance Setting). (2020) authored by Jonathan Katz. Kasra Abbaszadeh et al.: Zero-Knowledge Proofs of Training for Deep Neural Networks. (2024) authored by Jonathan Katz. Andreea B. Alexandru et al.: Private Anomaly Detection in Linear Controllers: Garbled Circuits vs. Homomorphic Encryption. (2022) authored by Jonathan Katz. Daniel Apon et al.: Efficient, Reusable Fuzzy Extractors from LWE. (2017) authored by Jonathan Katz. Daniel Apon et al.: Efficient, Reusable Fuzzy Extractors from LWE. (2017) authored by Jonathan Katz. Mariya Georgieva Belorgey et al.: Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic. (2023) authored by Jonathan Katz. Jonathan Katz and Luca Trevisan: On the efficiency of local decoding procedures for error-correcting codes. (2000) authored by Jonathan Katz. Chang Liu et al.: Automating Efficient RAM-Model Secure Computation. (2014) authored by Jonathan Katz. Kartik Nayak and Jonathan Katz: An Oblivious Parallel RAM with O(log2 N) Parallel Runtime Blowup. (2016) authored by Jonathan Katz. Matthew D. Green et al.: A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation. (2016) authored by Jonathan Katz. Matthew D. Green et al.: A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation. (2014) authored by Jonathan Katz. Dan Boneh et al.: Signing a Linear Subspace: Signature Schemes for Network Coding. (2008) authored by Jonathan Katz. Dan Boneh et al.: Signing a Linear Subspace: Signature Schemes for Network Coding. (2009) authored by Jonathan Katz. Nicholas Franzese et al.: Constant-Overhead Zero-Knowledge for RAM Programs. (2021) authored by Jonathan Katz. Nicholas Franzese et al.: Constant-Overhead Zero-Knowledge for RAM Programs. (2021) authored by Jonathan Katz. Kevin Lewi et al.: 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs. (2016) authored by Jonathan Katz. Kevin Lewi et al.: 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs. (2016) authored by Jonathan Katz. Chenkai Weng et al.: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits. (2020) authored by Jonathan Katz. Lei Fan et al.: A Permissionless Proof-of-Stake Blockchain with Best-Possible Unpredictability. (2021) authored by Jonathan Katz. Chenkai Weng et al.: Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits. (2021) authored by Jonathan Katz. Dana Dachman-Soled et al.: 10-Round Feistel is Indifferentiable from an Ideal Cipher. (2015) authored by Jonathan Katz. Radhika Garg et al.: Scalable Mixed-Mode MPC. (2023) authored by Jonathan Katz. Jonathan Katz and Benjamin Sela: A Quantum "Lifting Theorem" for Constructions of Pseudorandom Generators from Random Oracles. (2024) authored by Jonathan Katz. Dana Dachman-Soled et al.: 10-Round Feistel is Indifferentiable from an Ideal Cipher. (2016) authored by Jonathan Katz. Benoît Cogliati et al.: Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks. (2018) authored by Jonathan Katz. Chenkai Weng et al.: Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning. (2021) authored by Jonathan Katz. Chenkai Weng et al.: Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning. (2021) authored by Jonathan Katz. Yupeng Zhang et al.: An Expressive (Zero-Knowledge) Set Accumulator. (2017) authored by Jonathan Katz. Chun Guo et al.: Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers. (2020) authored by Jonathan Katz. Yupeng Zhang et al.: vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases. (2017) authored by Jonathan Katz. Yupeng Zhang et al.: vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases. (2017) authored by Jonathan Katz. Chun Guo et al.: Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers. (2019) authored by Jonathan Katz. Andreea B. Alexandru et al.: State Machine Replication under Changing Network Conditions. (2022) authored by Jonathan Katz. Andreea B. Alexandru et al.: State Machine Replication Under Changing Network Conditions. (2022) authored by Jonathan Katz. Jonathan Katz et al.: Hash Functions from Defective Ideal Ciphers. (2015) authored by Jonathan Katz. Michel Abdalla et al.: Algebraic Adversaries in the Universal Composability Framework. (2021) authored by Jonathan Katz. Michel Abdalla et al.: Algebraic Adversaries in the Universal Composability Framework. (2021) authored by Jonathan Katz. Chiu-Yuen Koo et al.: Reliable broadcast in radio networks: the bounded collision case. (2006) authored by Jonathan Katz"'}. In 2023, he took a leave of absence from the University of Maryland to serve as Chief Scientist at Dfns. Phil. While in graduate school, he worked as a research scientist at Telcordia Technologies (now ACS). J
output format: answer
|
72
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In which year did González receive the award for the Best MOOC in the Accésit category at the MIRIADAX Platform Awards?
Context: Lorenzo Moreno Ruiz et al.: Exploiting the advantages of symbolically interpretable continuous biomedical parameters with a fuzzyfied symbolic model. (2001) authored by Carina Soledad González-González. Eduardo Nacimiento-García et al.: Alexa, Do What I Want To. Implementing a Voice Spoofing Attack Tool for Virtual Voice Assistants. (2022) authored by Carina Soledad González-González. Silvia Alayón et al.: A laboratory experiment for teaching automation inspired by the smart home. (2013) authored by Carina Soledad González-González. Eduardo Nacimiento-García et al.: Pervasive gaming experiences to promote active aging using the virtual voice assistant Alexa. (2021) authored by Carina Soledad González-González. Juan Pablo Hourcade et al.: Developing Participatory Methods to Consider the Ethics of Emerging Technologies for Children. (2023) authored by Carina Soledad González-González. Eduardo Nacimiento-García et al.: Automatic captions on video calls, a must for the elderly: Using Mozilla DeepSpeech for the STT. (2021) authored by Carina Soledad González-González. Alicia García-Holgado et al.: European Proposals to Work in the Gender Gap in STEM: A Systematic Analysis. (2020) authored by Carina Soledad González-González. Lorenzo Moreno Ruiz et al.: Integrating Multimedia Technology, Knowledge Based System and Speech Processing for the Diagnostic and Treatment of Developmental Dyslexia. (2002) authored by Carina Soledad González-González. Eduardo Nacimiento-García et al.: Automatic captions on video calls: a must for the older adults. (2024) authored by Carina Soledad González-González. Pablo Vicente Torres-Carrión et al.: Enhancing phonological awareness in children with dyslexia: application based on a computer learning game environment. (2016) authored by Carina Soledad González-González. Lorena Colombo-Ruano et al.: Technological acceptance of voice assistants in older adults: an online co-creation experience. (2021) authored by Carina Soledad González-González. Lorenzo Moreno Ruiz et al.: Using KADS methodology in a simulation assisted knowledge based system: application to hospital management. (2001) authored by Carina Soledad González-González. Carina S. González et al.: Applying an Enterprise Resource Planning (ERP) methodology in the engineering studies. (2012) authored by Carina Soledad González-González. Rosa M. Gil Iranzo et al.: Learning Quantum Computing: An Interaction Protocol for Quantum Computing Interfaces. (2021) authored by Carina Soledad González-González. José F. Sigut et al.: A New Set of Features for Robust Change Detection. (2008) authored by Carina Soledad González-González. Daniel Alberto Giulianelli et al.: Modeling Parallel Applications on Mobile Devices. (2011) authored by Carina Soledad González-González. Carina S. González-González et al.: Strategies to introduce gender perspective in Engineering studies: a proposal based on self-diagnosis. (2020) authored by Carina Soledad González-González. Patricia Paderewski-Rodríguez et al.: Initiatives and Strategies to Encourage Women Into Engineering. (2017) authored by Carina Soledad González-González. Rosa M. Gil Iranzo et al.: Empathy and virtual agents for learning applications in symbiotic systems. (2018) authored by Carina Soledad González-González. Lorenzo Moreno Ruiz et al.: MNEME: A memory hierarchy simulator for an engineering computer architecture course. (2011) authored by Carina Soledad González-González. Sandra P. Cano et al.: Affective Communication for Socially Assistive Robots (SARs) for Children with Autism Spectrum Disorder: A Systematic Review. (2021) authored by Carina Soledad González-González'}. Using Mozilla DeepSpeech for the STT, in collaboration with Eduardo Nacimiento-García and Francisco Luis Gutiérrez Vela. \nShe also research in the field of the application of the artificial intelligence and accessible interfaces in the education
output format: answer
|
2019
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where did the author who published 'A New Method to Identify Multiple Sources of Oscillatory Activity from Magnetoencephalographic Data' receive his Master's degree from?
Context: Ole Jensen i10Index 179. Ole Jensen alternativeName Ole Riis Jensen. Ole Jensen name Ole Jensen. Marcel van Gerven et al.: Interpreting single trial data using groupwise regularisation. (2009) authored by Ole Jensen. Ole Jensen is Person. Ingrid L. C. Nieuwenhuis et al.: Visual areas become less engaged in associative recall following memory stabilization. (2008) authored by Ole Jensen. Ole Jensen alternativeName Jensen Ole. Ole Jensen is Creator. Ole Jensen modified 2023-10-18. Ole Jensen alternativeName Ole Jensen"}. \nJensen received a Master of Science degree in electrical engineering from The Technical University of Denmark in 1993
output format: answer
|
The Technical University of Denmark
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In which country was the author of Sampled-Data Control of 2D Kuramoto-Sivashinsky equation born?
Context: Emilia Fridman alternativeName Edward Fridman. Emilia Fridman alternativeName Eddie Fridman. Emilia Fridman alternativeName Emilia Fridman. Emilia Fridman alternativeName Fridman Emilia. Alexey S. Matveev et al.: Comprehending Complexity: Data-Rate Constraints in Large-Scale Networks. (2019) authored by Emilia Fridman. Emilia Fridman alternativeName Fridman. Emilia Fridman alternativeName Emilia M. Fridman. Emilia Fridman alternativeName E. Fridman. Emilia Fridman alternativeName E. M. Fridman. Xuefei Yang and Emilia Fridman: A Robust Time-Delay Approach to Continuous-Time Extremum Seeking for Multi-Variable Static Map. (2023) authored by Emilia Fridman. Emilia Fridman name Emilia Fridman. Emilia Fridman affiliation Tel Aviv University, Department of Electrical Engineering and Systems, Israel. Kun Liu et al.: Stability and L2-gain analysis of Networked Control Systems under Round-Robin scheduling: A time-delay approach. (2012) authored by Emilia Fridman. Kun Liu et al.: Generalized Jensen Inequalities with Application to Stability Analysis of Systems with Distributed Delays over Infinite Time-Horizons. (2016) authored by Emilia Fridman. Kun Liu et al.: Generalized Jensen inequalities with application to stability analysis of systems with distributed delays over infinite time-horizons. (2016) authored by Emilia Fridman. Valery A. Ugrinovskii and Emilia Fridman: A Round-Robin Protocol for Distributed Estimation with H∞ Consensus. (2014) authored by Emilia Fridman. Valery A. Ugrinovskii and Emilia Fridman: A Round-Robin protocol for distributed estimation with H∞ consensus. (2013) authored by Emilia Fridman. Valery A. Ugrinovskii and Emilia Fridman: A Round-Robin Type Protocol for Distributed Estimation with H∞ Consensus. (2014) authored by Emilia Fridman. Valery A. Ugrinovskii and Emilia Fridman: A Round-Robin type protocol for distributed estimation with H∞ consensus. (2014) authored by Emilia Fridman. Xuefei Yang et al.: Bounded Extremum Seeking for Single-Variable Static Map with Large Measurement Delay via Time-Delay Approach to Averaging. (2023) authored by Emilia Fridman. Emilia Fridman is Person. Robert Griñó et al.: A behavioural dynamic model for constant power loads in single-phase AC systems. (2021) authored by Emilia Fridman. Emilia Fridman primary affiliation Tel Aviv University, Department of Electrical Engineering and Systems, Israel. Johannes Schiffer et al.: Stability of a class of delayed port-Hamiltonian systems with application to microgrids with distributed rotational and electronic generation. (2016) authored by Emilia Fridman. Artem N. Nekhoroshikh et al.: Practical fixed-time ISS of neutral time-delay systems with application to stabilization by using delays. (2022) authored by Emilia Fridman. Laurentiu Hetel et al.: Variable Structure Control With Generalized Relays: A Simple Convex Optimization Approach. (2015) authored by Emilia Fridman. Emilia Fridman i10Index 185. Emilia Fridman member of Tel Aviv University. Kun Liu et al.: Network-Based Control under Round-Robin Scheduling and Quantization. (2012) authored by Emilia Fridman. Emilia Fridman and Uri Shaked: On reachable sets for linear systems with delay and bounded peak inputs. (2003) authored by Emilia Fridman. Anton Selivanov et al.: Passification-based decentralized adaptive synchronization of dynamical networks with time-varying delays. (2015) authored by Emilia Fridman. Jin Zhang and Emilia Fridman: Dynamic Event-Triggered Control of Networked Stochastic Systems With Scheduling Protocols. (2021) authored by Emilia Fridman. Kun Liu and Emilia Fridman: Discrete-time network-based control under Try-Once-Discard protocol and actuator constraints. (2014) authored by Emilia Fridman. Emilia Fridman h-index 67. Kun Liu et al.: Networked Control Systems in the Presence of Scheduling Protocols and Communication Delays. (2015) authored by Emilia FridmanA. \nProf. and M. She was promoted to Full Professor in 2012. Her Ph. They have a son, and live in Tel Aviv. Springer International Publishing, 2020. '}. Birkhauser
output format: answer
|
USSR
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Who has more works, the author of 'Discrete-time control design with positive semi-definite Lyapunov functions' or the author of 'Comment'?
Context: Jeanette J. Varela et al.: Predicting historical indoor temperatures from available local weather data. (2019) authored by Christine M. Anderson-Cook. Dae-Heung Jang and Christine M. Anderson-Cook: Firework Plot as a Graphical Exploratory Data Analysis Tool for Evaluating the Impact of Outliers in Data Exploration and Regression. (2014) authored by Christine M. Anderson-Cook. Christine M. Anderson‐Cook 2YrMeanCitedness 0.85714286565780639648. Youngil Kim et al.: Graphical methods for evaluating covering arrays. (2016) authored by Christine M. Anderson-Cook. Nathaniel T. Stevens et al.: Bayesian probability of predictive agreement for comparing the outcome of two separate regressions. (2018) authored by Christine M. Anderson-Cook. Lu Lu et al.: A Case Study on Selecting a Best Allocation of New Data for Improving the Estimation Precision of System and Subsystem Reliability Using Pareto Fronts. (2013) authored by Christine M. Anderson-Cook. Youngil Kim et al.: Selecting the Best Wild Card Entries in a Covering Array. (2017) authored by Christine M. Anderson-Cook. Timothy J. Robinson et al.: Bayesian Analysis of Split-Plot Experiments With Nonnormal Responses for Evaluating Nonstandard Performance Criteria. (2009) authored by Christine M. Anderson-Cook. Christine M. Anderson-Cook et al.: How to Host An Effective Data Competition: Statistical Advice for Competition Design and Analysis. (2019) authored by Christine M. Anderson-Cook. Christine M. Anderson-Cook et al.: Graphical Tools for Assessing the Sensitivity of Response Surface Designs to Model Misspecification. (2009) authored by Christine M. Anderson-Cook She became the first female recipient of the George Box Medal in 2021. '}. S. She moved to the University of Toronto for a master\'s degree in statistics in 1990, and returned to Waterloo for her Ph. F
output format: answer
|
Jessy W. Grizzle
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Which author has a higher hIndex, the author of 'Contract Theory for Wireless Networks' or the author of 'Third Eye: Context-Aware Detection for Hidden Terminal Emulation Attacks in Cognitive Radio-Enabled IoT Networks'?
Context: Jiang Xie 2YrMeanCitedness 3.7692308425903320312. Jiang Xie written paper amount in year2018: 8. Jiang Xie written paper amount in year2018: 8. Jiang Xie written paper amount in year2020: 8. Jiang Xie written paper amount in year2020: 8. Shanjun Cheng et al.: Dynamic multiagent load balancing using distributed constraint optimization techniques. (2014) authored by Jiang (Linda) Xie. Jiang Xie written paper amount in year2016: 6. Jiang Xie written paper amount in year2016: 6. Jiang Xie written paper amount in year2012: 8. Jiang Xie written paper amount in year2012: 8. Jiang Xie name Jiang Xie. Jiang Xie written paper amount in year2021: 5. Jiang Xie written paper amount in year2021: 5. Siqi Huang and Jiang (Linda) Xie: Pearl: A Fast Deep Learning Driven Compression Framework for UHD Video Delivery. (2021) authored by Jiang (Linda) Xie. Jiang Xie written paper amount in year2017: 8. Jiang Xie written paper amount in year2017: 8. Jiang Xie written paper amount in year2019: 7. Jiang Xie written paper amount in year2019: 7. Jiang Xie alternativeName Jiang Xie in 2004. Akyildiz
output format: answer
|
Zhu Han
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What type of monitoring data was used in the statistical model developed by the author to predict premature baby outcomes?
Context: Xing Han et al.: FuseMoE: Mixture-of-Experts Transformers for Fleximodal Fusion. (2024) authored by Suchi Saria. Andy Jinhua Ma et al.: Deformable Distributed Multiple Detector Fusion for Multi-Person Tracking. (2015) authored by Suchi Saria. Adarsh Subbaswamy et al.: The Hierarchy of Stable Distributions and Operators to Trade Off Stability and Performance. (2019) authored by Suchi Saria. Suchi Saria is Creator. Suchi Saria is Person. Suchi Saria i10Index 56. Suchi Saria alternativeName Suchi Saria. Suchi Saria name Suchi Saria. Suchi Saria link https://twitter.com/suchisaria. Suchi Saria modified 2023-10-18. Lauren M. Sanders et al.: Biological research and self-driving labs in deep space supported by artificial intelligence. (2023) authored by Suchi Saria She earned her bachelor's degree at Mount Holyoke College. In 2004 she joined Stanford University as a Rambus Corporation Fellow. She collaborated with David N. \nHer awards and honors include:"}. The talk has been viewed over 100,170 times. She was awarded a full scholarship from Microsoft
output format: answer
|
data from monitors, birth weight, and length of time spent in the womb
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: When did Mary Shaw receive the National Medal of Technology and Innovation from U.S. President Barack Obama?
Context: Robin Abraham et al.: Proceedings of the 4th international workshop on End-user software engineering, WEUSE '08, Leipzig, Germany, May 12, 2008 (2008) edited by Mary Shaw. Orna Raz et al.: Semantic anomaly detection in online data sources. (2002) authored by Mary Shaw. Christopher Scaffidi et al.: Tool support for data validation by end-user programmers. (2008) authored by Mary Shaw. Christopher Scaffidi et al.: Characterizing reusability of end-user web macro scripts. (2008) authored by Mary Shaw. Robert DeLine et al.: Lessons on Converting Batch Systems to Support Interaction (Experience Report). (1997) authored by Mary Shaw. Christopher Scaffidi et al.: Fast, Accurate Creation of Data Validation Formats by End-User Developers. (2009) authored by Mary Shaw. Christopher Scaffidi et al.: Predicting reuse of end-user web macro scripts. (2009) authored by Mary Shaw. Vahe Poladian et al.: Leveraging Resource Prediction for Anticipatory Dynamic Configuration. (2007) authored by Mary Shaw. Paul Luo Li et al.: Empirical evaluation of defect projection models for widely-deployed production software systems. (2004) authored by Mary Shaw. Christopher Scaffidi et al.: Using topes to validate and reformat data in end-user programming tools. (2008) authored by Mary Shaw. Christopher Scaffidi et al.: Using traits of web macro scripts to predict reuse. (2010) authored by Mary Shaw. Christopher Scaffidi et al.: Topes: reusable abstractions for validating data. (2008) authored by Mary Shaw. Mary Shaw et al.: Descartes: A programming-language approach to interactive display interfaces. (1983) authored by Mary Shaw. Paul Luo Li et al.: Finding Predictors of Field Defects for Open Source Software Systems in Commonly Available Data Sources: A Case Study of OpenBSD. (2005) authored by Mary Shaw. Paul Luo Li et al.: Forecasting Field Defect Rates Using a Combined Time-Based and Metrics-Based Approach: A Case Study of OpenBSD. (2005) authored by Mary Shaw. Rogério de Lemos et al.: Software Engineering for Self-Adaptive Systems II - International Seminar, Dagstuhl Castle, Germany, October 24-29, 2010 Revised Selected and Invited Papers (2013) edited by Mary Shaw. Christopher Scaffidi et al.: Toped: enabling end-user programmers to validate data. (2008) authored by Mary Shaw. Paul Luo Li et al.: Experiences and results from initiating field defect prediction and product test prioritization efforts at ABB Inc. (2006) authored by Mary Shaw to bring together the useful abstractions of systems design and the notations and tools of the software developer, and look at patterns used for system organization. Our selection emphasizes informal descriptions, touching lightly on formal notations and specifications and on tools to support them. " A component is simply described as "the elements that perform computation. Their work and that of their colleagues here at Carnegie Mellon has since led to engineering methods for architectural modeling, analysis and identification of architecture-level patterns, the use of which has now become standard in the engineering of larger scale software systems. C. S. S. to illustrate the discipling and examine the ways in which architectural design can impact software design
output format: answer
|
October 3, 2014
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Who has a government-type institute, Maxime Crochemore or Sepp Hochreiter?
Context: Willem Talloen et al.: I/NI-calls for the exclusion of non-informative genes: a highly effective filtering tool for microarray data. (2007) authored by Sepp Hochreiter. Johannes Mohr et al.: P-SVM Variable Selection for Discovering Dependencies Between Genetic and Brain Imaging Data. (2006) authored by Sepp Hochreiter. Johannes Lehner et al.: Contrastive Tuning: A Little Help to Make Masked Autoencoders Forget. (2023) authored by Sepp Hochreiter. Johannes Lehner et al.: Contrastive Tuning: A Little Help to Make Masked Autoencoders Forget. (2024) authored by Sepp Hochreiter. Johannes Palme et al.: KeBABS: an R package for kernel-based analysis of biological sequences. (2015) authored by Sepp Hochreiter. Lukas Gruber et al.: Overcoming Saturation in Density Ratio Estimation by Iterated Regularization. (2024) authored by Sepp Hochreiter. Ulrich Bodenhofer et al.: Modeling Position Specificity in Sequence Kernels by Fuzzy Equivalence Relations. (2009) authored by Sepp Hochreiter. Markus Hofmarcher et al.: Visual Scene Understanding for Autonomous Driving Using Semantic Segmentation. (2019) authored by Sepp Hochreiter. Fabian Paischer et al.: Semantic HELM: A Human-Readable Memory for Reinforcement Learning. (2023) authored by Sepp Hochreiter. Martin Heusel et al.: GANs Trained by a Two Time-Scale Update Rule Converge to a Nash Equilibrium. (2017) authored by Sepp Hochreiter. Jose A. Arjona-Medina et al.: RUDDER: Return Decomposition for Delayed Rewards. (2018) authored by Sepp Hochreiter. Elisabeth Rumetshofer et al.: Human-level Protein Localization with Convolutional Neural Networks. (2019) authored by Sepp Hochreiter. Christian Eichenberger et al.: Traffic4cast at NeurIPS 2021 - Temporal and Spatial Few-Shot Transfer Learning in Gridded Geo-Spatial Processes. (2022) authored by Sepp Hochreiter. Martin Gauch et al.: Few-Shot Learning by Dimensionality Reduction in Gradient Space. (2022) authored by Sepp Hochreiter. Martin Gauch et al.: Few-Shot Learning by Dimensionality Reduction in Gradient Space. (2022) authored by Sepp Hochreiter. Thomas Adler et al.: Quantum Optical Experiments Modeled by Long Short-Term Memory. (2019) authored by Sepp Hochreiter. Jose A. Arjona-Medina et al.: RUDDER: Return Decomposition for Delayed Rewards. (2019) authored by Sepp Hochreiter. Christian Eichenberger et al.: Traffic4cast at NeurIPS 2021 - Temporal and Spatial Few-Shot Transfer Learning in Gridded Geo-Spatial Processes. (2021) authored by Sepp Hochreiter. Martin Heusel et al.: GANs Trained by a Two Time-Scale Update Rule Converge to a Local Nash Equilibrium. (2017) authored by Sepp Hochreiter LSTM overcomes the problem of numerical instability in training recurrent neural networks (RNNs) that prevents them from learning from long sequences (vanishing or exploding gradient). '}. LSTM networks have also been used in Google Voice for transcription and search, and in the Google Allo chat app for generating response suggestion with low latency
output format: answer
|
Maxime Crochemore
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the number of publications for the affiliation of the writer of the 'A directed isoperimetric inequality with application to Bregman near neighbor lower bounds' paper?
Context: Suresh Venkatasubramanian alternativeName Suresh Venkatasubramanian. Suresh Venkatasubramanian alternativeName S. Venkatasubramanian. Suresh Venkatasubramanian name Suresh Venkatasubramanian. Suresh Venkatasubramanian alternativeName Sivasankari Venkatasubramanian. Suresh Venkatasubramanian is Person. Nabil H. Mustafa et al.: Hardware-assisted view-dependent map simplification. (2001) authored by Suresh Venkatasubramanian. Pegah Nokhiz et al.: Precarity: Modeling the Long Term Effects of Compounded Decisions on Individual Instability. (2021) authored by Suresh Venkatasubramanian. Pegah Nokhiz et al.: Precarity: Modeling the Long Term Effects of Compounded Decisions on Individual Instability. (2021) authored by Suresh Venkatasubramanian. Kathi Fisler et al.: Approaches for Weaving Responsible Computing into Data Structures and Algorithms Courses. (2022) authored by Suresh Venkatasubramanian. Mary W. Hall et al.: Rethinking Abstractions for Big Data: Why, Where, How, and What. (2013) authored by Suresh Venkatasubramanian. Suresh Venkatasubramanian i10Index 83. Jon M. Kleinberg et al.: Storage Management for Evolving Databases. (1997) authored by Suresh Venkatasubramanian. Jatin Chhugani et al.: vLOD: High-Fidelity Walkthrough of Large Virtual Environments. (2005) authored by Suresh Venkatasubramanian. Arvind Agarwal et al.: Sensor Network Localization for Moving Sensors. (2012) authored by Suresh Venkatasubramanian. Sorelle A. Friedler et al.: The (Im)possibility of fairness: different value systems require different mechanisms for fair decision making. (2021) authored by Suresh Venkatasubramanian. Nadya Bliss et al.: A Research Ecosystem for Secure Computing. (2021) authored by Suresh Venkatasubramanian. Babak Ahmadi et al.: Type-based categorization of relational attributes. (2009) authored by Suresh Venkatasubramanian. Peter Hillyard et al.: You're crossing the line: Localizing border crossings using wireless RF links. (2015) authored by Suresh Venkatasubramanian. Kweku Kwegyir-Aggrey et al.: The Misuse of AUC: What High Impact Risk Assessment Gets Wrong. (2023) authored by Suresh Venkatasubramanian. Kweku Kwegyir-Aggrey et al.: The Misuse of AUC: What High Impact Risk Assessment Gets Wrong. (2023) authored by Suresh Venkatasubramanian. I. Elizabeth Kumar et al.: Problems with Shapley-value-based explanations as feature importance measures. (2020) authored by Suresh Venkatasubramanian. I. Elizabeth Kumar et al.: Problems with Shapley-value-based explanations as feature importance measures. (2020) authored by Suresh Venkatasubramanian'}. Venkatasubramanian will be starting a new center on Computing for the People, to help think through what it means to do computer science that truly responds to the needs of people, instead of hiding behind a neutrality that merely gives more power to those already in power. and Marva M
output format: answer
|
20534
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many publications does the contributor with an hIndex of 45 have?
Context: Muhammad Zeeshan Gul and Muhammad Sharif: Traversable Wormhole Solutions Admitting Noether Symmetry in f(R,T2) Theory. (2023) authored by Muhammad Sharif 0004. M. Sharif name M. Sharif. M. Sharif alternativeName Mariam Muhammad Sharif. M. Sharif alternativeName M. Sharif. M. Sharif alternativeName M. SharifM. Sharif"}. , from 2013 to 2019. Now, Sharif has been appointed as Dean, Faculty of Science at University of the Punjab. The aim of this conference is to celebrate 100 years of Einstein's theory of general relativity
output format: answer
|
768
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many papers does the academic institution of the researcher who published Challenges and opportunities for analysis based research in big data in the IPCCC journal have?
