set list |
|---|
[
"Multilayer Extreme Learning Machine With Subnetwork Nodes for Representation Learning.",
"Food recognition using statistics of pairwise local features",
"Incremental extreme learning machine with fully complex hidden nodes"
] |
[
"Multilayer Extreme Learning Machine With Subnetwork Nodes for Representation Learning.",
"Extreme Learning Machine for Regression and Multiclass Classification",
"Ten myths of multimodal interaction"
] |
[
"Multilayer Extreme Learning Machine With Subnetwork Nodes for Representation Learning.",
"Extreme Learning Machine for Regression and Multiclass Classification",
"Automatic Tongue Diagnosis Using a Smart Phone"
] |
[
"Multilayer Extreme Learning Machine With Subnetwork Nodes for Representation Learning.",
"semi - supervised learning literature survey .",
"One button machine for automating feature engineering in relational databases"
] |
[
"Multilayer Extreme Learning Machine With Subnetwork Nodes for Representation Learning.",
"beyond bags of features : spatial pyramid matching for recognizing natural scene categories .",
"Research on Control Strategy of Two-Wheeled Self-Balancing Robot"
] |
[
"Categorical Reparameterization with Gumbel-Softmax",
"Variational inference for Monte Carlo objectives",
"Black Box Variational Inference"
] |
[
"Categorical Reparameterization with Gumbel-Softmax",
"InfoGAN: Interpretable Representation Learning by Information Maximizing Generative Adversarial Nets",
"How marketers can use celebrities to sell more effectively"
] |
[
"Categorical Reparameterization with Gumbel-Softmax",
"Variational inference for Monte Carlo objectives",
"A study of statistical techniques and performance measures for genetics-based machine learning: accuracy and interpretability"
] |
[
"Categorical Reparameterization with Gumbel-Softmax",
"Gradient Estimation Using Stochastic Computation Graphs",
"Evolving concepts of rheumatoid arthritis"
] |
[
"Categorical Reparameterization with Gumbel-Softmax",
"Hierarchical Multiscale Recurrent Neural Networks",
"An anthropometric data bank for the Iranian working population with ethnic diversity."
] |
[
"Misco: a MapReduce framework for mobile systems",
"MapReduce: simplified data processing on large clusters",
"GPUClusterforHig hPerformanceComp uting"
] |
[
"Misco: a MapReduce framework for mobile systems",
"MapReduce: simplified data processing on large clusters",
"Devon: Deformable Volume Network for Learning Optical Flow"
] |
[
"Misco: a MapReduce framework for mobile systems",
"MapReduce: simplified data processing on large clusters",
"Automatic Hashtag Recommendation for Microblogs using Topic-Specific Translation Model"
] |
[
"Misco: a MapReduce framework for mobile systems",
"Mars: a MapReduce framework on graphics processors",
"CityPulse: Large Scale Data Analytics Framework for Smart Cities"
] |
[
"Misco: a MapReduce framework for mobile systems",
"Mars: a MapReduce framework on graphics processors",
"Temporal Pattern and Association Discovery of Diagnosis Codes Using Deep Learning"
] |
[
"Detecting Abnormal Machine Characteristics in Cloud Infrastructures",
"Algorithms for speeding up distance-based outlier detection",
"Using computers to diagnose computer problems"
] |
[
"Detecting Abnormal Machine Characteristics in Cloud Infrastructures",
"Algorithms for speeding up distance-based outlier detection",
"Artificial intelligence and security: An overview"
] |
[
"Detecting Abnormal Machine Characteristics in Cloud Infrastructures",
"Fingerprinting the datacenter: automated classification of performance crises",
"A Protection Motivation Theory of Fear Appeals and Attitude Change1"
] |
[
"Detecting Abnormal Machine Characteristics in Cloud Infrastructures",
"Autopilot: automatic data center management",
"STR: A Seasonal-Trend Decomposition Procedure Based on Regression"
] |
[
"Detecting Abnormal Machine Characteristics in Cloud Infrastructures",
"Autopilot: automatic data center management",
"Phase Plots of Complex Functions: a Journey in Illustration"
] |
[
"(Re)Defining Gamification: A Process Approach",
"Defining gamification: a service marketing perspective",
"Designing games with a purpose"
] |
[
"(Re)Defining Gamification: A Process Approach",
"Defining gamification: a service marketing perspective",
"Accurately and Efficiently Interpreting Human-Robot Instructions of Varying Granularities"
] |
[
"(Re)Defining Gamification: A Process Approach",
"A behavior model for persuasive design",
"RLlib: Abstractions for Distributed Reinforcement Learning"
] |
[
"(Re)Defining Gamification: A Process Approach",
"Defining gamification: a service marketing perspective",
"A Roadmap for the Value-Loading Problem."
