set list |
|---|
[
"User Classification in Twitter Based on Sentiment Analysis on user Tweets",
"SENTIWORDNET: A Publicly Available Lexical Resource for Opinion Mining",
"Deriving marketing intelligence from online discussion"
] |
[
"User Classification in Twitter Based on Sentiment Analysis on user Tweets",
"From tweets to polls: linking text sentiment to public opinion time series",
"Kinematics analysis and simulation of a robotic arm using MATLAB"
] |
[
"User Classification in Twitter Based on Sentiment Analysis on user Tweets",
"Robust Sentiment Detection on Twitter from Biased and Noisy Data",
"a bayesian approach to temporal data clustering using hidden markov models ."
] |
[
"User Classification in Twitter Based on Sentiment Analysis on user Tweets",
"Sentiment analysis techniques in recent works",
"AU-aware Deep Networks for facial expression recognition"
] |
[
"User Classification in Twitter Based on Sentiment Analysis on user Tweets",
"Approaches, Tools and Applications for Sentiment Analysis Implementation",
"Memory transformation and systems consolidation."
] |
[
"Uses and Gratifications of Problematic Social Media Use Among University Students: a Simultaneous Examination of the Big Five of Personality Traits, Social Media Platforms, and Social Media Use Motives",
"The influence of personality on Facebook usage, wall postings, and regret",
"Too Much of a Good Thing? The... |
[
"Uses and Gratifications of Problematic Social Media Use Among University Students: a Simultaneous Examination of the Big Five of Personality Traits, Social Media Platforms, and Social Media Use Motives",
"Personality traits and psychological motivations predicting selfie posting behaviors on social networking si... |
[
"Uses and Gratifications of Problematic Social Media Use Among University Students: a Simultaneous Examination of the Big Five of Personality Traits, Social Media Platforms, and Social Media Use Motives",
"Problematic Use of Social Network Sites: The Interactive Relationship Between Gratifications Sought and Priv... |
[
"Uses and Gratifications of Problematic Social Media Use Among University Students: a Simultaneous Examination of the Big Five of Personality Traits, Social Media Platforms, and Social Media Use Motives",
"Social media addiction: What is the role of content in YouTube?",
"Viewport-Adaptive Navigable 360-Degree ... |
[
"Uses and Gratifications of Problematic Social Media Use Among University Students: a Simultaneous Examination of the Big Five of Personality Traits, Social Media Platforms, and Social Media Use Motives",
"Social network use and personality",
"Semantic Matchmaking for Job Recruitment: An Ontology-Based Hybrid A... |
[
"77 GHz radar-based altimeter for unmanned aerial vehicles",
"Range Doppler detection for automotive FMCW radars",
"Radar CFAR Thresholding in Clutter and Multiple Target Situations"
] |
[
"77 GHz radar-based altimeter for unmanned aerial vehicles",
"Range Doppler detection for automotive FMCW radars",
"Learning Answer-Entailing Structures for Machine Comprehension"
] |
[
"77 GHz radar-based altimeter for unmanned aerial vehicles",
"Range Doppler detection for automotive FMCW radars",
"To Scratch or not to Scratch?: A controlled experiment comparing plugged first and unplugged first programming lessons"
] |
[
"77 GHz radar-based altimeter for unmanned aerial vehicles",
"Range Doppler detection for automotive FMCW radars",
"Wearing a YouTube hat: directors, comedians, gurus, and user aggregated behavior"
] |
[
"77 GHz radar-based altimeter for unmanned aerial vehicles",
"Range Doppler detection for automotive FMCW radars",
"Optimisation of the SHA-2 family of hash functions on FPGAs"
] |
[
"Side-channel AttacK User Reference Architecture board SAKURA-G",
"A Compact Rijndael Hardware Architecture with S-Box Optimization",
"Electromagnetic Analysis: Concrete Results"
] |
[
"Side-channel AttacK User Reference Architecture board SAKURA-G",
"Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems",
"Extensible effects: an alternative to monad transformers"
] |
[
"Side-channel AttacK User Reference Architecture board SAKURA-G",
"Low Cost Attacks on Tamper Resistant Devices",
"An Empirical Exploration of Curriculum Learning for Neural Machine Translation"
] |
[
"Side-channel AttacK User Reference Architecture board SAKURA-G",
"Low Cost Attacks on Tamper Resistant Devices",
"Force Field Feature Extraction for Ear Biometrics"
] |
[
"Side-channel AttacK User Reference Architecture board SAKURA-G",
"Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems",
"Iron corrosion by novel anaerobic microorganisms"
] |
[
"FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage",
"Grammar-based whitebox fuzzing",
"Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs"
] |
[
"FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage",
"Learn&Fuzz: Machine learning for input fuzzing",
"Does PowerPoint enhance learning"
] |
[
"FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage",
"Grammar-based whitebox fuzzing",
"diversite genetique et variabilite des caracteres phenotypiques chez les arbres forestiers ."