Context: Guang Tan et al.: Bumping: A Bump-Aided Inertial Navigation Method for Indoor Vehicles Using Smartphones. (2014) authored by Jie Wu 0001. Yang Cong et al.: The phase-only null beamforming synthesis via manifold optimization. (2022) authored by Jie Wu 0001. Jing Xu et al.: Enhancing Smartphone-Based Multi-modal Indoor Localization with Camera and WiFi Signal. (2018) authored by Jie Wu 0001. Jiacheng Shang and Jie Wu: A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals. (2017) authored by Jie Wu 0001. Chang Liu et al.: FootStep-tracker: an anchor-free indoor localization system via sensing foot steps. (2015) authored by Jie Wu 0001. Yanchao Zhao et al.: Enhancing Camera-Based Multimodal Indoor Localization With Device-Free Movement Measurement Using WiFi. (2020) authored by Jie Wu 0001. Jiacheng Shang and Jie Wu: AudioKey: a usable device pairing system using audio signals on smartwatches. (2020) authored by Jie Wu 0001. Chang Liu et al.: Track Your Foot Step: Anchor-Free Indoor Localization Based on Sensing Users' Foot Steps. (2016) authored by Jie Wu 0001. Avinash Srinivasan et al.: Secure android covert channel with robust survivability to service provider restrictions. (2017) authored by Jie Wu 0001. Jinfeng Hu et al.: Designing Unimodular Waveform(s) for MIMO Radar by Deep Learning Method. (2021) authored by Jie Wu 0001. Bo Xie et al.: LIPS: A Light Intensity-Based Positioning System for Indoor Environments. (2016) authored by Jie Wu 0001. Fang Qi et al.: SSL-enabled trusted communication: Spoofing and protecting the non-cautious users. (2011) authored by Jie Wu 0001. Jiacheng Shang et al.: Defending Against Voice Spoofing: A Robust Software-Based Liveness Detection System. (2018) authored by Jie Wu 0001. Mingjun Xiao et al.: Time-Sensitive Utility-Based Routing in Duty-Cycle Wireless Sensor Networks with Unreliable Links. (2012) authored by Jie Wu 0001. Jiacheng Shang and Jie Wu: A Robust Sign Language Recognition System with Multiple Wi-Fi Devices. (2017) authored by Jie Wu 0001. Pouya Ostovari et al.: Efficient symbol-level transmission in error-prone wireless networks. (2013) authored by Jie Wu 0001. Jieying Chen et al.: Wireless Channel Prediction in Different Locations Using Transfer Learning. (2023) authored by Jie Wu 0001. Abdallah Khreishah et al.: Polynomial Time and Provably Efficient Network Coding Scheme for Lossy Wireless Networks. (2011) authored by Jie Wu 0001. Avinash Srinivasan et al.: Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss. (2015) authored by Jie Wu 0001. Ying Dai et al.: Boundary Helps: Reliable Route Selection With Directional Antennas in Cognitive Radio Networks. (2015) authored by Jie Wu 0001. Ying Dai and Jie Wu: Boundary Helps: Efficient Routing Protocol Using Directional Antennas in Cognitive Radio Networks. (2013) authored by Jie Wu 0001. Xiao Chen et al.: Improving the localization accuracy of targets by using their spatial-temporal relationships in wireless sensor networks. (2012) authored by Jie Wu 0001. Sheng Zhang et al.: Wireless Charger Placement and Power Allocation for Maximizing Charging Quality. (2018) authored by Jie Wu 0001. Yubin Duan et al.: A Privacy-Preserving Order Dispatch Scheme for Ride-Hailing Services. (2019) authored by Jie Wu 0001. Pouya Ostovari and Jie Wu: Robust wireless transmission of scalable coded videos using two-dimensional network coding. (2016) authored by Jie Wu 0001. Pouya Ostovari and Jie Wu: Reliable Broadcast with Joint Forward Error Correction and Erasure Codes in Wireless Communication Networks. (2015) authored by Jie Wu 0001. Mihaela Cardei et al.: Non-uniform sensor deployment in mobile wireless sensor networks. (2008) authored by Jie Wu 0001. Jiacheng Shang and Jie Wu: LightDefender: Protecting PIN Input using Ambient Light Sensor. (2020) authored by Jie Wu 0001. Feng Li et al.: Uncertainty Mitigation for Trustworthiness-Oriented Applications in Wireless Ad Hoc Networks. (2012) authored by Jie Wu 0001. Sheng Zhang et al.: P3: Joint optimization of charger placement and power allocation for wireless power transfer. (2015) authored by Jie Wu 0001. Ying Dai and Jie Wu: Sense in order: Channel selection for sensing in cognitive radio networks. (2013) authored by Jie Wu 0001. Shuhui Yang et al.: Efficient Broadcast in MANETs Using Network Coding and Directional Antennas. (2008) authored by Jie Wu 0001. Fei Dai and Jie Wu: Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas. (2006) authored by Jie Wu 0001. Qing Dai and Jie Wu: Computation of Minimal Uniform Transmission Range in Ad Hoc Wireless Networks. (2005) authored by Jie Wu 0001. Shuhui Yang et al.: Localized Movement-Assisted Sensor Deployment in Wireless Sensor Networks. (2006) authored by Jie Wu 0001. Sujun Li et al.: A Secure Scheme Based on One-Way Associated Key Management Model in Wireless Sensor Networks. (2021) authored by Jie Wu 0001. Longhua Guo et al.: Proposed Matching Scheme with Confidence and Prediction Uncertainty in Shared Economy. (2017) authored by Jie Wu 0001. Jiacheng Shang and Jie Wu: A Usable Authentication System Using Wrist-Worn Photoplethysmography Sensors on Smartwatches. (2019) authored by Jie Wu 0001. Ying Dai and Jie Wu: Cooperation Scheme For Distributed Spectrum Sensing In Cognitive Radio Networks. (2014) authored by Jie Wu 0001. Guoju Gao et al.: Truthful Incentive Mechanism for Nondeterministic Crowdsensing with Vehicles. (2018) authored by Jie Wu 0001. Pouya Ostovari and Jie Wu: Robust wireless delivery of scalable videos using inter-layer network coding. (2015) authored by Jie Wu 0001. Jiacheng Shang and Jie Wu: Fine-grained vital signs estimation using commercial wi-fi devices. (2016) authored by Jie Wu 0001. Qinghua Sima et al.: Multi-Armed Bandits Based Task Selection of A Mobile Crowdsensing Worker. (2022) authored by Jie Wu 0001. Avinash Srinivasan et al.: Steganographic information hiding that exploits a novel file system vulnerability. (2013) authored by Jie Wu 0001. Yingchi Mao and Jie Wu: GFG-Assisted Human Tracking Using Smart Phones. (2014) authored by Jie Wu 0001. Qing Dai and Jie Wu: Computation of Minimal Uniform Transmission Power in Ad Hoc Wireless Networks. (2003) authored by Jie Wu 0001. Mingfeng Huang et al.: A UAV-Assisted Ubiquitous Trust Communication System in 5G and Beyond Networks. (2021) authored by Jie Wu 0001. Feng Li et al.: CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks. (2010) authored by Jie Wu 0001. Pouya Ostovari et al.: Symbol-level reliable broadcasting of sensitive data in error-prone wireless networks. (2014) authored by Jie Wu 0001. Abdallah Khreishah et al.: Flow-based XOR Network Coding for Lossy Wireless Networks. (2012) authored by Jie Wu 0001e. \nSharif's father earned his living through agriculture. "}. \nIn the same year, Sharif pursued his M
output format: answer
|
130310
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the hIndex of the author who published Nitpick: A Counterexample Generator for Higher-Order Logic Based on a Relational Model Finder in 2010?
Context: Tobias Nipkow worksCount 291. Dirk Beyer et al.: Software-Verifikation. (2017) authored by Tobias Nipkow. Tobias Nipkow i10Index 100. Martin Wirsing et al.: Workshop über Rigorose Entwicklung software-intensiver Systeme. (2000) authored by Tobias Nipkow. Tobias Nipkow name Tobias Nipkow. Tobias Nipkow 2YrMeanCitedness 0.35714286565780639648. Thomas C. Hales et al.: A formal proof of the Kepler conjecture. (2015) authored by Tobias Nipkow. Tobias Nipkow et al.: Software Safety and Security - Tools for Analysis and Verification (2012) edited by Tobias Nipkow. Thomas C. Hales et al.: A Revision of the Proof of the Kepler Conjecture. (2010) authored by Tobias Nipkow. Manuel Eberl et al.: A Verified Compiler for Probability Density Functions. (2017) authored by Tobias Nipkow. Daniel Wasserrab et al.: C++ ist typsicher? Garantiert! (2007) authored by Tobias Nipkow. Tobias Nipkow alternativeName Tobias Nipkow. Tobias Nipkow written paper amount in year2016: 6. Tobias Nipkow written paper amount in year2016: 6. Balázs Tóth and Tobias Nipkow: Real-Time Double-Ended Queue. (2022) authored by Tobias Nipkow. Tobias Nipkow primary affiliation Technical University Munich, Germany. Manuel Eberl et al.: A Verified Compiler for Probability Density Functions. (2014) authored by Tobias Nipkow. Tobias Nipkow h-index 38. Manuel Eberl et al.: A Verified Compiler for Probability Density Functions. (2015) authored by Tobias Nipkow. Tobias Nipkow and Andrei Popescu: Making security type systems less ad hoc. (2014) authored by Tobias Nipkow. Tobias Nipkow affiliation Technical University Munich, Germany. Tobias Nipkow alternativeName T. Nipkow. Martin Wildmoser et al.: Prototyping Proof Carrying Code. (2004) authored by Tobias Nipkow. Tobias Nipkow written paper amount in year2022: 4. Tobias Nipkow written paper amount in year2022: 4. Tobias Nipkow: Region Quadtrees. (2024) authored by Tobias Nipkow'}. D
output format: answer
|
38
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many publications are cited by the institute of the author 'Eun Jung Kim'?
Context: Jisu Jeong et al.: The "Art of Trellis Decoding" Is Fixed-Parameter Tractable. (2017) authored by Eun Jung Kim 0002. Nathann Cohen et al.: A Polynomial-time Algorithm for Outerplanar Diameter Improvement. (2014) authored by Eun Jung Kim 0002. Nathann Cohen et al.: A Polynomial-Time Algorithm for Outerplanar Diameter Improvement. (2015) authored by Eun Jung Kim 0002. Nathann Cohen et al.: A polynomial-time algorithm for Outerplanar Diameter Improvement. (2017) authored by Eun Jung Kim 0002. Bruno Escoffier et al.: Subexponential and FPT-time Inapproximability of Independent Set and Related Problems (2012) authored by Eun Jung Kim 0002. Mamadou Moustapha Kanté et al.: An FPT Algorithm and a Polynomial Kernel for Linear Rankwidth-1 Vertex Deletion. (2017) authored by Eun Jung Kim 0002. Gregory Z. Gutin et al.: A Probabilistic Approach to Problems Parameterized above or below Tight Bounds. (2009) authored by Eun Jung Kim 0002. Mamadou Moustapha Kanté et al.: An FPT Algorithm and a Polynomial Kernel for Linear Rankwidth-1 Vertex Deletion. (2015) authored by Eun Jung Kim 0002. Gregory Z. Gutin et al.: A probabilistic approach to problems parameterized above or below tight bounds. (2011) authored by Eun Jung Kim 0002. Eun Jung Kim et al.: Flow-augmentation III: Complexity dichotomy for Boolean CSPs parameterized by the number of unsatisfied constraints. (2022) authored by Eun Jung Kim 0002. Eun Jung Kim et al.: Flow-augmentation III: Complexity dichotomy for Boolean CSPs parameterized by the number of unsatisfied constraints. (2023) authored by Eun Jung Kim 0002. Mamadou Moustapha Kanté et al.: FPT Algorithm and Polynomial Kernel for Linear Rank-width One Vertex Deletion. (2015) authored by Eun Jung Kim 0002. Eun Jung Kim et al.: Linear Kernels and Single-Exponential Algorithms via Protrusion Decompositions. (2013) authored by Eun Jung Kim 0002. Eun Jung Kim et al.: Linear Kernels and Single-Exponential Algorithms Via Protrusion Decompositions. (2016) authored by Eun Jung Kim 0002. Eun Jung Kim et al.: Linear kernels and single-exponential algorithms via protrusion decompositions (2012) authored by Eun Jung Kim 0002. Robert Crowston et al.: Systems of Linear Equations over F2 and Problems Parameterized above Average. (2010) authored by Eun Jung Kim 0002. Jungho Ahn et al.: Towards Constant-Factor Approximation for Chordal/Distance-Hereditary Vertex Deletion. (2022) authored by Eun Jung Kim 0002"}. D
output format: answer
|
203690
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many papers does the academic institution of the author who published the 'CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War' paper have?
Context: Cristobal De la maza et al.: A graph-based model to discover preference structure from choice data. (2018) authored by Cleotilde Gonzalez. Cleotilde González 2YrMeanCitedness 1.5405405759811401367. Cleotilde González name Cleotilde González. Cleotilde González alternativeName Cleotilde Gonzalez. Cleotilde González alternativeName Cleotilde González. Cleotilde González alternativeName Cleotilde GonzalezC. Gonzalez. Cleotilde González alternativeName Claudia Noguerón González. Cleotilde Gonzalez is Person. Thuy Ngoc Nguyen et al.: SpeedyIBL: A Solution to the Curse of Exponential Growth in Instance-Based Learning Models of Decisions from Experience. (2021) authored by Cleotilde Gonzalez. Cleotilde González modified 2023-10-18. Cleotilde González i10Index 95. Cleotilde González alternativeName C Gonzàlez. Ben R. Newell et al.: Managing the Budget: Stock-Flow Reasoning and the CO2 Accumulation Problem. (2016) authored by Cleotilde Gonzalez. Prashanth Rajivan et al.: Update now or later? Effects of experience, cost, and risk preference on update decisions. (2020) authored by Cleotilde Gonzalez. Samuel Cheyette et al.: Choice adaptation to increasing and decreasing event probabilities. (2016) authored by Cleotilde Gonzalez. Cleotilde González alternativeName C. González In 1997 she validated her degree in Spain by the Ministry of Education. That same year she also received the award AIPO Mari Carmen Marcos. '}
output format: answer
|
4774016
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What research tool was the result of the work on self-organizing systems by the author of the paper 'Establishing wireless time-triggered communication using a firefly clock synchronization approach'?
Context: Wilfried Elmenreich written paper amount in year2013: 17. Wilfried Elmenreich written paper amount in year2013: 17. Wilfried Elmenreich written paper amount in year2015: 22. Wilfried Elmenreich written paper amount in year2015: 22. Wilfried Elmenreich written paper amount in year2021: 17. Wilfried Elmenreich written paper amount in year2021: 17. Wilfried Elmenreich 2YrMeanCitedness 3.9722223281860351562. Wilfried Elmenreich written paper amount in year2017: 11. Wilfried Elmenreich written paper amount in year2017: 11. Andrea Monacchi et al.: Strategies for domestic energy conservation in Carinthia and Friuli-Venezia Giulia. (2013) authored by Wilfried Elmenreich. Wilfried Elmenreich written paper amount in year2018: 11. Wilfried Elmenreich written paper amount in year2018: 11. Wilfried Elmenreich h-index 26. Wilfried Elmenreich written paper amount in year2020: 19. Wilfried Elmenreich written paper amount in year2020: 19. Wilfried Elmenreich written paper amount in year2022: 6. Wilfried Elmenreich written paper amount in year2022: 6'}. \nIn 2008, he received Habilitation in the area of Computer Engineering from Vienna University of Technology. \nWilfried Elmenreich is a member of the senate of the Alpen-Adria-Universität Klagenfurt, Senior Member of IEEE and counselor of Klagenfurt\'s IEEE student branch. \nElmenreich was a visiting researcher at the Vanderbilt University, Nashville, Tennessee in 2005 and at the CISTER/IPP-Hurray Research Unit at the Polytechnic Institute of Porto in 2007
output format: answer
|
FREVO
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In which year was the author of 'An exploratory study to identify rogue seasonality in a steel company's supply network using spectral principal component analysis' born?
Context: Nina F. Thornhill name Nina F. Thornhill. Nina F. Thornhill affiliation Imperial College London, UK. Nina F. Thornhill member of Imperial College London. Nina F. Thornhill primary affiliation Imperial College London, UK. Sara Budinis and Nina F. Thornhill: Supercritical fluid recycle for surge control of CO2 centrifugal compressors. (2016) authored by Nina F. Thornhill. Nina F. Thornhill alternativeName Nina Thornhill. Nina F. Thornhill alternativeName Nina F Thornhill. Nina F. Thornhill alternativeName Nina F. Thornhill. Nina F. Thornhill alternativeName N.F Thornhill In 2007 she returned to Imperial College London to take the ABB/Royal Academy of Engineering Chair of Process Automation. \nThornhill read physics at the University of Oxford, earning a bachelor\'s degree there in 1976
output format: answer
|
1953
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Is the i10Index of Relational analysis of (co)inductive predicates, (co)algebraic datatypes, and (co)recursive functions author greater than the i10Index of A Graph-based Economical Dispatch Model author?
Context: Patricia Wright et al.: Using audio to support animated route information in a hospital touch-screen kiosk. (2010) authored by David De Roure. David De Roure alternativeName David DeRoure. David De Roure alternativeName Davide De Roure. David De Roure name David De Roure. David De Roure alternativeName De Roure David. David De Roure alternativeName D. DeRoure. David De Roure alternativeName David C. DeRoure. David De Roure alternativeName David Charles De Roure. David De Roure alternativeName Dave de Roure. David De Roure alternativeName David De Roure. David De Roure alternativeName D. C. DeRoure. David De Roure alternativeName D. De Roure. David De Roure alternativeName David C. De Roure. David De Roure alternativeName Roure De. Mark J. Weal et al.: Semantic Annotation of Ubiquitous Learning Environments. (2012) authored by David De Roure. John Halloran et al.: The literacy fieldtrip: using UbiComp to support children's creative writing. (2006) authored by David De Roure. David De Roure and Pip Willcox: Numbers in places: creative interventions in musical space & time. (2016) authored by David De Roure. Steven Blackburn and David De Roure: Musical Part Classification in Content Based Systems. (2000) authored by David De Roure. Mark J. Weal et al.: Tracking and Annotation in Skills-Based Learning Environments. (2009) authored by David De Roure. Iain Emsley and David De Roure: A Framework for the Preservation of a Docker Container. (2017) authored by David De Roure. David De Roure alternativeName D.C. De Roure. David De Roure 2YrMeanCitedness 3.0. Eva Hornecker et al.: UbiComp in opportunity spaces: challenges for participatory design. (2006) authored by David De Roure. David De Roure is Person. David De Roure et al.: Plans and performances: Parallels in the production of science and music. (2016) authored by David De Roure. Kristina M. Hettne et al.: Best Practices for Workflow Design: How to Prevent Workflow Decay. (2012) authored by David De Roure. Fredrik Espinoza et al.: Intrusiveness Management for Focused, Efficient, and Enjoyable Activities. (2007) authored by David De Roure. David De Roure is Creator. Mark J. Weal et al.: A Card Based Metaphor for Organising Pervasive Educational Experiences. (2007) authored by David De Roure. Sean Bechhofer et al.: Hello cleveland! Linked data publication of live music archives. (2013) authored by David De Roure. David De Roure et al.: Music and Science: Parallels in Production. (2015) authored by David De Roure. David De Roure is Author. David De Roure et al.: Digital Music Objects: Research Objects for Music. (2018) authored by David De Roure. Oktay Cetinkaya et al.: Coverage Performance of UAV-Powered Sensors for Energy-Neutral Networks with Recharging Stations. (2023) authored by David De Roure He was Warden of South Stoneham House in the late 80s. De Roure is also Technical Director of the Centre for Practice & Research in Science & Music at the Royal Northern College of Music. "}. He stayed on to do a Doctor of Philosophy degree in 1990 initially under the supervision of David W. He moved to the Oxford e-Research Centre in July 2010
output format: answer
|
Jasmin Blanchette
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the hIndex of the author of New models of cache architectures characterizing information leakage from cache side channels?
Context: Ruby B. Lee member of Princeton University. Guangyuan Hu et al.: Smartphone Impostor Detection with Built-in Sensors and Deep Learning. (2020) authored by Ruby B. Lee. Wei-Han Lee et al.: Time Series Segmentation through Automatic Feature Learning. (2018) authored by Ruby B. Lee. Ruby B. Lee name Ruby B. Lee. Ruby B. Lee affiliation Stanford University, CA, USA. Ping Wah Wong et al.: Image processing considerations for digital photography. (1997) authored by Ruby B. Lee. Ruby B. Lee link http://www.princeton.edu/~rblee/. Ruby B. Lee link http://www.princeton.edu/~rblee/. Ruby B. Lee alternativeName Ruby B. Lee. Ruby B. Lee affiliation Hewlett-Packard, Cupertino, CA, USA. Ruby B. Lee is Creator. Mahadevan Gomathisankaran and Ruby B. Lee: Tantra: A Fast PRNG Algorithm and its Implementation. (2009) authored by Ruby B. Lee. Ruby B. Lee affiliation Princeton University, Department of Electrical Engineering, NJ, USA. Ruby B. Lee primary affiliation Princeton University, Department of Electrical Engineering, NJ, USA. Wei-Han Lee et al.: Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors. (2018) authored by Ruby B. Lee. Ruby B. Lee is Author. Xiao Yang and Ruby B. Lee: PLX FP: an efficient floating-point instruction set for 3D graphics. (2004) authored by Ruby B. Lee. Ruby B. Lee link https://scholar.google.com/citations?user=odeKATgAAAAJ. Ruby B. Lee i10Index 65. Wei-Han Lee and Ruby B. Lee: Implicit Sensor-based Authentication of Smartphone Users with Smartwatch. (2017) authored by Ruby B. Lee. Wei-Han Lee and Ruby B. Lee: Implicit Sensor-based Authentication of Smartphone Users with Smartwatch. (2016) authored by Ruby B. Lee. Ruby B. Lee is Person. Ruby B. Lee orcidId https://orcid.org/0000-0001-9497-0777 She was elected as a member of the American Academy of Arts and Sciences in 2020. \nLee graduated from Cornell University\'s College Scholar Program in 1973. '}
output format: answer
|
30
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many papers are attributed to the institution where the author of the article 'Edge concealment in a combined surface mesh and scalar-field tissue model for surgical simulations' is affiliated?
Context: Karen Reynolds name Karen Reynolds. Karen Reynolds alternativeName Karen Reynolds. Karen Reynolds alternativeName Karen J. Reynolds. Karen Reynolds alternativeName K. Reynolds. Karen Reynolds alternativeName Karen Jane. Reynolds. Karen Reynolds i10Index 48'}. She is currently the Deputy Dean of Computer Science, Engineering and Mathematics at Flinders University and a Matthew Flinders Distinguished Professor
output format: answer
|
47459
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: For how long has the professor of computer science been the editor-in-chief of The Journal of Supercomputing?
Context: Alireza Khatamian and Hamid R. Arabnia: Survey on 3D Surface Reconstruction. (2016) authored by Hamid R. Arabnia. Rabia Jafri and Hamid R. Arabnia: A Survey of Face Recognition Techniques. (2009) authored by Hamid R. Arabnia. Austin T. New et al.: Non-rigid shape correspondence and description using geodesic field estimate distribution. (2012) authored by Hamid R. Arabnia. Seyed Amin Pouriyeh et al.: Combining Word Embedding and Knowledge-Based Topic Modeling for Entity Summarization. (2018) authored by Hamid R. Arabnia. Ananda S. Chowdhury et al.: Improved Stereo Correlation using Moravec Operator and Kolmogorov-Smirnov Test. (2005) authored by Hamid R. Arabnia. Seyed Amin Pouriyeh et al.: ES-LDA: Entity Summarization using Knowledge-based Topic Modeling. (2017) authored by Hamid R. Arabnia. Rabia Jafri and Hamid R. Arabnia: A Survey of Component-Based Face Recognition Approaches. (2007) authored by Hamid R. Arabnia. Rabia Jafri and Hamid R. Arabnia: Analysis of Subspace-based Face Recognition Techniques under Changes in Imaging Factors. (2007) authored by Hamid R. Arabnia. Rabia Jafri and Hamid R. Arabnia: A Multi-Level Component-Based Approach for Face Recognition. (2007) authored by Hamid R. Arabnia. Soheyla Amirian et al.: Automatic Image and Video Caption Generation With Deep Learning: A Concise Review and Algorithmic Overlap. (2020) authored by Hamid R. Arabnia. William Yang et al.: Identification of genes and pathways involved in kidney renal clear cell carcinoma. (2014) authored by Hamid R. Arabnia. Hamid R. Arabnia and Ashu M. G. Solo: Proceedings of the 2009 International Conference on Genetic and Evolutionary Methods, GEM 2009, July 13-16, 2009, Las Vegas Nevada, USA (2009) edited by Hamid R. Arabnia. Hamid R. Arabnia and Youngsong Mun: Proceedings of the 2008 International Conference on Genetic and Evolutionary Methods, GEM 2008, July 14-17, 2008, Las Vegas, Nevada, USA (2008) edited by Hamid R. Arabnia. Rabia Jafri et al.: Visual and Infrared Sensor Data-Based Obstacle Detection for the Visually Impaired Using the Google Project Tango Tablet Development Kit and the Unity Engine. (2018) authored by Hamid R. Arabnia. Hamid R. Arabnia et al.: Proceedings of the 2010 International Conference on Genetic and Evolutionary Methods, GEM 2010, July 12-15, 2010, Las Vegas Nevada, USA (2010) edited by Hamid R. Arabnia. Rabia Jafri et al.: A Skeleton-Based Deep Learning Approach for Recognizing Violent Actions in Surveillance Scenarios. (2022) authored by Hamid R. Arabnia. David Luper et al.: Spatial and Temporal Target Association through Semantic Analysis and GPS Data Mining. (2007) authored by Hamid R. Arabnia. Farid Ghareh Mohammadi and Hamid R. Arabnia: ISEA: Image Steganalysis using Evolutionary Algorithms. (2019) authored by Hamid R. Arabnia. Hamid R. Arabnia et al.: Proceedings of the 2007 International Conference on Genetic and Evolutionary Methods, GEM 2007, June 25-28, 2007, Las Vegas, Nevada, USA (2007) edited by Hamid R. Arabnia. Ananda S. Chowdhury and Hamid R. Arabnia: A Comprehensive Study of Stereo Correlation Performance. (2004) authored by Hamid R. Arabnia. Farid Ghareh Mohammadi et al.: 3D-model ShapeNet Core Classification using Meta-Semantic Learning. (2022) authored by Hamid R. Arabnia. Hamid R. Arabnia: Proceedings of The 2005 International Conference on Modeling, Simulation and Visualization Methods, MSV 2005, Las Vegas, Nevada, USA, June 27-30, 2005 (2005) edited by Hamid R. Arabnia. Seyedamin Pouriyeh et al.: Graph-Based Methods for Ontology Summarization: A Survey. (2018) authored by Hamid R. Arabnia. Hamid R. Arabnia and Andy Marsh: Proceedings of the 2009 International Conference on Semantic Web & Web Services, SWWS 2009, July 13-16, 2009, Las Vegas, Nevada, USA (2009) edited by Hamid R. Arabnia. Hamid R. Arabnia and Andy Marsh: Proceedings of the 2008 International Conference on Semantic Web & Web Services, SWWS 2008, July 14-17, 2008, Las Vegas, Nevada, USA (2008) edited by Hamid R. Arabnia. Hamid R. Arabnia et al.: Proceedings of the 2010 International Conference on Semantic Web & Web Services, SWWS 2010, July 12-15, 2010, Las Vegas, Nevada, USA (2010) edited by Hamid R. Arabnia. Mahsa Imani et al.: Improving MAX-MIN ant system performance with the aid of ART2-based Twin Removal method. (2010) authored by Hamid R. Arabnia. David Luper et al.: Path Normalcy Analysis Using Nearest Neighbor Outlier Detection. (2008) authored by Hamid R. Arabnia. Rabia Jafri and Hamid R. Arabnia: A Multi-Resolution Hierarchical Approach for Face Recognition. (2007) authored by Hamid R. Arabnia. Soheyla Amirian et al.: The Use of Video Captioning for Fostering Physical Activity. (2021) authored by Hamid R. Arabnia. Farzan Shenavarmasouleh et al.: DRDrV3: Complete Lesion Detection in Fundus Images Using Mask R-CNN, Transfer Learning, and LSTM. (2021) authored by Hamid R. Arabnia. Rabia Jafri et al.: Computer vision-based object recognition for the visually impaired in an indoors environment: a survey. (2014) authored by Hamid R. Arabnia. Seyed Amin Pouriyeh et al.: Graph-based Ontology Summarization: A Survey. (2018) authored by Hamid R. Arabnia. Jack O. Shelton and Hamid R. Arabnia: Brain Imaging for Diagnosis of Schizophrenia: Challenges, Successes and a Research Road Map. (2012) authored by Hamid R. Arabnia. Hamid R. Arabnia: Proceedings of the 2007 International Conference on Semantic Web & Web Services, SWWS 2007, June 25-28, 2007, Las Vegas, Nevada, USA (2007) edited by Hamid R. Arabnia. Hamid R. Arabnia: Proceedings of the 2006 International Conference on Modeling, Simulation & Visualization Methods, MSV 2006, Las Vegas, Nevada, USA, June 26-29, 2006 (2006) edited by Hamid R. Arabnia. Soheyla Amirian et al.: An Integrated Approach for Video Captioning and Applications. (2022) authored by Hamid R. Arabnia. Hamid R. Arabnia: Proceedings of the 2006 International Conference on Semantic Web & Web Services, SWWS 2006, Las Vegas, Nevada, USA, June 26-29, 2006 (2006) edited by Hamid R. Arabnia. Soheyla Amirian et al.: Automatic Generation of Descriptive Titles for Video Clips Using Deep Learning. (2021) authored by Hamid R. Arabnia. Hamid R. Arabnia: A distributed stereocorrelation algorithm. (1995) authored by Hamid R. Arabnia. Seyed Amin Pouriyeh et al.: A Comprehensive Survey of Ontology Summarization: Measures and Methods. (2018) authored by Hamid R. Arabnia. Rabia Jafri and Hamid R. Arabnia: PCA-Based Methods for Face Recognition. (2007) authored by Hamid R. Arabnia You can help Wikipedia by expanding it. '}
output format: answer
|
since 1997
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the birth year of the expert who authored Response Surface Methodology?
Context: Todd L. Graves et al.: Reliability Models for Almost-Series and Almost-Parallel Systems. (2010) authored by Christine M. Anderson-Cook. Youngil Kim et al.: Selecting the Best Wild Card Entries in a Covering Array. (2017) authored by Christine M. Anderson-Cook. Alexander D. Bolton and Christine M. Anderson-Cook: APT malware static trace analysis through bigrams and graph edit distance. (2017) authored by Christine M. Anderson-Cook. Diane Oyen et al.: Bayesian Networks with Prior Knowledge for Malware Phylogenetics. (2016) authored by Christine M. Anderson-Cook. Jeanette J. Varela et al.: Predicting historical indoor temperatures from available local weather data. (2019) authored by Christine M. Anderson-Cook. Diane Oyen et al.: Order priors for Bayesian network discovery with an application to malware phylogeny. (2017) authored by Christine M. Anderson-Cook. Dae-Heung Jang and Christine M. Anderson-Cook: Visualization Approaches for Evaluating Ridge Regression Estimators in Mixture and Mixture-Process Experiments. (2015) authored by Christine M. Anderson-Cook. Youngil Kim et al.: Graphical methods for evaluating covering arrays. (2016) authored by Christine M. Anderson-Cook. Dae-Heung Jang et al.: Graphical Methods for Influential Data Points in Cluster Analysis. (2016) authored by Christine M. Anderson-Cook. Sarah Burke et al.: Selecting a near-optimal design for multiple criteria with improved robustness to different user priorities. (2019) authored by Christine M. Anderson-CookD. '}. She became the first female recipient of the George Box Medal in 2021. F. Jeff Wu
output format: answer
|
1966
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the hIndex of the author who published the paper 'Modellheuristiken für effizientes forward model learning' in Autom. in the year 2021?
Context: Georg Ruß et al.: Hierarchical Spatial Clustering for Management Zone Delineation in Precision Agriculture. (2010) authored by Rudolf Kruse. Pascal Held and Rudolf Kruse: Online Fuzzy Community Detection by Using Nearest Hubs. (2016) authored by Rudolf Kruse. Pascal Held and Rudolf Kruse: Online Community Detection by Using Nearest Hubs. (2016) authored by Rudolf Kruse. Frank Rehm et al.: POLARMAP - Efficient Visualisation of High Dimensional Data. (2006) authored by Rudolf Kruse. Christian Braune and Rudolf Kruse: Fuzzy density based clustering with generalized centroids. (2016) authored by Rudolf Kruse. Frank Rehm et al.: Visualization of High-Dimensional Data with Polar Coordinates. (2009) authored by Rudolf Kruse. Frank Klawonn et al.: Fuzzy clustering: More than just fuzzification. (2015) authored by Rudolf Kruse. Siddeswara Mayura Guru et al.: Multiple Cluster Merging and Multihop Transmission in Wireless Sensor Networks. (2007) authored by Rudolf Kruse. Georg Ruß and Rudolf Kruse: Exploratory Hierarchical Clustering for Management Zone Delineation in Precision Agriculture. (2011) authored by Rudolf Kruse. Alexander Dockhorn et al.: Fuzzy Multiset Clustering for Metagame Analysis. (2019) authored by Rudolf Kruse. Xiaomeng Wang et al.: Fuzzy frequent pattern discovering based on recursive elimination. (2005) authored by Rudolf Kruse. Pascal Held and Rudolf Kruse: Detecting overlapping community hierarchies in dynamic graphs. (2016) authored by Rudolf Kruse. Salatiel Ezennaya-Gomez et al.: Handling Selective Participation in Neuron Assembly Detection. (2015) authored by Rudolf Kruse. Alexander Dockhorn et al.: Variable density based clustering. (2016) authored by Rudolf Kruse. Roland Winkler et al.: Problems of Fuzzy c-Means Clustering and Similar Algorithms with High Dimensional Data Sets. (2010) authored by Rudolf Kruse. Christian Braune et al.: Obtaining Shape Descriptors from a Concave Hull-Based Clustering Algorithm. (2016) authored by Rudolf Kruse. Christian Borgelt et al.: Handling Noise and Outliers in Fuzzy Clustering. (2015) authored by Rudolf Kruse. Michael R. Berthold et al.: Advances in Intelligent Data Analysis V, 5th International Symposium on Intelligent Data Analysis, IDA 2003, Berlin, Germany, August 28-30, 2003, Proceedings (2003) edited by Rudolf Kruse. Roland Winkler et al.: Prototype Based Fuzzy Clustering Algorithms in High-Dimensional Feature Spaces. (2015) authored by Rudolf Kruse. Roland Winkler et al.: Fuzzy Cluster Analysis of Larger Data Sets. (2009) authored by Rudolf Kruse. Frank Rehm et al.: Single Cluster Visualization to Optimize Air Traffic Management. (2006) authored by Rudolf Kruse. Matthias Steinbrecher and Rudolf Kruse: Fuzzy Descriptions to Identify Temporal Substructure Changes of Cooccurrence Graphs. (2009) authored by Rudolf Kruse. Pascal Held et al.: Clustering Social Networks Using Competing Ant Hives. (2015) authored by Rudolf Kruse. Frank Rehm et al.: Visualization of Single Clusters. (2006) authored by Rudolf Kruse. Roland Winkler et al.: A New Distance Function for Prototype Based Clustering Algorithms in High Dimensional Spaces. (2013) authored by Rudolf Kruse. Alexander Dockhorn et al.: An Alternating Optimization Approach Based on Hierarchical Adaptations of DBSCAN. (2015) authored by Rudolf Kruse. Frank Rehm et al.: MDSpolar: A New Approach for Dimension Reduction to Visualize High Dimensional Data. (2005) authored by Rudolf Kruse. Heiko Timm et al.: Differentiated Treatment of Missing Values in Fuzzy Clustering. (2003) authored by Rudolf Kruse. Rudolf Kruse name Rudolf Kruse. Christian Döring et al.: Effects of Irrelevant Attributes in Fuzzy Clustering. (2005) authored by Rudolf Kruse. Christoph Reichert et al.: An Efficient Decoder for the Recognition of Event-Related Potentials in High-Density MEG Recordings. (2016) authored by Rudolf Kruse'}. Following a short stay at the Fraunhofer Society, in 1986 he joined the University of Braunschweig as a professor of computer science
output format: answer
|
41
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many papers does the academic institution of the researcher who published 'Hybrid: A Unified Object-Oriented System' have?
