set list |
|---|
[
"Exposing the Hidden Web: An Analysis of Third-Party HTTP Requests on 1 Million Websites",
"Protecting browser state from web privacy attacks",
"Flash Cookies and Privacy"
] |
[
"Exposing the Hidden Web: An Analysis of Third-Party HTTP Requests on 1 Million Websites",
"Host Fingerprinting and Tracking on the Web : Privacy and Security Implications",
"Large scale multiple robot visual mapping with heterogeneous landmarks in semi-structured terrain"
] |
[
"Exposing the Hidden Web: An Analysis of Third-Party HTTP Requests on 1 Million Websites",
"Host Fingerprinting and Tracking on the Web : Privacy and Security Implications",
"Measuring the Usability of Mobile Applications for Phones and Tablets"
] |
[
"Exposing the Hidden Web: An Analysis of Third-Party HTTP Requests on 1 Million Websites",
"Protecting browser state from web privacy attacks",
"modified skyhook control of semi - active suspensions : a new model , gain scheduling , and hardware - in - the - loop tuning ."
] |
[
"Exposing the Hidden Web: An Analysis of Third-Party HTTP Requests on 1 Million Websites",
"Protecting browser state from web privacy attacks",
"Poselets: Body part detectors trained using 3D human pose annotations"
] |
[
"A Fingerprint Method for Indoor Localization Using Autoencoder Based Deep Extreme Learning Machine",
"Robust Extreme Learning Machine With its Application to Indoor Positioning",
"Semi-Supervised and Unsupervised Extreme Learning Machines"
] |
[
"A Fingerprint Method for Indoor Localization Using Autoencoder Based Deep Extreme Learning Machine",
"Robust Extreme Learning Machine With its Application to Indoor Positioning",
"\"Trust me, I'm an online vendor\": towards a model of trust for e-commerce system design"
] |
[
"A Fingerprint Method for Indoor Localization Using Autoencoder Based Deep Extreme Learning Machine",
"Robust Extreme Learning Machine With its Application to Indoor Positioning",
"A Multiagent Approach to $Q$-Learning for Daily Stock Trading"
] |
[
"A Fingerprint Method for Indoor Localization Using Autoencoder Based Deep Extreme Learning Machine",
"Improved Wi-Fi RSSI Measurement for Indoor Localization",
"Data Storage and Interaction using Magnetized Fabric"
] |
[
"A Fingerprint Method for Indoor Localization Using Autoencoder Based Deep Extreme Learning Machine",
"Improved Wi-Fi RSSI Measurement for Indoor Localization",
"Multilevel Inverter For Grid-Connected PV System Employing Digital PI Controller"
] |
[
"Stacked Patch Antenna With Dual-Polarization and Low Mutual Coupling for Massive MIMO",
"Massive MIMO for Next Generation Wireless Systems",
"Massive MIMO in the UL/DL of Cellular Networks: How Many Antennas Do We Need?"
] |
[
"Stacked Patch Antenna With Dual-Polarization and Low Mutual Coupling for Massive MIMO",
"Layered space-time architecture for wireless communication in a fading environment when using multi-element antennas",
"Combining supervised and unsupervised learning for zero-day malware detection"
] |
[
"Stacked Patch Antenna With Dual-Polarization and Low Mutual Coupling for Massive MIMO",
"Scaling up MIMO: Opportunities and challenges with very large arrays",
"Pneumoparotid: a case report and review of the literature."
