text
stringlengths 1
13.7k
| __index_level_0__
int64 0
3.6M
|
---|---|
Surf: Speeded up robust features | 1,111 |
the malaga urban dataset : high - rate stereo and lidar in a realistic urban scenario . | 1,113 |
Dynamic Data Replication Scheme in the Cloud Computing Environment | 1,120 |
Above the Clouds: A Berkeley View of Cloud Computing | 1,121 |
Teachers’ Use of Technology and Constructivism | 1,130 |
Integrating technology into K-12 teaching and learning: current knowledge gaps and recommendations for future research | 1,131 |
Continuous software engineering and beyond: trends and challenges | 1,140 |
user acceptance of information technology : toward a unified view . | 1,141 |
Climbing the "Stairway to Heaven" -- A Mulitiple-Case Study Exploring Barriers in the Transition from Agile Development towards Continuous Deployment of Software | 1,145 |
Trust and TAM in online shopping: an integrated model | 1,149 |
A Transforming Insurance Company and the 4 Types of Health Data Challenges that Arise: A Finnish Case Study | 1,150 |
Research Commentary - The Digital Transformation of Healthcare: Current Status and the Road Ahead | 1,151 |
Bringing Big Data to Personalized Healthcare: A Patient-Centered Framework | 1,155 |
value of information systems and products : understanding the users ’ perspective and values . | 1,159 |
Human-level AI's Killer Application: Interactive Computer Games | 1,160 |
Automated Intelligent Pilots for Combat Flight Simulation | 1,161 |
The Cog Project : Building a Humanoid Robot | 1,167 |
Combining Misuse Cases with Attack Trees and Security Activity Models | 1,170 |
Specifying reusable security requirements | 1,171 |
Eliciting security requirements with misuse cases | 1,175 |
Using abuse case models for security requirements analysis | 1,179 |
Neural network based attack on a masked implementation of AES | 1,180 |
A time series approach for profiling attack | 1,181 |
black - box side - channel attacks highlight the importance of countermeasures - an analysis of the xilinx virtex - 4 and virtex - 5 bitstream encryption mechanism . | 1,183 |
Electromagnetic Analysis: Concrete Results | 1,187 |
Self-Compassion and Psychological Well-Being in Older Adults | 1,190 |
Relation of threatened egotism to violence and aggression: The dark side of high self-esteem. | 1,191 |
Self-compassion versus global self-esteem: Two different ways of relating to oneself | 1,193 |
Concept Transfer Learning for Adaptive Language Understanding | 1,200 |
Neural Models for Sequence Chunking | 1,201 |
Attention-Based Recurrent Neural Network Models for Joint Intent Detection and Slot Filling | 1,203 |
Supervised Sequence Labelling with Recurrent Neural Networks | 1,205 |
Sequential Convolutional Neural Networks for Slot Filling in Spoken Language Understanding | 1,207 |
What is left to be understood in ATIS? | 1,209 |
A fast, universal algorithm to learn parametric nonlinear embeddings | 1,210 |
learning a parametric embedding by preserving local structure . | 1,215 |
Down will Come Baby, Cradle and All: Diagnostic and Therapeutic Implications of Chronic Trauma on Child Development | 1,220 |
Developmental traumatology part II: brain development | 1,221 |
Relationship of childhood abuse and household dysfunction to many of the leading causes of death in adults. The Adverse Childhood Experiences (ACE) Study. | 1,223 |
Neurobiological Sequelae of Childhood Trauma: Post-traumatic Stress Disorders in Children | 1,225 |
A theory of self-calibration of a moving camera | 1,230 |
Camera Self-Calibration: Theory and Experiments | 1,231 |
Virtual reality and information technology for archaeological site promotion | 1,240 |
Archeoguide: first results of an augmented reality, mobile computing system in cultural heritage sites | 1,241 |
an fft - based technique for translation , rotation , and scale - invariant image registration . | 1,243 |
An empirical study of multifactorial PSO and multifactorial DE | 1,250 |