Context: Claudio Corrodi et al.: Idea: Benchmarking Android Data Leak Detection Tools. (2018) authored by Oscar Nierstrasz. Mohammadreza Hazhirpasand et al.: Stopping DNS Rebinding Attacks in the Browser. (2021) authored by Oscar Nierstrasz. Max Leske et al.: A promising approach for debugging remote promises. (2016) authored by Oscar Nierstrasz. Haidar Osman et al.: Automatic feature selection by regularization to improve bug prediction accuracy. (2017) authored by Oscar Nierstrasz. Pascal Gadient et al.: Security Smells Pervade Mobile App Servers. (2021) authored by Oscar Nierstrasz. Pascal Gadient et al.: Security Smells Pervade Mobile App Servers. (2021) authored by Oscar Nierstrasz. Haidar Osman et al.: Hyperparameter optimization to improve bug prediction accuracy. (2017) authored by Oscar Nierstrasz. Pascal Gadient et al.: Security code smells in Android ICC. (2019) authored by Oscar Nierstrasz. Pascal Gadient et al.: Security Code Smells in Android ICC. (2018) authored by Oscar Nierstrasz. Mohammad Ghafari et al.: Security Smells in Android. (2017) authored by Oscar Nierstrasz. C. B. Collins et al.: A combinatorial application of matrix Riccati equations and their q-analogue. (1981) authored by Oscar Nierstrasz. Haidar Osman et al.: An Extensive Analysis of Efficient Bug Prediction Configurations. (2017) authored by Oscar Nierstrasz. Mohammad Ghafari et al.: Security Smells in Android. (2020) authored by Oscar Nierstrasz. Haidar Osman et al.: Tracking Null Checks in Open-Source Java Systems. (2016) authored by Oscar Nierstrasz. Oscar Nierstrasz name Oscar Nierstrasz. Leonel Merino et al.: CityVR: Gameful Software Visualization. (2017) authored by Oscar Nierstrasz. Haidar Osman et al.: Mining frequent bug-fix code changes. (2014) authored by Oscar Nierstrasz. Adrian Lienhard et al.: Test Blueprint - Exposing Side Effects in Execution Traces to Support Writing Unit Tests. (2008) authored by Oscar Nierstrasz. Leonel Merino et al.: MetaVis: Exploring Actionable Visualization. (2016) authored by Oscar Nierstrasz. Oscar Nierstrasz alternativeName Oscar Nierstrasz. Niko Schwarz et al.: Efficiently extracting full parse trees using regular expressions with capture groups. (2015) authored by Oscar Nierstrasz. Oscar Nierstrasz alternativeName NierstraszOscar. Jan Kurs et al.: Bounded Seas - - Island Parsing Without Shipwrecks. (2014) authored by Oscar Nierstrasz. Pascal Gadient et al.: Web APIs in Android through the Lens of Security. (2020) authored by Oscar Nierstrasz. Pascal Gadient et al.: Web APIs in Android through the Lens of Security. (2020) authored by Oscar Nierstrasz. Oscar Nierstrasz alternativeName Oscar M. Nierstrasz. Oscar Nierstrasz alternativeName Oscar Marius Nierstrasz. Nevena Milojkovic et al.: Mining inline cache data to order inferred types in dynamic languages. (2018) authored by Oscar Nierstrasz. Nitish Patkar et al.: Caveats in Eliciting Mobile App Requirements. (2020) authored by Oscar Nierstrasz. Nitish Patkar et al.: Caveats in Eliciting Mobile App Requirements. (2020) authored by Oscar Nierstrasz. Yuriy Tymchuk et al.: When QualityAssistant Meets Pharo: Enforced Code Critiques Motivate More Valuable Rules. (2016) authored by Oscar Nierstrasz. Arash Ale Ebrahim et al.: FuzzingDriver: the Missing Dictionary to Increase Code Coverage in Fuzzers. (2022) authored by Oscar Nierstrasz. Arash Ale Ebrahim et al.: FuzzingDriver: the Missing Dictionary to Increase Code Coverage in Fuzzers. (2022) authored by Oscar Nierstrasz. Pooja Rani et al.: A Decade of Code Comment Quality Assessment: A Systematic Literature Review. (2022) authored by Oscar Nierstrasz. Pascal Gadient et al.: Security Header Fields in HTTP Clients. (2021) authored by Oscar Nierstrasz Tsichritzis. "}. D. D. D. D
output format: answer
|
101866
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where was the contributor who published Filtering problem with nonlinear observations and drift terms equal to gradient vector field plus affine vector field born?
Context: Xianyang Jiang et al.: Coding Region Prediction Based on a Universal DNA Sequence Representation Method. (2008) authored by Stephen S.-T. Yau. Xianyang Jiang et al.: Survey on index based homology search algorithms. (2007) authored by Stephen S.-T. Yau. Xiaona Bao et al.: Nucleotide amino acid k-mer vector: an alignment-free method for comparing genomic sequences. (2022) authored by Stephen S.-T. Yau. Chuangqiang Hu et al.: Weight enumerators for nonbinary asymmetric quantum codes and their applications. (2020) authored by Stephen S.-T. Yau. Changchuan Yin and Stephen S.-T. Yau: Whole genome single nucleotide polymorphism genotyping of Staphylococcus aureus. (2019) authored by Stephen S.-T. Yau. Nan Sun et al.: A New Method Based on Coding Sequence Density to Cluster Bacteria. (2020) authored by Stephen S.-T. Yau. Ruohan Ren et al.: kmer2vec: A Novel Method for Comparing DNA Sequences by word2vec Embedding. (2022) authored by Stephen S.-T. Yau. Chenglong Yu et al.: DNA sequence comparison by a novel probabilistic method. (2011) authored by Stephen S.-T. Yau. Shi-Kuo Chang et al.: On consistency checking of spatial relationships in content-based image database systems. (2005) authored by Stephen S.-T. Yau. Qing-Long Zhang and Stephen S.-T. Yau: On Interactability of Spatial Relationships in Content-Based Image Database Systems. (2004) authored by Stephen S.-T. Yau. Shuai Liu et al.: Assessment of kmer degeneration method for complicated genomes. (2019) authored by Stephen S.-T. Yau. Stephen S.-T. Yau alternativeName Stephen Shing‐Toung Yau. Changchuan Yin and Stephen S.-T. Yau: Inverted repeats in coronavirus SARS-CoV-2 genome and implications in evolution. (2021) authored by Stephen S.-T. Yau. Stephen S.-T. Yau primary affiliation Tsinghua University, Beijing, China. Qing-Long Zhang et al.: A Unified Approach to Iconic Indexing, Retrieval, and Maintenance of Spatial Relationships in Image Databases. (1996) authored by Stephen S.-T. Yau. Xianyang Jiang and Stephen S.-T. Yau: A Novel Analysis Model for DNA Sequences. (2008) authored by Stephen S.-T. Yau After retiring from UIC in 2012, he joined Tsinghua University as a full-time professor. \nShing-Toung Yau was born in 1952 in British Hong Kong, with his ancestral home in Jiaoling County, Guangdong, China. '}. A
output format: answer
|
Hong Kong
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What was the title of the dissertation completed by Elizabeth M. Belding under the name Elizabeth Michelle Royer?
Context: Amit P. Jardosh et al.: Understanding link-layer behavior in highly congested IEEE 802.11b wireless networks. (2005) authored by Elizabeth M. Belding. Amit P. Jardosh et al.: IQU: practical queue-based user association management for WLANs. (2006) authored by Elizabeth M. Belding. Sumit Singh et al.: Sticky CSMA/CA: Implicit synchronization and real-time QoS in mesh networks. (2007) authored by Elizabeth M. Belding. Hui Dong et al.: Selective bit-error checking at the MAC layer for voice over mobile ad hoc networks with IEEE 802.11. (2004) authored by Elizabeth M. Belding. Ramya Raghavendra et al.: Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks. (2010) authored by Elizabeth M. Belding. Krishna N. Ramachandran et al.: Interference-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks. (2006) authored by Elizabeth M. Belding. Krishna N. Ramachandran et al.: A Multi-radio 802.11 Mesh Network Architecture. (2008) authored by Elizabeth M. Belding. Ramya Raghavendra et al.: MeshMon: a multi-tiered framework for wireless mesh network monitoring. (2011) authored by Elizabeth M. Belding. Ramya Raghavendra et al.: MeshMon: a multi-tiered framework for wireless mesh networkmonitoring. (2009) authored by Elizabeth M. Belding. Sumit Singh et al.: Millimeter Wave WPAN: Cross-Layer Modeling and Multi-Hop Architecture. (2007) authored by Elizabeth M. Belding. Ashish Sharma et al.: Cell-Share: Opportunistic Use of Cellular Uplink to Augment Rural WiFi Mesh Networks. (2009) authored by Elizabeth M. Belding. Sung-Ju Lee et al.: Scalability study of the ad hoc on-demand distance vector routing protocol. (2003) authored by Elizabeth M. Belding. Ramya Raghavendra et al.: Understanding handoffs in large ieee 802.11 wireless networks. (2007) authored by Elizabeth M. Belding. Prashanth Aravinda Kumar Acharya and Elizabeth M. Belding: MARS: Link-layer rate selection for multicast transmissions in wireless mesh networks. (2011) authored by Elizabeth M. Belding. Brett Stone-Gross et al.: Malware in IEEE 802.11 Wireless Networks. (2008) authored by Elizabeth M. Belding. Samir Ranjan Das et al.: Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks. (2000) authored by Elizabeth M. Belding. Sumit Singh et al.: Blockage and directivity in 60 GHz wireless personal area networks: from cross-layer model to multihop MAC design. (2009) authored by Elizabeth M. Belding. Jing Qian et al.: Leveraging Intra-User and Inter-User Representation Learning for Automated Hate Speech Detection. (2018) authored by Elizabeth M. Belding. Jing Qian et al.: Leveraging Intra-User and Inter-User Representation Learning for Automated Hate Speech Detection. (2018) authored by Elizabeth M. Belding. Varshika Srinivasavaradhan et al.: Poster: Beyond the Bars: Decoding the Complexities of Cellular Network Performance through Speedtest Data. (2024) authored by Elizabeth M. Belding. Giovanni Vigna et al.: An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. (2004) authored by Elizabeth M. Belding. Sung-Ju Lee et al.: Ad hoc on-demand distance-vector routing scalability. (2002) authored by Elizabeth M. Belding. Kimaya Sanzgiri et al.: Determining Intra-Flow Contention along Multihop Paths in Wireless Networks. (2004) authored by Elizabeth M. Belding. Paul Schmitt et al.: Internet Media Upload Caching for Poorly-Connected Regions. (2015) authored by Elizabeth M. Belding. Lara B. Deek et al.: Intelligent Channel Bonding in 802.11n WLANs. (2014) authored by Elizabeth M. Belding'}. \nOne of her publications, on Ad hoc On-Demand Distance Vector Routing in mobile networks, was selected for the SIGMOBILE Test of Time Award in 2018
output format: answer
|
Routing in Ad hoc Mobile Networks: On-Demand and Hierarchical Strategies
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many papers does the academic institution of the author who published 'Analysis of morphological surface profile extraction with multiple sonar range measurements' in the year 1999 have?
Context: Deniz Baskent affiliation Bilkent University, Department of Electrical Engineering, Ankara, Turkey. Deniz Baskent is Creator. Deniz Başkent alternativeName Deniz Baskent. Deniz Başkent alternativeName Deniz Başkent. Deniz Başkent name Deniz Başkent. Deniz Başkent alternativeName Başkent Deniz'}. She then obtained a NOHR Grant to fund a postdoc position in the same lab until the end of 2004. She was promoted full professor in 2014
output format: answer
|
56608
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the hIndex of the author of Autonomous navigation in a manufacturing environment?
Context: Maryam Rahnemoonfar et al.: FloodNet: A High Resolution Aerial Imagery Dataset for Post Flood Scene Understanding. (2021) authored by Robin R. Murphy. Maryam Rahnemoonfar et al.: FloodNet: A High Resolution Aerial Imagery Dataset for Post Flood Scene Understanding. (2020) authored by Robin R. Murphy. Tashnim Chowdhury et al.: RescueNet: A High Resolution UAV Semantic Segmentation Benchmark Dataset for Natural Disaster Damage Assessment. (2022) authored by Robin R. Murphy. Argho Sarkar et al.: SAM-VQA: Supervised Attention-Based Visual Question Answering Model for Post-Disaster Damage Assessment on Remote Sensing Imagery. (2023) authored by Robin R. Murphy. Tashnim Chowdhury et al.: Comprehensive Semantic Segmentation on High Resolution UAV Imagery for Natural Disaster Damage Assessment. (2020) authored by Robin R. Murphy. Maryam Rahnemoonfar et al.: Comprehensive Semantic Segmentation on High Resolution UAV Imagery for Natural Disaster Damage Assessment. (2020) authored by Robin R. Murphy. Robin R. Murphy name Robin R. Murphy. Robin R. Murphy et al.: Survivor buddy and SciGirls: affect, outreach, and questions. (2010) authored by Robin R. Murphy. Robin R. Murphy 2YrMeanCitedness 4.6999998092651367188. Maryam Rahnemoonfar et al.: Flooded Area Detection from Uav Images Based on Densely Connected Recurrent Neural Networks. (2018) authored by Robin R. Murphy. Robin R. Murphy written paper amount in year2012: 20. Robin R. Murphy written paper amount in year2012: 20. Robin R. Murphy alternativeName Robin Murphy. Robin R. Murphy written paper amount in year2016: 10. Robin R. Murphy written paper amount in year2016: 10. Justin Adams et al.: Use of Small Unmanned Aerial Systems for Tactical Response during Kilauea Volcano Lower East Rift Zone event. (2018) authored by Robin R. Murphy. Robin R. Murphy alternativeName Robin R. Murphy. Robin R. Murphy written paper amount in year2015: 9. Robin R. Murphy written paper amount in year2015: 9. Ananya Rao et al.: Analysis of Interior Rubble Void Spaces at Champlain Towers South Collapse. (2022) authored by Robin R. Murphy. Robin R. Murphy member of Texas A&M University. Ananya Rao et al.: Analysis of Interior Rubble Void Spaces at Champlain Towers South Collapse. (2023) authored by Robin R. Murphy. Robin R. Murphy et al.: Two case studies and gaps analysis of flood assessment for emergency management with small unmanned aerial systems. (2016) authored by Robin R. Murphy. Jan Dufek et al.: Visual pose stabilization of tethered small unmanned aerial system to assist drowning victim recovery. (2017) authored by Robin R. Murphy. Robin R. Murphy written paper amount in year2013: 15. Robin R. Murphy written paper amount in year2013: 15. Robin R. Murphy written paper amount in year2017: 10. Robin R. Murphy written paper amount in year2017: 10. Robin R. Murphy written paper amount in year2014: 16. Robin R. Murphy written paper amount in year2014: 16. Robin R. Murphy written paper amount in year2018: 17. Robin R. Murphy written paper amount in year2018: 17. Zachary Henkel et al.: A proxemic-based HRI testbed. (2012) authored by Robin R. Murphy. Robin R. Murphy written paper amount in year2020: 17. Robin R. Murphy written paper amount in year2020: 17\nMurphy was raised in Douglas, Georgia. She was a member of the Defense Science Study Group from 1997 to 1998; this led to her involvement on numerous science boards, including the Defense Science Board and the US Air Force Scientific Advisory Board. In 2008, Murphy moved to Texas A&M University
output format: answer
|
50
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Which city was the birthplace of the author of 'A data mining approach to the prediction of corporate failure'?
Context: Hanif Ullah et al.: Connecting Disjoint Nodes Through a UAV-Based Wireless Network for Bridging Communication Using IEEE 802.11 Protocols. (2020) authored by Sally I. McClean. Sally I. McClean et al.: Costing Mixed Coxian Phase-type Systems in a given time interval. (2013) authored by Sally I. McClean. Chunbo Luo et al.: Hybrid Demodulate-Forward Relay Protocol for Two-Way Relay Channels. (2015) authored by Sally I. McClean. Chunbo Luo et al.: Hybrid Demodulate-Forward Relay Protocol for Two-Way Relay Channels. (2015) authored by Sally I. McClean. Hanif Ullah et al.: An optimal UAV deployment algorithm for bridging communication. (2017) authored by Sally I. McClean. Petre Kulkarni et al.: Deploying Lightweight Queue Management for improving performance of Mobile Ad-hoc Networks (MANETs). (2006) authored by Sally I. McClean. Md Israfil Biswas et al.: An Efficient Rerouting Approach in Software Defined Networks. (2018) authored by Sally I. McClean. Hanif Ullah et al.: An Unmanned Aerial Vehicle Based Wireless Network for Bridging Communication. (2017) authored by Sally I. McClean. Petre Kulkarni et al.: Building a controlled delay assured forwarding class in differentiated services networks. (2006) authored by Sally I. McClean. Md Israfil Biswas et al.: A SDN-based On-Demand Path Provisioning Approach across Multi-domain Optical Networks. (2018) authored by Sally I. McClean. Philip Perry et al.: All-Optical Network Capacity for 5G Cellular Fronthaul. (2019) authored by Sally I. McClean. Parag G. Kulkarni et al.: A Lightweight, Scalable and Distributed Admission Control Algorithm for Voice Traffic. (2007) authored by Sally I. McClean. Mark P. Donnelly et al.: A Mobile Multimedia Technology to Aid Those with Alzheimer's Disease. (2010) authored by Sally I. McClean. Matthew Burns et al.: Using Convolutional Neural Networks with Multiple Thermal Sensors for Unobtrusive Pose Recognition. (2020) authored by Sally I. McClean. Md Israfil Biswas et al.: A Practical Evaluation in Openstack Live Migration of VMs Using 10Gb/s Interfaces. (2016) authored by Sally I. McClean. Philip Perry et al.: Comparison of Analogue and Digital Fronthaul for 5G MIMO Signals. (2020) authored by Sally I. McClean. Lalit Garg et al.: Clustering patient length of stay using mixtures of Gaussian models and phase type distributions. (2009) authored by Sally I. McClean. Chunbo Luo et al.: Communication provision for a team of remotely searching UAVs: A mobile relay approach. (2012) authored by Sally I. McClean. Brahim Allan et al.: Towards automatic placement of media objects in a personalised TV experience. (2022) authored by Sally I. McClean. Huseyin Abaci et al.: Dynamic bit-rate adjustment based on traffic characteristics for metro and core networks. (2011) authored by Sally I. McClean. Md Israfil Biswas et al.: A Policy Based Framework for Software Defined Optical Networks. (2017) authored by Sally I. McClean. Cathryn Peoples et al.: A Review of IoT Service Provision to Assess the Potential for System Interoperability in an Uncertain Ecosystem. (2019) authored by Sally I. McClean. Jing Ning et al.: 3D Reconstruction from Two Orthogonal Views Using Simulated Annealing Approach. (2001) authored by Sally I. McClean. Chunbo Luo et al.: Relaying for 5G: A novel low-error relaying protocol. (2015) authored by Sally I. McClean. Naghmeh Moradpoor et al.: Hybrid optical and wireless technology integrations for next generation broadband access networks. (2011) authored by Sally I. McClean. Huaizhong Zhang et al.: MCMC-Based Algorithm to Adjust Scale Bias in Large Series of Electron Microscopical Ultrathin Sections. (2009) authored by Sally I. McClean. Sally I. McClean et al.: Using mixed phase-type distributions to model patient pathways. (2010) authored by Sally I. McClean. Isaac K. E. Ampomah et al.: Every Layer Counts: Multi-Layer Multi-Head Attention for Neural Machine Translation. (2020) authored by Sally I. McClean. Chunbo Luo et al.: Multiple-source multiple-destinations relay channels with network coding. (2013) authored by Sally I. McClean. Miguel Angel Ortiz Barrios et al.: Reducing Appointment Lead-Time in an Outpatient Department of Gynecology and Obstetrics Through Discrete-Event Simulation: A Case Study. (2016) authored by Sally I. McClean. Isaac Kojo Essel Ampomah et al.: Dual contextual module for neural machine translation. (2021) authored by Sally I. McClean. Xin Hong et al.: Model-Based Segmentation of Multimodal Images. (2007) authored by Sally I. McClean. Dominic E. Holmes et al.: Using Fitt's Law to Model Arm Motion Tracked in 3D by a Leap Motion Controller for Virtual Reality Upper Arm Stroke Rehabilitation. (2016) authored by Sally I. McClean. Lalit Garg et al.: Optimal Control of Patient Admissions to Satisfy Resource Restrictions. (2008) authored by Sally I. McClean She was the second president of the Irish Statistical Association, serving as president from 1998 to 2000. "}
output format: answer
|
Belfast
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: The researcher with a co-author from QAware and creator of the paper Monotonicity Inference for Higher-Order Formulas in J. Autom. Reason., hIndex, is?
Context: Jasmin Christian Blanchette name Jasmin Christian Blanchette. Jasmin Christian Blanchette alternativeName Jasmin Christian Blanchette. Jasmin Christian Blanchette alternativeName Jasmin Blanchette. Jasmin Christian Blanchette alternativeName Jasmin C. Blanchette. Jasmin Christian Blanchette alternativeName J.C. Blanchette. Jasmin Blanchette affiliation University of Lorraine, Nancy, France. Jasmin Blanchette is Person. Jasmin Christian Blanchette member of French National Centre for Scientific Research. Jasmin Christian Blanchette i10Index 45. Jasmin Christian Blanchette 2YrMeanCitedness 1.1111111640930175781. Jasmin Blanchette primary affiliation Ludwig Maximilian University of Munich, Germany. Jasmin Christian Blanchette and Olaf Owe: An Open System Operational Semantics for an Object-Oriented and Component-Based Language. (2007) authored by Jasmin Blanchette. Jasmin Christian Blanchette citedByCount 1656. Jasmin Christian Blanchette orcidId https://orcid.org/0000-0002-8367-0936. Jasmin Blanchette link http://www4.in.tum.de/~blanchet/. Jasmin Blanchette affiliation Vrije Universiteit Amsterdam, The Netherlands. Jasmin Blanchette affiliation Ludwig Maximilian University of Munich, Germany\nBlanchette earned a Bachelor of Science degree in computer science from the Université de Sherbrooke, a Master of Science in computer science from the University of Oslo, and a PhD in computer science from the Technical University of Munich. '}
output format: answer
|
20
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where did the author who published A Visual Framework Invites Human into the Clustering Process complete her Ph.D.?
Context: Rui Zhang et al.: Dynamic and Efficient Private Keyword Search over Inverted Index-Based Encrypted Data. (2016) authored by Ling Liu 0001. Emre Yigitoglu et al.: Utility-Aware and Privacy-Preserving Mobile Query Services. (2023) authored by Ling Liu 0001. Emre Yigitoglu et al.: Utility-aware and privacy-preserving mobile query services. (2019) authored by Ling Liu 0001. Mudhakar Srivatsa et al.: EventGuard: A System Architecture for Securing Publish-Subscribe Networks. (2011) authored by Ling Liu 0001. Mudhakar Srivatsa et al.: TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. (2005) authored by Ling Liu 0001. Mudhakar Srivatsa and Ling Liu: Securing publish-subscribe overlay services with EventGuard. (2005) authored by Ling Liu 0001. Hui Yan et al.: Data Offloading Enabled by Heterogeneous UAVs for IoT Applications Under Uncertain Environments. (2023) authored by Ling Liu 0001. Mudhakar Srivatsa et al.: Preserving Caller Anonymity in Voice-over-IP Networks. (2008) authored by Ling Liu 0001. Mudhakar Srivatsa et al.: A Middleware System for Protecting Against Application Level Denial of Service Attacks. (2006) authored by Ling Liu 0001. Ming Xu et al.: Multi-Party Secret Key Generation Over Underwater Acoustic Channels. (2020) authored by Ling Liu 0001. Mudhakar Srivatsa et al.: Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. (2008) authored by Ling Liu 0001. Mudhakar Srivatsa et al.: Privacy in VoIP Networks: Flow Analysis Attacks and Defense. (2011) authored by Ling Liu 0001. Mudhakar Srivatsa et al.: ExchangeGuard: A Distributed Protocol for Electronic Fair-Exchange. (2005) authored by Ling Liu 0001. Bhuvan Bamba et al.: Road Network-Aware Anonymization in Mobile Systems with Reciprocity Support. (2015) authored by Ling Liu 0001. Yuzhe Richard Tang et al.: e-PPI: Locator Service in Information Networks with Personalized Privacy Preservation. (2014) authored by Ling Liu 0001. Qinyuan Feng et al.: Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses. (2010) authored by Ling Liu 0001. Yuzhe Richard Tang and Ling Liu: Privacy-Preserving Multi-Keyword Search in Information Networks. (2015) authored by Ling Liu 0001. Li Xiong et al.: Countering feedback sparsity and manipulation in reputation systems. (2007) authored by Ling Liu 0001. Mudhakar Srivatsa et al.: A Client-Transparent Approach to Defend Against Denial of Service Attacks. (2006) authored by Ling Liu 0001. Mudhakar Srivatsa and Ling Liu: Securing decentralized reputation management using TrustGuard. (2006) authored by Ling Liu 0001. Qi Zhang et al.: StackVault: Protection from Untrusted Functions. (2019) authored by Ling Liu 0001. Qi Zhang et al.: StackVault: Protection from Untrusted Functions. (2020) authored by Ling Liu 0001. Mudhakar Srivatsa and Ling Liu: Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach. (2009) authored by Ling Liu 0001. Yuzhe Richard Tang et al.: Lightweight authentication of freshness in outsourced key-value stores. (2014) authored by Ling Liu 0001. Bingbing Song et al.: Securing Deep Learning as a Service Against Adaptive High Frequency Attacks With MMCAT. (2023) authored by Ling Liu 0001. Yuzhe Richard Tang et al.: Deferred Lightweight Indexing for Log-Structured Key-Value Stores. (2015) authored by Ling Liu 0001. Ling Liu et al.: XWRAP: An XML-Enabled Wrapper Construction System for Web Information Sources. (2000) authored by Ling Liu 0001. Tarik Arici et al.: PINCO: a pipelined in-network compression scheme for data collection in wireless sensor networks. (2003) authored by Ling Liu 0001. Zhongwei Xie et al.: Cross-Modal Joint Embedding with Diverse Semantics. (2020) authored by Ling Liu 0001. Ming Xu et al.: Covert Secret-Key Agreement Protocol Based on the Underwater Acoustic Channel. (2022) authored by Ling Liu 0001. Sung-Hyun Sim et al.: Bagging Recurrent Event Imputation for Repair of Imperfect Event Log With Missing Categorical Events. (2023) authored by Ling Liu 0001. Jingpei Dan et al.: Real-Time Bridge Structural Condition Evaluation Based on Data Compression. (2019) authored by Ling Liu 0001. Mudhakar Srivatsa et al.: A Scalable Method for Access Control in Location-Based Broadcast Services. (2008) authored by Ling Liu 0001. Mudhakar Srivatsa and Ling Liu: Countering Targeted File Attacks Using LocationGuard. (2005) authored by Ling Liu 0001. Zhengtao Jiang et al.: Research on oblivious keyword search protocols with CKA security. (2018) authored by Ling Liu 0001. Gaoyang Liu et al.: Synchronization-Free GPS Spoofing Detection with Crowdsourced Air Traffic Control Data. (2019) authored by Ling Liu 0001. Xianqiang Bao et al.: Persistence and Recovery for In-Memory NoSQL Services: A Measurement Study. (2016) authored by Ling Liu 0001. David Buttler et al.: Efficient web change monitoring with page digest. (2004) authored by Ling Liu 0001. Ming Xu and Ling Liu: Sender-Receiver Role-Based Energy-Aware Scheduling for Internet of Underwater Things. (2019) authored by Ling Liu 0001. Ka Ho Chow et al.: Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks. (2019) authored by Ling Liu 0001. Ka Ho Chow et al.: Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks. (2019) authored by Ling Liu 0001. Zhiyuan Su et al.: Reliable and Resilient Trust Management in Distributed Service Provision Networks. (2015) authored by Ling Liu 0001. Mudhakar Srivatsa and Ling Liu: Secure Event Dissemination in Publish-Subscribe Networks. (2007) authored by Ling Liu 0001. De Wang et al.: Click traffic analysis of short URL spam on Twitter. (2013) authored by Ling Liu 0001. Daniel Rocco et al.: Exploiting the deep web with DynaBot: matching, probing, and ranking. (2005) authored by Ling Liu 0001. Sihao Hu et al.: BERT4ETH: A Pre-trained Transformer for Ethereum Fraud Detection. (2023) authored by Ling Liu 0001. Sihao Hu et al.: BERT4ETH: A Pre-trained Transformer for Ethereum Fraud Detection. (2023) authored by Ling Liu 0001. Wenqi Wei et al.: Bitcoin Transaction Forecasting With Deep Network Representation Learning. (2021) authored by Ling Liu 0001. Yuzhe Richard Tang et al.: Outsourcing multi-version key-value stores with verifiable data freshness. (2014) authored by Ling Liu 0001. Wenqi Wei et al.: Bitcoin Transaction Forecasting with Deep Network Representation Learning. (2020) authored by Ling Liu 0001'}. \nLiu was a 2012 recipient of the Edward J
output format: answer
|
Netherlands
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the research interest of the scholar who published Process mining and simulation: a match made in heaven!?