] |
[
"Stacked Patch Antenna With Dual-Polarization and Low Mutual Coupling for Massive MIMO",
"Scaling up MIMO: Opportunities and challenges with very large arrays",
"Gyro in the air: tracking 3D orientation of batteryless internet-of-things"
] |
[
"Stacked Patch Antenna With Dual-Polarization and Low Mutual Coupling for Massive MIMO",
"Layered space-time architecture for wireless communication in a fading environment when using multi-element antennas",
"Risk of injury on third-generation artificial turf in Norwegian professional football"
] |
[
"Unsupervised feature learning by augmenting single images",
"Training Hierarchical Feed-Forward Visual Recognition Models Using Transfer Learning from Pseudo-Tasks",
"Projection Pursuit Regression"
] |
[
"Unsupervised feature learning by augmenting single images",
"DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition",
"TinySPICE: a parallel SPICE simulator on GPU for massively repeated small circuit simulations"
] |
[
"Unsupervised feature learning by augmenting single images",
"A Fast Learning Algorithm for Deep Belief Nets",
"Differentiation of Primary Central Nervous System Lymphomas from High-Grade Gliomas by rCBV and Percentage of Signal Intensity Recovery Derived from Dynamic Susceptibility-Weighted Contrast-Enhanced P... |
[
"Unsupervised feature learning by augmenting single images",
"DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition",
"The Design of Wideband Phased Array Antenna using Ridged Tapered Slot Antenna"
] |
[
"Unsupervised feature learning by augmenting single images",
"Semi Supervised Logistic Regression",
"Text Classification using the Concept of Association Rule of Data Mining"
] |
[
"Low-profile fully integrated 60 GHz 18 element phased array on multilayer liquid crystal polymer flip chip package",
"Characterization of liquid crystal polymer (LCP) material and transmission lines on LCP substrates from 30 to 110 GHz",
"A SiGe BiCMOS 16-element phased-array transmitter for 60GHz communicatio... |
[
"Low-profile fully integrated 60 GHz 18 element phased array on multilayer liquid crystal polymer flip chip package",
"A CMOS bidirectional 32-element phased-array transceiver at 60GHz with LTCC antenna",
"RLlib: Abstractions for Distributed Reinforcement Learning"
] |
[
"Low-profile fully integrated 60 GHz 18 element phased array on multilayer liquid crystal polymer flip chip package",
"Characterization of liquid crystal polymer (LCP) material and transmission lines on LCP substrates from 30 to 110 GHz",
"A Survey on Access Control Mechanisms in E-commerce Environments"
] |
[
"Low-profile fully integrated 60 GHz 18 element phased array on multilayer liquid crystal polymer flip chip package",
"Investigation of a photodefinable glass substrate for millimeter-wave radios on package",
"Sirtuins in Cancer: a Balancing Act between Genome Stability and Metabolism"
] |
[
"Low-profile fully integrated 60 GHz 18 element phased array on multilayer liquid crystal polymer flip chip package",
"A CMOS bidirectional 32-element phased-array transceiver at 60GHz with LTCC antenna",
"An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical... |
[
"Improving Program Acceptability Through Source Code Transformations",
"Will they like this?: evaluating code contributions with language models",
"On the localness of software"
] |
[
"Improving Program Acceptability Through Source Code Transformations",
"Will they like this?: evaluating code contributions with language models",
"reparations , the young plan , and the great depression in germany ."
] |
[
"Improving Program Acceptability Through Source Code Transformations",
"Will they like this?: evaluating code contributions with language models",
"using goffman ’ s frameworks to explain presence and reality ."
] |
[
"Improving Program Acceptability Through Source Code Transformations",
"Will they like this?: evaluating code contributions with language models",
"A 64Mb MRAM with clamped-reference and adequate-reference schemes"
] |
[
"Improving Program Acceptability Through Source Code Transformations",
"Learning a Metric for Code Readability",
"SafeFS: a modular architecture for secure user-space file systems: one FUSE to rule them all"
] |
[
"Printed Slot Loaded Bow-Tie Antenna With Super Wideband Radiation Characteristics for Imaging Applications",
"A Double-Sided Rounded Bow-Tie Antenna (DSRBA) for UWB Communication",