] |
[
"FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage",
"Probability-Based Parameter Selection for Black-Box Fuzz Testing",
"LEOPARD syndrome (PTPN11, T468M) in three boys fulfilling neurofibromatosis type 1 clinical criteria"
] |
[
"FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage",
"Fuzzing with code fragments",
"2 Epidemiology of Inflammatory Bowel Disease"
] |
[
"ADVANCES IN IMAGE PROCESSING FOR DETECTION OF PLANT DISEASES",
"Survey and comparative analysis of entropy and relative entropy thresholding techniques",
"Pattern classification and scene analysis"
] |
[
"ADVANCES IN IMAGE PROCESSING FOR DETECTION OF PLANT DISEASES",
"Survey and comparative analysis of entropy and relative entropy thresholding techniques",
"Pixel-level Semantics Guided Image Colorization"
] |
[
"ADVANCES IN IMAGE PROCESSING FOR DETECTION OF PLANT DISEASES",
"Survey and comparative analysis of entropy and relative entropy thresholding techniques",
"Optimisation of the SHA-2 family of hash functions on FPGAs"
] |
[
"ADVANCES IN IMAGE PROCESSING FOR DETECTION OF PLANT DISEASES",
"Survey and comparative analysis of entropy and relative entropy thresholding techniques",
"Prediction of Employee Promotion Based on Personal Basic Features and Post Features"
] |
[
"ADVANCES IN IMAGE PROCESSING FOR DETECTION OF PLANT DISEASES",
"Survey and comparative analysis of entropy and relative entropy thresholding techniques",
"web usage mining for a better web - based learning environment ."
] |
[
"A harmonic suppression circularly polarized patch antenna for an RF ambient energy harvesting system",
"Recycling ambient microwave energy with broad-band rectenna arrays",
"5.8-GHz circularly polarized dual-diode rectenna and rectenna array for microwave power transmission"
] |
[
"A harmonic suppression circularly polarized patch antenna for an RF ambient energy harvesting system",
"Recycling ambient microwave energy with broad-band rectenna arrays",
"To Scratch or not to Scratch?: A controlled experiment comparing plugged first and unplugged first programming lessons"
] |
[
"A harmonic suppression circularly polarized patch antenna for an RF ambient energy harvesting system",
"A 2.45 GHz harmonic suppression rectangular patch antenna",
"ARDB—Antibiotic Resistance Genes Database"
] |
[
"A harmonic suppression circularly polarized patch antenna for an RF ambient energy harvesting system",
"Recycling ambient microwave energy with broad-band rectenna arrays",
"Optimisation of the SHA-2 family of hash functions on FPGAs"
] |
[
"A harmonic suppression circularly polarized patch antenna for an RF ambient energy harvesting system",
"A 2.45 GHz harmonic suppression rectangular patch antenna",
"CityBeat: real-time social media visualization of hyper-local city data"
] |
[
"Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population",
"r : a language and environment for statistical computing .",
"Emergence of scaling in random networks"
] |
[
"Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population",
"r : a language and environment for statistical computing .",
"Finding centric local outliers in categorical/numerical spaces"
] |
[
"Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population",
"r : a language and environment for statistical computing .",
"recognising ' social ' and ' non - social ' emotions in self and others : a study of autism ."
] |
[
"Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population",
"r : a language and environment for statistical computing .",
"A Reinforcement Learning Approach to Interactive-Predictive Neural Machine Translation"
] |
[
"Data Mining of Online Genealogy Datasets for Revealing Lifespan Patterns in Human Population",
"The Spread of Obesity in a Large Social Network over 32 Years",
"Remote Sensing Image Classification Based on Stacked Denoising Autoencoder"
] |
[
"SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust",
"Secure code update for embedded devices via proofs of secure erasure",
"Efficient memory safety for TinyOS"
] |
[
"SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust",
"Secure code update for embedded devices via proofs of secure erasure",
"SIRT6 deficiency results in severe hypoglycemia by enhancing both basal and insulin-stimulated glucose uptake in mice."