Context: Wil M. P. van der Aalst et al.: Supplementary Proceedings of the Seventh International Conference on Analysis of Images, Social Networks and Texts (AIST 2018), Moscow, Russia, July 5 - 7, 2018 (2018) edited by Wil M. P. van der Aalst. Wil M. P. van der Aalst et al.: Analysis of Images, Social Networks and Texts - 7th International Conference, AIST 2018, Moscow, Russia, July 5-7, 2018, Revised Selected Papers (2018) edited by Wil M. P. van der Aalst. Wil M. P. van der Aalst et al.: Analysis of Images, Social Networks and Texts - 6th International Conference, AIST 2017, Moscow, Russia, July 27-29, 2017, Revised Selected Papers (2018) edited by Wil M. P. van der Aalst. Wil M. P. van der Aalst et al.: Analysis of Images, Social Networks and Texts - 8th International Conference, AIST 2019, Kazan, Russia, July 17-19, 2019, Revised Selected Papers (2020) edited by Wil M. P. van der Aalst. Wil M. P. van der Aalst et al.: Analysis of Images, Social Networks and Texts - 8th International Conference, AIST 2019, Kazan, Russia, July 17-19, 2019, Revised Selected Papers (2019) edited by Wil M. P. van der Aalst. Wil M. P. van der Aalst et al.: Recent Trends in Analysis of Images, Social Networks and Texts - 9th International Conference, AIST 2020, Skolkovo, Moscow, Russia, October 15-16, 2020 Revised Supplementary Proceedings (2021) edited by Wil M. P. van der Aalst. Wil M. P. van der Aalst et al.: Analysis of Images, Social Networks and Texts - 9th International Conference, AIST 2020, Skolkovo, Moscow, Russia, October 15-16, 2020, Revised Selected Papers (2021) edited by Wil M. P. van der Aalst. Wil M. P. van der Aalst et al.: Supplementary Proceedings of the Sixth International Conference on Analysis of Images, Social Networks and Texts (AIST 2017), Moscow, Russia, July 27 - 29, 2017 (2017) edited by Wil M. P. van der Aalst. Dennis M. M. Schunselaar et al.: A Framework for Efficiently Deciding Language Inclusion for Sound Unlabelled WF-Nets. (2013) authored by Wil M. P. van der Aalst. Majid Rafiei et al.: TraVaG: Differentially Private Trace Variant Generation Using GANs. (2023) authored by Wil M. P. van der Aalst. Majid Rafiei et al.: TraVaG: Differentially Private Trace Variant Generation Using GANs. (2023) authored by Wil M. P. van der Aalst. Maja Pesic et al.: Enacting Declarative Languages Using LTL: Avoiding Errors and Improving Performance. (2010) authored by Wil M. P. van der Aalst. Alessandro Artale et al.: Enriching Data Models with Behavioral Constraints. (2019) authored by Wil M. P. van der Aalst. H. M. W. Verbeek et al.: Reduction rules for reset/inhibitor nets. (2010) authored by Wil M. P. van der Aalst. Wil M. P. van der Aalst et al.: "Compositionality of projection inheritance" [Sci. Comput. Programming 42 (2-3) (2002) 129-171]. (2002) authored by Wil M. P. van der Aalst. Nataliya Mulyar et al.: The Conceptualization of a Configurable Multi-party Multi-message Request-Reply Conversation. (2007) authored by Wil M. P. van der Aalst. Indira Sen et al.: People Make Better Edits: Measuring the Efficacy of LLM-Generated Counterfactually Augmented Data for Harmful Language Detection. (2023) authored by Wil M. P. van der Aalst. Indira Sen et al.: People Make Better Edits: Measuring the Efficacy of LLM-Generated Counterfactually Augmented Data for Harmful Language Detection. (2023) authored by Wil M. P. van der Aalst. Lukas Liss et al.: Object-Centric Alignments. (2023) authored by Wil M. P. van der Aalst. Lukas Liss et al.: Object-Centric Alignments. (2023) authored by Wil M. P. van der Aalst. Arya Adriansyah et al.: Alignment Based Precision Checking. (2012) authored by Wil M. P. van der Aalst. Alfredo Cuzzocrea et al.: Proceedings of the 11th International Conference on Data Science, Technology and Applications, DATA 2022, Lisbon, Portugal, July 11-13, 2022. (2022) edited by Wil M. P. van der Aalst. Diego Calvanese et al.: Conceptual Schema Transformation in Ontology-based Data Access (Extended Abstract). (2018) authored by Wil M. P. van der Aalst. Diego Calvanese et al.: Conceptual Schema Transformation in Ontology-Based Data Access. (2018) authored by Wil M. P. van der Aalst. Alessandro Berti and Wil M. P. van der Aalst: Extracting Multiple Viewpoint Models from Relational Databases. (2019) authored by Wil M. P. van der Aalst. Alessandro Berti and Wil M. P. van der Aalst: Extracting Multiple Viewpoint Models from Relational Databases. (2020) authored by Wil M. P. van der Aalst. Mohammadreza Fani Sani et al.: Model-Independent Error Bound Estimation for Conformance Checking Approximation. (2023) authored by Wil M. P. van der Aalst. Wil M. P. van der Aalst i10Index 422. Wil M. P. van der Aalst: Reduction Using Induced Subnets to Systematically Prove Properties for Free-Choice Nets. (2021) authored by Wil M. P. van der Aalst. Wil M. P. van der Aalst: Reduction Using Induced Subnets To Systematically Prove Properties For Free-Choice Nets. (2021) authored by Wil M. P. van der Aalst. Daniel Schuster et al.: Conformance Checking for Trace Fragments Using Infix and Postfix Alignments. (2022) authored by Wil M. P. van der Aalst. Daniel Schuster et al.: Conformance Checking for Trace Fragments Using Infix and Postfix Alignments. (2022) authored by Wil M. P. van der Aalst. Jan Mendling et al.: Generating correct EPCs from configured C-EPCs. (2006) authored by Wil M. P. van der Aalst. Tobias Brockhoff et al.: Time-aware Concept Drift Detection Using the Earth Mover's Distance. (2020) authored by Wil M. P. van der Aalst. Guangming Li et al.: Automatic Discovery of Object-Centric Behavioral Constraint Models. (2017) authored by Wil M. P. van der Aalst. Marcus Dees et al.: Accurate Predictions, Invalid Recommendations: Lessons Learned at the Dutch Social Security Institute UWV. (2021) authored by Wil M. P. van der Aalst. Mohammadreza Fani Sani et al.: Model Independent Error Bound Estimation for Conformance Checking Approximation. (2021) authored by Wil M. P. van der Aalst. Marcello La Rosa et al.: Questionnaire-based variability modeling for system configuration. (2009) authored by Wil M. P. van der Aalst. María Adela Grando et al.: Semantic-Based Conformance Checking of Computer Interpretable Medical Guidelines. (2011) authored by Wil M. P. van der Aalst. Christoph Quix et al.: Proceedings of the 10th International Conference on Data Science, Technology and Applications, DATA 2021, Online Streaming, July 6-8, 2021. (2021) edited by Wil M. P. van der Aalst. Elham Ramezani Taghiabadi et al.: Compliance Checking of Data-Aware and Resource-Aware Compliance Requirements. (2014) authored by Wil M. P. van der Aalst. Fabrizio Maria Maggi et al.: A Knowledge-Based Integrated Approach for Discovering and Repairing Declare Maps. (2013) authored by Wil M. P. van der Aalst. H. M. W. Verbeek and Wil M. P. van der Aalst: Merging Alignments for Decomposed Replay. (2016) authored by Wil M. P. van der Aalst. Cong Liu et al.: A General Framework to Identify Software Components from Execution Data. (2019) authored by Wil M. P. van der Aalst. Wil M. P. van der Aalst: Free-choice Nets with Home Clusters are Lucent. (2021) authored by Wil M. P. van der Aalst. Wil M. P. van der Aalst: Free-Choice Nets With Home Clusters Are Lucent. (2021) authored by Wil M. P. van der Aalst. Guangming Li et al.: Object-centric behavioral constraint models: a hybrid model for behavioral and data perspectives. (2019) authored by Wil M. P. van der Aalst. Uwe Zdun et al.: A survey of patterns for Service-Oriented Architectures. (2006) authored by Wil M. P. van der Aalst. Nataliya Mulyar et al.: Declarative and Procedural Approaches for Modelling Clinical Guidelines: Addressing Flexibility Issues. (2007) authored by Wil M. P. van der Aalst. Maikel L. van Eck et al.: Data-Driven Usability Test Scenario Creation. (2018) authored by Wil M. P. van der Aalst
output format: answer
|
information systems, business process management, simulation, Petri nets, process models, workflow management systems, verification techniques, process mining, enterprise resource planning systems, computer supported cooperative work, web services, business process redesign, resource allocation, and interorganizational business processes
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What university did the author of Parameterized SAT work at as a Lecturer and then Reader from 2004 to 2009?
Context: Eduard Eiben et al.: Meta-Kernelization using Well-Structured Modulators. (2015) authored by Stefan Szeider. Eduard Eiben et al.: Meta-kernelization using Well-structured Modulators. (2015) authored by Stefan Szeider. Eduard Eiben et al.: Meta-kernelization using well-structured modulators. (2018) authored by Stefan Szeider. Neeldhara Misra et al.: Upper and Lower Bounds for Weak Backdoor Set Detection. (2013) authored by Stefan Szeider. Neeldhara Misra et al.: Upper and Lower Bounds for Weak Backdoor Set Detection (2013) authored by Stefan Szeider. Michael R. Fellows et al.: Clique-width minimization is NP-hard. (2006) authored by Stefan Szeider. Michael R. Fellows et al.: Proving NP-hardness for clique-width II: non-approximability of clique-width (2005) authored by Stefan Szeider. Robert Ganian et al.: Sum-of-Products with Default Values: Algorithms and Complexity Results. (2022) authored by Stefan Szeider. Michael R. Fellows et al.: Clique-Width is NP-Complete. (2009) authored by Stefan Szeider. Robert Ganian et al.: Sum-of-Products with Default Values: Algorithms and Complexity Results. (2018) authored by Stefan Szeider. Gregory Z. Gutin et al.: Corrigendum. The Linear Arrangement Problem Parameterized Above Guaranteed Value. (2013) authored by Stefan Szeider. Michael R. Fellows et al.: Proving NP-hardness for clique-width I: non-approximability of sequential clique-width (2005) authored by Stefan Szeider. Stefan Szeider name Stefan Szeider. Friedrich Slivovsky and Stefan Szeider: Model Counting for Formulas of Bounded Clique-Width. (2014) authored by Stefan Szeider. Friedrich Slivovsky and Stefan Szeider: Model Counting for Formulas of Bounded Clique-Width. (2013) authored by Stefan Szeider. André Schidler et al.: Threshold Treewidth and Hypertree Width. (2022) authored by Stefan Szeider. Sebastian Ordyniak et al.: A General Theoretical Framework for Learning Smallest Interpretable Models. (2024) authored by Stefan Szeider. Robert Ganian et al.: Threshold Treewidth and Hypertree Width. (2022) authored by Stefan Szeider. Robert Ganian et al.: Threshold Treewidth and Hypertree Width. (2020) authored by Stefan Szeider. Robert Ganian et al.: Algorithmic Applications of Tree-Cut Width. (2015) authored by Stefan Szeider. Stefan Szeider is Creator. Stefan Szeider alternativeName Stefan Szeider. Robert Ganian et al.: Algorithmic Applications of Tree-Cut Width. (2022) authored by Stefan Szeider. Robert Ganian et al.: Algorithmic Applications of Tree-Cut Width. (2022) authored by Stefan Szeider. Fedor V. Fomin et al.: k-Gap Interval Graphs. (2012) authored by Stefan Szeider. Stefan Szeider alternativeName S. Szeider. Pim van 't Hof et al.: On Contracting Graphs to Fixed Pattern Graphs. (2010) authored by Stefan Szeider. Pim van 't Hof et al.: On graph contractions and induced minors. (2012) authored by Stefan Szeider. Johannes Klaus Fichte et al.: An SMT Approach to Fractional Hypertree Width. (2018) authored by Stefan Szeider. Franz-Xaver Reichl et al.: Circuit Minimization with QBF-Based Exact Synthesis. (2023) authored by Stefan Szeider. Stefan Szeider member of TU Wien. Eduard Eiben et al.: Learning Small Decision Trees with Large Domain. (2023) authored by Stefan Szeider. Laura Kovács et al.: Formalizing Graph Trail Properties in Isabelle/HOL. (2021) authored by Stefan Szeider. Konrad K. Dabrowski et al.: Learning Small Decision Trees for Data of Low Rank-Width. (2024) authored by Stefan Szeider. Laura Kovács et al.: Formalizing Graph Trail Properties in Isabelle/HOL. (2020) authored by Stefan Szeider. Eduard Eiben et al.: The Computational Complexity of Concise Hypersphere Classification. (2023) authored by Stefan Szeider. Eduard Eiben et al.: The Computational Complexity of Concise Hypersphere Classification. (2023) authored by Stefan Szeider'}. \nSzeider also worked on width measures for graphs such as treewidth and clique-width
output format: answer
|
University of Durham, UK
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many papers does the academic institution of the researcher who published 'Edge computing in context - Research and engineering challenges' have?
Context: Schahram Dustdar alternativeName Schrahram Dustdar. Schahram Dustdar alternativeName Schahram Dustdar. Schahram Dustdar alternativeName Dustdar. Schahram Dustdar alternativeName Dustdar Schahram. Schahram Dustdar alternativeName Schahramn Dustdar. Schahram Dustdar alternativeName S. Dustdar. Schahram Dustdar modified 2023-10-18. Schahram Dustdar name Schahram Dustdar. Schahram Dustdar alternativeName Scharam Dustdar. Schahram Dustdar 2YrMeanCitedness 5.3440861701965332031. Zhu Xiao et al.: Predicting Urban Region Heat via Learning Arrive-Stay-Leave Behaviors of Private Cars. (2023) authored by Schahram Dustdar. Zhenjie Zhang et al.: A novel nonlinear causal inference approach using vector-based belief rule base. (2021) authored by Schahram Dustdar. Waldemar Hummer et al.: Testing of data-centric and event-based dynamic service compositions. (2013) authored by Schahram Dustdar. Philipp Leitner et al.: Preventing SLA Violations in Service Compositions Using Aspect-Based Fragment Substitution. (2010) authored by Schahram Dustdar. Zhenjie Zhang et al.: Intelligent identification for vertical track irregularity based on multi-level evidential reasoning rule model. (2022) authored by Schahram Dustdar. Christian Inzinger et al.: Non-intrusive policy optimization for dependable and adaptive service-oriented systems. (2012) authored by Schahram Dustdar. Mohammad Allahbakhsh et al.: Quality Control in Crowdsourcing Systems: Issues and Directions. (2013) authored by Schahram Dustdar. Schahram Dustdar is Person. Hong Linh Truong et al.: On Identifying and Reducing Irrelevant Information in Service Composition and Execution. (2010) authored by Schahram Dustdar. Alessio Arleo et al.: Sabrina: Modeling and Visualization of Financial Data over Time with Incremental Domain Knowledge. (2019) authored by Schahram Dustdar. Konrad Pfadenhauer et al.: Challenges and Solutions for Model Driven Web Service Composition. (2005) authored by Schahram Dustdar. Alessio Arleo et al.: Sabrina: Modeling and Visualization of Economy Data with Incremental Domain Knowledge. (2019) authored by Schahram Dustdar. Shizhan Liu et al.: Pyraformer: Low-Complexity Pyramidal Attention for Long-Range Time Series Modeling and Forecasting. (2022) authored by Schahram Dustdar. Ognjen Scekic et al.: PRINGL - A domain-specific language for incentive management in crowdsourcing. (2015) authored by Schahram Dustdar. Waldemar Hummer et al.: Test Coverage of Data-Centric Dynamic Compositions in Service-Based Systems. (2011) authored by Schahram Dustdar. Philipp Leitner et al.: Data-driven and automated prediction of service level agreement violations in service compositions. (2013) authored by Schahram Dustdar. Alireza Furutanpey et al.: FrankenSplit: Saliency Guided Neural Feature Compression with Shallow Variational Bottleneck Injection. (2023) authored by Schahram Dustdar. Roman Khazankin et al.: Adaptive Request Prioritization in Dynamic Service-Oriented Systems. (2011) authored by Schahram Dustdar. Yuanwei Zhu et al.: A Semantic-Aware Transmission With Adaptive Control Scheme for Volumetric Video Service. (2023) authored by Schahram Dustdar. Christoph Dorn and Schahram Dustdar: Interaction-Driven Self-adaptation of Service Ensembles. (2010) authored by Schahram Dustdar. Shengtao Sun et al.: Remote Sensing Image Interpretation With Semantic Graph-Based Methods: A Survey. (2022) authored by Schahram Dustdar. Lukasz Juszczyk and Schahram Dustdar: Script-Based Generation of Dynamic Testbeds for SOA. (2011) authored by Schahram Dustdar. Schahram Dustdar orcidId https://orcid.org/0000-0001-6872-8821. Oliver Hanappi et al.: Asserting reliable convergence for configuration management scripts. (2016) authored by Schahram Dustdar. Clemens Lachner et al.: A Data Protection Focused Adaptation Engine for Distributed Video Analytics Pipelines. (2022) authored by Schahram Dustdar. Schahram Dustdar and Wolfgang Schreiner: A survey on web services composition. (2005) authored by Schahram Dustdar. Florian Skopik et al.: Discovering and Managing Social Compositions in Collaborative Enterprise Crowdsourcing Systems. (2012) authored by Schahram Dustdar. Christoph Dorn et al.: Interaction mining and skill-dependent recommendations for multi-objective team composition. (2011) authored by Schahram Dustdar. Hongbo Jiang et al.: A Utility-Aware General Framework With Quantifiable Privacy Preservation for Destination Prediction in LBSs. (2021) authored by Schahram Dustdar. Jingyang Hu et al.: BlinkRadar: Non-Intrusive Driver Eye-Blink Detection with UWB Radar. (2022) authored by Schahram Dustdar. Fei Li and Schahram Dustdar: Incorporating Unsupervised Learning in Activity Recognition. (2011) authored by Schahram Dustdar. Schahram Dustdar: Design by Units - A Novel Approach for Building Elastic Systems. (2012) authored by Schahram Dustdar. Lukasz Juszczyk and Schahram Dustdar: Script-Based Generation of Dynamic Testbeds for SOA. (2010) authored by Schahram Dustdar. Alessio Arleo et al.: Visual Exploration of Financial Data with Incremental Domain Knowledge. (2023) authored by Schahram Dustdar. Philipp Leitner et al.: Cost-Based Optimization of Service Compositions. (2013) authored by Schahram Dustdar. Xiaojian Xu et al.: Data classification based on attribute vectorization and evidence fusion. (2022) authored by Schahram Dustdar. Waldemar Hummer et al.: Deriving a unified fault taxonomy for event-based systems. (2012) authored by Schahram Dustdar. Ognjen Scekic et al.: Social Interaction Analysis for Team Collaboration. (2018) authored by Schahram Dustdar. Waldemar Hummer et al.: Dynamic Migration of Processing Elements for Optimized Query Execution in Event-Based Systems. (2011) authored by Schahram Dustdar. Jingyang Hu et al.: EarSonar: An Acoustic Signal-Based Middle-Ear Effusion Detection Using Earphones. (2023) authored by Schahram Dustdar'}. You can help Wikipedia by expanding it
output format: answer
|
62886
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the number of articles attributed to the institution where the author of 'On Scheduling and Real-Time Capacity of Hexagonal Wireless Sensor Networks' works?
Context: Yu Meng et al.: Tuning Language Models as Training Data Generators for Augmentation-Enhanced Few-Shot Learning. (2022) authored by Tarek F. Abdelzaher. Yu Meng et al.: Tuning Language Models as Training Data Generators for Augmentation-Enhanced Few-Shot Learning. (2023) authored by Tarek F. Abdelzaher. Chi Han et al.: LM-Switch: Lightweight Language Model Conditioning in Word Embedding Space. (2023) authored by Tarek F. Abdelzaher. Xinyi Liu et al.: Unsupervised Image Classification by Ideological Affiliation from User-Content Interaction Patterns. (2023) authored by Tarek F. Abdelzaher. Hyungsul Kim et al.: NDPMine: Efficiently Mining Discriminative Numerical Features for Pattern-Based Classification. (2010) authored by Tarek F. Abdelzaher. Tarek Abdelzaher name Tarek Abdelzaher. Walid A. Hanafy et al.: Failure-Resilient ML Inference at the Edge through Graceful Service Degradation. (2023) authored by Tarek F. Abdelzaher. Chaoqi Yang et al.: Quantifying Projected Impact of Social Distancing Policies on COVID-19 Outcomes in the US. (2020) authored by Tarek F. Abdelzaher. Yigong Hu et al.: On Exploring Image Resizing for Optimizing Criticality-based Machine Perception. (2021) authored by Tarek F. Abdelzaher. Tarek Abdelzaher alternativeName Tarek Abdelzaher. Huajie Shao et al.: Challenging β-VAE with β<1 for Disentanglement Via Dynamic Learning. (2020) authored by Tarek F. Abdelzaher. Shengzhong Liu et al.: On Removing Algorithmic Priority Inversion from Mission-critical Machine Inference Pipelines. (2020) authored by Tarek F. Abdelzaher. Chenkai Sun et al.: Decoding the Silent Majority: Inducing Belief Augmented Social Graph with Large Language Model for Response Forecasting. (2023) authored by Tarek F. Abdelzaher. Chenkai Sun et al.: Decoding the Silent Majority: Inducing Belief Augmented Social Graph with Large Language Model for Response Forecasting. (2023) authored by Tarek F. Abdelzaher. Hyungsul Kim et al.: Signature Pattern Covering via Local Greedy Algorithm and Pattern Shrink. (2011) authored by Tarek F. Abdelzaher. Huajie Shao et al.: Misinformation Detection and Adversarial Attack Cost Analysis in Directional Social Networks. (2020) authored by Tarek F. Abdelzaher. Meet P. Vadera et al.: URSABench: A System for Comprehensive Benchmarking of Bayesian Deep Neural Network Models and Inference methods. (2022) authored by Tarek F. Abdelzaher. Yanbing Mao et al.: Cost Function Learning in Memorized Social Networks with Cognitive Behavioral Asymmetry. (2022) authored by Tarek F. Abdelzaher. Yanbing Mao et al.: Cost Function Learning in Memorized Social Networks With Cognitive Behavioral Asymmetry. (2024) authored by Tarek F. Abdelzaher. Shen Li et al.: Stark: Optimizing In-Memory Computing for Dynamic Dataset Collections. (2017) authored by Tarek F. Abdelzaher. Prasanna Giridhar and Tarek F. Abdelzaher: Demo: Event Localization using Instagram. (2016) authored by Tarek F. Abdelzaher. Md. Tanvir Al Amin et al.: Unveiling polarization in social networks: A matrix factorization approach. (2017) authored by Tarek F. Abdelzaher. Tarek Abdelzaher alternativeName Tarek F. Abdelzaher. Yiran Zhao et al.: On the improvement of classifying EEG recordings using neural networks. (2017) authored by Tarek F. Abdelzaher. Huajie Shao et al.: ControlVAE: Controllable Variational Autoencoder. (2020) authored by Tarek F. Abdelzaher. Chaoqi Yang et al.: Disentangling Overlapping Beliefs by Structured Matrix Factorization. (2020) authored by Tarek F. Abdelzaher. Dachun Sun et al.: Computational Modeling of Hierarchically Polarized Groups by Structured Matrix Factorization. (2021) authored by Tarek F. Abdelzaher. Yiran Zhao et al.: VibeBin: A Vibration-Based Waste Bin Level Detection System. (2017) authored by Tarek F. Abdelzaher. Shengzhong Liu et al.: GIobalFusion: A Global Attentional Deep Learning Framework for Multisensor Information Fusion. (2020) authored by Tarek F. Abdelzaher. Tarek F. Abdelzaher et al.: Towards a Layered Architecture for Object-Based Execution in Wide-Area Deeply Embedded Computing. (2007) authored by Tarek F. Abdelzaher. Tarek F. Abdelzaher is Person. Shengzhong Liu et al.: Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines. (2024) authored by Tarek F. Abdelzaher. Yanbing Mao et al.: Dynamics of Public Opinion Evolution with Asymmetric Cognitive Bias. (2021) authored by Tarek F. Abdelzaher. Huajie Shao et al.: Controllable and Diverse Text Generation in E-commerce. (2021) authored by Tarek F. Abdelzaher. Huajie Shao et al.: Controllable and Diverse Text Generation in E-commerce. (2021) authored by Tarek F. Abdelzaher. Hang Cui and Tarek F. Abdelzaher: SenseLens: An Efficient Social Signal Conditioning System for True Event Detection. (2022) authored by Tarek F. Abdelzaher. Tarek Abdelzaher alternativeName T. Abdelzaher. Chaoqi Yang et al.: Hierarchical Overlapping Belief Estimation by Structured Matrix Factorization. (2020) authored by Tarek F. Abdelzaher. Yunan Zhang et al.: Macross: Urban Dynamics Modeling based on Metapath Guided Cross-Modal Embedding. (2019) authored by Tarek F. Abdelzaher. Xiang Ren et al.: CoType: Joint Extraction of Typed Entities and Relations with Knowledge Bases. (2016) authored by Tarek F. Abdelzaher. Xiang Ren et al.: CoType: Joint Extraction of Typed Entities and Relations with Knowledge Bases. (2017) authored by Tarek F. Abdelzaher. Shengzhong Liu et al.: On Exploring Attention-based Explanation for Transformer Models in Text Classification. (2021) authored by Tarek F. Abdelzaher. Huajie Shao et al.: Controllable Variational Autoencoder. (2020) authored by Tarek F. Abdelzaher. Tarek Abdelzaher alternativeName T. F. Abdelzaher. Jinning Li et al.: Unsupervised Belief Representation Learning with Information-Theoretic Variational Graph Auto-Encoders. (2022) authored by Tarek F. Abdelzaher. Tarek Abdelzaher alternativeName T.F.A. AbdelZaher. Jinning Li et al.: Unsupervised Belief Representation Learning in Polarized Networks with Information-Theoretic Variational Graph Auto-Encoders. (2021) authored by Tarek F. Abdelzaher. Shiwei Fang et al.: Optimizing Intelligent Edge-clouds with Partitioning, Compression and Speculative Inference. (2021) authored by Tarek F. Abdelzaher. Md. Yusuf Sarwar Uddin et al.: PhotoNet+: outlier-resilient coverage maximization in visual sensing applications. (2012) authored by Tarek F. Abdelzaher. Wenbo He et al.: PDA: Privacy-Preserving Data Aggregation for Information Collection. (2011) authored by Tarek F. Abdelzaher Shin. "'}
output format: answer
|
252899
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Who is the nationality of the author of A Real-Integer-Discrete-Coded Differential Evolution Algorithm: A Preliminary Study?
Context: José Rui Figueira et al.: A multiple criteria approach for constructing a pandemic impact assessment composite indicator: The case of Covid-19 in Portugal. (2021) authored by José Rui Figueira. José Rui Figueira et al.: A multiple criteria approach for building a pandemic impact assessment composite indicator: The case of COVID-19 in Portugal. (2023) authored by José Rui Figueira. Bapi Dutta et al.: On the orness of Bonferroni mean and its variants. (2019) authored by José Rui Figueira. Isabel Maria João et al.: An Ordinal Regression Method for Multicriteria Analysis of Customer Satisfaction. (2008) authored by José Rui Figueira. José Rui Figueira primary affiliation Instituto Superior Técnico, Lisbon, Portugal. José Rui Figueira affiliation Instituto Superior Técnico, Lisbon, Portugal. Max Alaluna et al.: Secure Virtual Network Embedding in a Multi-Cloud Environment. (2017) authored by José Rui Figueira. Mário Augusto et al.: Benchmarking in a multiple criteria performance context: An application and a conceptual framework. (2008) authored by José Rui Figueira. José Rui Figueira scopus http://www.scopus.com/inward/authorDetails.url?authorID=7003315309&partnerID=MN8TOARS. José Rui Figueira 2YrMeanCitedness 4.689655303955078125. Nikolaos Argyris et al.: CUT: A Multicriteria Approach for Concavifiable Preferences. (2014) authored by José Rui Figueira. Max Alaluna et al.: Secure multi-cloud virtual network embedding. (2020) authored by José Rui Figueira. Miguel Alves Pereira et al.: A network Data Envelopment Analysis to estimate nations' efficiency in the fight against SARS-CoV-2. (2022) authored by José Rui Figueira. José Rui Figueira link https://www.scopus.com/authid/detail.uri?authorId=7003315309. Vincent Mousseau et al.: Dealing with inconsistent judgments in multiple criteria sorting models. (2006) authored by José Rui Figueira. José Rui Figueira link http://www.wikidata.org/entity/Q58862874. Rui Fragoso and José Rui Figueira: Sustainable supply chain network design: An application to the wine industry in Southern Portugal. (2021) authored by José Rui Figueira. Ana Sara Costa et al.: An application of the ELECTRE TRI-C method to characterize government performance in OECD countries. (2019) authored by José Rui Figueira Under Figueira, Team Wellington won the 2018 OFC Champions League, qualifying the club for their first ever FIFA Club World Cup; the club was knocked out on penalties to Al-Ain in the playoff round after a 3–3 draw. Figueira previously held notable roles as the head coach of Team Wellington, assistant coach of the New Zealand national team, and head coach of the New Zealand under-17 national team
output format: answer
|
English
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the institute type in which the author of the article 'Exploratory Visualization' published in 2008 works?
Context: M.J. Kraak name M.J. Kraak. Habtom Tsega et al.: Towards a smarter system for Human Sensor Web. (2015) authored by Menno-Jan Kraak. Menno-Jan Kraak is Person. Manuel Garcia Alvarez et al.: Integration and Exploitation of Sensor Data in Smart Cities through Event-Driven Applications. (2019) authored by Menno-Jan Kraak. M.J. Kraak alternativeName M. Kraak. Dong-Po Deng et al.: Using social media for collaborative species identification and occurrence: issues, methods, and tools. (2012) authored by Menno-Jan Kraak. M.J. Kraak alternativeName Menno‐Jan Kraak. Norhakim Yusof et al.: Mining Frequent Spatio-Temporal Patterns in Wind Speed and Direction. (2014) authored by Menno-Jan Kraak. M.J. Kraak alternativeName M. J. Kraak. Xiaojing Wu et al.: Co-clustering geo-referenced time series: exploring spatio-temporal patterns in Dutch temperature data. (2015) authored by Menno-Jan Kraak Between 1981 and 1983 he did his compulsory army service as an officer in a military geography unit. "}
output format: answer
|
education
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What was the birthplace of the creator of the publication 'Subcarrier index coordinate expression (SICE): An ultra-low-power OFDM-compatible wireless communications scheme tailored for internet of things'?