"Ground influence on the input impedance of transient dipole and bow-tie antennas"
] |
[
"Printed Slot Loaded Bow-Tie Antenna With Super Wideband Radiation Characteristics for Imaging Applications",
"A Modified Bow-Tie Antenna for Improved Pulse Radiation",
"An Overview of Diode Pumped Solid State (DPSS) Lasers"
] |
[
"Printed Slot Loaded Bow-Tie Antenna With Super Wideband Radiation Characteristics for Imaging Applications",
"Millimeter-Wave and Submillimeter-Wave Imaging for Security and Surveillance",
"A meta-synthesis on parenting a child with autism"
] |
[
"Printed Slot Loaded Bow-Tie Antenna With Super Wideband Radiation Characteristics for Imaging Applications",
"A Modified Bow-Tie Antenna for Improved Pulse Radiation",
"Failure risk management of buried infrastructure using fuzzy-based techniques"
] |
[
"Printed Slot Loaded Bow-Tie Antenna With Super Wideband Radiation Characteristics for Imaging Applications",
"A Double-Sided Rounded Bow-Tie Antenna (DSRBA) for UWB Communication",
"Aggregated Momentum: Stability Through Passive Damping"
] |
[
"TripleBit: a Fast and Compact System for Large Scale RDF Data",
"Column-store support for RDF data management: not all swans are white",
"Efficient RDF Storage and Retrieval in Jena2"
] |
[
"TripleBit: a Fast and Compact System for Large Scale RDF Data",
"Column-store support for RDF data management: not all swans are white",
"Implicit Learning : History & Applications"
] |
[
"TripleBit: a Fast and Compact System for Large Scale RDF Data",
"sesame : a generic architecture for storing and querying rdf and rdf schema .",
"Assessing the risk of IT outsourcing"
] |
[
"TripleBit: a Fast and Compact System for Large Scale RDF Data",
"Scalable Semantic Web Data Management Using Vertical Partitioning",
"Hierarchical image segmentation based on similarity of NDVI time series"
] |
[
"TripleBit: a Fast and Compact System for Large Scale RDF Data",
"Column-store support for RDF data management: not all swans are white",
"\"Support Vector Feature Selection for Early Detection of Anastomosis Leakage from Bag-of-Words in Electronic Health Records\""
] |
[
"Hands Deep in Deep Learning for Hand Pose Estimation",
"Deep Learning in Neural Networks: An Overview",
"6D hands: markerless hand-tracking for computer aided design"
] |
[
"Hands Deep in Deep Learning for Hand Pose Estimation",
"Latent Regression Forest: Structured Estimation of 3D Articulated Hand Posture",
"Review of Efficient Resource Scheduling Algorithms in Cloud Computing"
] |
[
"Hands Deep in Deep Learning for Hand Pose Estimation",
"Vision-based hand pose estimation: A review",
"Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security"
] |
[
"Hands Deep in Deep Learning for Hand Pose Estimation",
"Dynamics based 3D skeletal hand tracking",
"A Meta-Analysis of 137 Personality Subjective Well-Being"
] |
[
"Hands Deep in Deep Learning for Hand Pose Estimation",
"Vision-based hand pose estimation: A review",
"Nonlinear Characterization of Electrostatic MEMS Resonators"
] |
[
"Analysis of Telegram, An Instant Messaging Service",
"\"What do they snapchat about?\" Patterns of use in time-limited instant messaging service",
"a longitudinal study of emoticon use in text messaging from smartphones ."
] |
[
"Analysis of Telegram, An Instant Messaging Service",
"What's up with whatsapp?: comparing mobile instant messaging behaviors with traditional SMS",
"Attention-Guided Answer Distillation for Machine Reading Comprehension"
] |
[
"Analysis of Telegram, An Instant Messaging Service",
"The Anatomy of A Large-Scale Hyper Textualweb Search Engine",
"A modular software architecture for UAVs"
] |
[
"Analysis of Telegram, An Instant Messaging Service",
"The Anatomy of A Large-Scale Hyper Textualweb Search Engine",
"Location-Based Mobile Games"
] |
[
"Analysis of Telegram, An Instant Messaging Service",
"\"What do they snapchat about?\" Patterns of use in time-limited instant messaging service",
"Here's My Point: Joint Pointer Architecture for Argument Mining"
] |
[
"Strategy, Choice of Performance Measures, and Performance",
"Linking the balanced scorecard to strategy",
"The Balanced Scorecard: Translating Strategy into Action"
] |
[
"Strategy, Choice of Performance Measures, and Performance",
"management control systems and strategy : a critical review * .",
"Perioperative Nursing Leaders Implement Clinical Practice Guidelines Using the Iowa Model of Evidence-Based Practice."