] |
[
"SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust",
"On the difficulty of software-based attestation of embedded devices",
"Reflection as part of continuous professional development for public health professionals: a literature review"
] |
[
"SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust",
"Secure code update for embedded devices via proofs of secure erasure",
"Feedforward Neural Network Methodology"
] |
[
"SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust",
"Secure code update for embedded devices via proofs of secure erasure",
"Monocular vision-based obstacle detection/avoidance for unmanned aerial vehicles"
] |
[
"Gender Variance and Dysphoria in Children and Adolescents.",
"Desisting and persisting gender dysphoria after childhood: A qualitative follow-up study",
"Gender Identity and Adjustment in Middle Childhood"
] |
[
"Gender Variance and Dysphoria in Children and Adolescents.",
"Desisting and persisting gender dysphoria after childhood: A qualitative follow-up study",
"Maximizing CNN Accelerator Efficiency Through Resource Partitioning"
] |
[
"Gender Variance and Dysphoria in Children and Adolescents.",
"Factors Associated With Desistence and Persistence of Childhood Gender Dysphoria: A Quantitative Follow-Up Study",
"User profiling in personalization applications through rule discovery and validation"
] |
[
"Gender Variance and Dysphoria in Children and Adolescents.",
"Desisting and persisting gender dysphoria after childhood: A qualitative follow-up study",
"Basic Concepts of Lexical Resource Semantics"
] |
[
"Gender Variance and Dysphoria in Children and Adolescents.",
"Endocrine Treatment of Transsexual Persons:An Endocrine Society Clinical Practice Guideline",
"Nanocomputers and swarm intelligence"
] |
[
"Analysis of long queries in a large scale search log",
"A taxonomy of web search",
"transparent queries : investigating users ' mental models of search engines ."
] |
[
"Analysis of long queries in a large scale search log",
"A study of Poisson query generation model for information retrieval",
"Materials and Manufacturing Technologies Available for Production of a Pediatric Bioabsorbable Stent"
] |
[
"Analysis of long queries in a large scale search log",
"A Markov random field model for term dependencies",
"Estimating 3D Trajectories from 2D Projections via Disjunctive Factored Four-Way Conditional Restricted Boltzmann Machines"
] |
[
"Analysis of long queries in a large scale search log",
"A study of Poisson query generation model for information retrieval",
"A 4.3μW 28nm-CMOS pixel front-end with switched inverter-based comparator"
] |
[
"Analysis of long queries in a large scale search log",
"A machine learning architecture for optimizing web search engines",
"The effects of psychotomimetic drugs on primary suggestibility"
] |
[
"The NHGRI GWAS Catalog, a curated resource of SNP-trait associations",
"Genome-wide meta-analysis increases to 71 the number of confirmed Crohn's disease susceptibility loci",
"The human phenotype ontology."
