set
sequence |
---|
[
"HydraDB: a resilient RDMA-driven key-value middleware for in-memory cluster computing",
"Cache craftiness for fast multicore key-value storage",
"A practical concurrent binary search tree"
] |
[
"HydraDB: a resilient RDMA-driven key-value middleware for in-memory cluster computing",
"Benchmarking cloud serving systems with YCSB",
"Bottom-Up and Top-Down Attention for Image Captioning and Visual Question Answering"
] |
[
"HydraDB: a resilient RDMA-driven key-value middleware for in-memory cluster computing",
"MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing",
"Deep Spatiality: Unsupervised Learning of Spatially-Enhanced Global and Local 3D Features by Deep Neural Network With Coupled Softmax"
] |
[
"HydraDB: a resilient RDMA-driven key-value middleware for in-memory cluster computing",
"Fast crash recovery in RAMCloud",
"A technique for dynamic updating of Java software"
] |
[
"HydraDB: a resilient RDMA-driven key-value middleware for in-memory cluster computing",
"Fast crash recovery in RAMCloud",
"Preserving privacy by de-identifying facial images"
] |
[
"Evaluation of Keypoint Extraction and Matching for Pose Estimation Using Pairs of Spherical Images",
"SUSAN—A New Approach to Low Level Image Processing",
"3D Scene Reconstruction from Multiple Spherical Stereo Pairs"
] |
[
"Evaluation of Keypoint Extraction and Matching for Pose Estimation Using Pairs of Spherical Images",
"A comparative evaluation of 3D keypoint detectors in a RGB-D Object Dataset",
"NetCache: Balancing Key-Value Stores with Fast In-Network Caching"
] |
[
"Evaluation of Keypoint Extraction and Matching for Pose Estimation Using Pairs of Spherical Images",
"SUSAN—A New Approach to Low Level Image Processing",
"Salivary gland scintigraphy using technetium-99m-pertechnetate after autotransplantation of the submandibular salivary gland in the correction of dry eye"
] |
[
"Evaluation of Keypoint Extraction and Matching for Pose Estimation Using Pairs of Spherical Images",
"SUSAN—A New Approach to Low Level Image Processing",
"Running Head : Letting Structure Emerge Letting Structure Emerge : Connectionist and Dynamical Systems Approaches to Understanding Cognition"
] |
[
"Evaluation of Keypoint Extraction and Matching for Pose Estimation Using Pairs of Spherical Images",
"Robust relative pose estimation with integrated cheirality constraint",
"ML for the Working Programmer"
] |
[
"Position-Aligned translation model for citation recommendation",
"Improving Text Segmentation Using Latent Semantic Analysis: A Reanalysis of Choi, Wiemer-Hastings, and Moore (2001)",
"The mathematics of statistical machine translation: Parameter estimation"
] |
[
"Position-Aligned translation model for citation recommendation",
"Cross-lingual relevance models",
"SeqViews2SeqLabels: Learning 3D Global Features via Aggregating Sequential Views by RNN With Attention"
] |
[
"Position-Aligned translation model for citation recommendation",
"Cross-lingual relevance models",
"2D-3D Pose Consistency-based Conditional Random Fields for 3D Human Pose Estimation"
] |
[
"Position-Aligned translation model for citation recommendation",
"Improving Text Segmentation Using Latent Semantic Analysis: A Reanalysis of Choi, Wiemer-Hastings, and Moore (2001)",
"Robust Textual Inference Via Graph Matching"
] |
[
"Position-Aligned translation model for citation recommendation",
"Cross-lingual relevance models",
"Domain Adaptation of Conditional Probability Models via Feature Subsetting"
] |
[
"Customisation of Paillier homomorphic encryption for efficient binary biometric feature vector matching",
"A survey on biometric cryptosystems and cancelable biometrics",
"A Human Identification Technique Using Images of the Iris and Wavelet Transform"
] |
[
"Customisation of Paillier homomorphic encryption for efficient binary biometric feature vector matching",
"Public-Key Cryptosystems Based on Composite Degree Residuosity Classes",
"On-line personalization of a touch screen based keyboard"
