set list |
|---|
[
"Big Data: Understanding Big Data",
"Toward Scalable Systems for Big Data Analytics: A Technology Tutorial",
"Service-Generated Big Data and Big Data-as-a-Service: An Overview"
] |
[
"Big Data: Understanding Big Data",
"Hive - A Warehousing Solution Over a Map-Reduce Framework",
"Secure multiparty computation for privacy preserving data mining"
] |
[
"Big Data: Understanding Big Data",
"Web-based collaborative big data analytics on big data as a service platform",
"Low-Profile Narrow-Frame Antenna for Seven-Band WWAN/LTE Smartphone Applications"
] |
[
"Big Data: Understanding Big Data",
"Data management in cloud environments: NoSQL and NewSQL data stores",
"A training algorithm for optimal margin classifiers"
] |
[
"Big Data: Understanding Big Data",
"Challenges for MapReduce in Big Data",
"A Solar Power Generation System with a Seven-Level Inverter"
] |
[
"A Study of Age and Gender seen through Mobile Phone Usage Patterns in Mexico",
"A dual coordinate descent method for large-scale linear SVM",
"A randomized algorithm for principal component analysis"
] |
[
"A Study of Age and Gender seen through Mobile Phone Usage Patterns in Mexico",
"Experimental and Quasi-Experimental Designs for Generalized Causal Inference",
"Orthodontics in 3 millennia. Chapter 11: the golden age of orthodontics."
] |
[
"A Study of Age and Gender seen through Mobile Phone Usage Patterns in Mexico",
"A dual coordinate descent method for large-scale linear SVM",
"Instruments for the evaluation of motor abilities for children with severe multiple disabilities: A systematic review of the literature"
] |
[
"A Study of Age and Gender seen through Mobile Phone Usage Patterns in Mexico",
"Experimental and Quasi-Experimental Designs for Generalized Causal Inference",
"Convolutional Neural Networks-Based MRI Image Analysis for the Alzheimer’s Disease Prediction From Mild Cognitive Impairment"
] |
[
"A Study of Age and Gender seen through Mobile Phone Usage Patterns in Mexico",
"BIRDS OF A FEATHER : Homophily in Social Networks",
"Effect of Motor Control Exercises Versus Graded Activity in Patients With Chronic Nonspecific Low Back Pain: A Randomized Controlled Trial"
] |
[
"non - structural case marking in tibeto - burman and artificial languages * .",
"Language production : Grammatical encoding",
"Word and World Order: Semantic, Phonological, and Metrical Determinants of Serial Position"
] |
[
"non - structural case marking in tibeto - burman and artificial languages * .",
"Language production : Grammatical encoding",
"Energy-Optimal Mobile Cloud Computing under Stochastic Wireless Channel"
] |
[
"non - structural case marking in tibeto - burman and artificial languages * .",
"Language production : Grammatical encoding",
"Mechanical design and basic analysis of a modular robot with special climbing and manipulation functions"
] |
[
"non - structural case marking in tibeto - burman and artificial languages * .",
"Foundations of Language: Brain, Meaning, Grammar, Evolution",
"Prevalence and Risk Factors of Hypertension in Myanmar: A Systematic Review and Meta-Analysis"
] |
[
"non - structural case marking in tibeto - burman and artificial languages * .",
"Foundations of Language: Brain, Meaning, Grammar, Evolution",
"A Security approach for Data Migration in Cloud Computing"
] |
[
"Towards ubiquitous human gestures recognition using wireless networks",
"WiFinger: leveraging commodity WiFi for fine-grained finger gesture recognition",
"visual tracking of high dof articulated structures : an application to human hand tracking ."
] |
[
"Towards ubiquitous human gestures recognition using wireless networks",
"Whole-home gesture recognition using wireless signals",
"Circular array of wideband 3D Vivaldi antennas"
] |
[
"Towards ubiquitous human gestures recognition using wireless networks",
"Bringing gesture recognition to all devices",
"Community detection in weighted networks: Algorithms and applications"
] |
[
"Towards ubiquitous human gestures recognition using wireless networks",
"Avoiding multipath to revive inbuilding WiFi localization",
"evaluation of wavelet - based algorithm for printed circuit board ( pcb ) inspection ."