] |
[
"The NHGRI GWAS Catalog, a curated resource of SNP-trait associations",
"The OBO Foundry: coordinated evolution of ontologies to support biomedical data integration",
"A Closer Look at Spatiotemporal Convolutions for Action Recognition"
] |
[
"The NHGRI GWAS Catalog, a curated resource of SNP-trait associations",
"Disease Ontology: a backbone for disease semantic integration",
"Applying Deep Learning to Basketball Trajectories"
] |
[
"The NHGRI GWAS Catalog, a curated resource of SNP-trait associations",
"Disease Ontology: a backbone for disease semantic integration",
"Direct Measurement of Small Antenna Radiation Efficiency by Calorimetric Method"
] |
[
"The NHGRI GWAS Catalog, a curated resource of SNP-trait associations",
"The OBO Foundry: coordinated evolution of ontologies to support biomedical data integration",
"On the Efficiency of FHE-Based Private Queries"
] |
[
"Temporally-aware algorithms for document classification",
"The Problem of Concept Drift: Definitions and Related Work",
"Heterogenous Uncertainty Sampling for Supervised Learning"
] |
[
"Temporally-aware algorithms for document classification",
"Training linear {SVM}s in linear time",
"Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma"
] |
[
"Temporally-aware algorithms for document classification",
"Training linear {SVM}s in linear time",
"Unsupervised Personalized Feature Selection"
] |
[
"Temporally-aware algorithms for document classification",
"The Problem of Concept Drift: Definitions and Related Work",
"Context-aware Image Generation by Using Generative Adversarial Networks"
] |
[
"Temporally-aware algorithms for document classification",
"Training linear {SVM}s in linear time",
"Beyond definition/use: architectural interconnection"
] |
[
"A 6-bit CMOS Active Phase Shifter for Ku-Band Phased Arrays",
"Integrated Phased Array Systems in Silicon",
"Design and Analysis of a 21–29-GHz Ultra-Wideband Receiver Front-End in 0.18-$\\mu$ m CMOS Technology"
] |
[
"A 6-bit CMOS Active Phase Shifter for Ku-Band Phased Arrays",
"A $Ku$ -Band Two-Antenna Four-Simultaneous Beams SiGe BiCMOS Phased Array Receiver",
"Review of clustering algorithms for microgrid formation"
] |
[
"A 6-bit CMOS Active Phase Shifter for Ku-Band Phased Arrays",
"A $Ku$ -Band Two-Antenna Four-Simultaneous Beams SiGe BiCMOS Phased Array Receiver",
"Incremental Segmentation on Private Data without Catastrophic Forgetting"
] |
[
"A 6-bit CMOS Active Phase Shifter for Ku-Band Phased Arrays",
"A Wideband Transformer Balun With Center Open Stub in CMOS Process",
"Basic Concepts of Lexical Resource Semantics"
] |
[
"A 6-bit CMOS Active Phase Shifter for Ku-Band Phased Arrays",
"Low Insertion Loss, Compact 4-bit Phase Shifter in 65 nm CMOS for 5G Applications",
"rna - seq gene expression estimation with read mapping uncertainty ."
] |
[
"Detection of Anomalies in Large Scale Accounting Data using Deep Autoencoder Networks",
"Variational Autoencoder based Anomaly Detection using Reconstruction Probability",
"Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions"
] |
[
"Detection of Anomalies in Large Scale Accounting Data using Deep Autoencoder Networks",
"Large Scale Detection of Irregularities in Accounting Data",
"Flexible dry surface-electrodes for ECG long-term monitoring"
] |
[
"Detection of Anomalies in Large Scale Accounting Data using Deep Autoencoder Networks",
"An Autoencoder Approach to Learning Bilingual Word Representations",
"CNN-Based Joint Clustering and Representation Learning with Feature Drift Compensation for Large-Scale Image Data"
] |
[
"Detection of Anomalies in Large Scale Accounting Data using Deep Autoencoder Networks",
"An Autoencoder Approach to Learning Bilingual Word Representations",
"Fast profile matching algorithms - A survey"
] |
[
"Detection of Anomalies in Large Scale Accounting Data using Deep Autoencoder Networks",
"An Autoencoder Approach to Learning Bilingual Word Representations",
"The acceptance and use of a virtual learning environment in China"
] |
[
"Review of optical flow technique for moving object detection",
"Vehicle Ego-Motion Estimation and Moving Object Detection using a Monocular Camera",
"A combined corner and edge detector"
] |
[
"Review of optical flow technique for moving object detection",
"Vehicle Ego-Motion Estimation and Moving Object Detection using a Monocular Camera",
"Early evidence of the genus Homo in East Asia."