Context: Miriam Cha et al.: Improving Sar Automatic Target Recognition Using Simulated Images Under Deep Residual Refinements. (2018) authored by H. T. Kung 0001. H. T. Kung and John T. Robinson: On Optimistic Methods for Concurrency Control. (1981) authored by H. T. Kung 0001. H. T. Kung and John T. Robinson: On Optimistic Methods for Concurrency Control. (1979) authored by H. T. Kung 0001. Wen Tai et al.: exBERT: Extending Pre-trained Models with Domain-specific Vocabulary Under Constrained Training Resources. (2020) authored by H. T. Kung 0001. Chun-Hsiao Yeh et al.: Gen4Gen: Generative Data Pipeline for Generative Multi-Concept Composition. (2024) authored by H. T. Kung 0001. H. T. Kung and Christos H. Papadimitriou: An Optimality Theory of Concurrency Control for Databases. (1983) authored by H. T. Kung 0001. James R. Williamson et al.: Detecting Depression using Vocal, Facial and Semantic Communication Cues. (2016) authored by H. T. Kung 0001. H. T. Kung et al.: Mapping Systolic Arrays onto 3D Circuit Structures: Accelerating Convolutional Neural Network Inference. (2018) authored by H. T. Kung 0001. H. T. Kung and Christos H. Papadimitriou: An Optimality Theory of Concurrency Control for Databases. (1979) authored by H. T. Kung 0001. Surat Teerapittayanon et al.: BranchyNet: Fast inference via early exiting from deep neural networks. (2016) authored by H. T. Kung 0001. Miriam Cha et al.: Adversarial Learning of Semantic Relevance in Text to Image Synthesis. (2018) authored by H. T. Kung 0001. H. T. Kung and Shie Yuan Wang: Zero Queueing Flow Control and Applications. (1998) authored by H. T. Kung 0001. Surat Teerapittayanon et al.: BranchyNet: Fast Inference via Early Exiting from Deep Neural Networks. (2017) authored by H. T. Kung 0001. Miriam Cha et al.: Adversarial Learning of Semantic Relevance in Text to Image Synthesis. (2019) authored by H. T. Kung 0001. Gérard M. Baudet et al.: Parallel Execution of a Sequence of tasks on a Asynchronous Multiprocessor. (1980) authored by H. T. Kung 0001. Chia-Hsin Huang et al.: Use of Content Tags in Managing Advertisements for Online Videos. (2008) authored by H. T. Kung 0001. Andrew Sabot et al.: MEMA Runtime Framework: Minimizing External Memory Accesses for TinyML on Microcontrollers. (2023) authored by H. T. Kung 0001. Miriam Cha et al.: Adversarial nets with perceptual losses for text-to-image synthesis. (2017) authored by H. T. Kung 0001. Miriam Cha et al.: Adversarial nets with perceptual losses for text-to-image synthesis. (2017) authored by H. T. Kung 0001. H. T. Kung et al.: Systolic Building Block for Logic-on-Logic 3D-IC Implementations of Convolutional Neural Networks. (2019) authored by H. T. Kung 0001. Youngjune Gwon et al.: Multimodal Sparse Coding for Event Detection. (2016) authored by H. T. Kung 0001. Youngjune Gwon et al.: Fast Online Learning of Antijamming and Jamming Strategies. (2015) authored by H. T. Kung 0001. H. T. Kung and Jon A. Webb: Mapping Image Processing Operations onto a Linear Systolic Machine. (1986) authored by H. T. Kung 0001. Miriam Cha et al.: Language Modeling by Clustering with Word Embeddings for Text Readability Assessment. (2017) authored by H. T. Kung 0001. Miriam Cha et al.: Language Modeling by Clustering with Word Embeddings for Text Readability Assessment. (2017) authored by H. T. Kung 0001. H. T. Kung et al.: Localization with snap-inducing shaped residuals (SISR): coping with errors in measurement. (2009) authored by H. T. Kung 0001. Bradley McDanel et al.: Full-stack Optimization for Accelerating CNNs with FPGA Validation. (2019) authored by H. T. Kung 0001 In 1971, he moved from University of Washington to Carnegie Mellon with Joseph F. program with colleagues at Harvard Business School. research remains well cited. His students at Carnegie Mellon included Charles E. Morris after Morris released one of the first ever internet worms. D. D. '}
output format: answer
|
Shanghai
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In which country did the author of Virtual Enterprise for Data Mining and Decision Support study technical mathematics?
Context: Blaz Skrlj et al.: Towards Robust Text Classification with Semantics-Aware Recurrent Neural Architecture. (2019) authored by Nada Lavrac. Blaz Skrlj et al.: Embedding-based Silhouette Community Detection. (2019) authored by Nada Lavrac. Blaz Skrlj et al.: Embedding-based Silhouette community detection. (2020) authored by Nada Lavrac. Anze Vavpetic et al.: Semantic subgroup explanations. (2014) authored by Nada Lavrac. Blaz Skrlj et al.: Feature Importance Estimation with Self-Attention Networks. (2020) authored by Nada Lavrac. Blaz Skrlj et al.: Feature Importance Estimation with Self-Attention Networks. (2020) authored by Nada Lavrac. Ljupco Todorovski et al.: Discovery Science, 9th International Conference, DS 2006, Barcelona, Spain, October 7-10, 2006, Proceedings (2006) edited by Nada Lavrac. Timen Stepisnik Perdih et al.: Semantic Reasoning from Model-Agnostic Explanations. (2021) authored by Nada Lavrac. Blaz Skrlj et al.: CBSSD: community-based semantic subgroup discovery. (2019) authored by Nada Lavrac. Dragan Gamberger et al.: Identification of Gender Specific Biomarkers for Alzheimer's Disease. (2015) authored by Nada Lavrac. Blaz Skrlj et al.: Community-Based Semantic Subgroup Discovery. (2017) authored by Nada Lavrac. Nada Lavrac et al.: Subgroup Discovery with CN2-SD. (2004) authored by Nada Lavrac. Igor Mozetic et al.: Semantic Subgroup Discovery and Cross-Context Linking for Microarray Data Analysis. (2012) authored by Nada Lavrac. Anita Valmarska et al.: Multi-view Clustering with mvReliefF for Parkinson's Disease Patients Subgroup Detection. (2020) authored by Nada Lavrac. Blaz Skrlj et al.: Deep Node Ranking: an Algorithm for Structural Network Embedding and End-to-End Classification. (2019) authored by Nada Lavrac. Nada Lavrač modified 2023-10-18. Blaz Skrlj et al.: Prioritization of COVID-19-Related Literature via Unsupervised Keyphrase Extraction and Document Representation Learning. (2021) authored by Nada Lavrac. Blaz Skrlj et al.: Prioritization of COVID-19-related literature via unsupervised keyphrase extraction and document representation learning. (2021) authored by Nada Lavrac. Anita Valmarska et al.: Symptoms and medications change patterns for Parkinson's disease patients stratification. (2018) authored by Nada Lavrac. Igor Trajkovski and Nada Lavrac: Efficient Generation of Biologically Relevant Enriched Gene Sets. (2007) authored by Nada Lavrac. Dragana Miljkovic et al.: Discovering dependencies between domains of redox potential and plant defence through triplet extraction and copulas. (2018) authored by Nada Lavrac. Blaz Skrlj et al.: PubMed-Scale Chemical Concept Embeddings Reconstruct Physical Protein Interaction Networks. (2021) authored by Nada Lavrac. Dragan Gamberger et al.: Diagnostic Rules of Increased Reliability for Critical Medical Applications. (1999) authored by Nada Lavrac. Borut Sluban et al.: Evaluating Outliers for Cross-Context Link Discovery. (2011) authored by Nada Lavrac. Donatella Gubiani et al.: Outlier based literature exploration for cross-domain linking of Alzheimer's disease and gut microbiota. (2017) authored by Nada Lavrac. Borut Sluban et al.: Advances in Class Noise Detection. (2010) authored by Nada Lavrac. Dragan Gamberger et al.: Induction of comprehensible models for gene expression datasets by subgroup discovery methodology. (2004) authored by Nada Lavrac. Laura Langohr et al.: Contrasting Subgroup Discovery. (2013) authored by Nada Lavrac. Dragan Gamberger et al.: Multilayer Clustering: Biomarker Driven Segmentation of Alzheimer's Disease Patient Population. (2015) authored by Nada Lavrac. Dragana Miljkovic et al.: Incremental revision of biological networks from texts. (2013) authored by Nada Lavrac. Dragana Miljkovic et al.: Constraint-driven optimization of plant defense model parameters. (2012) authored by Nada Lavrac. Nada Lavrač alternativeName Nada Lavraç. . '}
output format: answer
|
Slovenia
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the cited by count for the institution of 'Machine Learning Approaches for Temporal Information Extraction: A comparative study' author?
Context: Marie‐Francine Moens modified 2023-10-18. Dario Pavllo et al.: Convolutional Generation of Textured 3D Meshes. (2020) authored by Marie-Francine Moens. Dario Pavllo et al.: Convolutional Generation of Textured 3D Meshes. (2020) authored by Marie-Francine Moens. Marie‐Francine Moens name Marie‐Francine Moens. Marie‐Francine Moens i10Index 115. Arthur Van Meerbeeck et al.: Optimizing ship detection efficiency in SAR images. (2022) authored by Marie-Francine Moens. Marie‐Francine Moens 2YrMeanCitedness 0.5416666865348815918. Djoerd Hiemstra and Marie-Francine Moens: Guest editorial: special issue on ECIR 2021. (2022) authored by Marie-Francine Moens. Marie‐Francine Moens alternativeName Marie‐Francine Moens. Marie‐Francine Moens alternativeName Marie—Francine Moens. Marie‐Francine Moens alternativeName M. Moens. Marie‐Francine Moens alternativeName M. F. Moens. Farjad Malik et al.: Two-phase training mitigates class imbalance for camera trap image classification with CNNs. (2021) authored by Marie-Francine Moens. Thierry Deruyttere et al.: Corrigendum to "Giving commands to a self-driving car: How to deal with uncertain situations?" [Eng. Appl. Artif. Intell. 103 (2021) 104257]. (2022) authored by Marie-Francine Moens. Marie‐Francine Moens alternativeName M.‐F. Moens. Katrien Laenen and Marie-Francine Moens: Attention-based Fusion for Outfit Recommendation. (2019) authored by Marie-Francine Moens. Marie-Francine Moens et al.: Abstracting of Legal Cases: The SALOMON Experience. (1997) authored by Marie-Francine Moens. Raquel Mochales Palau and Marie-Francine Moens: Study on the Structure of Argumentation in Case Law. (2008) authored by Marie-Francine Moens. Marie‐Francine Moens member of KU Leuven. Thibaut Dusart et al.: Cross-modal alignment for wildlife recognition. (2013) authored by Marie-Francine Moens. Mingxiao Li et al.: Layout-Aware Dreamer for Embodied Visual Referring Expression Grounding. (2023) authored by Marie-Francine Moens. Thierry Deruyttere et al.: Talk2Car: Taking Control of Your Self-Driving Car. (2019) authored by Marie-Francine Moens. Thierry Deruyttere et al.: Talk2Car: Taking Control of Your Self-Driving Car. (2019) authored by Marie-Francine Moens. Marie-Francine Moens is Person. Susana Zoghbi et al.: I pinned it. where can i buy one like it?: automatically linking pinterest pins to online webshops. (2013) authored by Marie-Francine Moens. Damien Sileo et al.: Generating multiple-choice questions for medical question answering with distractors and cue-masking. (2023) authored by Marie-Francine Moens. Mingxiao Li et al.: Layout-aware Dreamer for Embodied Referring Expression Grounding. (2022) authored by Marie-Francine Moens. Tingyu Qu et al.: Weakly Supervised Face Naming with Symmetry-Enhanced Contrastive Loss. (2022) authored by Marie-Francine Moens. Tingyu Qu et al.: Weakly Supervised Face Naming with Symmetry-Enhanced Contrastive Loss. (2023) authored by Marie-Francine Moens. Marie‐Francine Moens h-index 39. Marie‐Francine Moens worksCount 558. Guillem Collell et al.: Imagined Visual Representations as Multimodal Embeddings. (2017) authored by Marie-Francine Moens. Thierry Deruyttere et al.: Giving Commands to a Self-driving Car: A Multimodal Reasoner for Visual Grounding. (2020) authored by Marie-Francine Moens. Thierry Deruyttere et al.: Giving commands to a self-driving car: How to deal with uncertain situations? (2021) authored by Marie-Francine Moens. Thierry Deruyttere et al.: Giving Commands to a Self-Driving Car: How to Deal with Uncertain Situations? (2021) authored by Marie-Francine Moens. Katrien Laenen and Marie-Francine Moens: A Comparative Study of Outfit Recommendation Methods with a Focus on Attention-based Fusion. (2020) authored by Marie-Francine Moens. Susana Zoghbi et al.: Cross-Modal Fashion Search. (2016) authored by Marie-Francine Moens. Phi The Pham et al.: Cross-Media Alignment of Names and Faces. (2010) authored by Marie-Francine Moens. Ignacio Avas et al.: Align MacridVAE: Multimodal Alignment for Disentangled Recommendations. (2024) authored by Marie-Francine Moens. Yang Yang et al.: Forecasting Potential Diabetes Complications. (2014) authored by Marie-Francine Moens. Marie-Francine Moens is Creator. Marie-Francine Moens primary affiliation Catholic University of Leuven, Belgium. Leif Azzopardi et al.: EmSe: Supporting Children's Information Needs within a Hospital Environment. (2012) authored by Marie-Francine Moens. Thomas Provoost and Marie-Francine Moens: Detecting Relations in the Gene Regulation Network. (2013) authored by Marie-Francine Moens. Karl Gyllstrom et al.: The downside of markup: examining the harmful effects of CSS and javascript on indexing today's web. (2012) authored by Marie-Francine Moens there in 1999. D
output format: answer
|
6128510
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where did the author of Scaffolding Meta-Cognitive Skills for Effective Analogical Problem Solving via Tailored Example Selection get her Ph.D. from?
Context: Fabio Hellmann et al.: GANonymization: A GAN-based Face Anonymization Framework for Preserving Emotional Expressions. (2023) authored by Cristina Conati. Martijn Millecamp et al.: What's in a User? Towards Personalising Transparency for Music Recommender Interfaces. (2020) authored by Cristina Conati. Cristina Conati modified 2023-10-18. Cristina Conati et al.: Towards User-Adaptive Information Visualization. (2015) authored by Cristina Conati. Cristina Conati et al.: Exploring Eye Tracking to Increase Bandwidth in User Modeling. (2005) authored by Cristina Conati. Ben Steichen et al.: Te, Te, Hi, Hi: Eye Gaze Sequence Analysis for Informing User-Adaptive Information Visualizations. (2014) authored by Cristina Conati. Giulio Jacucci et al.: IUI 2022: 27th International Conference on Intelligent User Interfaces, Helsinki, Finland, March 22 - 25, 2022 (2022) edited by Cristina Conati. Matteo Rizzo et al.: Cascading Convolutional Temporal Colour Constancy. (2021) authored by Cristina Conati. Martijn Millecamp et al.: Classifeye: Classification of Personal Characteristics Based on Eye Tracking Data in a Recommender System Interface. (2021) authored by Cristina Conati. Cristina Conati et al.: Using Eye-Tracking Data for High-Level User Modeling in Adaptive Interfaces. (2007) authored by Cristina Conati. Cristina Conati h-index 34. Ben Steichen et al.: Seeing how you're Looking - Using Real-Time Eye Gaze Data for User-Adaptive Visualization. (2013) authored by Cristina Conati. Giulio Jacucci et al.: IUI 2022: 27th International Conference on Intelligent User Interfaces, Helsinki, Finland, March 22 - 25, 2022 - Companion Volume (2022) edited by Cristina Conati. Sébastien Lallé and Cristina Conati: The role of user differences in customization: a case study in personalization for infovis-based content. (2019) authored by Cristina Conati. Ömer Sümer et al.: Region-based Saliency Explanations on the Recognition of Facial Genetic Syndromes. (2023) authored by Cristina Conati. Samad Kardan et al.: The Usefulness of Log Based Clustering in a Complex Simulation Environment. (2014) authored by Cristina Conati. Cristina Conati et al.: Proceedings of the 14th International Conference on Intelligent User Interfaces, IUI 2009, Sanibel Island, Florida, USA, February 8-11, 2009 (2009) edited by Cristina Conati. Cristina Conati i10Index 96. Andrea Bunt et al.: Supporting interface customization using a mixed-initiative approach. (2007) authored by Cristina Conati. Cristina Conati et al.: User-Adaptive Visualizations: Can Gaze Data Tell Us When a User Needs Them? (2011) authored by Cristina Conati. Matteo Rizzo et al.: Evaluating the Faithfulness of Saliency-based Explanations for Deep Learning Models for Temporal Colour Constancy. (2022) authored by Cristina Conati. Jeffrey Nichols et al.: Proceedings of the 21st International Conference on Intelligent User Interfaces, IUI 2016, Sonoma, CA, USA, March 7-10, 2016 (2016) edited by Cristina Conati"}. D
output format: answer
|
University of Pittsburgh
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many publications are cited by the institution where the creator of 'Neural Sign Language Translation by Learning Tokenization' is affiliated?
Context: Baris Evrim Demiröz et al.: Rectangle Blanket Problem: Binary integer linear programming formulation and solution algorithms. (2019) authored by Lale Akarun. Baris Evrim Demiröz et al.: Rectangle blanket problem: Binary integer linear programming formulation and solution algorithms. (2019) authored by Lale Akarun. Ertan Onur et al.: Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks. (2004) authored by Lale Akarun. Ertan Onur et al.: Surveillance with wireless sensor networks in obstruction: Breach paths as watershed contours. (2010) authored by Lale Akarun. Ertan Onur et al.: Coverage in Sensor Networks When Obstacles Are Present. (2006) authored by Lale Akarun. Baris Evrim Demiröz et al.: Coupling Fall Detection and Tracking in Omnidirectional Cameras. (2014) authored by Lale Akarun. Lale Akarun et al.: Adaptive methods for dithering color images. (1995) authored by Lale Akarun. Lale Akarun et al.: Adaptive methods for dithering color images. (1997) authored by Lale Akarun. Ertan Onur et al.: Surveillance Wireless Sensor Networks: Deployment Quality Analysis. (2007) authored by Lale Akarun. Lale Akarun and Richard A. Haddad: Performance measures for rank order filters. (1991) authored by Lale Akarun. Salih Burak Göktürk et al.: Automated inspection of PCB's using a novel approach. (1999) authored by Lale Akarun. Lale Akarun and Richard A. Haddad: Adaptive decimated median filtering. (1992) authored by Lale Akarun. Baris Evrim Demiröz et al.: Fall detection using multi-omnidirectional cameras. (2013) authored by Lale Akarun. Nese Alyüz et al.: Detection of Realistic Facial Occlusions for Robust 3D Face Recognition. (2014) authored by Lale Akarun. Dogan Özdemir and Lale Akarun: Fuzzy algorithms for combined quantization and dithering. (2001) authored by Lale Akarun. Merve Gül Kantarci et al.: A Survey of 3D Object Reconstruction Methods. (2022) authored by Lale Akarun. Ahmet Alp Kindiroglu et al.: Multi-domain and multi-task prediction of extraversion and leadership from meeting videos. (2017) authored by Lale Akarun. Nese Alyüz et al.: Robust 3D face recognition in the presence of realistic occlusions. (2012) authored by Lale Akarun. Berk Gökberk et al.: Rank-Based Decision Fusion for 3D Shape-Based Face Recognition. (2005) authored by Lale Akarun She served as departmental chair from 2010 to 2012. S. S
output format: answer
|
286954
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many scientific articles are attributed to the author's affiliation in which the paper 'An intermediate value theorem for graphs with given automorphism group' was published?
Context: Pavol Hell alternativeName Pavol Hell. Pavol Hell name Pavol Hell. Pavol Hell alternativeName P. Hell. Pavol Hell link http://www.cs.sfu.ca/~pavol/. Pavol Hell link http://www.cs.sfu.ca/~pavol/. Pavol Hell is Person. Pavol Hell 2YrMeanCitedness 0.11111111193895339966. Pavol Hell i10Index 116. Pavol Hell member of Simon Fraser University. Pavol Hell worksCount 311. Pavol Hell orcidId https://orcid.org/0000-0001-7609-9746. Pavol Hell affiliation Simon Fraser University, Burnaby, Canada. Pavol Hell link https://en.wikipedia.org/wiki/Pavol_Hell. Pavol Hell primary affiliation Simon Fraser University, Burnaby, Canada. Pavol Hell modified 2023-10-18. Pavol Hell is Creator. Hovhannes A. Harutyunyan et al.: Messy broadcasting - Decentralized broadcast schemes with limited knowledge. (2011) authored by Pavol Hell. Pavol Hell and Jaroslav Nesetril: Colouring, constraint satisfaction, and complexity. (2008) authored by Pavol Hell. Francesc Comellas and Pavol Hell: Broadcasting in generalized chordal rings. (2003) authored by Pavol Hell. Pavol Hell: Preface. (1990) authored by Pavol Hell. Pavol Hell and Arthur L. Liestman: Broadcasting in one dimension. (1988) authored by Pavol Hell. Luisa Gargano et al.: Colouring Paths in Directed Symmetric Trees with Applications to WDM Routing. (1997) authored by Pavol Hell. Pavol Hell h-index 40. Richard C. Brewster et al.: Oriented star packings. (2008) authored by Pavol Hell. László Egri et al.: Space complexity of list H-colouring: a dichotomy. (2014) authored by Pavol Hell. László Egri et al.: Space complexity of list H-colouring: a dichotomy. (2013) authored by Pavol Hell. David Hartvigsen et al.: The k-piece packing problem. (2006) authored by Pavol Hell'}. Hell started his mathematical studies at Charles University in Prague, and moved to Canada in August 1968 after the Warsaw Pact invasion of Czechoslovakia
output format: answer
|
64761
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where did the author who published 'An efficient N-to-1 multipath routing protocol in wireless sensor networks' receive a Ph.D. in Electrical and Computer Engineering?
Context: Wenhai Sun et al.: Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup. (2018) authored by Wenjing Lou. Wenhai Sun et al.: Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. (2014) authored by Wenjing Lou. Ning Zhang et al.: Memory Forensic Challenges Under Misused Architectural Features. (2018) authored by Wenjing Lou. Ning Zhang et al.: CacheKit: Evading Memory Introspection Using Cache Incoherence. (2016) authored by Wenjing Lou. Wenhai Sun et al.: Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud. (2016) authored by Wenjing Lou. Yang Hu et al.: Transferability of Adversarial Examples in Machine Learning-based Malware Detection. (2022) authored by Wenjing Lou. Chen Cao et al.: CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices. (2018) authored by Wenjing Lou. Jin Li et al.: A Hybrid Cloud Approach for Secure Authorized Deduplication. (2015) authored by Wenjing Lou. Tao Jiang et al.: Secure and Efficient Cloud Data Deduplication With Randomized Tag. (2017) authored by Wenjing Lou. Xuefeng Liu et al.: One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage. (2017) authored by Wenjing Lou. Ning Zhang et al.: PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution. (2018) authored by Wenjing Lou. Yang Xiao et al.: Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution. (2019) authored by Wenjing Lou. Wei Song et al.: A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications. (2017) authored by Wenjing Lou. Yang Xiao et al.: PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution. (2020) authored by Wenjing Lou. Ning Zhang et al.: Black penguin: On the feasibility of detecting intrusion with homogeneous memory. (2017) authored by Wenjing Lou. Wenhai Sun et al.: Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing. (2014) authored by Wenjing Lou. Jin Li et al.: Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing. (2009) authored by Wenjing Lou. Qingyu Liu et al.: Age of Critical Information: Optimizing Data Freshness Based on Content Criticality. (2023) authored by Wenjing Lou. Ning Wang et al.: FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations. (2022) authored by Wenjing Lou. Wenjing Lou: Fortifying Your Defenses: Techniques to Thwart Adversarial Attacks and Boost Performance of Machine Learning-Based Intrusion Detection Systems. (2023) authored by Wenjing Lou. Jin Li et al.: Secure Deduplication with Efficient and Reliable Convergent Key Management. (2014) authored by Wenjing Lou. Jin Li et al.: Fuzzy Keyword Search over Encrypted Data in Cloud Computing. (2010) authored by Wenjing Lou. Wei Ren et al.: Optimized User Revocation for Group Signature Based Privacy-Aware PKI. (2008) authored by Wenjing Lou. Qian Wang et al.: Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. (2011) authored by Wenjing Lou. Tong Li et al.: NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine Learning. (2021) authored by Wenjing Lou. Ming Li et al.: Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. (2010) authored by Wenjing Lou. Ruide Zhang et al.: AugAuth: Shoulder-surfing resistant authentication for augmented reality. (2017) authored by Wenjing Lou. Ming Li et al.: Authorized Private Keyword Search over Encrypted Data in Cloud Computing. (2011) authored by Wenjing Lou. Cong Wang et al.: Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data. (2012) authored by Wenjing Lou. Wenjing Lou name Wenjing Lou. Shucheng Yu et al.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. (2010) authored by Wenjing Lou. Bing Wang et al.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. (2014) authored by Wenjing Lou. Ming Li et al.: Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. (2013) authored by Wenjing Lou. Wei Ren et al.: Efficient user revocation for privacy-aware PKI. (2008) authored by Wenjing Lou. Yaxing Chen et al.: Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data. (2019) authored by Wenjing Lou. Jin Li et al.: Identity-Based Encryption with Outsourced Revocation in Cloud Computing. (2015) authored by Wenjing LouS. S. and a B
output format: answer
|
University of Florida
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What was the call sign of the first female fighter pilot of the United States Navy who contributed to Driver Alerting in ADAS-Equipped Cars: A Field Study?
Context: Jacqueline M. Tappan et al.: Mobile application for utility domains. (2011) authored by Mary L. Cummings. Marvin S. Cohen et al.: Cognition and game theory in the design of a collaboration manager for shared control of multiple UV assets. (2008) authored by Mary L. Cummings. Jessica J. Márquez and Mary L. Cummings: Design and Evaluation of Path Planning Decision Support for Planetary Surface Exploration. (2008) authored by Mary L. Cummings. Mark Ashdown and Mary L. Cummings: Asymmetric Synchronous Collaboration Within Distributed Teams. (2007) authored by Mary L. Cummings. Mary L. Cummings is Creator. Mary L. Cummings and Sylvain Bruni: Human-automated planner collaboration in complex resource allocation decision support systems. (2010) authored by Mary L. Cummings. Christopher W. Berardi et al.: Investigating the efficacy of network visualizations for intelligence tasks. (2013) authored by Mary L. Cummings. Mary L. Cummings alternativeName Mary L. ‘Missy’ Cummings. Mary L. Cummings written paper amount in year2015: 9. Mary L. Cummings written paper amount in year2015: 9. Mary L. Cummings and Alexander J. Stimpson: Identifying Critical Contextual Design Cues Through a Machine Learning Approach. (2019) authored by Mary L. Cummings. Alexander J. Stimpson and Mary L. Cummings: Assessing Intervention Timing in Computer-Based Education Using Machine Learning Algorithms. (2014) authored by Mary L. Cummings. Luca F. Bertuccelli et al.: Choice modeling of relook tasks for UAV search missions. (2010) authored by Mary L. Cummings She became a full professor at Duke University in 2016. from 2018 to 2021. '}. U. In November 2021, Dr. \nAs of 2021[update], Cummings is the director of George Mason University\'s Autonomy and Robotics Center and a professor at the university
output format: answer
|
Medusa
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the cited by count for the institution where the creator of 'Edsger W. Dijkstra - Acta Informatica and Marktoberdorf' is affiliated?
Context: Radu Grosu et al.: A Modular Visual Model for Hybrid Systems. (1998) authored by Manfred Broy. Manfred Broy et al.: Model-Driven Development of Reliable Automotive Services, Second Automotive Software Workshop, ASWSD 2006, San Diego, CA, USA, March 15-17, 2006, Revised Selected Papers (2008) edited by Manfred Broy. Manfred Broy name Manfred Broy. Manfred Broy: Towards formal modeling of functional features and feature interactions in software intensive systems. (2011) authored by Manfred Broy. Manfred Broy alternativeName Manfred Broy. Manfred Broy alternativeName Manfred H.B. Broy. Manfred Broy alternativeName M. Broy. Manfred Broy: System Behaviour Models with Discrete and Dense Time. (2012) authored by Manfred Broy. Manfred Broy: Seamless Model Driven Systems Engineering Based on Formal Models. (2009) authored by Manfred Broy. Manfred Broy et al.: Seamless Model-Based Development: From Isolated Tools to Integrated Model Engineering Environments. (2010) authored by Manfred Broy. Manfred Broy: A Functional Solution to the RPC-Memory Specification Problem. (1994) authored by Manfred Broy. Manfred Broy and Claus Dendorfer: Functional modelling of operating sytem [system] structures by timed higher order stream processing functions (1990) authored by Manfred Broy. Manfred Broy et al.: Model-Based Testing of Reactive Systems, Advanced Lectures [The volume is the outcome of a research seminar that was held in Schloss Dagstuhl in January 2004] (2005) edited by Manfred Broy. Manfred Broy et al.: Service-Oriented Modeling of CoCoME with Focus and AutoFocus. (2007) authored by Manfred Broy. Manfred Broy and Martin Wirsing: Generalized Heterogeneous Algebras. (1983) authored by Manfred Broy. Christoph Legat et al.: Interface Behavior Modeling for Automatic Verification of Industrial Automation Systems' Functional Conformance. (2014) authored by Manfred Broy. Marco Kuhrmann et al.: Flexible software process lines in practice: A metamodel-based approach to effectively construct and manage families of software process models. (2017) authored by Manfred Broy. Marco Kuhrmann et al.: Flexible software process lines in practice: A metamodel-based approach to effectively construct and manage families of software process models. (2016) authored by Manfred Broy. Manfred Broy et al.: Software and System Modeling Based on a Unified Formal Semantics. (2014) authored by Manfred Broy. Manfred Broy: Multi-view Modeling of Software Systems. (2002) authored by Manfred Broy. Manfred Broy: Challenges in modeling cyber-physical systems. (2013) authored by Manfred Broy. Manfred Broy: Seamless Model-Based System Development: Foundations - (Extended Abstract). (2019) authored by Manfred Broy. Manfred Broy and Thomas Streicher: Modular functional modelling of Petri nets with individual tokens. (1992) authored by Manfred Broy. Klaus Pohl et al.: Advanced Model-Based Engineering of Embedded Systems. (2016) authored by Manfred Broy. Manfred Broy and Alexander Pretschner: A Model-Based View onto Testing. (2011) authored by Manfred Broy. Manfred Broy and Martin Wirsing: Generalized Heterogeneous Algebras and Partial Interpretations. (1983) authored by Manfred Broy. Manfred Broy and Claus Dendorfer: Modelling Operating System Structures by Timed Stream Processing Functions. (1992) authored by Manfred Broy. Manfred Broy: Equational Specification of Partial Higher-Order Algebras. (1988) authored by Manfred Broy. Manfred Broy: Architecture Driven Modeling in Software Development. (2004) authored by Manfred Broy. Manfred Broy et al.: Automotive Software - Connected Services in Mobile Networks, First Automotive Software Workshop, ASWSD 2004, San Diego, CA, USA, January 10-12, 2004, Revised Selected Papers (2006) edited by Manfred Broy. Manfred Broy et al.: Algebraic Implementations Preserve Program Correctness. (1986) authored by Manfred Broy. Wolfgang Böhm et al.: Model-Based Engineering of Collaborative Embedded Systems (2021) edited by Manfred Broy. Manfred Broy et al.: Software and System Modeling Based on a Unified Formal Semantics. (1997) authored by Manfred Broy. Manfred Broy: Seamless Method- and Model-based Software and Systems Engineering. (2010) authored by Manfred Broy. Jennifer Hehn et al.: On Integrating Design Thinking for Human-Centered Requirements Engineering. (2020) authored by Manfred Broy. Jennifer Hehn et al.: On Integrating Design Thinking for a Human-centered Requirements Engineering. (2019) authored by Manfred Broy. Manfred Broy: Service-Oriented Systems Engineering: Modeling Services and Layered Architectures. (2003) authored by Manfred Broy. Manfred Broy and Thomas Streicher: Modular functional modelling of Petri nets with individual tokems (1990) authored by Manfred Broy. Manfred Broy is Person. Sebastián Uchitel et al.: Guest Editorial: Special Section on Interaction and State-Based Modeling. (2005) authored by Manfred Broy. Manfred Broy: A Functional Calculus for Specification and Verification of Nondeterministic Interactive Systems. (2003) authored by Manfred Broy. Manfred Broy: Algebraic specification of reactive systems. (2000) authored by Manfred Broy'}. Bauer on the subject of transformation of programs running in parallel (Transformation parallel ablaufender Programme)
output format: answer
|
4204140
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many students has the author advised as a PhD advisor according to the TEXT?