] |
[
"Customisation of Paillier homomorphic encryption for efficient binary biometric feature vector matching",
"A survey on biometric cryptosystems and cancelable biometrics",
"The Impact of Diversity on Online Ensemble Learning in the Presence of Concept Drift"
] |
[
"Customisation of Paillier homomorphic encryption for efficient binary biometric feature vector matching",
"A survey on biometric cryptosystems and cancelable biometrics",
"Collaborative Filtering with Implicit Feedbacks by Discounting Positive Feedbacks"
] |
[
"Customisation of Paillier homomorphic encryption for efficient binary biometric feature vector matching",
"A survey on biometric cryptosystems and cancelable biometrics",
"10 Origami Model for Breathing Alveoli"
] |
[
"Guidance for the evaluation and treatment of hereditary and acquired thrombophilia",
"Risk assessment of recurrence in patients with unprovoked deep vein thrombosis or pulmonary embolism: the Vienna prediction model.",
"Improvements on Cross-Validation: The 632+ Bootstrap Method"
] |
[
"Guidance for the evaluation and treatment of hereditary and acquired thrombophilia",
"Risk assessment of recurrence in patients with unprovoked deep vein thrombosis or pulmonary embolism: the Vienna prediction model.",
"Design and Performance Evaluation of Image Processing Algorithms on GPUs"
] |
[
"Guidance for the evaluation and treatment of hereditary and acquired thrombophilia",
"Risk assessment of recurrence in patients with unprovoked deep vein thrombosis or pulmonary embolism: the Vienna prediction model.",
"Optimal operational strategy for hybrid renewable energy system using genetic algorithms"
] |
[
"Guidance for the evaluation and treatment of hereditary and acquired thrombophilia",
"Risk assessment of recurrence in patients with unprovoked deep vein thrombosis or pulmonary embolism: the Vienna prediction model.",
"the critical period for language acquisition and the deaf child ' s language comprehension : a psycholinguistic approach ."
] |
[
"Guidance for the evaluation and treatment of hereditary and acquired thrombophilia",
"Risk assessment of recurrence in patients with unprovoked deep vein thrombosis or pulmonary embolism: the Vienna prediction model.",
"Pattern recognition in pediatric and adolescent gynecology--a case for formal education."
] |
[
"Simulating Murder: The Aversion to Harmful Action",
"An fMRI Investigation of Emotional Engagement in Moral Judgment",
"Reconciling reinforcement learning models with behavioral extinction and renewal: Implications for addiction, relapse, and problem gambling"
] |
[
"Simulating Murder: The Aversion to Harmful Action",
"maps of bounded rationality : psychology for behavioral economicst .",
"Iterative Spectral Clustering for Unsupervised Object Localization"
] |
[
"Simulating Murder: The Aversion to Harmful Action",
"A cognitive developmental approach to morality: investigating the psychopath",
"Relationship between total quality management (TQM) and continuous improvement of international project management (CIIPM)"
] |
[
"Simulating Murder: The Aversion to Harmful Action",
"An fMRI Investigation of Emotional Engagement in Moral Judgment",
"CMOS Voltage Level-Up Shifter – A Review"
] |
[
"Simulating Murder: The Aversion to Harmful Action",
"A cognitive developmental approach to morality: investigating the psychopath",
"Flipped Classroom Strategies for CS Education"
] |
[
"Tracking Control of 3-Wheels Omni-Directional Mobile Robot Using Fuzzy Azimuth Estimator",
"Omni-directional mobile robot controller based on trajectory linearization",
"Design and Development of a Comprehensive Omni directional Soccer Player Robot"
] |
[
"Tracking Control of 3-Wheels Omni-Directional Mobile Robot Using Fuzzy Azimuth Estimator",
"Omni-drive Robot Motion on Curved Paths: The Fastest Path between Two Points Is Not a Straight-Line",
"human - computer interaction july 2008 privacy , trust and self - disclosure online ."