] |
[
"(Re)Defining Gamification: A Process Approach",
"A behavior model for persuasive design",
"Scaling agile software development through lean governance"
] |
[
"Social trust and social reciprocity based cooperative D2D communications",
"Applications, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey",
"The small world of the American corporate elite, 1982–2001"
] |
[
"Social trust and social reciprocity based cooperative D2D communications",
"Random Graph Models of Social Networks",
"Phase III randomized study of the proposed adalimumab biosimilar GP2017 in psoriasis: impact of multiple switches"
] |
[
"Social trust and social reciprocity based cooperative D2D communications",
"Random Graph Models of Social Networks",
"Efficient B-Mode Ultrasound Image Reconstruction From Sub-Sampled RF Data Using Deep Learning"
] |
[
"Social trust and social reciprocity based cooperative D2D communications",
"Strong reciprocity and human sociality",
"Cold-induced conversion of cholesterol to bile acids in mice shapes the gut microbiome and promotes adaptive thermogenesis"
] |
[
"Social trust and social reciprocity based cooperative D2D communications",
"Game Theory: Analysis of Conflict",
"IoT system for monitoring vital signs of elderly population"
] |
[
"Literature Review on Automatic Text Summarization: Single and Multiple Summarizations",
"Literature Review of Automatic Multiple Documents Text Summarization",
"TextTiling: Segmenting Text Into Multi-Paragraph Subtopic Passages"
] |
[
"Literature Review on Automatic Text Summarization: Single and Multiple Summarizations",
"Automatic text processing: the transformation, analysis, and retrieval of information by computer",
"DeepNorm-A Deep Learning Approach to Text Normalization"
] |
[
"Literature Review on Automatic Text Summarization: Single and Multiple Summarizations",
"TextRank: Bringing Order Into Texts",
"Learning the easy things first: Self-paced visual category discovery"
] |
[
"Literature Review on Automatic Text Summarization: Single and Multiple Summarizations",
"Automatic text processing: the transformation, analysis, and retrieval of information by computer",
"Virtual Hajj (V-Hajj) — Adaptation of persuasive design in virtual environment (VE) and multimedia integrated approach le... |
[
"Literature Review on Automatic Text Summarization: Single and Multiple Summarizations",
"Literature Review of Automatic Multiple Documents Text Summarization",
"Modeling and implementing collaborative editing systems with transactional techniques"
] |
[
"Studying Fake News via Network Analysis: Detection and Mitigation",
"Provenance Data in Social Media",
"Patterns of temporal variation in online media"
] |
[
"Studying Fake News via Network Analysis: Detection and Mitigation",
"Confirmation Bias: A Ubiquitous Phenomenon in Many Guises",
"A Survey of Mobile Crowdsensing Techniques: A Critical Component for The Internet of Things"
] |
[
"Studying Fake News via Network Analysis: Detection and Mitigation",
"Tracing Fake-News Footprints: Characterizing Social Media Messages by How They Propagate",
"A Literature Study on Privacy Patterns Research"
] |
[
"Studying Fake News via Network Analysis: Detection and Mitigation",
"Echo Chambers: Emotional Contagion and Group Polarization on Facebook",
"The Missing Piece in Complex Analytics: Low Latency, Scalable Model Management and Serving with Velox"
] |
[
"Studying Fake News via Network Analysis: Detection and Mitigation",
"LINE: Large-scale Information Network Embedding",
"Load balancing in 5G cloud radio access networks supporting IoT communications for smart communities"
] |
[
"Mitigating the Attraction Effect with Visualizations",
"Explaining the “ Identifiable Victim Effect ”",
"The Framing of Decisions and the Psychology of Choice"
] |
[
"Mitigating the Attraction Effect with Visualizations",
"WeightLifter: Visual Weight Space Exploration for Multi-Criteria Decision Making",
"A survey of grammatical inference in software engineering"
] |
[
"Mitigating the Attraction Effect with Visualizations",
"Explaining the “ Identifiable Victim Effect ”",
"Blood flow restricted and traditional resistance training performed to fatigue produce equal muscle hypertrophy"
] |
[
"Mitigating the Attraction Effect with Visualizations",
"Confirmation Bias: A Ubiquitous Phenomenon in Many Guises",
"how does mindfulness meditation work ? proposing mechanisms of action from a conceptual and neural perspective ."