Enhancing Differential Evolution Utilizing Eigenvector-Based Crossover Operator | 1,251 |
Evolutionary computation: Comments on the history and current state | 1,253 |
Learning with Whom to Share in Multi-task Feature Learning | 1,257 |
Solving Single-digit Sudoku Subproblems | 1,260 |
Metaheuristics can Solve Sudoku Puzzles | 1,261 |
Dynamic Programming Treatment of the Travelling Salesman Problem | 1,265 |
Linear Systems, Sparse Solutions, and Sudoku | 1,267 |
Detecting Integrity Attacks on SCADA Systems | 1,270 |
Secure control against replay attacks | 1,271 |
Research Challenges for the Security of Control Systems | 1,275 |
A Plant-Wide Industrial Process Control Security Problem | 1,279 |
PointerPhone: Using Mobile Phones for Direct Pointing Interactions with Remote Displays | 1,280 |
the smart phone : a ubiquitous input device . | 1,281 |
Augmented surfaces: a spatially continuous work space for hybrid computing environments | 1,283 |
SpeckleSense: fast, precise, low-cost and compact motion sensing using laser speckle | 1,285 |
Avoiding interference: how people use spatial separation and partitioning in SDG workspaces | 1,289 |
Keep Calm and Study Memes | 1,290 |
Memes in a Digital World: Reconciling with a Conceptual Troublemaker | 1,291 |
Automatic Language Identification fromWritten Texts An Overview | 1,300 |
N-Gram Based Text Categorization | 1,301 |
Automatic Detection and Language Identification of Multilingual Documents | 1,303 |
Frontal to profile face verification in the wild | 1,310 |
From Few to many: Illumination cone models for face recognition under variable lighting and pose | 1,311 |
Deeply learned face representations are sparse, selective, and robust | 1,313 |
Face Description with Local Binary Patterns: Application to Face Recognition | 1,317 |
algorithm and technique on various edge detection : a survey . | 1,320 |
A Computational Approach toEdgeDetection | 1,321 |
Real-time Facial Expression Recognition Based on Adaptive Canny Operator Edge Detection | 1,323 |
Performance Optimization of Communication Subsystem in Scale-Out Distributed Storage | 1,330 |
Performance Optimization for All Flash Scale-Out Storage | 1,331 |
Ceph: a scalable, high-performance distributed file system | 1,335 |
A System for Automated Detection of Ampoule Injection Impurities | 1,340 |
What is principal component analysis? | 1,341 |
Particulate Matter in Injectable Drug Products | 1,343 |
Extreme learning machine: Theory and applications | 1,345 |
Activity recognition and monitoring using multiple sensors on different body positions | 1,350 |
Activity recognition from user-annotated acceleration data | 1,351 |
measuring user engagement . | 1,360 |
The development and evaluation of a survey to measure user engagement | 1,361 |
The Measurement of Web-Customer Satisfaction: An Expectation and Disconfirmation Approach | 1,363 |
Theory and models for creating engaging and immersive ecommerce Websites | 1,365 |
Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research | 1,367 |
Towards Open Set Deep Networks | 1,370 |
Distance-Based Image Classification: Generalizing to New Classes at Near-Zero Cost | 1,371 |
Zero-Shot Learning Through Cross-Modal Transfer | 1,373 |
Fast, Accurate Detection of 100,000 Object Classes on a Single Machine | 1,375 |
Is object localization for free? - Weakly-supervised learning with convolutional neural networks | 1,379 |
Beyond Traditional DTN Routing: Social Networks for Opportunistic Communication | 1,380 |
Epidemic Routing for Partially-Connected Ad Hoc Networks | 1,381 |
Efficient routing in intermittently connected mobile networks: the multiple-copy case | 1,383 |
MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks | 1,385 |
Intent Generation for Goal-Oriented Dialogue Systems based on Schema.org Annotations | 1,390 |
Learning End-to-End Goal-Oriented Dialog | 1,391 |
Verb Semantics And Lexical Selection | 1,393 |