] |
[
"Tracking Control of 3-Wheels Omni-Directional Mobile Robot Using Fuzzy Azimuth Estimator",
"Omni-drive Robot Motion on Curved Paths: The Fastest Path between Two Points Is Not a Straight-Line",
"Macro-FF: Improving AI Planning with Automatically Learned Macro-Operators"
] |
[
"Tracking Control of 3-Wheels Omni-Directional Mobile Robot Using Fuzzy Azimuth Estimator",
"Omni-drive Robot Motion on Curved Paths: The Fastest Path between Two Points Is Not a Straight-Line",
"Stiffness Analysis and Optimization of a Co-axial Spherical Parallel Manipulator"
] |
[
"Tracking Control of 3-Wheels Omni-Directional Mobile Robot Using Fuzzy Azimuth Estimator",
"Omni-directional mobile robot controller based on trajectory linearization",
"GiLA: GitHub label analyzer"
] |
[
"Position based cryptography with location privacy: A step for Fog Computing",
"Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing",
"A Survey of Fog Computing: Concepts, Applications and Issues"
] |
[
"Position based cryptography with location privacy: A step for Fog Computing",
"Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing",
"A High-Definition LIDAR System Based on Two-Mirror Deflection Scanners"
] |
[
"Position based cryptography with location privacy: A step for Fog Computing",
"Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement",
"Mastering the game of Go with deep neural networks and tree search"
] |
[
"Position based cryptography with location privacy: A step for Fog Computing",
"Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing",
"POI recommendation with geographical and multi-tag influences"
] |
[
"Position based cryptography with location privacy: A step for Fog Computing",
"Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement",
"An Architecture Proposal for Network Traffic Monitoring with IoT Traffic Classification Support"
] |
[
"Coresets for $k$-Means and $k$-Median Clustering and their Applications",
"A constant-factor approximation algorithm for the k-median problem",
"Analysis of a local search heuristic for facility location problems"
] |
[
"Coresets for $k$-Means and $k$-Median Clustering and their Applications",
"Better streaming algorithms for clustering problems",
"Co-designing online privacy-related games and stories with children"
] |
[
"Coresets for $k$-Means and $k$-Median Clustering and their Applications",
"Better streaming algorithms for clustering problems",
"Another face of demodicosis"
] |
[
"Coresets for $k$-Means and $k$-Median Clustering and their Applications",
"A constant-factor approximation algorithm for the k-median problem",
"Towards Integrating TOSCA and ITIL"
] |
[
"Coresets for $k$-Means and $k$-Median Clustering and their Applications",
"Better streaming algorithms for clustering problems",
"Benchmarking modern distributed streaming platforms"
] |
[
"Heterogeneous Multi-View Information Fusion: Review of 3-D Reconstruction Methods and a New Registration with Uncertainty Modeling",
"Planar homography: accuracy analysis and applications",
"multi - view matching for unordered image sets , or \" how do i organize my holiday snaps ? \" ."
] |
[
"Heterogeneous Multi-View Information Fusion: Review of 3-D Reconstruction Methods and a New Registration with Uncertainty Modeling",
"Planar homography: accuracy analysis and applications",
"Design of Orthogonal Uplink Pilot Sequences for TDD Massive MIMO under Pilot Contamination"
] |
[
"Heterogeneous Multi-View Information Fusion: Review of 3-D Reconstruction Methods and a New Registration with Uncertainty Modeling",
"Planar homography: accuracy analysis and applications",
"the ns manual ( formerly ns notes and documentation ."