] |
[
"Mitigating the Attraction Effect with Visualizations",
"WeightLifter: Visual Weight Space Exploration for Multi-Criteria Decision Making",
"Can distributed software development be agile?"
] |
[
"Head-and-face shape variations of U.S. civilian workers",
"Analysis of segmented human body scans",
"Eigenfaces for Recognition"
] |
[
"Head-and-face shape variations of U.S. civilian workers",
"A comparison between Chinese and Caucasian head shapes.",
"Low-Voltage Low-Power CMOS Oscillator with Low Temperature and Process Sensitivity"
] |
[
"Head-and-face shape variations of U.S. civilian workers",
"A comparison between Chinese and Caucasian head shapes.",
"A Steady-State Evolutionary Algorithm for Building Collaborative Learning Teams in Educational Environments Considering the Understanding Levels and Interest Levels of the Students."
] |
[
"Head-and-face shape variations of U.S. civilian workers",
"The space of human body shapes: reconstruction and parameterization from range scans",
"Supraclavicular Artery Flap"
] |
[
"Head-and-face shape variations of U.S. civilian workers",
"Digital 3-D headforms with facial features representative of the current US workforce",
"skeleton pruning by contour approximation and the integer medial axis transform ."
] |
[
"Morphological features help POS tagging of unknown words across language varieties",
"Building A Large Annotated Corpus Of English: The Penn Treebank",
"Question Answering from Frequently Asked Question Files: Experiences with the FAQ FINDER System"
] |
[
"Morphological features help POS tagging of unknown words across language varieties",
"Maximum Entropy Markov Models for Information Extraction and Segmentation",
"A Beam-Steering Reconfigurable Antenna for WLAN Applications"
] |
[
"Morphological features help POS tagging of unknown words across language varieties",
"A Maximum Entropy Model For Part-Of-Speech Tagging",
"NADPH oxidase links endoplasmic reticulum stress, oxidative stress, and PKR activation to induce apoptosis"
] |
[
"Morphological features help POS tagging of unknown words across language varieties",
"Maximum Entropy Markov Models for Information Extraction and Segmentation",
"Gradient-learned Models for Stereo Matching CS 231 A Project Final Report"
] |
[
"Morphological features help POS tagging of unknown words across language varieties",
"Maximum Entropy Markov Models for Information Extraction and Segmentation",
"The toxicity of silver to soil organisms exposed to silver nanoparticles and silver nitrate in biosolids-amended field soil"
] |
[
"The Web Engineering Security (WES) Methodology",
"INFORMATION SYSTEMS EPISTEMOLOGY: AN HISTORICAL PERSPECTIVE",
"contextualist research and the study of organizational change processes1 ."