] |
[
"Towards ubiquitous human gestures recognition using wireless networks",
"Bringing gesture recognition to all devices",
"Structured Text simulator for PLC in learning environment"
] |
[
"Adversarial Feedback Loop",
"Feedback Networks",
"Edge Boxes: Locating Object Proposals from Edges"
] |
[
"Adversarial Feedback Loop",
"Feedback Networks",
"Phylogenetic Inference of Colony Isolates Comprising Seasonal Microcystis Blooms in Lake Taihu, China"
] |
[
"Adversarial Feedback Loop",
"Human Pose Estimation with Iterative Error Feedback",
"Orchestrating nuclear envelope disassembly and reassembly during mitosis"
] |
[
"Adversarial Feedback Loop",
"ESRGAN: Enhanced Super-Resolution Generative Adversarial Networks",
"Adversarial Sampling for Active Learning"
] |
[
"Adversarial Feedback Loop",
"Deep Learning Face Attributes in the Wild",
"How much does industry matter, really"
] |
[
"Microphone Array Driven Speech Recognition: Influence of Localization on the Word Error Rate",
"Robust time delay estimation exploiting redundancy among multiple microphones",
"Recognition by Linear Combinations of Models"
] |
[
"Microphone Array Driven Speech Recognition: Influence of Localization on the Word Error Rate",
"CONDENSATION—Conditional Density Propagation for Visual Tracking",
"Simultaneous High Sensitivity Sensing of Temperature and Humidity with Graphene Woven Fabrics"
] |
[
"Microphone Array Driven Speech Recognition: Influence of Localization on the Word Error Rate",
"Robust time delay estimation exploiting redundancy among multiple microphones",
"A global approach to automatic solution of jigsaw puzzles"
] |
[
"Microphone Array Driven Speech Recognition: Influence of Localization on the Word Error Rate",
"Robust time delay estimation exploiting redundancy among multiple microphones",
"Temporal Segment Networks for Action Recognition in Videos"
] |
[
"Microphone Array Driven Speech Recognition: Influence of Localization on the Word Error Rate",
"CONDENSATION—Conditional Density Propagation for Visual Tracking",
"Deep Feature Learning via Structured Graph Laplacian Embedding for Person Re-Identification"
] |
[
"Extraction of synonyms and semantically related words from chat logs",
"Exploring patterns in dictionary definitions for synonym extraction",
"Semantic distance in WordNet: An experimental, application-oriented evaluation of five measures"
] |
[
"Extraction of synonyms and semantically related words from chat logs",
"Extracting Synonyms from Dictionary Definitions",
"Feature-Rich Named Entity Recognition for Bulgarian Using Conditional Random Fields"
] |
[
"Extraction of synonyms and semantically related words from chat logs",
"An introduction to random indexing",
"Elliptic Curve Cryptosystems"
] |
[
"Extraction of synonyms and semantically related words from chat logs",
"resource lean and portable automatic text summarization .",
"Garment perception and its folding using a dual-arm robot"
] |
[
"Extraction of synonyms and semantically related words from chat logs",
"An introduction to random indexing",
"Metric Learning and Manifolds Metric Learning and Manifolds : Preserving the Intrinsic Geometry"
] |
[
"Duration and Interval Hidden Markov Model for sequential data analysis",
"Dynamic Bayesian Networks: Representation, Inference and Learning",
"Predicting cardiovascular disease from real-time electrocardiographic monitoring: An adaptive machine learning approach on a cell phone"
] |
[
"Duration and Interval Hidden Markov Model for sequential data analysis",
"Dynamic Bayesian Networks: Representation, Inference and Learning",
"Reliable privacy-preserving communications for wireless ad hoc networks"
] |
[
"Duration and Interval Hidden Markov Model for sequential data analysis",
"Data Mining for Wearable Sensors in Health Monitoring Systems: A Review of Recent Trends and Challenges",
"Performance evaluation of a robot-assisted catheter operating system with haptic feedback"
] |
[
"Duration and Interval Hidden Markov Model for sequential data analysis",
"Data Mining for Wearable Sensors in Health Monitoring Systems: A Review of Recent Trends and Challenges",
"An improved short questionnaire for the measurement of extraversion and neuroticism"
] |
[
"Duration and Interval Hidden Markov Model for sequential data analysis",
"Data Mining for Wearable Sensors in Health Monitoring Systems: A Review of Recent Trends and Challenges",
"Impact of the Interdecadal Pacific Oscillation on Tropical Cyclone Activity in the North Atlantic and Eastern North Pacific"
] |
[
"Stacked patch array in LTCC for 28 GHz antenna-in-package applications",
"A Multilayer LTCC Solution for Integrating 5G Access Point Antenna Modules",
"Via-fence antennas on LTCC for radar applications at 122 GHz"
] |
[
"Stacked patch array in LTCC for 28 GHz antenna-in-package applications",
"A wideband array of stacked patch antennas using embedded air cavities in LTCC",