Context: Ingolf Sommer et al.: Improving the quality of protein structure models by selecting from alignment alternatives. (2006) authored by Thomas Lengauer. Ingolf Sommer et al.: Moment invariants as shape recognition technique for comparing protein binding sites. (2007) authored by Thomas Lengauer. Thomas Lengauer and Rolf Müller: Robust and accurate hierarchical floorplanning with integrated global wiring. (1993) authored by Thomas Lengauer. Thomas Lengauer and Rolf Müller: A Robust Framework for Hierarchical Floorplanning with Integrated Global Wiring. (1990) authored by Thomas Lengauer. Ina Koch and Thomas Lengauer: Detection of Distant Structural Similarities in a Set of Proteins Using a Fast Graph-Based Method. (1997) authored by Thomas Lengauer. Nils Weinhold et al.: Local Function Conservation in Sequence and Structure Space. (2008) authored by Thomas Lengauer. Ralf Thiele et al.: Recursive Dynamic Programming for Adaptive Sequence and Structure Alignment. (1995) authored by Thomas Lengauer. Mario Albrecht et al.: Improving Fold Recognition of Protein Threading by Experimental Distance Constraints. (2001) authored by Thomas Lengauer. Mario Albrecht et al.: Improving fold recognition of protein threading by experimental distance constraints. (2002) authored by Thomas Lengauer. Thomas Lengauer: Invited Lecture: Discrete Optimization Methods for Packing Problems in Two and Three Dimensions - With Applications in the Textile and Car Manufacturing Industries. (1999) authored by Thomas Lengauer. Jan Freudenberg et al.: A new Method for Unification of Existing Protein Structure- and Sequence-Families. (2001) authored by Thomas Lengauer. Andreas Schlicker et al.: A new measure for functional similarity of gene products based on Gene Ontology. (2006) authored by Thomas Lengauer. Jörg Heistermann and Thomas Lengauer: Efficient Automatic Part Nesting on Irregular and Inhomogeneous Surfaces. (1993) authored by Thomas Lengauer. Dirk Theune et al.: Robust methods for EMC-driven routing. (1994) authored by Thomas Lengauer. Andreas Steffen et al.: Flexible Docking of Ligands into Synthetic Receptors Using a Two-Sided Incremental Construction Algorithm. (2006) authored by Thomas Lengauer. Francisco S. Domingues et al.: Conformational analysis of alternative protein structures. (2007) authored by Thomas Lengauer. Matthias Rarey et al.: Time-Efficient Docking of Flexible Ligands into Active Sites of Proteins. (1995) authored by Thomas Lengauer. Burkhard Heil et al.: Computational recognition of potassium channel sequences. (2006) authored by Thomas Lengauer. Jan Freudenberg et al.: A hypergraph-based method for unification of existing protein structure- and sequence-families. (2002) authored by Thomas Lengauer. Andreas Kämper et al.: Fully Automated Flexible Docking of Ligands into Flexible Synthetic Receptors Using Forward and Inverse Docking Strategies. (2006) authored by Thomas Lengauer. Sven-Eric Schelhorn et al.: Sensitive Detection of Viral Transcripts in Human Tumor Transcriptomes. (2013) authored by Thomas Lengauer. Thomas Lengauer and Stefan Näher: An analysis of ternary simulation as a tool for race detection in digital MOS circuits. (1986) authored by Thomas Lengauer. Matthias Rarey et al.: Placement of medium-sized molecular fragments into active sites of proteins. (1996) authored by Thomas Lengauer. Oliver Sander et al.: Structural Descriptors of Protein-Protein Binding Sites. (2008) authored by Thomas Lengauer. Andreas Schlicker et al.: Improving disease gene prioritization using the semantic similarity of Gene Ontology terms. (2010) authored by Thomas Lengauer. Mario Albrecht et al.: Decomposing protein networks into domain-domain interactions. (2005) authored by Thomas Lengauer In the eighties and early nineties, Lengauer's research concentrated on discrete optimization methods for the design of integrated circuits and on packing problems in manufacturing. rer. nat. On the latter topic he cofounded the company BioSolveIT GmbH in Sankt Augustin, Germany, together with Christian Lemmen, Matthias Rarey, and Ralf Zimmer from his team at GMD. In 2010 he was awarded the AIDS Research Award of the Heinz-Ansmann Foundation, together with Rolf Kaiser and Marc Oette. \nIn 2003, Lengauer was awarded the Konrad Zuse Medal, the highest award of the Gesellschaft für Informatik (German Informatics Society), as well as the Karl-Heinz-Beckurts Award
output format: answer
|
over 50
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the birth year of the researcher who established the AI Now Institute with Meredith Whittaker?
Context: Kate Crawford and Tarleton Gillespie: What is a flag for? Social media reporting tools and the vocabulary of complaint. (2016) authored by Kate Crawford 0002. Kate Crawford alternativeName Kate Crawford. Kate Crawford name Kate Crawford. Kate Crawford alternativeName K. Crawford. Alexandra Sasha Luccioni et al.: A Framework for Deprecating Datasets: Standardizing Documentation, Identification, and Communication. (2022) authored by Kate Crawford 0002. Kate Crawford alternativeName K G Crawford Crawford co-founded the Sydney-based Deluxe Mood Recordings record label and is a member of the Clan Analogue music collective. '}. \nAs a writer Crawford has written for The Sydney Morning Herald and Foreign Policy. \nCrawford was previously part of the Canberra electronic music duo B(if)tek (along with Nicole Skeltys) and released three albums between 1998 and 2003. She was a Fellow of the Centre for Policy Development and in March 2008 she was selected as one of 1000 Australians to attend the Australia 2020 Summit in Canberra on 19–20 April 2008
output format: answer
|
1974
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where did the author of the publication on Passivity and Passivity Indices of Nonlinear Systems Under Operational Limitations using Approximations graduate from?
Context: Arash Rahnama et al.: Network-based protein structural classification. (2018) authored by Panos J. Antsaklis. Marian V. Iordache and Panos J. Antsaklis: Decentralized supervision of Petri nets. (2006) authored by Panos J. Antsaklis. Eloy García and Panos J. Antsaklis: Decentralized model-based event-triggered control of networked systems. (2012) authored by Panos J. Antsaklis. Arash Rahnama et al.: Encoding Multi-Resolution Brain Networks Using Unsupervised Deep Learning. (2017) authored by Panos J. Antsaklis. Arash Rahnama et al.: Encoding Multi-Resolution Brain Networks Using Unsupervised Deep Learning. (2017) authored by Panos J. Antsaklis. Panos J. Antsaklis orcidId https://orcid.org/0000-0002-6836-5028. Eloy García et al.: Decentralised event-triggered cooperative control with limited communication. (2013) authored by Panos J. Antsaklis. Panos J. Antsaklis alternativeName Panos J. Antsaklis. Panos J. Antsaklis alternativeName Panagiotis Antsaklis. Han Yu and Panos J. Antsaklis: Formation control of multi-agent systems with connectivity preservation by using both event-driven and time-driven communication. (2012) authored by Panos J. Antsaklis. Panos J. Antsaklis alternativeName Panos Antsaklis. Panos J. Antsaklis alternativeName P. Antsaklis. Marian V. Iordache et al.: Synthesis of deadlock prevention supervisors using Petri nets. (2002) authored by Panos J. Antsaklis. Marian V. Iordache and Panos J. Antsaklis: Supervision Based on Place Invariants: A Survey. (2006) authored by Panos J. Antsaklis. Panos J. Antsaklis 2YrMeanCitedness 2.4883720874786376953. Panos J. Antsaklis is Creator. Marian V. Iordache and Panos J. Antsaklis: Petri nets and programming: A survey. (2009) authored by Panos J. Antsaklis. Panos J. Antsaklis alternativeName P. J. Antsaklis. Jin Dai et al.: Learning-based formal synthesis of cooperative multi-agent systems with an application to robotic coordination. (2016) authored by Panos J. Antsaklis. Panos J. Antsaklis name Panos J. Antsaklis. Marian V. Iordache et al.: Efficient design of Petri-net supervisors with disjunctive specifications. (2013) authored by Panos J. Antsaklis. Marian V. Iordache and Panos J. Antsaklis: Design of T-liveness enforcing supervisors in Petri nets. (2003) authored by Panos J. Antsaklis. Panos J. Antsaklis: Editorial Marking the 60th Anniversary of TAC: A Success Story. (2015) authored by Panos J. Antsaklis. Eloy García and Panos J. Antsaklis: Model-Based Event-Triggered Control for Systems With Quantization and Time-Varying Network Delays. (2013) authored by Panos J. Antsaklis. Marian V. Iordache et al.: A method for the synthesis of liveness enforcing supervisors in Petri nets. (2001) authored by Panos J. Antsaklis. Eloy García and Panos J. Antsaklis: Model-based event-triggered control with time-varying network delays. (2011) authored by Panos J. Antsaklis. Marian V. Iordache and Panos J. Antsaklis: Generalized Conditions for Liveness Enforcement and Deadlock Prevention in Petri Nets. (2001) authored by Panos J. Antsaklis. Kevin M. Passino and Panos J. Antsaklis: Event rates and aggregation in hierarchical discrete event systems. (1992) authored by Panos J. Antsaklis. Marian V. Ioradache and Panos J. Antsaklis: Resilience to failures and reconfigurations in the supervision based on place invariants. (2004) authored by Panos J. Antsaklis. Arash Rahnama and Panos J. Antsaklis: Learning-Based Event-Triggered Control for Synchronization of Passive Multiagent Systems Under Attack. (2020) authored by Panos J. Antsaklis. John Anthony Rossiter et al.: Control education for societal-scale challenges: A community roadmap. (2023) authored by Panos J. Antsaklis'}. Clifford and Evelyn A. {'institute_wikipedia_text': 'Panos Antsaklis is the H. This research examines ways to design engineering systems that will exhibit high degrees of autonomy in performing useful tasks
output format: answer
|
National Technical University of Athens, Greece
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the name of the spouse of the creator of What underlies rapid learning and systematic generalization in humans?
Context: James L. McClelland written paper amount in year2016: 1. James L. McClelland written paper amount in year2016: 1. James L. McClelland written paper amount in year2019: 5. James L. McClelland written paper amount in year2019: 5. James L. McClelland written paper amount in year2015: 2. James L. McClelland written paper amount in year2015: 2. James L. McClelland written paper amount in year2018: 4. James L. McClelland written paper amount in year2018: 4. James L. McClelland written paper amount in year2017: 2. James L. McClelland written paper amount in year2017: 2. James L. McClelland written paper amount in year2020: 9. James L. McClelland written paper amount in year2020: 9. James L. McClelland written paper amount in year2014: 3D. '}. He received a B
output format: answer
|
Heidi Marsha Feldman
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the number of publications for the affiliation of the 'Remembrance Agent: A Continuously Running Automated Information Retrieval System' writer?
Context: Richard Li et al.: ScratchVR: low-cost, calibration-free sensing for tactile input on mobile virtual reality enclosures. (2018) authored by Thad Starner. Fereshteh Shahmiri et al.: Serpentine: A Self-Powered Reversibly Deformable Cord Sensor for Human Input. (2019) authored by Thad Starner. Nivedita Arora et al.: Surface++: A Scalable and Self-sustainable Wireless Sound Sensing Surface. (2019) authored by Thad Starner. Cheng Zhang et al.: FingerPing: Recognizing Fine-grained Hand Poses using Active Acoustic On-body Sensing. (2018) authored by Thad Starner. Nivedita Arora et al.: MARS: Nano-Power Battery-free Wireless Interfaces for Touch, Swipe and Speech Input. (2021) authored by Thad Starner. Nivedita Arora et al.: MARS: Nano-Power Battery-free Wireless Interfaces for Touch, Swipe and Speech Input. (2021) authored by Thad Starner. Alex Olwal et al.: E-Textile Microinteractions: Augmenting Twist with Flick, Slide and Grasp Gestures for Soft Electronics. (2020) authored by Thad Starner. Junyu Chen et al.: First Bite/Chew: distinguish different types of food by first biting/chewing and the corresponding hand movement. (2023) authored by Thad Starner. Zahoor Zafrulla et al.: Hand detection in American Sign Language depth data using domain-driven random forest regression. (2015) authored by Thad Starner. Thad Starner and Yael Maguire: Heat Dissipation in Wearable Computers Aided by Thermal Coupling with the User. (1999) authored by Thad Starner. Roshan Lalintha Peiris et al.: ISWC 2018: Towards Smarter Wearable Technologies That Blend With Our Bodies. (2019) authored by Thad Starner. David M. Krum et al.: Evaluation of a Multimodal Interface for 3D Terrain Visualization. (2002) authored by Thad Starner. Charles Ramey et al.: Wear-a-CUDA: a GPU based dolphin whistle recognizer for underwater wearable computers. (2018) authored by Thad Starner. Nivedita Arora et al.: SATURN: A Thin and Flexible Self-powered Microphone Leveraging Triboelectric Nanogenerator. (2018) authored by Thad Starner. Cheng Zhang et al.: FingerSound: Recognizing unistroke thumb gestures using a ring. (2017) authored by Thad Starner. Tanya Estes et al.: A wearable vibration glove for improving hand sensation in persons with Spinal Cord Injury using Passive Haptic Rehabilitation. (2015) authored by Thad Starner. Giancarlo Valentin et al.: Canine reachability of snout-based wearable inputs. (2014) authored by Thad Starner. Cheng Zhang et al.: TapSkin: Recognizing On-Skin Input for Smartwatches. (2016) authored by Thad Starner. Seungyon Claire Lee et al.: AirTouch: Synchronizing In-air Hand Gesture and On-body Tactile Feedback to Augment Mobile Gesture Interaction. (2011) authored by Thad Starner. Tracy L. Westeyn et al.: ActionGSR: A Combination Galvanic Skin Response-Accelerometer for Physiological Measurements in Active Environments. (2006) authored by Thad Starner. Youngwook Do et al.: Bit Whisperer: Enabling Ad-hoc, Short-range, Walk-Up-and-Share Data Transmissions via Surface-restricted Acoustics. (2021) authored by Thad Starner. Cheng Zhang et al.: Bioacoustics-Based Human-Body-Mediated Communication. (2017) authored by Thad Starner. Junichi Shimizu et al.: Solar system: smooth pursuit interactions using EOG glasses. (2016) authored by Thad Starner. Caitlyn E. Seim et al.: Passive Haptic Training to Improve Speed and Performance on a Keypad. (2017) authored by Thad Starner. Abdelkareem Bedri et al.: A wearable system for detecting eating activities with proximity sensors in the outer ear. (2015) authored by Thad Starner. Juling Li et al.: First Bite/Chew: distinguish typical allergic food by two IMUs. (2023) authored by Thad Starner. Jung Wook Park et al.: Applying Compute-Proximal Energy Harvesting to Develop Self-Sustained Systems for Automobiles. (2022) authored by Thad Starner. Dingtian Zhang et al.: OptoSense: Towards Ubiquitous Self-Powered Ambient Light Sensing Surfaces. (2020) authored by Thad Starner. Nirmal J. Patel et al.: A model of two-thumb chording on a phone keypad. (2009) authored by Thad Starner. Martin Friedmann et al.: Device Synchronization Using an Optimal Linear Filter. (1992) authored by Thad Starner. Scott M. Gilliland and Thad Starner: Development of a custom keyboard for extended use in salt water. (2015) authored by Thad Starner. Nivedita Arora et al.: SATURN: Technical and Design Challenges of Building a Self-sustaining Sound and Vibration Sensing Material. (2019) authored by Thad Starner He designed the hardware for his system, dubbed "The Lizzy", based on designs of the wearable "hip PC" designed by Doug Platt, who built Starner\'s original wearable. The original system consisted of custom parts from a kit made by Park Enterprises, a Private Eye display, and a Twiddler chorded keyboard. '}. As of January 29, 2008, Starner\'s setup has evolved to include a heads-up display showing 640x480 screen resolution, a Twiddler, and an OQO Model 1 Ultra-Mobile PC (though the specifications listed suggest an OQO Model 01+) with a GHz processor, 512 MB of RAM, 30GB hard disk, USB2, Firewire, and Wi-Fi built in, as well as a mobile phone with cellular Internet access as well. He also helped found Charmed Technology. He won a talent show in technological science for one of the first AI puzzle-solving PC computer simulations in 1986 before high school graduation gaining him early recognition
output format: answer
|
150877
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where did the author who wrote 'Optical Networks-Status Report and the Road Ahead' obtain his Ph.D.?
Context: Wushao Wen et al.: LVMSR - An Efficient Algorithm to Multicast Layered Video. (2000) authored by Biswanath Mukherjee. Wushao Wen et al.: LVMSR: an efficient algorithm to multicast layered video. (2003) authored by Biswanath Mukherjee. Amitabha Banerjee et al.: RAPID: an end-system aware protocol for intelligent data transfer over lambda grids. (2006) authored by Biswanath Mukherjee. Carlos Colman Meixner et al.: A Survey on Resiliency Techniques in Cloud Computing Infrastructures and Applications. (2016) authored by Biswanath Mukherjee. Nicholas J. Puketza et al.: A Software Platform for Testing Intrusion Detection Systems. (1997) authored by Biswanath Mukherjee. Saigopal Thota et al.: Trust-Based Collaboration Service Framework: A Platform for Communication and Content Sharing. (2012) authored by Biswanath Mukherjee. Martin O. Nicholes and Biswanath Mukherjee: A Survey of Security Techniques for the Border Gateway Protocol (BGP). (2009) authored by Biswanath Mukherjee. Eric Sturzinger et al.: Application-aware resource provisioning in a heterogeneous Internet of Things. (2017) authored by Biswanath Mukherjee. Steven R. Snapp et al.: A system for distributed intrusion detection. (1991) authored by Biswanath Mukherjee. Ningning Guo et al.: Protection against failure of machine-learning-based QoT prediction. (2022) authored by Biswanath Mukherjee. Abhishek Gupta et al.: A Scalable Approach for Service Chain (SC) Mapping with Multiple SC Instances in a Wide-Area Network. (2017) authored by Biswanath Mukherjee. Sugang Xu et al.: A Novel Strategy of Carrier Cooperation with Coordinated Scheduling for Swift Failure/Disaster Recovery. (2023) authored by Biswanath Mukherjee. Danyang Zheng et al.: Towards Optimal Parallelism-Aware Service Chaining and Embedding. (2022) authored by Biswanath Mukherjee. Yali Liu et al.: Video Streaming Forensic - Content Identification with Traffic Snooping. (2010) authored by Biswanath Mukherjee. Divya Chitimalla et al.: Application-aware software-defined EPON upstream resource allocation. (2015) authored by Biswanath Mukherjee. Massimo Tornatore et al.: Holding-Time-Aware Dynamic Traffic Grooming. (2008) authored by Biswanath Mukherjee. Biswanath Mukherjee et al.: Comments on 'Exact analysis of asymmetric polling systems with single buffers'. (1990) authored by Biswanath Mukherjee. Wushao Wen et al.: Token-tray/weighted queuing-time (TT/WQT): an adaptive batching policy for near video-on-demand system. (2001) authored by Biswanath Mukherjee. Wushao Wen et al.: Token-tray/weighted queuing-time (TT/WQT): an adaptive batching policy for near video-on-demand system. (2002) authored by Biswanath Mukherjee. Abhishek Gupta et al.: A Scalable Approach for Service Chain Mapping With Multiple SC Instances in a Wide-Area Network. (2018) authored by Biswanath Mukherjee. Vishwanath Ramamurthi et al.: MIMO-Based Rate Adaptation to Enhance TCP Throughput over Wireless Fading Channels. (2008) authored by Biswanath Mukherjee. Biswanath Mukherjee alternativeName Mukherjee Biswanath. Yali Liu et al.: SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack. (2009) authored by Biswanath Mukherjee. Xiaoling Qiu et al.: Priority-Based Coverage-Aware Congestion Control for Multihop Wireless Sensor Networks. (2008) authored by Biswanath Mukherjee. Biswanath Mukherjee name Biswanath Mukherjee. Biswanath Mukherjee alternativeName Biswanath Mukherjee. Yali Liu et al.: Detecting sensitive data exfiltration by an insider attack. (2008) authored by Biswanath Mukherjee. Dragos Andrei et al.: Flexible Scheduling of Multicast Sessions with Different Granularities for Large Data Distribution over WDM Networks. (2009) authored by Biswanath Mukherjee. Amitabha Banerjee et al.: Algorithms for Integrated Routing and Scheduling for Aggregating Data from Distributed Resources on a Lambda Grid. (2008) authored by Biswanath Mukherjee. Xiaoling Qiu et al.: Efficient Aggregation of Multiple Classes of Information in Wireless Sensor Networks. (2009) authored by Biswanath Mukherjee. Xiaoxin Wu et al.: MACA-an efficient channel allocation scheme in cellular networks. (2000) authored by Biswanath Mukherjee. Biswaroop Guha and Biswanath Mukherjee: Network security via reverse engineering of TCP code: vulnerability analysis and proposed solutions. (1997) authored by Biswanath Mukherjee. Biswaroop Guha and Biswanath Mukherjee: Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions. (1996) authored by Biswanath Mukherjee. Sabidur Rahman et al.: Auto-Scaling VNFs Using Machine Learning to Improve QoS and Reduce Cost. (2018) authored by Biswanath Mukherjee. Nicholas J. Puketza et al.: A Methodology for Testing Intrusion Detection Systems. (1996) authored by Biswanath Mukherjee. Yali Liu et al.: A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance. (2008) authored by Biswanath Mukherjee. Yu Wu et al.: Content Fragmentation: A Redundancy Scheme to Save Energy in Cloud Networks. (2018) authored by Biswanath Mukherjee. Rodrigo Izidoro Tinini et al.: Energy-Efficient Baseband Processing via vBBU Migration in Virtualized Cloud-Fog RAN. (2019) authored by Biswanath Mukherjee. Xiaoxin Wu et al.: MADF: Mobile-assisted data forwarding for wireless data networks. (2004) authored by Biswanath Mukherjee. Joonho Choi et al.: A Survey of User Behavior in VoD Service and Bandwidth-Saving Multicast Streaming Schemes. (2012) authored by Biswanath Mukherjee. Danyang Zheng et al.: Service Function Chaining and Embedding With Heterogeneous Faults Tolerance in Edge Networks. (2023) authored by Biswanath Mukherjee. S. Sedef Savas et al.: Disaster-aware service provisioning with manycasting in cloud networks. (2014) authored by Biswanath Mukherjee. Sifat Ferdousi et al.: Disaster-Aware Datacenter Placement and Dynamic Content Management in Cloud Networks. (2015) authored by Biswanath Mukherjee. Biswanath Mukherjee alternativeName B. Mukherjee. Sabidur Rahman et al.: Insights from Analysis of Video Streaming Data to Improve Resource Management. (2018) authored by Biswanath Mukherjee. Sabidur Rahman et al.: Insights from Analysis of Video Streaming Data to Improve Resource Management. (2018) authored by Biswanath Mukherjee. Rafael B. R. Lourenço et al.: Data evacuation from data centers in disaster-affected regions through software-defined satellite networks. (2019) authored by Biswanath Mukherjee. Abu S. Reaz et al.: Synthetic traffic generation for streaming video to model IPTV. (2011) authored by Biswanath Mukherjee. Ming Xia et al.: SLA-Aware Provisioning for Revenue Maximization in Telecom Mesh Networks. (2008) authored by Biswanath Mukherjee. Gustavo B. Figueiredo et al.: Load balancing and latency reduction in multi-user CoMP over TWDM-VPONs. (2016) authored by Biswanath MukherjeeD. , a Silicon Valley startup company acquired by Fortinet. , a Silicon Valley startup company, acquired by Fortinet, Inc. He is the founder and President of Ennetix, Inc
output format: answer
|
University of Washington
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many publications are cited by the institute of the author of 'When Learners Surpass their Sources: Mathematical Modeling of Learning from an Inconsistent Source'?
Context: Cesar Alvarado et al.: Optimizing homeostatic cell renewal in hierarchical tissues. (2018) authored by Natalia L. Komarova. Jienian Yang et al.: The Role of Symmetric Stem Cell Divisions in Tissue Homeostasis. (2015) authored by Natalia L. Komarova. Natalia L. Komarova name Natalia L. Komarova. Natalia L. Komarova modified 2023-10-18. Natalia L. Komarova i10Index 119. Natalia L. Komarova alternativeName Natalia KomarovaD. Newell. \nKomarova is married to UC Irvine evolutionary biologist Dominik Wodarz
output format: answer
|
4937754
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many articles are attributed to the academic institution where the author of 'Empirical evaluation of a hybrid intelligent monitoring system using different measures of effectiveness' works?
Context: Brais Cancela and Amparo Alonso-Betanzos: Wavefront Marching Methods: A Unified Algorithm to Solve Eikonal and Static Hamilton-Jacobi Equations. (2021) authored by Amparo Alonso-Betanzos. Carlos Eiras-Franco et al.: Scalable approximate k-NN Graph construction based on Locality Sensitive Hashing. (2017) authored by Amparo Alonso-Betanzos. Carlos Eiras-Franco et al.: Fast Distributed kNN Graph Construction Using Auto-tuned Locality-sensitive Hashing. (2020) authored by Amparo Alonso-Betanzos. Carlos Eiras-Franco et al.: Scalable feature selection using ReliefF aided by locality-sensitive hashing. (2021) authored by Amparo Alonso-Betanzos. Amparo Alonso‐Betanzos modified 2023-10-18. Amparo Alonso‐Betanzos 2YrMeanCitedness 1.590909123420715332. Beatriz Remeseiro et al.: Learning features on tear film lipid layer classification. (2015) authored by Amparo Alonso-Betanzos. Verónica Bolón-Canedo et al.: Real-Time Tear Film Classification Through Cost-Based Feature Selection. (2015) authored by Amparo Alonso-Betanzos. Amparo Alonso‐Betanzos name Amparo Alonso‐Betanzos. Amparo Alonso-Betanzos is Person. Iago Porto-Díaz et al.: Local Modeling Classifier for Microarray Gene-Expression Data. (2010) authored by Amparo Alonso-Betanzos. Amparo Alonso‐Betanzos alternativeName Amparo Alonso‐Betanzos. Amparo Alonso-Betanzos et al.: Analysis and evaluation of hard and fuzzy clustering segmentation techniques in burned patient images. (2000) authored by Amparo Alonso-Betanzos. Amparo Alonso-Betanzos et al.: Shear strength prediction using dimensional analysis and functional networks. (2004) authored by Amparo Alonso-Betanzos. Amparo Alonso-Betanzos is Creator. Amparo Alonso‐Betanzos alternativeName A. Alonso‐Betanzos. Beatriz Remeseiro et al.: A Methodology for Improving Tear Film Lipid Layer Classification. (2014) authored by Amparo Alonso-Betanzos. Amparo Alonso‐Betanzos alternativeName A. Alonso Betanzos. Sergio Ramírez-Gallego et al.: Fast-mRMR: Fast Minimum Redundancy Maximum Relevance Algorithm for High-Dimensional Big Data. (2017) authored by Amparo Alonso-Betanzos. Verónica Bolón-Canedo et al.: Interferential Tear Film Lipid Layer Classification: An Automatic Dry Eye Test. (2012) authored by Amparo Alonso-Betanzos. Brais Cancela et al.: A scalable saliency-based feature selection method with instance-level information. (2020) authored by Amparo Alonso-Betanzos. Jorge Paz-Ruza et al.: Sustainable Transparency in Recommender Systems: Bayesian Ranking of Images for Explainability. (2023) authored by Amparo Alonso-Betanzos. David Martínez-Rego et al.: A Minimum Volume Covering Approach with a Set of Ellipsoids. (2013) authored by Amparo Alonso-Betanzos. Brais Cancela et al.: A delayed Elastic-Net approach for performing adversarial attacks. (2020) authored by Amparo Alonso-Betanzos"}. \nIn 1998, she was awarded the L'Oreal-UNESCO Award for Women In Science in Spain
output format: answer
|
21949
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many publication citations does Traian-Florin Serbanuta's co-author and author of Semantics and Algorithms for Parametric Monitoring, have?
Context: Sandeep Dasgupta et al.: A complete formal semantics of x86-64 user-level instruction set architecture. (2019) authored by Grigore Rosu. Grigore Roşu alternativeName Rosu Grigore. Grigore Roşu name Grigore Roşu. Daejun Park et al.: A formal verification tool for Ethereum VM bytecode. (2018) authored by Grigore Rosu. Grigore Roşu alternativeName Grigore Roşu. Grigore Roşu alternativeName Grigore Roșu. Grigore Roşu alternativeName Grigore Rosu. Grigore Rosu: Formal Design, Implementation and Verification of Blockchain Languages (Invited Talk). (2018) authored by Grigore Rosu. Grigore Roşu alternativeName G. Rosu. Grigore Rosu: Formal Design, Implementation and Verification of Blockchain Languages Using K (Invited Talk). (2020) authored by Grigore Rosu. Holger Giese and Grigore Rosu: Formal Techniques for Distributed Systems - Joint 14th IFIP WG 6.1 International Conference, FMOODS 2012 and 32nd IFIP WG 6.1 International Conference, FORTE 2012, Stockholm, Sweden, June 13-16, 2012. Proceedings (2012) edited by Grigore Rosu. Daejun Park et al.: End-to-End Formal Verification of Ethereum 2.0 Deposit Smart Contract. (2020) authored by Grigore Rosu. Jeff Huang et al.: Maximal sound predictive race detection with control flow abstraction. (2014) authored by Grigore Rosu. Sumant Kowshik et al.: Static Analysis to Enforce Safe Value Flow in Embedded Control Systems. (2006) authored by Grigore Rosu. Everett Hildenbrandt et al.: KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine. (2018) authored by Grigore Rosu. Qingzhou Luo and Grigore Rosu: EnforceMOP: a runtime property enforcement system for multithreaded programs. (2013) authored by Grigore Rosu. Grigore Rosu: Proceedings of the Seventh International Workshop on Rewriting Logic and its Applications, WRLA 2008, Budapest, Hungary, March 29-30, 2008 (2009) edited by Grigore Rosu. Feng Chen et al.: Checking and Correcting Behaviors of Java Programs at Runtime with Java-MOP. (2005) authored by Grigore Rosu. Koushik Sen et al.: Detecting Errors in Multithreaded Programs by Generalized Predictive Analysis of Executions. (2005) authored by Grigore Rosu. Xiaohong Chen and Grigore Rosu: A general approach to define binders using matching logic. (2020) authored by Grigore Rosu. Grigore Roşu i10Index 128. Grigore Rosu: A Birkhoff-like Axiomatizability Result for Hidden Algebra and Coalgebra. (1998) authored by Grigore Rosu. Grigore Rosu: An Effective Algorithm for the Membership Problem for Extended Regular Expressions. (2007) authored by Grigore Rosu. José Meseguer and Grigore Rosu: The rewriting logic semantics project: A progress report. (2013) authored by Grigore Rosu. Stefan Ciobaca et al.: A Language-Independent Proof System for Mutual Program Equivalence. (2014) authored by Grigore Rosu. José Meseguer and Grigore Rosu: The Rewriting Logic Semantics Project: A Progress Report. (2011) authored by Grigore Rosu. Xiaohong Chen et al.: Towards a unified proof framework for automated fixpoint reasoning using matching logic. (2020) authored by Grigore Rosu. José Meseguer and Grigore Rosu: Algebraic Methodology and Software Technology, 12th International Conference, AMAST 2008, Urbana, IL, USA, July 28-31, 2008, Proceedings (2008) edited by Grigore Rosu'}. S. D. D. It is as expressive as first-order logic plus mathematical induction, \nand uses a compact notation to capture, as syntactic sugar, several formal systems of critical importance, such as algebraic specification and initial algebra semantics, first-order logic with least fixed points,\ntyped or untyped lambda-calculi, \ndependent type systems, \n separation logic with recursive predicates, rewriting logic,\nHoare logic, temporal logics, \ndynamic logic, and the modal μ-calculus
output format: answer
|
7172
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Who has a higher hIndex, the author of 'Call Admission Control for Voice/Data Integration in Broadband Wireless Networks' or the author of 'Principles of dashboard adaptability to get insights into origin-destination data'?