] |
[
"The Web Engineering Security (WES) Methodology",
"Extreme Programming Explained: Embrace Change",
"The critical period hypothesis revisited"
] |
[
"The Web Engineering Security (WES) Methodology",
"INFORMATION SYSTEMS EPISTEMOLOGY: AN HISTORICAL PERSPECTIVE",
"Security testing for chatbots"
] |
[
"The Web Engineering Security (WES) Methodology",
"Principles of survey research part 2: designing a survey",
"Variable resolution SAR ADC architecture with 99.6% reduction in switching energy over conventional scheme"
] |
[
"The Web Engineering Security (WES) Methodology",
"Extreme Programming Explained: Embrace Change",
"User acceptance of a G2B system: a case of electronic procurement system in Malaysia"
] |
[
"Suitability of a Consensual Fuzzy Inference System to Evaluate Suppliers of Strategic Products",
"Understanding supply chain management: critical research and a theoretical framework",
"Enterprise logistics and supply chain structure: the role of fit"
] |
[
"Suitability of a Consensual Fuzzy Inference System to Evaluate Suppliers of Strategic Products",
"Supplier Selection Criteria and Methods in Supply Chains: A Review",
"A survey on question answering technology from an information retrieval perspective"
] |
[
"Suitability of a Consensual Fuzzy Inference System to Evaluate Suppliers of Strategic Products",
"A multi-variable approach to supplier segmentation",
"UWB Bandpass Filter Using Cascaded Miniature High-Pass and Low-Pass Filters With Multilayer Liquid Crystal Polymer Technology"
] |
[
"Suitability of a Consensual Fuzzy Inference System to Evaluate Suppliers of Strategic Products",
"A multi-variable approach to supplier segmentation",
"Prediction of workflow execution time using provenance traces: Practical applications in medical data processing"
] |
[
"Suitability of a Consensual Fuzzy Inference System to Evaluate Suppliers of Strategic Products",
"Supplier Selection Criteria and Methods in Supply Chains: A Review",
"Fast Computation of Wasserstein Barycenters"
] |
[
"Automated Image Annotation based on YOLOv3",
"Early Detection of Sudden Pedestrian Crossing for Safe Driving During Summer Nights",
"Fast Feature Pyramids for Object Detection"
] |
[
"Automated Image Annotation based on YOLOv3",
"Early Detection of Sudden Pedestrian Crossing for Safe Driving During Summer Nights",
"LipNet: Sentence-level Lipreading"
] |
[
"Automated Image Annotation based on YOLOv3",
"Pedestrian detection in thermal images using adaptive fuzzy C-means clustering and convolutional neural networks",
"SIMO PPM optical wireless communication system over gamma turbulence channels with generalized pointing errors"
] |
[
"Automated Image Annotation based on YOLOv3",
"Pedestrian Detection at Day/Night Time with Visible and FIR Cameras: A Comparison",
"Forecasting Fraudulent Financial Statements using Data Mining"
] |
[
"Automated Image Annotation based on YOLOv3",
"Pedestrian Detection with Semantic Regions of Interest",
"Graph Isomorphism in Quasipolynomial Time"
] |
[
"Explicit Modelling of the Implicit Short Term User Preferences for Music Recommendation",
"Content-Aware Collaborative Music Recommendation Using Pre-trained Neural Networks",
"Factorization Machines with libFM"
] |
[
"Explicit Modelling of the Implicit Short Term User Preferences for Music Recommendation",
"Content-Aware Collaborative Music Recommendation Using Pre-trained Neural Networks",
"Modeling requirements for an Emergency Medical Service system design evaluator"
] |
[
"Explicit Modelling of the Implicit Short Term User Preferences for Music Recommendation",
"Session-based Recommendations with Recurrent Neural Networks",
"A 50-GHz Phase-Locked Loop in 0.13-$\\mu$ m CMOS"
] |
[
"Explicit Modelling of the Implicit Short Term User Preferences for Music Recommendation",
"Session-based Recommendations with Recurrent Neural Networks",
"HMM-Based Defect Localization in Wire Ropes --- A New Approach to Unusual Subsequence Recognition"
] |
[
"Explicit Modelling of the Implicit Short Term User Preferences for Music Recommendation",
"Improving Music Recommendation in Session-Based Collaborative Filtering by Using Temporal Context",
"High Dimensional Human Guided Machine Learning"
] |
[
"Cloud security ecosystem for data security and privacy",
"cloudsim : a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms .",
"enabling public verifiability and data dynamics for storage security ."
] |
[
"Cloud security ecosystem for data security and privacy",
"A survey on security issues in service delivery models of cloud computing",
"Enabling User-Policy-Confined VM Migration in Trusted Cloud Computing"
] |
[
"Cloud security ecosystem for data security and privacy",
"cloudsim : a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms .",
"PARAID: A gear-shifting power-aware RAID"
] |
[
"Cloud security ecosystem for data security and privacy",
"PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING",
"Simplification and Repair of Polygonal Models Using Volumetric Techniques"
] |
[
"Cloud security ecosystem for data security and privacy",
"PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING",
"Modeling, simulation and control of single actuator magnetic levitation system"
] |
[
"Rules and Ontology Based Data Access",
"The DL-Lite Family and Relations",
"Making prolog more expressive"
] |
[
"Rules and Ontology Based Data Access",
"On the relation between SPARQL1.1 and Answer Set Programming",
"External Mechanical Devices and Vascular Surgery for Erectile Dysfunction."