"Automatic image annotation by incorporating feature hierarchy and boosting to scale up SVM classifiers"
] |
[
"Stacked patch array in LTCC for 28 GHz antenna-in-package applications",
"Massive MIMO Design for 5G Networks: An Overview on Alternative Antenna Configurations and Channel Model Challenges",
"Full 3D reconstruction of transparent objects"
] |
[
"Stacked patch array in LTCC for 28 GHz antenna-in-package applications",
"24-Element Antenna-in-Package for Stationary 60-GHz Communication Scenarios",
"The development of DRUM: A software tool for video-assisted usability evaluation"
] |
[
"Stacked patch array in LTCC for 28 GHz antenna-in-package applications",
"Massive MIMO Design for 5G Networks: An Overview on Alternative Antenna Configurations and Channel Model Challenges",
"A Scalable and Adaptive Method for Finding Semantically Equivalent Cue Words of Uncertainty"
] |
[
"Combining Concurrent Think-Aloud Protocols and Eye-Tracking Observations: An Analysis of Verbalizations and Silences",
"Think-aloud protocols: a comparison of three think-aloud protocols for use in testing data-dissemination web sites for usability",
"Development of an instrument measuring user satisfaction of... |
[
"Combining Concurrent Think-Aloud Protocols and Eye-Tracking Observations: An Analysis of Verbalizations and Silences",
"Think-aloud protocols: a comparison of three think-aloud protocols for use in testing data-dissemination web sites for usability",
"Metrorrhagia in a child with an endodermal sinus tumor of t... |
[
"Combining Concurrent Think-Aloud Protocols and Eye-Tracking Observations: An Analysis of Verbalizations and Silences",
"Think-aloud protocols: a comparison of three think-aloud protocols for use in testing data-dissemination web sites for usability",
"1 Should Payment Card Issuers Reissue Cards in Response to ... |
[
"Combining Concurrent Think-Aloud Protocols and Eye-Tracking Observations: An Analysis of Verbalizations and Silences",
"Think-aloud protocols: a comparison of three think-aloud protocols for use in testing data-dissemination web sites for usability",
"Reactive high-level behavior synthesis for an Atlas humanoi... |
[
"Combining Concurrent Think-Aloud Protocols and Eye-Tracking Observations: An Analysis of Verbalizations and Silences",
"Think-aloud protocols: a comparison of three think-aloud protocols for use in testing data-dissemination web sites for usability",
"Learning Depth with Convolutional Spatial Propagation Netwo... |
[
"Pattern analysis in stock markets optimized by genetic algorithms using modified SAX",
"a novel bit level time series representation with implication of similarity search and clustering .",
"Using Dynamic Time Warping to Find Patterns in Time Series"
] |
[
"Pattern analysis in stock markets optimized by genetic algorithms using modified SAX",
"a novel bit level time series representation with implication of similarity search and clustering .",
"Optical character recognition using template matching and back propagation algorithm"
] |
[
"Pattern analysis in stock markets optimized by genetic algorithms using modified SAX",
"A Bit Level Representation for Time Series Data Mining with Shape Based Similarity",
"la resolvante de lagrange et ses applications ."
] |
[
"Pattern analysis in stock markets optimized by genetic algorithms using modified SAX",
"Stock market trading rule discovery using pattern recognition and technical analysis",
"Gender Equality in Academia: Bad News from the Trenches, and Some Possible Solutions"
] |
[
"Pattern analysis in stock markets optimized by genetic algorithms using modified SAX",
"Stock market trading rule discovery using pattern recognition and technical analysis",
"Biomass Energy Technological Paradigm (BETP): Trends in This Sector"
] |
[
"Dividing and Aggregating Network for Multi-view Action Recognition",
"Structured Feature Learning for Pose Estimation",
"Theano: new features and speed improvements"
] |
[
"Dividing and Aggregating Network for Multi-view Action Recognition",
"Human Action Recognition Using Factorized Spatio-Temporal Convolutional Networks",
"A Pacific Culture among Wild Baboons: Its Emergence and Transmission"
] |
[
"Dividing and Aggregating Network for Multi-view Action Recognition",
"Tensor-Train Recurrent Neural Networks for Video Classification",
"Comparison of the Effects of Quetiapine XR and Lithium Monotherapy on Actigraphy-Measured Circadian Parameters in Patients With Bipolar II Depression"
] |
[
"Dividing and Aggregating Network for Multi-view Action Recognition",
"Tensor-Train Recurrent Neural Networks for Video Classification",
"Extending IEEE 1588 to fault tolerant clock synchronization"
] |
[
"Dividing and Aggregating Network for Multi-view Action Recognition",
"Structured Feature Learning for Pose Estimation",
"Phase contrast cine magnetic resonance imaging."