] |
[
"Strategy, Choice of Performance Measures, and Performance",
"Linking the balanced scorecard to strategy",
"Using Topic Modeling to Improve Prediction of Neuroticism and Depression in College Students"
] |
[
"Strategy, Choice of Performance Measures, and Performance",
"Total Quality Management",
"Pedagogy of CS Unplugged : Lessons from Outreach and Education Activities in Computer Science"
] |
[
"Strategy, Choice of Performance Measures, and Performance",
"Total Quality Management",
"Plasticity in the Working Memory System: Life Span Changes and Response to Injury"
] |
[
"Lingering Effects: Stereotype Threat Hurts More than You Think",
"The regulation of explicit and implicit race bias: the role of motivations to respond without prejudice.",
"Motivation reconsidered: the concept of competence"
] |
[
"Lingering Effects: Stereotype Threat Hurts More than You Think",
"The regulation of explicit and implicit race bias: the role of motivations to respond without prejudice.",
"A Capacitive Fringing Field Sensor Design for Moisture Measurement Based on Printed Circuit Board Technology"
] |
[
"Lingering Effects: Stereotype Threat Hurts More than You Think",
"Self-efficacy: Toward a unifying theory of behavioral change",
"Actinomycosis: etiology, clinical features, diagnosis, treatment, and management"
] |
[
"Lingering Effects: Stereotype Threat Hurts More than You Think",
"The regulation of explicit and implicit race bias: the role of motivations to respond without prejudice.",
"Effect of robot's active touch on people's motivation"
] |
[
"Lingering Effects: Stereotype Threat Hurts More than You Think",
"Self-efficacy: Toward a unifying theory of behavioral change",
"Predictive Factors of Participation in Postsecondary Education for High School Leavers with Autism"
] |
[
"A Survey on Generic Scada Simulators",
"Simulation of Network Attacks on SCADA Systems",
"A Taxonomy of Attacks on the DNP3 Protocol"
] |
[
"A Survey on Generic Scada Simulators",
"SCADASim—A Framework for Building SCADA Simulations",
"Design of Road Power Generator (RPG):an Alternate Energy Source for Sustainability"
] |
[
"A Survey on Generic Scada Simulators",
"EPOCHS: a platform for agent-based electric power and communication simulation built from commercial off-the-shelf components",
"Inverse Sparse Tracker With a Locally Weighted Distance Metric"
] |
[
"A Survey on Generic Scada Simulators",
"Simulation of Network Attacks on SCADA Systems",
"Sports highlights generation based on acoustic events detection: A rugby case study"
] |
[
"A Survey on Generic Scada Simulators",
"SCADASim—A Framework for Building SCADA Simulations",
"A Linearly Relaxed Approximate Linear Program for Markov Decision Processes"
] |
[
"Cyberbullying Identification Using Participant-Vocabulary Consistency",
"The five W's of \"bullying\" on Twitter: Who, What, Why, Where, and When",
"filtering offensive language in online communities using grammatical relations ."
] |
[
"Cyberbullying Identification Using Participant-Vocabulary Consistency",
"Modeling the Detection of Textual Cyberbullying",
"MMSS: Multi-modal Sharable and Specific Feature Learning for RGB-D Object Recognition"
] |
[
"Cyberbullying Identification Using Participant-Vocabulary Consistency",
"Using Machine Learning to Detect Cyberbullying",
"2 All Learning Rates At Once : Description"
] |
[
"Cyberbullying Identification Using Participant-Vocabulary Consistency",
"Detecting Offensive Language in Social Media to Protect Adolescent Online Safety",
"the application of signature character strengths and positive experiences at work harzer ."
] |
[
"Cyberbullying Identification Using Participant-Vocabulary Consistency",
"Cyber Bullying Detection Using Social and Textual Analysis",
"Endoscopic ultrasound in the detection of pancreatic islet cell tumours"
] |
[
"On-line rigid object recognition and pose estimation based on inertial parameters",
"The scaled unscented transformation",
"A new method for the nonlinear transformation of means and covariances in filters and estimators"
] |
[
"On-line rigid object recognition and pose estimation based on inertial parameters",
"matrix computations ( 3 . ed . ) .",
"Distributed sensor calibration and least-square parameter identification in WSNs using consensus algorithms"
] |
[
"On-line rigid object recognition and pose estimation based on inertial parameters",
"A New Extension of the Kalman Filter to Nonlinear Systems",
"New strategies for drug discovery: activation of silent or weakly expressed microbial gene clusters"
] |
[
"On-line rigid object recognition and pose estimation based on inertial parameters",
"Introduction to robotics mechanics and control",
"Risk of cardiovascular comorbidity in patients with chronic obstructive pulmonary disease: a systematic review and meta-analysis."