] |
[
"Heterogeneous Multi-View Information Fusion: Review of 3-D Reconstruction Methods and a New Registration with Uncertainty Modeling",
"Planar homography: accuracy analysis and applications",
"High quality compatible triangulations for 2D shape morphing"
] |
[
"Heterogeneous Multi-View Information Fusion: Review of 3-D Reconstruction Methods and a New Registration with Uncertainty Modeling",
"Planar homography: accuracy analysis and applications",
"Cervical Cancer Detection Using SVM Based Feature Screening"
] |
[
"re - conceptualizing information system success : the is - impact measurement model .",
"The DeLone and McLean Model of Information Systems Success : A Ten-Year Update",
"An empirical investigation of the factors affecting data warehousing success"
] |
[
"re - conceptualizing information system success : the is - impact measurement model .",
"The Propagation of Technology Management Taxonomies for Evaluating Investments in Information Systems",
"Deep Interactive Region Segmentation and Captioning"
] |
[
"re - conceptualizing information system success : the is - impact measurement model .",
"Review: information technology and organizational performance: an integrative model of IT business value",
"Effi cacy and economic assessment of conventional ventilatory support versus extracorporeal membrane oxygenation for severe adult respiratory failure ( CESAR ) : a multicentre randomised controlled trial"
] |
[
"re - conceptualizing information system success : the is - impact measurement model .",
"Information systems success: the quest for the dependent variable",
"On the Generative Discovery of Structured Medical Knowledge"
] |
[
"re - conceptualizing information system success : the is - impact measurement model .",
"Information systems success: the quest for the dependent variable",
"Penile duplication."
] |
[
"Fully automated neuropsychological assessment for detecting mild cognitive impairment",
"LIBSVM: A library for support vector machines",
"Solving the multiple-instance problem with axis-parallel rectangles"
] |
[
"Fully automated neuropsychological assessment for detecting mild cognitive impairment",
"Maximum likelihood linear regression for speaker adaptation of continuous density hidden Markov models",
"Decentralized Consistent Network Updates in SDN with ez-Segway"
] |
[
"Fully automated neuropsychological assessment for detecting mild cognitive impairment",
"The WEKA data mining software: an update",
"Single-Vertex Origami and Spherical Expansive Motions"
] |
[
"Fully automated neuropsychological assessment for detecting mild cognitive impairment",
"The WEKA data mining software: an update",
"About malicious software in smartphones"
] |
[
"Fully automated neuropsychological assessment for detecting mild cognitive impairment",
"LIBSVM: A library for support vector machines",
"Moving shadow detection and removal - a wavelet transform based approach"
] |
[
"Adapting Tree Structures for Processing with SIMD Instructions",
"FAST: fast architecture sensitive tree search on modern CPUs and GPUs",
"Super-Scalar RAM-CPU Cache Compression"
] |
[
"Adapting Tree Structures for Processing with SIMD Instructions",
"The adaptive radix tree: ARTful indexing for main-memory databases",
"Mirror-touch synesthesia is linked with empathy"
] |
[
"Adapting Tree Structures for Processing with SIMD Instructions",
"Cache Conscious Indexing for Decision-Support in Main Memory",
"Oriented and Ordered Biomimetic Remineralization of the Surface of Demineralized Dental Enamel Using HAP@ACP Nanoparticles Guided by Glycine"
] |
[
"Adapting Tree Structures for Processing with SIMD Instructions",
"FAST: fast architecture sensitive tree search on modern CPUs and GPUs",
"Quality assessment of systematic reviews in software engineering: a tertiary study"
] |
[
"Adapting Tree Structures for Processing with SIMD Instructions",
"The End of an Architectural Era (It's Time for a Complete Rewrite)",
"Skill-based differences in spatio-temporal team behaviour in defence of the Ancients 2 (DotA 2)"
] |
[
"Criteria Chains: A Novel Multi-Criteria Recommendation Approach",
"Matrix Factorization Techniques for Recommender Systems",
"Collaborative filtering with temporal dynamics"
] |
[
"Criteria Chains: A Novel Multi-Criteria Recommendation Approach",
"Multi-Criteria Recommender Systems",