] |
[
"Building Hardware Components for Memory Protection of Applications on a Tiny Processor",
"TrustLite: a security architecture for tiny embedded devices",
"Stitching the gadgets: on the ineffectiveness of coarse-grained control-flow integrity protection"
] |
[
"Building Hardware Components for Memory Protection of Applications on a Tiny Processor",
"Using CoreSight PTM to Integrate CRA Monitoring IPs in an ARM-Based SoC",
"X-band 11.7-W, 29-dB gain, 42% PAE three-stage pHEMT MMIC power amplifier"
] |
[
"Building Hardware Components for Memory Protection of Applications on a Tiny Processor",
"TrustLite: a security architecture for tiny embedded devices",
"Oxytosis/Ferroptosis—(Re-) Emerging Roles for Oxidative Stress-Dependent Non-apoptotic Cell Death in Diseases of the Central Nervous System"
] |
[
"Building Hardware Components for Memory Protection of Applications on a Tiny Processor",
"Using CoreSight PTM to Integrate CRA Monitoring IPs in an ARM-Based SoC",
"Lipid droplet-associated proteins in atherosclerosis (Review)"
] |
[
"Building Hardware Components for Memory Protection of Applications on a Tiny Processor",
"TrustLite: a security architecture for tiny embedded devices",
"Property-based attestation for computing platforms: caring about properties, not mechanisms"
] |
[
"the impact of social media on children , adolescents , and families .",
"Different types of Internet use, depression, and social anxiety : the role of perceived friendship quality",
"Constructing sexuality and identity in an online teen chat room"
] |
[
"the impact of social media on children , adolescents , and families .",
"How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occurs",
"Multi-Graph Matching via Affinity Optimization with Graduated Consistency Regularization"
] |
[
"the impact of social media on children , adolescents , and families .",
"Healthcare via Cell Phones: A Systematic Review",
"Applicability of the 5S management method for quality improvement in health-care facilities: a review"
] |
[
"the impact of social media on children , adolescents , and families .",
"A privacy paradox: Social networking in the United States",
"Combined Top-Down/Bottom-Up Segmentation"
] |
[
"the impact of social media on children , adolescents , and families .",
"How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occurs",
"Application of Computer Vision to Crack Detection of Concrete Structure"
] |
[
"A framework for focused linked data crawler using context graphs",
"Breadth-first crawling yields high-quality pages",
"Mercator: A scalable, extensible Web crawler"
] |
[
"A framework for focused linked data crawler using context graphs",
"Towards Dataset Dynamics: Change Frequency of Linked Open Data Sources",
"Robust detection of non-motorized road users using deep learning on optical and LIDAR data"
] |
[
"A framework for focused linked data crawler using context graphs",
"Sindice.com: A document-oriented lookup index for open linked data",
"Seeing the forest when entry is unlikely: Probability and the mental representation of events"
] |
[
"A framework for focused linked data crawler using context graphs",
"Breadth-first crawling yields high-quality pages",
"Medical decision support system for diagnosis of neuromuscular disorders using DWT and fuzzy support vector machines"
] |
[
"A framework for focused linked data crawler using context graphs",
"Sindice.com: A document-oriented lookup index for open linked data",
"Graph-Regularized Saliency Detection With Convex-Hull-Based Center Prior"
] |
[
"Overview of the Multiview and 3D Extensions of High Efficiency Video Coding",
"Overview of the Stereo and Multiview Video Coding Extensions of the H.264/MPEG-4 AVC Standard",
"Efficient Prediction Structures for Multiview Video Coding"
] |
[
"Overview of the Multiview and 3D Extensions of High Efficiency Video Coding",
"3D High-Efficiency Video Coding for Multi-View Video and Depth Data",
"The AI Rebellion: Changing the Narrative."