] |
[
"Rules and Ontology Based Data Access",
"linking data to ontologies .",
"Orthogonal polynomials for complex Gaussian processes"
] |
[
"Rules and Ontology Based Data Access",
"linking data to ontologies .",
"Chic or Social: Visual Popularity Analysis in Online Fashion Networks"
] |
[
"Rules and Ontology Based Data Access",
"Efficient SPARQL-to-SQL with R2RML mappings",
"ESC Guidelines on the diagnosis and management of acute pulmonary embolism"
] |
[
"A multi-agent approach for dynamic production and distribution scheduling",
"Vehicle Routing Problem with Time Windows, Part II: Metaheuristics",
"Ant Algorithms for Discrete Optimization"
] |
[
"A multi-agent approach for dynamic production and distribution scheduling",
"Vehicle Routing Problem with Time Windows, Part II: Metaheuristics",
"data mining in education sector : a review ."
] |
[
"A multi-agent approach for dynamic production and distribution scheduling",
"Vehicle Routing Problem with Time Windows, Part II: Metaheuristics",
"Work climate and the mediating role of workplace bullying related to job performance, job satisfaction, and work ability: A study among hospital nurses"
] |
[
"A multi-agent approach for dynamic production and distribution scheduling",
"Vehicle Routing Problem with Time Windows, Part II: Metaheuristics",
"Social Media Technology and Government Transparency"
] |
[
"A multi-agent approach for dynamic production and distribution scheduling",
"adaptation in natural and artificial systems .",
"LUNG SEGMENTATIONINPULMONARY CTIMAGESUSINGWAVELETTRANSFORM"
] |
[
"an architecture for and fast and general data processing on large clusters .",
"MapReduce: simplified data processing on large clusters",
"resilient distributed datasets : a fault - tolerant abstraction for in - memory cluster computing ."
] |
[
"an architecture for and fast and general data processing on large clusters .",
"Calvin: fast distributed transactions for partitioned database systems",
"An Empirical Investigation of the Antecedents and Consequences of Privacy Uncertainty in the Context of Mobile Apps"
] |
[
"an architecture for and fast and general data processing on large clusters .",
"MillWheel: Fault-Tolerant Stream Processing at Internet Scale",
"Analysing and presenting qualitative data"
] |
[
"an architecture for and fast and general data processing on large clusters .",
"Shark: SQL and rich analytics at scale",
"Practical Backscatter Communication Systems for Battery-Free Internet of Things: A Tutorial and Survey of Recent Research"
] |
[
"an architecture for and fast and general data processing on large clusters .",
"Calvin: fast distributed transactions for partitioned database systems",
"Monitoring head/eye motion for driver alertness with one camera"
] |
[
"Trends in the exploitation of novel drug targets",
"DrugBank 3.0: a comprehensive resource for ‘Omics’ research on drugs",
"PubChem: a public information system for analyzing bioactivities of small molecules"
] |
[
"Trends in the exploitation of novel drug targets",
"DrugBank 3.0: a comprehensive resource for ‘Omics’ research on drugs",
"A Fast Clustering Algorithm for VANETs"
] |
[
"Trends in the exploitation of novel drug targets",
"DrugBank 3.0: a comprehensive resource for ‘Omics’ research on drugs",
"Understanding and Mapping Natural Beauty"
] |
[
"Trends in the exploitation of novel drug targets",
"DrugBank 3.0: a comprehensive resource for ‘Omics’ research on drugs",
"Dirty paper coding vs. TDMA for MIMO broadcast channels"
] |
[
"Trends in the exploitation of novel drug targets",
"DrugBank 3.0: a comprehensive resource for ‘Omics’ research on drugs",
"Learning Entity Types from Query Logs via Graph-Based Modeling"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.