] |
[
"On-line rigid object recognition and pose estimation based on inertial parameters",
"The scaled unscented transformation",
"Task-oriented design of concentric tube robots using mechanics-based models"
] |
[
"Cyclone: Unified Stream and Batch Processing",
"Muppet: MapReduce-Style Processing of Fast Data",
"Flexible time management in data stream systems"
] |
[
"Cyclone: Unified Stream and Batch Processing",
"Muppet: MapReduce-Style Processing of Fast Data",
"3-D model-based tracking of humans in action: a multi-view approach"
] |
[
"Cyclone: Unified Stream and Batch Processing",
"MillWheel: Fault-Tolerant Stream Processing at Internet Scale",
"Algorithms and Applications of Structure from Motion ( SFM ) : A Survey"
] |
[
"Cyclone: Unified Stream and Batch Processing",
"Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters",
"2-Server PIR with Sub-Polynomial Communication"
] |
[
"Cyclone: Unified Stream and Batch Processing",
"Muppet: MapReduce-Style Processing of Fast Data",
"Loneliness, Social Networks, and Health: A Cross-Sectional Study in Three Countries"
] |
[
"Artistic simulation of curly hair",
"A Survey on Hair Modeling: Styling, Simulation, and Rendering",
"Rendering fur with three dimensional textures"
] |
[
"Artistic simulation of curly hair",
"Optimized Spatial Hashing for Collision Detection of Deformable Objects",
"Low Awareness of Breast Cancer and Considerable Barriers to Early Presentation Among Saudi Women at a Primary Care Setting"
] |
[
"Artistic simulation of curly hair",
"A Survey on Hair Modeling: Styling, Simulation, and Rendering",
"Benefactive/Malefactive Event and Writer Attitude Annotation"
] |
[
"Artistic simulation of curly hair",
"STRANDS: Interactive Simulation of Thin Solids using Cosserat Models",
"A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates"
] |
[
"Artistic simulation of curly hair",
"A Survey on Hair Modeling: Styling, Simulation, and Rendering",
"Large scale multiple robot visual mapping with heterogeneous landmarks in semi-structured terrain"
] |
[
"Autoencoder With Invertible Functions for Dimension Reduction and Image Reconstruction",
"Recursive Distributed Representations",
"Complexity of exact gradient computation algorithms for recurrent neural networks"
] |
[
"Autoencoder With Invertible Functions for Dimension Reduction and Image Reconstruction",
"Recursive Distributed Representations",
"Linguistic camouflage in girls with autism spectrum disorder"
] |
[
"Autoencoder With Invertible Functions for Dimension Reduction and Image Reconstruction",
"Incremental Support Vector Learning for Ordinal Regression",
"Work Related Stress, Burnout, Job Satisfaction and General Health of Nurses"
] |
[
"Autoencoder With Invertible Functions for Dimension Reduction and Image Reconstruction",
"Kernel codebooks for scene categorization",
"Non-Local Patch-Based Image Inpainting"
] |
[
"Autoencoder With Invertible Functions for Dimension Reduction and Image Reconstruction",
"Stacked denoising autoencoders: learning useful representations in a deep network with a local denoising criterion",
"SVO: Semidirect Visual Odometry for Monocular and Multicamera Systems"
] |
[
"Actor-critic versus direct policy search: a comparison based on sample complexity",
"Reinforcement learning of motor skills with policy gradients",
"Exact robot navigation using artificial potential functions"
] |
[
"Actor-critic versus direct policy search: a comparison based on sample complexity",
"Learning Continuous Control Policies by Stochastic Value Gradients",
"Using Factor Analysis to Generate Clusters of Agile Practices (A Guide for Agile Process Improvement)"
] |
[
"Actor-critic versus direct policy search: a comparison based on sample complexity",
"Robot Skill Learning: From Reinforcement Learning to Evolution Strategies",
"Mindfulness meditation and the immune system: a systematic review of randomized controlled trials"
] |
[
"Actor-critic versus direct policy search: a comparison based on sample complexity",
"Reinforcement learning of motor skills with policy gradients",
"Incidence of Cerebral Microbleeds in the General Population: The Rotterdam Scan Study"
] |
[
"Actor-critic versus direct policy search: a comparison based on sample complexity",
"Policy Improvement Methods: Between Black-Box Optimization and Episodic Reinforcement Learning",
"Viargo - A generic virtual reality interaction library"
] |
[
"Improved Intrusion Detection in DDoS Applying Feature Selection Using Rank & Score of Attributes in KDD-99 Data Set",
"Data Mining Techniques for ( Network ) Intrusion Detection Systems",
"Learning a similarity metric discriminatively, with application to face verification"
] |
[
"Improved Intrusion Detection in DDoS Applying Feature Selection Using Rank & Score of Attributes in KDD-99 Data Set",
"Irrelevant Features and the Subset Selection Problem",
"Deep learning for analysing synchrotron data streams"
] |
[
"Improved Intrusion Detection in DDoS Applying Feature Selection Using Rank & Score of Attributes in KDD-99 Data Set",
"learning and optimization using the clonal selection principle .",
"data structures in java for matrix computations ."
] |
[
"Improved Intrusion Detection in DDoS Applying Feature Selection Using Rank & Score of Attributes in KDD-99 Data Set",
"A modified particle swarm optimizer",
"The ACCESS model: a transcultural nursing practice framework"
] |
[
"Improved Intrusion Detection in DDoS Applying Feature Selection Using Rank & Score of Attributes in KDD-99 Data Set",
"learning and optimization using the clonal selection principle .",
"Evaluation of manpower scheduling strategies at outpatient pharmacy with discrete-event simulation"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.