] |
[
"Overview of the Multiview and 3D Extensions of High Efficiency Video Coding",
"State of the Art in Stereoscopic and Autostereoscopic Displays",
"The FrameNet Constructicon"
] |
[
"Overview of the Multiview and 3D Extensions of High Efficiency Video Coding",
"3D High-Efficiency Video Coding for Multi-View Video and Depth Data",
"Wireless-control strategy for parallel operation of distributed generation inverters"
] |
[
"Overview of the Multiview and 3D Extensions of High Efficiency Video Coding",
"3D High-Efficiency Video Coding for Multi-View Video and Depth Data",
"examination of the relevance of personal selling in marketing activities : a descriptive method ."
] |
[
"A performance study of BitTorrent-like peer-to-peer systems",
"dissecting bittorrent : five months in a torrent ' s lifetime .",
"The Sybil Attack"
] |
[
"A performance study of BitTorrent-like peer-to-peer systems",
"dissecting bittorrent : five months in a torrent ' s lifetime .",
"A Novel Embedding Method for Information Diffusion Prediction in Social Network Big Data"
] |
[
"A performance study of BitTorrent-like peer-to-peer systems",
"The Eigentrust algorithm for reputation management in P2P networks",
"Event-based social networks: linking the online and offline social worlds"
] |
[
"A performance study of BitTorrent-like peer-to-peer systems",
"dissecting bittorrent : five months in a torrent ' s lifetime .",
"Proposed embedded security framework for Internet of Things (IoT)"
] |
[
"A performance study of BitTorrent-like peer-to-peer systems",
"dissecting bittorrent : five months in a torrent ' s lifetime .",
"A Proposal for Semantic Map Representation and Evaluation"
] |
[
"BCTrust: A decentralized authentication blockchain-based mechanism",
"A method for obtaining digital signatures and public-key cryptosystems",
"TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks"
] |
[
"BCTrust: A decentralized authentication blockchain-based mechanism",
"DTLS based security and two-way authentication for the Internet of Things",
"Design of broadband circularly polarized horn antenna using an L-shaped probe"
] |
[
"BCTrust: A decentralized authentication blockchain-based mechanism",
"The Elliptic Curve Digital Signature Algorithm (ECDSA)",
"A first look at user activity on tinder"
] |
[
"BCTrust: A decentralized authentication blockchain-based mechanism",
"Secure and Authenticated Data Communication in Wireless Sensor Networks",
"C4.5, Class Imbalance, and Cost Sensitivity: Why Under-Sampling beats Over-Sampling"
] |
[
"BCTrust: A decentralized authentication blockchain-based mechanism",
"The Elliptic Curve Digital Signature Algorithm (ECDSA)",
"Changing What You See by Changing What You Know: The Role of Attention"
] |
[
"Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications",
"I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks",
"How unique is your web browser"
] |
[
"Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications",
"I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks",
"Fuzzy C-Means for Fraud Detection in Large Transaction Data Sets"
] |
[
"Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications",
"No Escape From Reality: Security and Privacy of Augmented Reality Browsers",
"Biocompatibility of two novel root repair materials."
] |
[
"Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications",
"No Escape From Reality: Security and Privacy of Augmented Reality Browsers",
"Comparison of laser beam propagation at 785 nm and 1550 nm in fog and haze for optical wireless communications"
] |
[
"Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications",
"I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks",
"Studying Complex Adaptive Systems"
] |
[
"Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling Debugging",
"The design and implementation of Zap: a system for migrating computing environments",
"ATOM: a system for building customized program analysis tools"
] |
[
"Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling Debugging",
"Jockey: a user-space library for record-replay debugging",
"Graph-based Knowledge Representation: Computational Foundations of Conceptual Graphs"
] |
[
"Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling Debugging",
"Jockey: a user-space library for record-replay debugging",
"Accurate recognition of words in scenes without character segmentation using recurrent neural network"
] |
[
"Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling Debugging",
"Jockey: a user-space library for record-replay debugging",
"Black-box testing using flowgraphs: an experimental assessment of effectiveness and automation potential"
] |
[
"Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling Debugging",
"Jockey: a user-space library for record-replay debugging",
"Detecting Stress Based on Social Interactions in Social Networks"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.