"Proving Theorems about LISP Functions"
] |
[
"Criteria Chains: A Novel Multi-Criteria Recommendation Approach",
"Matrix factorization techniques for context aware recommendation",
"Relationship between total quality management (TQM) and continuous improvement of international project management (CIIPM)"
] |
[
"Criteria Chains: A Novel Multi-Criteria Recommendation Approach",
"Matrix Factorization Techniques for Recommender Systems",
"Understanding ITO decisions and implementations in Malaysia public healthcare sector: The evidence from a pilot case study"
] |
[
"Criteria Chains: A Novel Multi-Criteria Recommendation Approach",
"Matrix factorization techniques for context aware recommendation",
"Duration Dependence and Dispersion in Count-Data Models"
] |
[
"Adaptive Convolutional ELM For Concept Drift Handling in Online Stream Data",
"A review on real time data stream classification and adapting to various concept drift scenarios",
"Evolutionary optimization in uncertain environments-a survey"
] |
[
"Adaptive Convolutional ELM For Concept Drift Handling in Online Stream Data",
"Incremental Learning of Concept Drift in Nonstationary Environments",
"Heart Rate Monitoring in Team Sports—A Conceptual Framework for Contextualizing Heart Rate Measures for Training and Recovery Prescription"
] |
[
"Adaptive Convolutional ELM For Concept Drift Handling in Online Stream Data",
"Recent Advances in Convolutional Neural Networks",
"Using Open Data to Analyze Urban Mobility from Social Networks"
] |
[
"Adaptive Convolutional ELM For Concept Drift Handling in Online Stream Data",
"Deep Boltzmann machines",
"Analysis and comparison of axial-flux permanent-magnet brushless-DC machines with fractional-slot concentrated-windings"
] |
[
"Adaptive Convolutional ELM For Concept Drift Handling in Online Stream Data",
"A review on real time data stream classification and adapting to various concept drift scenarios",
"Trusted Execution Environment: What It is, and What It is Not"
] |
[
"Theoretical and Methodological Context of (Post)-Modern Econometrics and Competing Philosophical Discourses for Policy Prescription",
"Bridging the qualitative-quantitative divide: guidelines for conducting mixed methods research in information systems",
"Interpretive case studies in IS research: nature and method"
] |
[
"Theoretical and Methodological Context of (Post)-Modern Econometrics and Competing Philosophical Discourses for Policy Prescription",
"Methodological implications of critical realism for mixed-methods research",
"Salivary gland scintigraphy using technetium-99m-pertechnetate after autotransplantation of the submandibular salivary gland in the correction of dry eye"
] |
[
"Theoretical and Methodological Context of (Post)-Modern Econometrics and Competing Philosophical Discourses for Policy Prescription",
"Principles for Conducting Critical Realist Case Study Research in Information Systems",
"A Flexible Optical pH Sensor Based on Polysulfone Membranes Coated with pH-Responsive Polyaniline Nanofibers"
] |
[
"Theoretical and Methodological Context of (Post)-Modern Econometrics and Competing Philosophical Discourses for Policy Prescription",
"Combining IS Research Methods: Towards a Pluralist Methodology",
"SQLEM: fast clustering in SQL using the EM algorithm"
] |
[
"Theoretical and Methodological Context of (Post)-Modern Econometrics and Competing Philosophical Discourses for Policy Prescription",
"Combining IS Research Methods: Towards a Pluralist Methodology",
"Magnetic Induction Communications for Wireless Underground Sensor Networks"
] |
[
"CLINICIAN ’ S CORNER THE RATIONAL CLINICAL EXAMINATION Has This Prepubertal Girl Been Sexually Abused ?",
"Healing of Nonhymenal Genital Injuries in Prepubertal and Adolescent Girls: A Descriptive Study",
"Anogenital Injuries in Child Pedestrians Run Over by Low-Speed Motor Vehicles: Four Cases With Findings That Mimic Child Sexual Abuse"
] |
[
"CLINICIAN ’ S CORNER THE RATIONAL CLINICAL EXAMINATION Has This Prepubertal Girl Been Sexually Abused ?",
"Guidelines for medical care of children evaluated for suspected sexual abuse: an update for 2008",
"Measurement of Blood Loss: Review of the Literature"
] |
[
"CLINICIAN ’ S CORNER THE RATIONAL CLINICAL EXAMINATION Has This Prepubertal Girl Been Sexually Abused ?",