] |
[
"Review of optical flow technique for moving object detection",
"Moving object tracking using optical flow and motion vector estimation",
"Automatic Segmentation of Acute Ischemic Stroke From DWI Using 3-D Fully Convolutional DenseNets"
] |
[
"Review of optical flow technique for moving object detection",
"Vehicle Ego-Motion Estimation and Moving Object Detection using a Monocular Camera",
"Millisecond-scale molecular dynamics simulations on Anton"
] |
[
"Review of optical flow technique for moving object detection",
"Vehicle Ego-Motion Estimation and Moving Object Detection using a Monocular Camera",
"Affective computing using speech and eye gaze: a review and bimodal system proposal for continuous affect prediction"
] |
[
"Persona: an online social network with user-defined privacy",
"Characterizing privacy in online social networks",
"Tor: The Second-Generation Onion Router"
] |
[
"Persona: an online social network with user-defined privacy",
"Characterizing privacy in online social networks",
"Case-based reasoning and its implications for legal expert systems"
] |
[
"Persona: an online social network with user-defined privacy",
"Role-Based Access Controls",
"Drugs for bad bugs: confronting the challenges of antibacterial discovery"
] |
[
"Persona: an online social network with user-defined privacy",
"Characterizing privacy in online social networks",
"κ-FSOM: Fair Link Scheduling Optimization for Energy-Aware Data Collection in Mobile Sensor Networks"
] |
[
"Persona: an online social network with user-defined privacy",
"NOYB: privacy in online social networks",
"An innovated 500V UHV ESD self-protection device structure"
] |
[
"A comparison of feed-forward and recurrent neural networks in time series forecasting",
"advanced supervised learning in multi - layer perceptrons — from backpropagation to adaptive learning algorithms .",
"genetic algorithms in search optimization and machine learning ."
] |
[
"A comparison of feed-forward and recurrent neural networks in time series forecasting",
"Improving the learning speed of 2-layer neural networks by choosing initial values of the adaptive weights",
"Irony and Sarcasm: Corpus Generation and Analysis Using Crowdsourcing"
] |
[
"A comparison of feed-forward and recurrent neural networks in time series forecasting",
"Neural Networks and Financial Trading and the Efficient Markets Hypothesis",
"3D Integration technology: Status and application development"
] |
[
"A comparison of feed-forward and recurrent neural networks in time series forecasting",
"Improving the learning speed of 2-layer neural networks by choosing initial values of the adaptive weights",
"Multichannel Variable-Size Convolution for Sentence Classification"
] |
[
"A comparison of feed-forward and recurrent neural networks in time series forecasting",
"Neural Networks and Financial Trading and the Efficient Markets Hypothesis",
"Human-Currency Interaction: learning from virtual currency use in China"
] |
[
"Hybrid Brain–Computer Interface Techniques for Improved Classification Accuracy and Increased Number of Commands: A Review",
"Multi-Class Motor Imagery EEG Decoding for Brain-Computer Interfaces",
"Fast and robust fixed-point algorithms for independent component analysis"
] |
[
"Hybrid Brain–Computer Interface Techniques for Improved Classification Accuracy and Increased Number of Commands: A Review",
"Multi-Class Motor Imagery EEG Decoding for Brain-Computer Interfaces",
"Design of an anthropomorphic dual-arm robot with biologically inspired 8-DOF arms"
] |
[
"Hybrid Brain–Computer Interface Techniques for Improved Classification Accuracy and Increased Number of Commands: A Review",
"Multi-Class Motor Imagery EEG Decoding for Brain-Computer Interfaces",
"Time Series Forecasting using Evolutionary Neural Network"
] |
[
"Hybrid Brain–Computer Interface Techniques for Improved Classification Accuracy and Increased Number of Commands: A Review",
"Multi-Class Motor Imagery EEG Decoding for Brain-Computer Interfaces",
"life satisfaction questionnaire ( lisat - 9 ) : reliability and validity for patients with acquired brain injury ... |
[
"Hybrid Brain–Computer Interface Techniques for Improved Classification Accuracy and Increased Number of Commands: A Review",
"Multi-Class Motor Imagery EEG Decoding for Brain-Computer Interfaces",
"TeamBeam Meta-Data Extraction from Scientific Literature"
] |
[
"Tiresias: Predicting Security Events Through Deep Learning",
"The ghost in the browser: Analysis of web-based malware",
"a foray into conficker ' s logic and rendezvous points ."
] |
[
"Tiresias: Predicting Security Events Through Deep Learning",
"The ghost in the browser: Analysis of web-based malware",
"Assessing rural small community water supply in Limpopo, South Africa: water service benchmarks and reliability."
] |
[
"Tiresias: Predicting Security Events Through Deep Learning",
"The ghost in the browser: Analysis of web-based malware",
"UK Biobank: from concept to reality."
] |
[
"Tiresias: Predicting Security Events Through Deep Learning",
"Detection and analysis of drive-by-download attacks and malicious JavaScript code",
"Prediction of ground motion parameters using randomized ANFIS (RANFIS)"
] |
[
"Tiresias: Predicting Security Events Through Deep Learning",
"MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models",
"Cross-media analysis and reasoning: advances and directions"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.