Context: Arko Lucieer and Menno-Jan Kraak: Alpha-shapes for visualizing irregular-shaped class clusters in 3D feature space for classification of remotely sensed imagery. (2004) authored by Menno-Jan Kraak. Xiang Zhang et al.: Formalization and Data Enrichment for Automated Evaluation of Building Pattern Preservation. (2010) authored by Menno-Jan Kraak. M.J. Kraak 2YrMeanCitedness 0.56666666269302368164. Arko Lucieer and Menno-Jan Kraak: Interactive and visual fuzzy classification of remotely sensed imagery for exploration of uncertainty. (2004) authored by Menno-Jan Kraak. Xiang Zhang et al.: Building pattern recognition in topographic data: examples on collinear and curvilinear alignments. (2013) authored by Menno-Jan Kraak. M.J. Kraak name M.J. Kraak. Menno-Jan Kraak and Daniël E. Van de Vlag: Understanding Spatiotemporal Patterns: Visual Ordering of Space and Time. (2007) authored by Menno-Jan Kraak. M.J. Kraak written paper amount in year2016: 18. M.J. Kraak written paper amount in year2016: 18. M.J. Kraak written paper amount in year2015: 20"}. Between 1981 and 1983 he did his compulsory army service as an officer in a military geography unit
output format: answer
|
Raouf Boutaba
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Since when has the author of Gain more insight from your PLS-SEM results been included in Clarivate Analytics' highly cited researchers list?
Context: Claudia Hock et al.: Management of multi-purpose stadiums: importance and performance measurement of service interfaces. (2010) authored by Christian M. Ringle. Christian M. Ringle alternativeName Christian Ringle. Christian M. Ringle name Christian M. Ringle. Christian M. Ringle alternativeName C Ringle. Christian M. Ringle alternativeName Ringle. Christian M. Ringle alternativeName Christian M. Ringle"}. Ringle is a professor of management and decision sciences at the Hamburg University of Technology, Germany
output format: answer
|
2
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What type of institution is the author of 'Knowing The What But Not The Where in Bayesian Optimization' affiliated with?
Context: Adar Kahana et al.: A high order compact time/space finite difference scheme for the 2D and 3D wave equation with a damping layer. (2022) authored by Eli Turkel. Sergey V. Petropavlovsky et al.: 3D time-dependent scattering about complex shapes using high order difference potentials. (2022) authored by Eli Turkel. Darrell Steven Britt et al.: Numerical solution of the wave equation with variable wave speed on nonconforming domains by high-order difference potentials. (2018) authored by Eli Turkel. Sergey V. Petropavlovsky et al.: Computation of unsteady electromagnetic scattering about 3D complex bodies in free space with high-order difference potentials. (2024) authored by Eli Turkel. Michael Medvinsky et al.: High order numerical simulation of the transmission and scattering of waves using the method of difference potentials. (2013) authored by Eli Turkel. Matteo Parsani et al.: An implicit high-order spectral difference approach for large eddy simulation. (2010) authored by Eli Turkel. Oded Ovadia et al.: A convolutional dispersion relation preserving scheme for the acoustic wave equation. (2024) authored by Eli Turkel. Oded Ovadia et al.: A Convolutional Dispersion Relation Preserving Scheme for the Acoustic Wave Equation. (2022) authored by Eli Turkel. Eli Turkel et al.: Compact 2D and 3D sixth order schemes for the Helmholtz equation with variable wave number. (2013) authored by Eli Turkel. Arie Shaus et al.: Quality Evaluation of Facsimiles of Hebrew First Temple Period Inscriptions. (2012) authored by Eli Turkel Soloveitchik. D. D. B. Other applications of deep learning include using large time steps and improving the accuracy of finite differences for high frequencies on coarse grids. "}
output format: answer
|
nonprofit
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In which country is the Eindhoven University of Technology located where the author is a Full Professor?
Context: Florian David Brunner et al.: Robust Event-Triggered MPC With Guaranteed Asymptotic Bound and Average Sampling Rate. (2017) authored by W. P. M. H. Heemels. V. S. Dolk et al.: Event-Triggered Consensus for Multi-Agent Systems with Guaranteed Robust Positive Minimum Inter-Event Times. (2019) authored by W. P. M. H. Heemels. Florian David Brunner et al.: Robust self-triggered MPC for constrained linear systems: A tube-based approach. (2016) authored by W. P. M. H. Heemels. Christopher A. Orrico et al.: Learning the cost-to-go for mixed-integer nonlinear model predictive control. (2024) authored by W. P. M. H. Heemels. Alexander Katriniok et al.: Discrete-time Control Barrier Functions for Guaranteed Recursive Feasibility in Nonlinear MPC: An Application to Lane Merging. (2023) authored by W. P. M. H. Heemels. Alexander Katriniok et al.: Discrete-Time Control Barrier Functions for Guaranteed Recursive Feasibility in Nonlinear MPC: An Application to Lane Merging. (2023) authored by W. P. M. H. Heemels. Florian David Brunner et al.: Robust self-triggered MPC for constrained linear systems. (2014) authored by W. P. M. H. Heemels. Alessandro Alessio et al.: Convex Polyhedral Invariant Sets for Closed-Loop Linear MPC Systems. (2006) authored by W. P. M. H. Heemels. Alessandro Alessio et al.: Squaring the circle: An algorithm for generating polyhedral invariant sets from ellipsoidal ones. (2007) authored by W. P. M. H. Heemels. Joris Sijs et al.: On integration of event-based estimation and robust MPC in a feedback loop. (2010) authored by W. P. M. H. Heemels. V. S. Dolk et al.: Output-based event-triggered control systems under Denial-of-Service attacks. (2015) authored by W. P. M. H. Heemels. Emre Aydiner et al.: Robust self-triggered model predictive control for constrained discrete-time LTI systems based on homothetic tubes. (2015) authored by W. P. M. H. Heemels. Mohammadhadi Balaghiinaloo et al.: An ℓ2-consistent event-triggered control policy for linear systems. (2021) authored by W. P. M. H. Heemels. Mircea Lazar et al.: Squaring the circle: an algorithm for generating polyhedral invariant sets from ellipsoidal ones. (2006) authored by W. P. M. H. Heemels. Jan H. Richter et al.: Decoupling-based reconfigurable control of linear systems after actuator faults. (2009) authored by W. P. M. H. Heemels. V. S. Dolk et al.: Event-Triggered Control Systems Under Denial-of-Service Attacks. (2017) authored by W. P. M. H. Heemels. Thomas A. F. Theunisse et al.: Robust Global Stabilization of the DC-DC Boost Converter via Hybrid Control. (2015) authored by W. P. M. H. Heemels. Dominicus P. Borgers et al.: Dynamic Periodic Event-Triggered Control for Linear Systems. (2017) authored by W. P. M. H. Heemels. Eelco P. van Horssen et al.: Performance analysis and controller improvement for linear systems with (m, k)-firm data losses. (2016) authored by W. P. M. H. Heemels. F. D. Brunne et al.: Dynamic thresholds in robust event-triggered control for discrete-time linear systems. (2016) authored by W. P. M. H. Heemels. Jiaheng Yang et al.: A System-Theoretic Approach to Construct a Banded Null Basis to Efficiently Solve MPC-Based QP Problems. (2019) authored by W. P. M. H. Heemels. Sven Adrianus Nicolaas Nouwens et al.: Constraint-Adaptive MPC for linear systems: A system-theoretic framework for speeding up MPC through online constraint removal. (2023) authored by W. P. M. H. Heemels. Sven Adrianus Nicolaas Nouwens et al.: Constraint-adaptive MPC for linear systems: A system-theoretic framework for speeding up MPC through online constraint removal. (2023) authored by W. P. M. H. Heemels. Mahmoud Abdelrahim et al.: Input-to-state stabilizing event-triggered control for linear systems with output quantization. (2016) authored by W. P. M. H. Heemels. Victor S. Dolk et al.: Event-Triggered Control for String-Stable Vehicle Platooning. (2017) authored by W. P. M. H. Heemels. M. Kanat Camlibel et al.: A full characterization of stabilizability of bimodal piecewise linear systems with scalar inputs. (2008) authored by W. P. M. H. Heemels. Dominicus P. Borgers et al.: Dynamic event-triggered control with time regularization for linear systems. (2016) authored by W. P. M. H. Heemels. Duarte Antunes and W. P. M. H. Heemels: Performance analysis of a class of linear quadratic regulators for switched linear systems. (2014) authored by W. P. M. H. Heemels. Dominicus Paulus Borgers et al.: Riccati-Based Design of Event-Triggered Controllers for Linear Systems With Delays. (2018) authored by W. P. M. H. Heemels. Elena Petri et al.: Event-triggered observer design for linear systems. (2021) authored by W. P. M. H. Heemels. Elena Petri et al.: Event-triggered observer design for linear systems. (2021) authored by W. P. M. H. Heemels. Thomas A. F. Theunisse et al.: Hybrid control of the boost converter: Robust global stabilization. (2013) authored by W. P. M. H. Heemels. Francesco Comaschi et al.: FPGA Implementations of Piecewise Affine Functions Based on Multi-Resolution Hyperrectangular Partitions. (2012) authored by W. P. M. H. Heemels. Mahmoud Abdelrahim et al.: Event-Triggered Quantized Control for Input-to-State Stabilization of Linear Systems With Distributed Output Sensors. (2019) authored by W. P. M. H. Heemels. A. T. J. R. Cobbenhagen et al.: Coverage control for outbreak dynamics. (2017) authored by W. P. M. H. Heemels. Koen Classens et al.: A Closed-Loop Perspective on Fault Detection for Precision Motion Control: With Application to an Overactuated System. (2021) authored by W. P. M. H. Heemels. Mircea Lazar and W. P. M. H. Heemels: A New Dual-mode Hybrid MPC Algorithm with a robust stability Guarantee. (2006) authored by W. P. M. H. Heemels. Behnam Asadi Khashooei et al.: Suboptimal event-triggered control over unreliable communication links with experimental validation. (2017) authored by W. P. M. H. Heemels. Duarte J. Antunes et al.: Consistent Event-Triggered Consensus on Complete Graphs. (2023) authored by W. P. M. H. Heemels. Koen J. A. Scheres et al.: Robustifying Event-Triggered Control to Measurement Noise. (2022) authored by W. P. M. H. HeemelsSc. \nHeemels obtained M
output format: answer
|
Netherlands
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Where did the author of Preemptive Scheduling with Due Dates receive his BTech degree?
Context: Jing-Fu Jenq and Sartaj Sahni: Reconfigurable Mesh Algorithms for the Hough Transform. (1994) authored by Sartaj Sahni. Adeesha Wijayasiri et al.: Dynamic Data-Driven SAR Image Reconstruction Using Multiple GPUs. (2018) authored by Sartaj Sahni. Baba C. Vemuri et al.: A Robust and Efficient Algorithm for Image Registration. (1997) authored by Sartaj Sahni. Adeesha Wijayasiri et al.: Dynamic Data Driven SAR Reconstruction on Hybrid Multicore systems. (2018) authored by Sartaj Sahni. Jing-Fu Jenq and Sartaj Sahni: Reconfigurable Mesh Algorithms for the Hough Transform. (1991) authored by Sartaj Sahni. Guna Seetharaman et al.: Dynamic multistatic synthetic aperture radar (DMSAR) with image reconstruction algorithms and analysis. (2013) authored by Sartaj Sahni. Jing-Fu Jenq and Sartaj Sahni: Reconfigurable Mesh Algorithms for the Area and Perimeter of Image Components. (1991) authored by Sartaj Sahni. Jing-Fu Jenq and Sartaj Sahni: Reconfigurable Mesh Algorithms for Image Shrinking, Expanding, Clustering, and Template Matching. (1991) authored by Sartaj Sahni. Adeesha Wijayasiri et al.: Dynamic data driven image reconstruction using multiple GPUs. (2016) authored by Sartaj Sahni. Dinesh P. Mehta and Sartaj Sahni: Models and techniques for the visualization of labeled discrete objects. (1992) authored by Sartaj Sahni. Eric T. Hayden et al.: Techniques for mapping synthetic aperture radar processing algorithms to multi-GPU clusters. (2012) authored by Sartaj Sahni. Xiaochun Xu et al.: A computational geometry method for localization using differences of distances. (2010) authored by Sartaj Sahni. Adeesha Wijayasiri et al.: Multiobjective Optimization of SAR Reconstruction on Hybrid Multicore Systems. (2020) authored by Sartaj Sahni. Sartaj Sahni alternativeName Sartaj Sahni. Sanjay Ranka and Sartaj Sahni: Computing Hough transforms on hypercube multicomputers. (1990) authored by Sartaj Sahni. William Chapman et al.: A framework for rendering high resolution synthetic aperture radar images on heterogeneous architectures. (2014) authored by Sartaj Sahni. Abdur R. Shahid et al.: PPVC: Privacy Preserving Voronoi Cell for location-based services. (2017) authored by Sartaj Sahni. Sartaj Sahni name Sartaj Sahni. Xinyan Zha and Sartaj Sahni: Highly compressed Aho-Corasick automata for efficient intrusion detection. (2008) authored by Sartaj Sahni. Sanguthevar Rajasekaran et al.: Efficient Algorithms for Local Alignment Search. (2001) authored by Sartaj Sahni. Kam-Hoi Cheng and Sartaj Sahni: VLSI Systems For Matrix Multiplication. (1985) authored by Sartaj Sahni. Kam-Hoi Cheng and Sartaj Sahni: A new VLSI system for adaptive recursive filtering. (1989) authored by Sartaj Sahni. Kam-Hoi Cheng and Sartaj Sahni: A New VLSI System for Adaptive Recursive Filtering. (1986) authored by Sartaj Sahni. Chunchun Zhao and Sartaj Sahni: Efficient RNA folding using Zuker's method. (2017) authored by Sartaj Sahni. Sartaj Sahni et al.: Data Structures For One-Dimensional Packet Classification Using Most-Specific-Rule Matching. (2002) authored by Sartaj Sahni. Sartaj Sahni et al.: Data Structures for One-Dimensional Packet Classification Using Most-Specific-Rule Matching. (2003) authored by Sartaj Sahni. Dinesh P. Mehta and Sartaj K. Sahni: Models, techniques, and algorithms for finding, selecting, and displaying patterns in strings and other discrete objects. (1997) authored by Sartaj Sahni. Adeesha Wijayasiri et al.: Performance and Energy Evaluation of SAR Reconstruction on Intel Knights Landing. (2018) authored by Sartaj Sahni. Anuj Jain et al.: Partitioning 3d Phantoms Into Homogeneous Cuboids. (2003) authored by Sartaj Sahni. Li-Shin Lin and Sartaj Sahni: Maximum Alignment of Interchageable Terminals. (1988) authored by Sartaj Sahni. Sartaj Sahni: Data Structures for One-Dimensional Packet Classification Using Most-Specific-Rule Matching. (2002) authored by Sartaj Sahni. Adeesha Wijayasiri et al.: Parallel Dynamic Data Driven Approaches for Synthetic Aperture Radar. (2017) authored by Sartaj Sahni. Junjie Li et al.: Pairwise sequence alignment for very long sequences on GPUs. (2014) authored by Sartaj Sahni. Dinesh P. Mehta and Sartaj Sahni: Computing Display Conflicts in String Visualization. (1994) authored by Sartaj Sahni. Sartaj Sahni alternativeName Sartaj Kumar Sahni. Junjie Li et al.: Pairwise sequence alignment for very long sequences on GPUs. (2012) authored by Sartaj Sahni. Sartaj Sahni alternativeName S. Sahni. Xinyan Zha and Sartaj Sahni: Multipattern string matching on a GPU. (2011) authored by Sartaj Sahni. Baba C. Vemuri et al.: An efficient motion estimator with application to medical image registration. (1998) authored by Sartaj Sahni. Dinesh P. Mehta and Sartaj Sahni: Computing Display Conflicts in String and Circular String Visualization. (1992) authored by Sartaj Sahni. Madhusudan Nigam and Sartaj Sahni: Computational Geometry on a Reconflgurable Mesh. (1994) authored by Sartaj Sahni. Junjie Li et al.: Multicore and GPU algorithms for Nussinov RNA folding. (2014) authored by Sartaj Sahni. Sartaj Sahni alternativeName Sartaj K. Sahni"}. \nProf. Sahni is a member of the European Academy of Sciences
output format: answer
|
Indian Institute of Technology Kanpur
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Whose institute has more publications, the creator of 'Informatik als Wissenschaft an der Technischen Universität München und ihre Anwendung in Wirtschaft und Gesellschaft' or the author of 'Reply to Will and Hegselmann'?
Context: Yihui Ren et al.: Generative Modeling of Human Behavior and Social Interactions Using Abductive Analysis. (2018) authored by Michael W. Macy. Meysam Alizadeh et al.: Psychology and morality of political extremists: evidence from Twitter language analysis of alt-right and Antifa. (2019) authored by Michael W. Macy. Vanessa Cedeno-Mieles et al.: Networked experiments and modeling for producing collective identity in a group of human subjects using an iterative abduction framework. (2020) authored by Michael W. Macy. Meysam Alizadeh et al.: Psychological and Personality Profiles of Political Extremists. (2017) authored by Michael W. Macy. Vanessa Cedeno-Mieles et al.: Mechanistic and data-driven agent-based models to explain human behavior in online networked group anagram games. (2019) authored by Michael W. Macy. Alexander Ruch et al.: Demographic Confounding Causes Extreme Instances of Lifestyle Politics on Facebook. (2022) authored by Michael W. Macy. Thomas Davidson et al.: Automated Hate Speech Detection and the Problem of Offensive Language. (2017) authored by Michael W. Macy. Thomas Davidson et al.: Automated Hate Speech Detection and the Problem of Offensive Language. (2017) authored by Michael W. Macy. George Berry et al.: The opacity problem in social contagion. (2019) authored by Michael W. Macy and his M. and Ph. '}. I
output format: answer
|
Technical University of Munich
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the h-index of the author who authored Time-Delay Systems: Analysis and Control?
Context: Emilia Fridman alternativeName Fridman Emilia. Emilia Fridman alternativeName Emilia Fridman. Emilia Fridman alternativeName Emilia M. Fridman. Emilia Fridman alternativeName Fridman. Emilia Fridman alternativeName E. M. Fridman. Emilia Fridman name Emilia Fridman. Emilia Fridman alternativeName E. Fridman. Emilia Fridman 2YrMeanCitedness 2.5697674751281738281. Emilia Fridman alternativeName Edward Fridman. Emilia Fridman alternativeName Eddie Fridman. Emilia Fridman et al.: Stability of the cell dynamics in acute myeloid leukemia. (2016) authored by Emilia Fridman. Emilia Fridman is Person. Emilia Fridman orcidId https://orcid.org/0000-0002-8773-9494. Rami Katz et al.: Network-based deployment of multi-agents without communication of leaders with multiple followers: a PDE approach. (2022) authored by Emilia Fridman. Maria Terushkin and Emilia Fridman: Network-based deployment of nonlinear multi agents over open curves: A PDE approach. (2021) authored by Emilia Fridman. Jose Louis Avila Alonso et al.: Stability analysis of PDEs modelling cell dynamics in Acute Myeloid Leukemia. (2014) authored by Emilia Fridman. Emilia Fridman is Creator. Emilia Fridman member of Tel Aviv University. Emilia Fridman i10Index 185. Emilia Fridman link https://www.eng.tau.ac.il/~emilia/. Emilia Fridman link https://www.eng.tau.ac.il/~emilia/. Emilia Fridman modified 2023-10-18. Denis V. Efimov et al.: On robust stability of sine-Gordon equation. (2019) authored by Emilia Fridman. Rami Katz and Emilia Fridman: Finite-Dimensional Boundary Control of the Linear Kuramoto-Sivashinsky Equation Under Point Measurement With Guaranteed $L^2$-Gain. (2022) authored by Emilia Fridman. Andrei Polyakov et al.: On homogeneous evolution equation in a Banach space. (2015) authored by Emilia Fridman. Emilia Fridman alternativeName Э. Фридман. Anton Selivanov and Emilia Fridman: PDE-Based Deployment of Multiagents Measuring Relative Position to One Neighbor. (2022) authored by Emilia Fridman. Pengfei Wang et al.: Constructive finite-dimensional boundary control of stochastic 1D parabolic PDEs. (2023) authored by Emilia Fridman. Emilia Fridman link https://en.wikipedia.org/wiki/Emilia_Fridman. Emilia Fridman link http://www.wikidata.org/entity/Q60023547. Emilia Fridman et al.: Bounds on the response of a drilling pipe model. (2010) authored by Emilia Fridman. Wen Kang and Emilia Fridman: Constrained control of 1-D parabolic PDEs using sampled in space sensing and actuation. (2020) authored by Emilia Fridman. Andrey Polyakov et al.: On Homogeneous Distributed Parameter Systems. (2016) authored by Emilia Fridman. Jieqiang Wei et al.: A PDE approach to deployment of mobile agents under leader relative position measurements. (2019) authored by Emilia Fridman. Wen Kang et al.: Sampled-data observer for 2D Navier-Stokes equation. (2019) authored by Emilia Fridman'}. and M. They have a son, and live in Tel Aviv. Vadim Strygin. She was promoted to Full Professor in 2012. Her Ph. \nEmilia Fridman was born in Kuibyshev, USSR. ; Liu, Kun, Fridman, Emilia, Xia, Yuanqing. She worked on various programs supported by the Ministry of Absorption, starting from Senior Researcher in 1993, and becoming a Principal Research Associate (parallel to Associate Professor) in 2002
output format: answer
|
63
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many scientific papers are attributed to the organization in which the creator of 'The false dichotomy between accessibility and usability' works?
Context: Yijie Guo et al.: Batch Reinforcement Learning Through Continuation Method. (2021) authored by Ed H. Chi. Wang-Cheng Kang et al.: Deep Hash Embedding for Large-Vocab Categorical Feature Representations. (2020) authored by Ed H. Chi. Sungryull Sohn et al.: BRPO: Batch Residual Policy Optimization. (2020) authored by Ed H. Chi. Sungryull Sohn et al.: BRPO: Batch Residual Policy Optimization. (2020) authored by Ed H. Chi. Noveen Sachdeva et al.: How to Train Data-Efficient LLMs. (2024) authored by Ed H. Chi. Tiansheng Yao et al.: Self-supervised Learning for Large-scale Item Recommendations. (2021) authored by Ed H. Chi. Ji Yang et al.: Mixed Negative Sampling for Learning Two-tower Neural Networks in Recommendations. (2020) authored by Ed H. Chi. Francois Belletti et al.: Factorized Recurrent Neural Architectures for Longer Range Dependence. (2018) authored by Ed H. Chi. Wang-Cheng Kang et al.: Learning Multi-granular Quantized Embeddings for Large-Vocab Categorical Features in Recommender Systems. (2020) authored by Ed H. Chi. Wang-Cheng Kang et al.: Learning Multi-granular Quantized Embeddings for Large-Vocab Categorical Features in Recommender Systems. (2020) authored by Ed H. Chi. Benjamin Coleman et al.: Unified Embedding: Battle-Tested Feature Representations for Web-Scale ML Systems. (2023) authored by Ed H. Chi. Benjamin Coleman et al.: Unified Embedding: Battle-Tested Feature Representations for Web-Scale ML Systems. (2023) authored by Ed H. Chi. Ge Liu et al.: Data Efficient Training for Reinforcement Learning with Adaptive Behavior Policy Sharing. (2020) authored by Ed H. Chi. Tiansheng Yao et al.: Self-supervised Learning for Deep Models in Recommendations. (2020) authored by Ed H. Chi. Yin Zhang et al.: Empowering Long-tail Item Recommendation through Cross Decoupling Network (CDN). (2022) authored by Ed H. Chi. Walid Krichene et al.: Efficient Training on Very Large Corpora via Gramian Estimation. (2018) authored by Ed H. Chi. Walid Krichene et al.: Efficient Training on Very Large Corpora via Gramian Estimation. (2019) authored by Ed H. Chi. Kiran Vodrahalli et al.: Algorithms for Efficiently Learning Low-Rank Neural Networks. (2022) authored by Ed H. Chi. Yin Zhang et al.: Empowering Long-tail Item Recommendation through Cross Decoupling Network (CDN). (2023) authored by Ed H. Chi. Jiaqi Ma et al.: SNR: Sub-Network Routing for Flexible Parameter Sharing in Multi-Task Learning. (2019) authored by Ed H. Chi. Bo Chang et al.: AntisymmetricRNN: A Dynamical System View on Recurrent Neural Networks. (2019) authored by Ed H. Chi. Bo Chang et al.: AntisymmetricRNN: A Dynamical System View on Recurrent Neural Networks. (2019) authored by Ed H. Chi. Yuji Roh et al.: LEVI: Generalizable Fine-tuning via Layer-wise Ensemble of Different Views. (2024) authored by Ed H. Chi. Huan Gui et al.: Hiformer: Heterogeneous Feature Interactions Learning with Transformers for Recommender Systems. (2023) authored by Ed H. Chi. Derek Zhiyuan Cheng et al.: Efficient Data Representation Learning in Google-scale Systems. (2023) authored by Ed H. Chi. Xinyang Yi et al.: Online Matching: A Real-time Bandit System for Large-scale Recommendations. (2023) authored by Ed H. Chi. Xinyang Yi et al.: Online Matching: A Real-time Bandit System for Large-scale Recommendations. (2023) authored by Ed H. Chi. Minmin Chen et al.: Top-K Off-Policy Correction for a REINFORCE Recommender System. (2018) authored by Ed H. Chi. Jianling Wang et al.: Large Language Models as Data Augmenters for Cold-Start Item Recommendation. (2024) authored by Ed H. Chi. Wang-Cheng Kang et al.: Learning to Embed Categorical Features without Embedding Tables for Recommendation. (2021) authored by Ed H. Chi. Minmin Chen et al.: Top-K Off-Policy Correction for a REINFORCE Recommender System. (2019) authored by Ed H. Chi. Kaize Ding et al.: HyperFormer: Learning Expressive Sparse Feature Representations via Hypergraph Transformer. (2023) authored by Ed H. Chi. Kaize Ding et al.: HyperFormer: Learning Expressive Sparse Feature Representations via Hypergraph Transformer. (2023) authored by Ed H. Chi\nIn his spare time, Chi is an avid Taekwondo martial artist, photographer, and snowboarder. He started as an intern and was officially hired in 1999. Riedl. [citation needed] He is married and has one daughter. [citation needed]\nBorn and raised in Taipei, Taiwan, Chi moved to Minnesota in the 9th grade
output format: answer
|
22642
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Whose i10Index is higher, the author based in Université Paris Dauphine-PSL or the author with University of Groningen affiliation?
Context: Gerben Bergwerff et al.: Computational and algorithmic models of strategies in turn-based games. (2014) authored by Rineke Verbrugge. Jakob Dirk Top et al.: An Automated Method for Building Cognitive Models for Turn-Based Games from a Strategy Logic. (2018) authored by Rineke Verbrugge. Hamed Ayoobi et al.: Local-HDP: Interactive open-ended 3D object category recognition in real-time robotic scenarios. (2022) authored by Rineke Verbrugge. Hamed Ayoobi et al.: Explain What You See: Open-Ended Segmentation and Recognition of Occluded 3D Objects. (2023) authored by Rineke Verbrugge. Hamed Ayoobi et al.: Explain What You See: Open-Ended Segmentation and Recognition of Occluded 3D Objects. (2023) authored by Rineke Verbrugge. Hamed Ayoobi et al.: Local-HDP: Interactive Open-Ended 3D Object Categorization. (2020) authored by Rineke Verbrugge. Tamoghna Halder et al.: How do adults reason about their opponent? Typologies of players in a turn-taking game. (2015) authored by Rineke Verbrugge. Hamed Ayoobi et al.: Handling Unforeseen Failures Using Argumentation-Based Learning. (2019) authored by Rineke Verbrugge. Hamed Ayoobi et al.: Handling Unforeseen Failures Using Argumentation-Based Learning. (2019) authored by Rineke Verbrugge. Sujata Ghosh et al.: Human Strategic Reasoning in Dynamic Games: Experiments, Logics, Cognitive Models. (2015) authored by Rineke Verbrugge. Piter Dykstra et al.: An Agent-Based Dialogical Model with Fuzzy Attitudes. (2015) authored by Rineke Verbrugge. Elske van der Vaart and Rineke Verbrugge: Agent-based models for animal cognition: a proposal and prototype. (2008) authored by Rineke Verbrugge. Harmen de Weerd et al.: Theory of Mind in the Mod Game: An Agent-Based Model of Strategic Reasoning. (2014) authored by Rineke Verbrugge. Marcin Korecki et al.: Balancing Selfishness and Efficiency in Mobile Ad-hoc Networks: An Agent-based Simulation. (2020) authored by Rineke Verbrugge. Johan van Benthem et al.: Models of Strategic Reasoning - Logics, Games, and Communities (2015) edited by Rineke Verbrugge. Thiri Haymar Kyaw et al.: Multi-player Multi-issue Negotiation with Mediator using CP-nets. (2013) authored by Rineke Verbrugge. Marcin Dziubinski et al.: Reducing the complexity of logics for multiagent systems. (2007) authored by Rineke Verbrugge. Piter Dykstra et al.: Put Your Money Where Your Mouth Is: DIAL, A Dialogical Model for Opinion Dynamics. (2013) authored by Rineke Verbrugge"}. In 2021, she was elected a member of the Royal Netherlands Academy of Arts and Sciences (KNAW)
output format: answer
|
Rineke Verbrugge
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What type of facility is the institution of the author who wrote 'Getting Started in Tiling Microarray Analysis'?
Context: X. Shirley Liu alternativeName XIANGYU LIU. X. Shirley Liu alternativeName Xu Liu. X. Shirley Liu name X. Shirley Liu. X. Shirley Liu alternativeName X. Shirley Liu. Xiaole Shirley Liu link https://twitter.com/xshirleyliu. Wubing Zhang et al.: Machine Learning Modeling of Protein-intrinsic Features Predicts Tractability of Targeted Protein Degradation. (2022) authored by Xiaole Shirley Liu. Xiaole Shirley Liu is Person Little. '}
output format: answer
|
facility
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In terms of i10Index, who has a higher score, the author of 'A Position Paper on 'Living Laboratories': Rethinking Ecological Designs and Experimentation in Human-Computer Interaction' or the author of 'Semi-coupled basis and distance metric learning for cross-domain matching: Application to low-resolution face recognition'?