"Guidelines for medical care of children evaluated for suspected sexual abuse: an update for 2008",
"The Relationship between Posttreatment Smile Esthetics and the ABO Objective Grading System"
] |
[
"CLINICIAN ’ S CORNER THE RATIONAL CLINICAL EXAMINATION Has This Prepubertal Girl Been Sexually Abused ?",
"Healing of Nonhymenal Genital Injuries in Prepubertal and Adolescent Girls: A Descriptive Study",
"Reality of evidence-based practice in palliative care"
] |
[
"CLINICIAN ’ S CORNER THE RATIONAL CLINICAL EXAMINATION Has This Prepubertal Girl Been Sexually Abused ?",
"Guidelines for medical care of children evaluated for suspected sexual abuse: an update for 2008",
"A novel 8T SRAM with minimized power and delay"
] |
[
"Named Entity Recognition in Bengali: A Conditional Random Field Approach",
"Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data",
"A Comparison Of Algorithms For Maximum Entropy Parameter Estimation"
] |
[
"Named Entity Recognition in Bengali: A Conditional Random Field Approach",
"Shallow Parsing With Conditional Random Fields",
"Algorithms for feature selection: An evaluation"
] |
[
"Named Entity Recognition in Bengali: A Conditional Random Field Approach",
"Early Results For Named Entity Recognition With Conditional Random Fields, Feature Induction And Web-Enhanced Lexicons",
"Mobility Models, Traces and Impact of Mobility on Opportunistic Routing Algorithms: A Survey"
] |
[
"Named Entity Recognition in Bengali: A Conditional Random Field Approach",
"Early Results For Named Entity Recognition With Conditional Random Fields, Feature Induction And Web-Enhanced Lexicons",
"Reversible logic implementation of AES algorithm"
] |
[
"Named Entity Recognition in Bengali: A Conditional Random Field Approach",
"An Algorithm that Learns What's in a Name",
"Classification Of Spatio-Temporal Patterns With Applications To Recognition Of Sonar Sequences"
] |
[
"An investigation into users’ considerations towards using password managers",
"Using personal examples to improve risk communication for security & privacy decisions",
"Password security: a case history"
] |
[
"An investigation into users’ considerations towards using password managers",
"\" . . . no one can hack my mind \" : comparing expert and non - expert security practices .",
"Common genetic variants of the FADS1 FADS2 gene cluster and their reconstructed haplotypes are associated with the fatty acid composition in phospholipids"
] |
[
"An investigation into users’ considerations towards using password managers",
"\" . . . no one can hack my mind \" : comparing expert and non - expert security practices .",
"Improving Argument Mining in Student Essays by Learning and Exploiting Argument Indicators versus Essay Topics"
] |
[
"An investigation into users’ considerations towards using password managers",
"The domino effect of password reuse",
"A topological insight into restricted Boltzmann machines"
] |
[
"An investigation into users’ considerations towards using password managers",
"The domino effect of password reuse",
"Reversible logic implementation of AES algorithm"
] |
[
"K-means Algorithm Based on Particle Swarm Optimization Algorithm for Anomaly Intrusion Detection",
"Finding Groups in Data: An Introduction to Cluster Analysis.",
"particle systems - a technique for modeling a class of fuzzy objects ."
] |
[
"K-means Algorithm Based on Particle Swarm Optimization Algorithm for Anomaly Intrusion Detection",
"Finding Groups in Data: An Introduction to Cluster Analysis.",
"Who Said What: Modeling Individual Labelers Improves Classification"
] |
[
"K-means Algorithm Based on Particle Swarm Optimization Algorithm for Anomaly Intrusion Detection",
"The base-rate fallacy and the difficulty of intrusion detection",
"Optimization Circuit Based Buck-Boost Converter for Charging the Solar Power Plant"
] |
[
"K-means Algorithm Based on Particle Swarm Optimization Algorithm for Anomaly Intrusion Detection",
"The base-rate fallacy and the difficulty of intrusion detection",
"Volumetric 3D mapping in real-time on a CPU"
] |
[
"K-means Algorithm Based on Particle Swarm Optimization Algorithm for Anomaly Intrusion Detection",
"The base-rate fallacy and the difficulty of intrusion detection",
"Evaluating usage and quality of technical software documentation: an empirical study"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.