Context: Olga C. Avila-Montes et al.: Segmentation of the Thoracic Aorta in Noncontrast Cardiac CT Images. (2013) authored by Ioannis A. Kakadiaris. Raja P. Yalamanchili et al.: Automatic segmentation of the diaphragm in non-contrast CT images. (2010) authored by Ioannis A. Kakadiaris. Tongtong Huang et al.: Population stratification enables modeling effects of reopening policies on mortality and hospitalization rates. (2021) authored by Ioannis A. Kakadiaris. Mahsa Shafaei et al.: A Case Study of Deep Learning-Based Multi-Modal Methods for Labeling the Presence of Questionable Content in Movie Trailers. (2021) authored by Ioannis A. Kakadiaris. Amol Pednekar et al.: Automatic Segmentation of Abdominal Fat from CT Data. (2005) authored by Ioannis A. Kakadiaris. Sean M. O'Malley et al.: Intravascular Ultrasound-Based Imaging of Vasa Vasorum for the Detection of Vulnerable Atherosclerotic Plaque. (2005) authored by Ioannis A. Kakadiaris. Celeste Williams et al.: Simulation Studies for Predicting Surgical Outcomes in Breast Reconstructive Surgery. (2003) authored by Ioannis A. Kakadiaris. Eleni Zacharia et al.: Segmentation of zebrafish embryonic images using a geometric atlas deformation. (2012) authored by Ioannis A. Kakadiaris. Uday Kurkure et al.: Automated segmentation of thoracic aorta in non-contrast CT images. (2008) authored by Ioannis A. Kakadiaris. Olga C. Avila-Montes et al.: Aorta segmentation in non-contrast cardiac CT images using an entropy-based cost function. (2010) authored by Ioannis A. Kakadiaris. Eduardo Gerardo Mendizabal Ruiz et al.: Segmentation of the luminal border in intravascular ultrasound B-mode images using a probabilistic approach. (2013) authored by Ioannis A. Kakadiaris. Yen H. Le et al.: A framework for building multi-tissue atlas of zebrafish embryo. (2014) authored by Ioannis A. Kakadiaris. Alberto Santamaría-Pang et al.: Automatic Centerline Extraction of Irregular Tubular Structures Using Probability Volumes from Multiphoton Imaging. (2007) authored by Ioannis A. Kakadiaris. Eduardo Gerardo Mendizabal Ruiz and Ioannis A. Kakadiaris: A physics-based intravascular ultrasound image reconstruction method for lumen segmentation. (2016) authored by Ioannis A. Kakadiaris. Furkan Gursoy and Ioannis A. Kakadiaris: Error Parity Fairness: Testing for Group Fairness in Regression Tasks. (2022) authored by Ioannis A. Kakadiaris. Ioannis A. Kakadiaris is Creator. Raja P. Yalamanchili et al.: Knowledge-based quantification of pericardial fat in non-contrast CT data. (2010) authored by Ioannis A. Kakadiaris. Eduardo Gerardo Mendizabal Ruiz and Ioannis A. Kakadiaris: Probabilistic Segmentation of the Lumen from Intravascular Ultrasound Radio Frequency Data. (2012) authored by Ioannis A. Kakadiaris. Alok N. Bandekar et al.: Automated Pericardial Fat Quantification in CT Data. (2006) authored by Ioannis A. Kakadiaris. Eduardo Gerardo Mendizabal Ruiz et al.: Towards Extra-Luminal Blood Detection from Intravascular Ultrasound Radio Frequency Data. (2011) authored by Ioannis A. Kakadiaris. Mahsa Shafaei et al.: A Case Study of Deep Learning Based Multi-Modal Methods for Predicting the Age-Suitability Rating of Movie Trailers. (2021) authored by Ioannis A. Kakadiaris. Amol Pednekar et al.: Automated left ventricular segmentation in cardiac MRI. (2006) authored by Ioannis A. Kakadiaris. Eduardo Gerardo Mendizabal Ruiz et al.: An Inverse Scattering Algorithm for the Segmentation of the Luminal Border on Intravascular Ultrasound Data. (2009) authored by Ioannis A. Kakadiaris. David T. Chen et al.: Modeling for Plastic and Reconstructive Breast Surgery. (2000) authored by Ioannis A. Kakadiaris. Gerd Brunner et al.: Toward Unsupervised Classification of Calcified Arterial Lesions. (2008) authored by Ioannis A. Kakadiaris. Deepak Roy Chittajallu et al.: Fuzzy-Cuts: A knowledge-driven graph-based method for medical image segmentation. (2009) authored by Ioannis A. Kakadiaris. John W. Gardner et al.: Accuracy-Fairness Tradeoff in Parole Decision Predictions: A Preliminary Analysis. (2022) authored by Ioannis A. Kakadiaris. Uday Kurkure et al.: Localization and Segmentation of Left Ventricle in Cardiac Cine-MR Images. (2009) authored by Ioannis A. Kakadiaris. Ioannis A. Kakadiaris link http://www.wikidata.org/entity/Q41511859. S. Urban et al.: Automatic Reconstruction of Dendrite Morphology from Optical Section Stacks. (2006) authored by Ioannis A. Kakadiaris. Ioannis A. Kakadiaris et al.: iRay: Mobile AR Using Structure Sensor. (2016) authored by Ioannis A. Kakadiaris. Anselmo Peñas et al.: Overview of the CLEF Question Answering Track 2015. (2015) authored by Ioannis A. Kakadiaris. Dimitris N. Metaxas and Ioannis A. Kakadiaris: Elastically Adaptive Deformable Models. (1996) authored by Ioannis A. Kakadiaris. Sean M. O'Malley and Ioannis A. Kakadiaris: Towards Robust Structure-Based Enhancement and Horizon Picking in 3-D Seismic Data. (2004) authored by Ioannis A. Kakadiaris. Amol Pednekar and Ioannis A. Kakadiaris: Image segmentation based on fuzzy connectedness using dynamic weights. (2006) authored by Ioannis A. Kakadiaris[citation needed] He is married and has one daughter. \nArticles, a selection:'}. \nChi was elected to the CHI Academy in 2018. Riedl. His work has been covered in various newspapers and magazines around the world, including The Economist, Time, Los Angeles Times, Technology Review, and Wired
output format: answer
|
Ioannis A. Kakadiaris
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Whose hIndex value is higher, the author who published Bias Correction or the author of Bartlett and Bartlett-Type Corrections?
Context: Ana Javornik et al.: Revealing the Shopper Experience of Using a "Magic Mirror" Augmented Reality Make-Up Application. (2016) authored by Yvonne Rogers. Steven Houben et al.: Roam-IO: Engaging with People Tracking Data through an Interactive Physical Data Installation. (2019) authored by Yvonne Rogers. Roman Rädle et al.: Demonstrating HuddleLamp: Spatially-Aware Mobile Displays for Ad-hoc Around-the-Table Collaboration. (2014) authored by Yvonne Rogers. James A. Landay et al.: UbiComp 2011: Ubiquitous Computing, 13th International Conference, UbiComp 2011, Beijing, China, September 17-21, 2011, Proceedings (2011) edited by Yvonne Rogers. Simon Holland et al.: Running up Blueberry Hill: prototyping whole body interaction in harmony space. (2009) authored by Yvonne Rogers. Tim Coughlan et al.: Enabling live dialogic and collaborative learning between field and indoor contexts. (2011) authored by Yvonne Rogers. Ashild Kummen et al.: MotionInput v2.0 supporting DirectX: A modular library of open-source gesture-based machine learning and computer vision methods for interacting and controlling existing software with a webcam. (2021) authored by Yvonne Rogers. Sarah Gallacher et al.: SmallTalk: Using Tangible Interactions to Gather Feedback from Children. (2016) authored by Yvonne Rogers. Roman Rädle et al.: HuddleLamp: Spatially-Aware Mobile Displays for Ad-hoc Around-the-Table Collaboration. (2014) authored by Yvonne Rogers. Silvia Gabrielli et al.: A Conceptual Framework for Mixed Reality Environments: Designing Novel Learning Activities for Young Children. (2002) authored by Yvonne Rogers. Jon Bird et al.: Low-fi skin vision: a case study in rapid prototyping a sensory substitution system. (2009) authored by Yvonne Rogers. Zuzanna Lechelt et al.: ConnectUs: A New Toolkit for Teaching about the Internet of Things. (2016) authored by Yvonne Rogers. Peta Wyeth et al.: The Internet of Playful Things. (2015) authored by Yvonne Rogers. Tim Coughlan et al.: The conceptual framing, design and evaluation of device ecologies for collaborative activities. (2012) authored by Yvonne Rogers. Lisa Koeman et al.: "Everyone Is Talking about It!": A Distributed Approach to Urban Voting Technology and Visualisations. (2015) authored by Yvonne Rogers. Edward Tse et al.: Child computer interaction: workshop on UI technologies and educational pedagogy. (2011) authored by Yvonne Rogers. Stefan Kreitmayer et al.: UniPad: orchestrating collaborative activities through shared tablets and an integrated wall display. (2013) authored by Yvonne Rogers. Matt Jones et al.: Proceedings of the 19th International Conference on Human-Computer Interaction with Mobile Devices and Services, MobileHCI 2017, Vienna, Austria, September 4-7, 2017 (2017) edited by Yvonne Rogers. Rob Comber et al.: Food and interaction design: designing for food in everyday life. (2012) authored by Yvonne Rogers. Charlene Jennett et al.: Squeezy Green Balls: Promoting Environmental Awareness through Playful Interactions. (2016) authored by Yvonne Rogers. Silvia Gabrielli et al.: Young Children's Spatial Representations Developed through Exploration of a Desktop Virtual Reality Scene. (2000) authored by Yvonne Rogers. Sangita Ganesh et al.: FoodWorks: tackling fussy eating by digitally augmenting children's meals. (2014) authored by Yvonne Rogers. Paul Marshall et al.: Introduction to the special issue on the theory and practice of embodied interaction in HCI and interaction design. (2013) authored by Yvonne Rogers. Hamed S. Alavi et al.: The Five Strands of Living Lab: A Literature Study of the Evolution of Living Lab Concepts in HCI. (2020) authored by Yvonne Rogers. Margot Brereton et al.: Make and connect: enabling people to connect through their things. (2017) authored by Yvonne Rogers. Tammy Toscos et al.: "What's your number?": A survey of how parents and teens cope with diabetes in the context of technology support. (2011) authored by Yvonne Rogers. Evropi Stefanidi et al.: MagiBricks: Fostering Intergenerational Connectedness in Distributed Play with Smart Toy Bricks. (2023) authored by Yvonne Rogers. Zuzanna Lechelt et al.: How Embodied Interactions Manifest Themselves During Collaborative Learning in Classroom Settings. (2019) authored by Yvonne Rogers. Paul Marshall et al.: Conceptualising tangibles to support learning. (2003) authored by Yvonne Rogers One of the projects was "Ambient Wood", encouraging children to explore biological processes in a forest using wireless probes. She is known for her work on iconic interface to human-centre AI and a research agenda of user engagement in ubiquitous computing. She led projects such as Visualising Mill Road, where they collected community data and visualized it as street art, and the Tidy Street project, visualising energy usage and efficiency from power meters
output format: answer
|
Gauss M. Cordeiro
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the hIndex of the author of the paper 'METERG: Measurement-Based End-to-End Performance Estimation Technique in QoS-Capable Multiprocessors' published in IEEE Real Time Technology and Applications Symposium in 2006?
Context: Krste Asanović 2YrMeanCitedness 5.3200001716613769531. Scott Beamer et al.: Direction-optimizing breadth-first search. (2013) authored by Krste Asanovic. Scott Beamer et al.: Direction-optimizing breadth-first search. (2012) authored by Krste Asanovic. Krste Asanovic affiliation University of California at Berkeley, CA, USA. Mohit Tiwari et al.: Context-centric Security. (2012) authored by Krste Asanovic. Krste Asanović alternativeName Krste Asanovic. Krste Asanović alternativeName Krste Asanović. Krste Asanović name Krste Asanović. Krste Asanović alternativeName Asanovic Krste. Qijing Huang et al.: AutoPhase: Juggling HLS Phase Orderings in Random Forests with Deep Reinforcement Learning. (2020) authored by Krste Asanovic. Ameer Haj-Ali et al.: NeuroVectorizer: end-to-end vectorization with deep reinforcement learning. (2020) authored by Krste Asanovic. Christopher Batten et al.: Designing Chip-Level Nanophotonic Interconnection Networks. (2012) authored by Krste Asanovic. Ameer Haj-Ali et al.: AutoPhase: Juggling HLS Phase Orderings in Random Forests with Deep Reinforcement Learning. (2020) authored by Krste Asanovic. Ameer Haj-Ali et al.: NeuroVectorizer: End-to-End Vectorization with Deep Reinforcement Learning. (2019) authored by Krste Asanovic. Krste Asanović alternativeName K. Asanović. Krste Asanović alternativeName K. Asanovic. Scott Beamer et al.: GAIL: the graph algorithm iron law. (2015) authored by Krste Asanovic. Krste Asanovic primary affiliation SiFive, USA. Krste Asanović i10Index 131. Krste Asanovic affiliation MIT, Cambridge, USA. Krste Asanovic and Jan-Willem van de Waerdt: Welcome from general chairs. (2013) authored by Krste Asanovic You can help Wikipedia by expanding it. '}
output format: answer
|
47
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: In which city did the author of 'Nothing about me without me': investigating the health information access needs of adolescent patients work as a Staff Software Engineer at IBM before joining the Georgia Institute of Technology?
Context: Ferran Altarriba Bertran et al.: The Playful Potential of Shared Mealtime: A Speculative Catalog of Playful Technologies for Day-to-day Social Eating Experiences. (2021) authored by Lauren Wilcox. Lauren Wilcox modified 2023-10-18. Emma Beede et al.: A Human-Centered Evaluation of a Deep Learning System Deployed in Clinics for the Detection of Diabetic Retinopathy. (2020) authored by Lauren Wilcox. Carrie J. Cai et al.: Onboarding Materials as Cross-functional Boundary Objects for Developing AI Assistants. (2021) authored by Lauren Wilcox. Zijie J. Wang et al.: Farsight: Fostering Responsible AI Awareness During AI Application Prototyping. (2024) authored by Lauren Wilcox. Agustín Gravano et al.: On the role of context and prosody in the interpretation of 'okay'. (2007) authored by Lauren Wilcox. Lauren Wilcox et al.: Interactive tools for inpatient medication tracking: a multi-phase study with cardiothoracic surgery patients. (2016) authored by Lauren Wilcox. Lauren Wilcox 2YrMeanCitedness 9.75. Lauren Wilcox alternativeName Lauren Wilcox. Allison Woodruff et al.: How Knowledge Workers Think Generative AI Will (Not) Transform Their Industries. (2023) authored by Lauren Wilcox and an M. '}. She holds a B. S
output format: answer
|
Austin, Texas
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the birth year of the author of Relationships between internal and external metrics in co-evolution?
Context: Yan Guo et al.: A Comparison of Artificial Neural Networks and Support Vector Machines on Land Cover Classification. (2012) authored by Kenneth A. De Jong. Benjamin W. Wah et al.: Report on Workshop on High Performance Computing and Communications for Grand Challenge Applications: Computer Vision, Speech and Natural Language Processing, and Artificial Intelligence. (1993) authored by Kenneth A. De Jong. Alexei V. Samsonovich et al.: Detecting Student Metacognition and Learning in Problem Solving with Biologically Inspired Cognitive Architectures. (2011) authored by Kenneth A. De Jong. Xinyun Zou et al.: Neuroevolution of a Recurrent Neural Network for Spatial and Working Memory in a Simulated Robotic Environment. (2021) authored by Kenneth A. De Jong. Xinyun Zou et al.: Neuroevolution of a recurrent neural network for spatial and working memory in a simulated robotic environment. (2021) authored by Kenneth A. De Jong. Zbigniew Skolicki et al.: Co-evolution of terrorist and security scenarios for water distribution systems. (2008) authored by Kenneth A. De Jong. Eric O. Scott and Kenneth A. De Jong: Toward learning neural network encodings for continuous optimization problems. (2018) authored by Kenneth A. De Jong. Uday Kamath et al.: EML: A Scalable, Transparent Meta-Learning Paradigm for Big Data Applications. (2019) authored by Kenneth A. De Jong. Neera P. Sood et al.: Evaluating the XCS learning classifier system in competitive simultaneous learning environments. (2005) authored by Kenneth A. De Jong. Jean-Michel Claverie et al.: Robust nonlinear control design using competitive coevolution. (2000) authored by Kenneth A. De Jong. Uday Kamath et al.: Theoretical and Empirical Analysis of a Parallel Boosting Algorithm. (2015) authored by Kenneth A. De Jong. Rida E. Moustafa et al.: A GA-Based Method for Function Approximation Using Adaptive Interpolation. (2000) authored by Kenneth A. De Jong. Kenneth A. De Jong name Kenneth A. De Jong. Uday Kamath et al.: Theoretical and Empirical Analysis of a Spatial EA Parallel Boosting Algorithm. (2018) authored by Kenneth A. De Jong. Eric O. Scott and Kenneth A. De Jong: Automating Knowledge Transfer with Multi-Task Optimization. (2019) authored by Kenneth A. De Jong. Haleh Vafaie and Kenneth A. De Jong: Robust Feature Selection Algorithms. (1993) authored by Kenneth A. De Jong. Uday Kamath et al.: An analysis of a spatial EA parallel boosting algorithm. (2013) authored by Kenneth A. De Jong. Uday Kamath et al.: Selecting predictive features for recognition of hypersensitive sites of regulatory genomic sequences with an evolutionary algorithm. (2010) authored by Kenneth A. De Jong. Alexei V. Samsonovich et al.: Cognitive Processes in Preparation for Problem Solving. (2015) authored by Kenneth A. De Jong. Kenneth A. De Jong alternativeName Kenneth A. De Jong. Uday Kamath et al.: A Spatial EA Framework for Parallelizing Machine Learning Methods. (2012) authored by Kenneth A. De Jong. Kenneth A. De Jong alternativeName Kenneth A. JongD. '}
output format: answer
|
1944
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: What is the hIndex of the author who published the paper 'Information science and the phenomenon of information' in 1976?
Context: Nicholas J. Belkin name Nicholas J. Belkin. Nicholas J. Belkin alternativeName Nicholas J. Belkin. Nicholas J. Belkin alternativeName Nicholas Belkin. Nicholas J. Belkin et al.: Rutgers' TREC 2001 Interactive Track Experience. (2001) authored by Nicholas J. Belkin. Nicholas J. Belkin is Person. Nicholas J. Belkin alternativeName N. J. Belkin. Diane Kelly and Nicholas J. Belkin: A user modeling system for personalized interaction and tailored retrieval in interactive IR. (2002) authored by Nicholas J. Belkin. Nicholas J. Belkin et al.: Rutgers' TREC-6 Interactive Track Experience. (1997) authored by Nicholas J. Belkin. Jingjing Liu et al.: Predicting task difficulty for different task types. (2010) authored by Nicholas J. Belkin. Nicholas J. Belkin alternativeName N. Belkin. Nicholas J. Belkin et al.: Rutgers' TREC-7 Interactive Track Experience. (1998) authored by Nicholas J. Belkin. Nicholas J. Belkin modified 2023-10-18. Chang Liu et al.: Analysis and evaluation of query reformulations in different task types. (2010) authored by Nicholas J. Belkin. Vanessa Murdock et al.: Identifying and improving retrieval for procedural questions. (2007) authored by Nicholas J. Belkin. Nicholas J. Belkin et al.: Support for Question-Answering in Interactive Information Retrieval: Rutgers' TREC-9 Interactive Track Experience. (2000) authored by Nicholas J. Belkin. Gareth J. F. Jones et al.: Report on the CHIIR 2019 Second Workshop on Evaluation of Personalisation in Information Retrieval (WEPIR 2019). (2019) authored by Nicholas J. Belkin. Nicholas J. Belkin et al.: Rutgers Interactive Track at TREC 2002. (2002) authored by Nicholas J. Belkin. Ja-Young Kim and Nicholas J. Belkin: Categories of Music Description and Search Terms and Phrases Used by Non-Music Experts. (2002) authored by Nicholas J. Belkin. Chang Liu et al.: Predicting Search Task Difficulty at Different Search Stages. (2014) authored by Nicholas J. Belkin. Chang Liu et al.: Using dwell time as an implicit measure of usefulness in different task types. (2011) authored by Nicholas J. Belkin. Nicholas J. Belkin et al.: Rutgers' HARD and Web Interactive Track Experiments at TREC 2003. (2003) authored by Nicholas J. Belkin. Marijn Koolen et al.: Report on the Second Workshop on Supporting Complex Search Tasks. (2017) authored by Nicholas J. Belkin. Nicholas J. Belkin 2YrMeanCitedness 0.0. Gareth J. F. Jones et al.: Second Workshop on Evaluation of Personalisation in Information Retrieval (WEPIR 2019). (2019) authored by Nicholas J. Belkin In 2015, Belkin received the Gerard Salton Award. '}. \nNicholas Belkin has been awarded numerous times, obtaining in 2003 the Award of Merit , and the Gerard Salton Award in 2015. " The components would be the same as those used in the traditional model: navigation (browsing), query (querying), display, indexing, representation and matching. He has given more than 200 lectures around the world. In such cases it is more suitable to attempt to describe a user\'s anomalous state of knowledge than to ask the user to specify her/his need as a request to the system
output format: answer
|
37
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: How many papers are attributed to the academic institution of the researcher who authored 'Time Complexity of Unambiguous Path Systems' in 'Inf. Process. Lett.' in 1982?
Context: Jakub Radoszewski et al.: Rectangular Tile Covers of 2D-Strings. (2022) authored by Wojciech Rytter. Jurek Czyzowicz et al.: Broadcast with Energy-Exchanging Mobile Agents Distributed on a Tree. (2018) authored by Wojciech Rytter. Richard Cole et al.: On special families of morphisms related to [delta]-matching and don't care symbols. (2003) authored by Wojciech Rytter. Marek Karpinski et al.: An Efficient Pattern-Matching Algorithm for Strings with Short Descriptions. (1997) authored by Wojciech Rytter. Marek Karpinski et al.: Pattern-Matching for Strings with Short Descriptions. (1995) authored by Wojciech Rytter. Wojciech Rytter and Ahmed Saoudi: On Parallel Recognition of Two Classes of 2-D Array Patterns. (1992) authored by Wojciech Rytter. Marek Karpinski et al.: Pattern-Matching for Strings with Short Descriptions (1995) authored by Wojciech Rytter. Juhani Karhumäki et al.: Efficient constructions of test sets for regular and context-free languages. (1993) authored by Wojciech Rytter. Wojciech Rytter alternativeName Wojciech Rytter. Juhani Karhumäki et al.: Efficient Constructions of Test Sets for Regular and Context-Free Languages. (1991) authored by Wojciech Rytter. Dominik D. Freydenberger et al.: Testing k-binomial equivalence. (2015) authored by Wojciech Rytter. Juhani Karhumäki et al.: Pattern-Matching Problems for Two-Dimensional Images Described by Finite Automata. (2000) authored by Wojciech Rytter. Juhani Karhumäki et al.: Pattern-Matching Problems for 2-Dimensional Images Described by Finite Automata. (1997) authored by Wojciech Rytter. Pawel Baturo and Wojciech Rytter: Compressed string-matching in standard Sturmian words. (2009) authored by Wojciech Rytter. Jurek Czyzowicz et al.: Communication Problems for Mobile Agents Exchanging Energy. (2016) authored by Wojciech Rytter. Radoslaw Glowinski and Wojciech Rytter: Compressed Pattern-Matching with Ranked Variables in Zimin Words. (2013) authored by Wojciech Rytter. Cédric Bastien et al.: Equivalence of Functions Represented by Simple Context-Free Grammars with Output. (2006) authored by Wojciech Rytter. Alan Gibbons and Wojciech Rytter: Optimal Parallel Algorithm for Dynamic Expression Evaluation and Context-Free Recognition (1989) authored by Wojciech Rytter. Panagiotis Charalampopoulos et al.: Computing Covers of 2D-Strings. (2021) authored by Wojciech Rytter. Wojciech Rytter name Wojciech Rytter. Jurek Czyzowicz et al.: Gossiping by energy-constrained mobile agents in tree networks. (2021) authored by Wojciech Rytter. Maxime Crochemore et al.: Fast Practical Multi-Pattern Matching. (1999) authored by Wojciech Rytter. Pawel Baturo and Wojciech Rytter: Occurrence and Lexicographic Properties of Standard Sturmian Words. (2007) authored by Wojciech Rytter. Wojciech Rytter alternativeName W. Rytter. Maxime Crochemore et al.: Constant-Time Randomized Parallel String Matching. (1997) authored by Wojciech Rytter. Maxime Crochemore et al.: Two-Dimensional Pattern Matching by Sampling. (1993) authored by Wojciech Rytter. Jurek Czyzowicz et al.: Energy-optimal broadcast and exploration in a tree using mobile agents. (2019) authored by Wojciech Rytter. Oscar Garrido et al.: A Simple Randomized Parallel Algorithm for Maximal f-Matching. (1992) authored by Wojciech Rytter. Leszek Gasieniec et al.: Constant-Space String Matching with Smaller Number of Comparisons: Sequential Sampling. (1995) authored by Wojciech Rytter. Jerzy Czyzowicz et al.: Energy-Optimal Broadcast in a Tree with Mobile Agents. (2017) authored by Wojciech Rytter. Maxime Crochemore et al.: Order-preserving indexing. (2016) authored by Wojciech Rytter. Maxime Crochemore et al.: Approximate String Matching with Gaps. (2002) authored by Wojciech Rytter. Wojciech Rytter: Fast Recognition of Pushdown Automaton and Context-free Languages (1985) authored by Wojciech Rytter. Oscar Garrido et al.: A Simple Randomized Parallel Algorithm for Maximal f-Matchings. (1996) authored by Wojciech Rytter. Panagiotis Charalampopoulos et al.: Circular pattern matching with k mismatches. (2021) authored by Wojciech Rytter. Cédric Bastien et al.: Equivalence of simple functions. (2007) authored by Wojciech Rytter. Panagiotis Charalampopoulos et al.: Circular Pattern Matching with k Mismatches. (2019) authored by Wojciech Rytter. Panagiotis Charalampopoulos et al.: Circular Pattern Matching with k Mismatches. (2019) authored by Wojciech Rytter"}. D
output format: answer
|
72341
|
Utilize the provided context information, structured by
to generate answers to the following question:
- Generate the answer to the question based on the provided context.
- Avoid including any explanations or apologies in your responses.
- Only respond to questions that ask for the answer to the target question without any additional information.
- Strictly provide the answer without any additional text.
Question: Which author has more publications, the scholar who wrote about Wavelet-Galerkin method or the author of Rethinking Computer Science Through AI?
Context: Steven Lang et al.: DAFNe: A One-Stage Anchor-Free Deep Model for Oriented Object Detection. (2021) authored by Kristian Kersting. Kristian Kersting affiliation University of Bonn, Faculty of Agriculture, Germany. Mirwaes Wahabzada et al.: Automated interpretation of 3D laserscanned point clouds for plant organ segmentation. (2015) authored by Kristian Kersting. Karl Stelzner et al.: Decomposing 3D Scenes into Objects via Unsupervised Volume Segmentation. (2021) authored by Kristian Kersting. Ahmed Jawad et al.: Where traffic meets DNA: mobility mining using biological sequence analysis revisited. (2011) authored by Kristian Kersting. Rudolf Lioutikov et al.: Learning attribute grammars for movement primitive sequencing. (2020) authored by Kristian Kersting. Rudolph Triebel et al.: Robust 3D Scan Point Classification using Associative Markov Networks. (2006) authored by Kristian Kersting. Frieder Uhlig et al.: Transformer-Boosted Anomaly Detection with Fuzzy Hashes. (2022) authored by Kristian Kersting. Lukas Struppek et al.: Image Classifiers Leak Sensitive Attributes About Their Classes. (2023) authored by Kristian Kersting. Amos Treiber et al.: CryptoSPN: Privacy-preserving Sum-Product Network Inference. (2020) authored by Kristian Kersting. Amos Treiber et al.: CryptoSPN: Privacy-Preserving Sum-Product Network Inference. (2020) authored by Kristian Kersting. Kristian Kersting alternativeName Kersting Kristian. Patrick Schramowski and Kristian Kersting: Inferring Offensiveness In Images From Natural Language Supervision. (2021) authored by Kristian Kersting. Marion Neumann et al.: Erosion Band Features for Cell Phone Image Based Plant Disease Classification. (2014) authored by Kristian Kersting. Lukas Struppek et al.: Be Careful What You Smooth For: Label Smoothing Can Be a Privacy Shield but Also a Catalyst for Model Inversion Attacks. (2023) authored by Kristian Kersting. Sriraam Natarajan et al.: Deep Distant Supervision: Learning Statistical Relational Models for Weak Supervision in Natural Language Extraction. (2016) authored by Kristian Kersting. Alejandro Molina et al.: Poisson Sum-Product Networks: A Deep Architecture for Tractable Multivariate Poisson Distributions. (2017) authored by Kristian Kersting. Saket Joshi et al.: Generalized First Order Decision Diagrams for First Order Markov Decision Processes. (2009) authored by Kristian Kersting. Andreas Karwath et al.: Boosting Relational Sequence Alignments. (2008) authored by Kristian Kersting. Ahmed Jawad et al.: Biological Sequence Analysis meets Mobility Mining. (2011) authored by Kristian Kersting. Kristian Kersting name Kristian Kersting. Kristian Kersting 2YrMeanCitedness 0.93636363744735717773. Gopika Sudhakaran et al.: Vision Relation Transformer for Unbiased Scene Graph Generation. (2023) authored by Kristian Kersting. Gopika Sudhakaran et al.: Vision Relation Transformer for Unbiased Scene Graph Generation. (2023) authored by Kristian Kersting. Kristian Kersting alternativeName Kristian Kersting. Kristian Kersting et al.: Towards Discovering Structural Signatures of Protein Folds Based on Logical Hidden Markov Models. (2003) authored by Kristian Kersting. Antonio Vergari et al.: Sum-Product Autoencoding: Encoding and Decoding Representations Using Sum-Product Networks. (2018) authored by Kristian Kersting. Babak Ahmadi et al.: Lifted Conditioning for Pairwise Marginals and Beyond. (2010) authored by Kristian Kersting. Xiaoting Shao et al.: Modelling Multivariate Ranking Functions with Min-Sum Networks. (2020) authored by Kristian Kersting. Daniel Ochs et al.: Effective Risk Detection for Natural Gas Pipelines Using Low-Resolution Satellite Images. (2024) authored by Kristian Kersting. Marco Bellagente et al.: MultiFusion: Fusing Pre-Trained Models for Multi-Lingual, Multi-Modal Image Generation. (2023) authored by Kristian Kersting. Marco Bellagente et al.: MultiFusion: Fusing Pre-Trained Models for Multi-Lingual, Multi-Modal Image Generation. (2023) authored by Kristian Kersting. Lukas Struppek et al.: Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks. (2022) authored by Kristian Kersting. Lukas Struppek et al.: Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks. (2022) authored by Kristian Kersting. Laura Antanas et al.: Semantic and geometric reasoning for robotic grasping: a probabilistic logic approach. (2019) authored by Kristian Kersting. Piotr Szymanski et al.: How is a data-driven approach better than random choice in label space division for multi-label classification? (2016) authored by Kristian Kersting. Piotr Szymanski et al.: How Is a Data-Driven Approach Better than Random Choice in Label Space Division for Multi-Label Classification? (2016) authored by Kristian Kersting. Nafise Sadat Moosavi et al.: Adaptable Adapters. (2022) authored by Kristian Kersting. Nafise Sadat Moosavi et al.: Adaptable Adapters. (2022) authored by Kristian Kersting. Quentin Delfosse et al.: Boosting Object Representation Learning via Motion and Object Continuity. (2023) authored by Kristian Kersting. Quentin Delfosse et al.: Boosting Object Representation Learning via Motion and Object Continuity. (2022) authored by Kristian Kersting. Jens Behley et al.: Learning to hash logistic regression for fast 3D scan point classification. (2010) authored by Kristian Kersting. Zhongjie Yu et al.: Leveraging probabilistic circuits for nonparametric multi-output regression. (2021) authored by Kristian Kersting. Zhongjie Yu et al.: Leveraging Probabilistic Circuits for Nonparametric Multi-Output Regression. (2021) authored by Kristian Kersting. Sriraam Natarajan et al.: Logical Hierarchical Hidden Markov Models for Modeling User Activities. (2008) authored by Kristian Kersting. Fabrizio Ventola et al.: Random Sum-Product Forests with Residual Links. (2019) authored by Kristian Kersting. Shuo Yang et al.: Learning from Imbalanced Data in Relational Domains: A Soft Margin Approach. (2014) authored by Kristian Kersting. Mehul Bhatt and Kristian Kersting: Semantic Interpretation of Multi-Modal Human-Behaviour Data - Making Sense of Events, Activities, Processes. (2017) authored by Kristian Kersting. Daan Fierens et al.: Pairwise Markov Logic. (2012) authored by Kristian Kersting. Tushar Khot et al.: Gradient-based boosting for statistical relational learning: the Markov logic network and missing data cases. (2015) authored by Kristian Kersting'}. 5 million euros over five years. D. in 2006
output format: answer
|
Stephen S.-T. Yau
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.