text
stringlengths
1
13.7k
__index_level_0__
int64
0
3.6M
Surf: Speeded up robust features
1,111
the malaga urban dataset : high - rate stereo and lidar in a realistic urban scenario .
1,113
Dynamic Data Replication Scheme in the Cloud Computing Environment
1,120
Above the Clouds: A Berkeley View of Cloud Computing
1,121
Teachers’ Use of Technology and Constructivism
1,130
Integrating technology into K-12 teaching and learning: current knowledge gaps and recommendations for future research
1,131
Continuous software engineering and beyond: trends and challenges
1,140
user acceptance of information technology : toward a unified view .
1,141
Climbing the "Stairway to Heaven" -- A Mulitiple-Case Study Exploring Barriers in the Transition from Agile Development towards Continuous Deployment of Software
1,145
Trust and TAM in online shopping: an integrated model
1,149
A Transforming Insurance Company and the 4 Types of Health Data Challenges that Arise: A Finnish Case Study
1,150
Research Commentary - The Digital Transformation of Healthcare: Current Status and the Road Ahead
1,151
Bringing Big Data to Personalized Healthcare: A Patient-Centered Framework
1,155
value of information systems and products : understanding the users ’ perspective and values .
1,159
Human-level AI's Killer Application: Interactive Computer Games
1,160
Automated Intelligent Pilots for Combat Flight Simulation
1,161
The Cog Project : Building a Humanoid Robot
1,167
Combining Misuse Cases with Attack Trees and Security Activity Models
1,170
Specifying reusable security requirements
1,171
Eliciting security requirements with misuse cases
1,175
Using abuse case models for security requirements analysis
1,179
Neural network based attack on a masked implementation of AES
1,180
A time series approach for profiling attack
1,181
black - box side - channel attacks highlight the importance of countermeasures - an analysis of the xilinx virtex - 4 and virtex - 5 bitstream encryption mechanism .
1,183
Electromagnetic Analysis: Concrete Results
1,187
Self-Compassion and Psychological Well-Being in Older Adults
1,190
Relation of threatened egotism to violence and aggression: The dark side of high self-esteem.
1,191
Self-compassion versus global self-esteem: Two different ways of relating to oneself
1,193
Concept Transfer Learning for Adaptive Language Understanding
1,200
Neural Models for Sequence Chunking
1,201
Attention-Based Recurrent Neural Network Models for Joint Intent Detection and Slot Filling
1,203
Supervised Sequence Labelling with Recurrent Neural Networks
1,205
Sequential Convolutional Neural Networks for Slot Filling in Spoken Language Understanding
1,207
What is left to be understood in ATIS?
1,209
A fast, universal algorithm to learn parametric nonlinear embeddings
1,210
learning a parametric embedding by preserving local structure .
1,215
Down will Come Baby, Cradle and All: Diagnostic and Therapeutic Implications of Chronic Trauma on Child Development
1,220
Developmental traumatology part II: brain development
1,221
Relationship of childhood abuse and household dysfunction to many of the leading causes of death in adults. The Adverse Childhood Experiences (ACE) Study.
1,223
Neurobiological Sequelae of Childhood Trauma: Post-traumatic Stress Disorders in Children
1,225
A theory of self-calibration of a moving camera
1,230
Camera Self-Calibration: Theory and Experiments
1,231
Virtual reality and information technology for archaeological site promotion
1,240
Archeoguide: first results of an augmented reality, mobile computing system in cultural heritage sites
1,241
an fft - based technique for translation , rotation , and scale - invariant image registration .
1,243
An empirical study of multifactorial PSO and multifactorial DE
1,250
Enhancing Differential Evolution Utilizing Eigenvector-Based Crossover Operator
1,251
Evolutionary computation: Comments on the history and current state
1,253
Learning with Whom to Share in Multi-task Feature Learning
1,257
Solving Single-digit Sudoku Subproblems
1,260
Metaheuristics can Solve Sudoku Puzzles
1,261
Dynamic Programming Treatment of the Travelling Salesman Problem
1,265
Linear Systems, Sparse Solutions, and Sudoku
1,267
Detecting Integrity Attacks on SCADA Systems
1,270
Secure control against replay attacks
1,271
Research Challenges for the Security of Control Systems
1,275
A Plant-Wide Industrial Process Control Security Problem
1,279
PointerPhone: Using Mobile Phones for Direct Pointing Interactions with Remote Displays
1,280
the smart phone : a ubiquitous input device .
1,281
Augmented surfaces: a spatially continuous work space for hybrid computing environments
1,283
SpeckleSense: fast, precise, low-cost and compact motion sensing using laser speckle
1,285
Avoiding interference: how people use spatial separation and partitioning in SDG workspaces
1,289
Keep Calm and Study Memes
1,290
Memes in a Digital World: Reconciling with a Conceptual Troublemaker
1,291
Automatic Language Identification fromWritten Texts An Overview
1,300
N-Gram Based Text Categorization
1,301
Automatic Detection and Language Identification of Multilingual Documents
1,303
Frontal to profile face verification in the wild
1,310
From Few to many: Illumination cone models for face recognition under variable lighting and pose
1,311
Deeply learned face representations are sparse, selective, and robust
1,313
Face Description with Local Binary Patterns: Application to Face Recognition
1,317
algorithm and technique on various edge detection : a survey .
1,320
A Computational Approach toEdgeDetection
1,321
Real-time Facial Expression Recognition Based on Adaptive Canny Operator Edge Detection
1,323
Performance Optimization of Communication Subsystem in Scale-Out Distributed Storage
1,330
Performance Optimization for All Flash Scale-Out Storage
1,331
Ceph: a scalable, high-performance distributed file system
1,335
A System for Automated Detection of Ampoule Injection Impurities
1,340
What is principal component analysis?
1,341
Particulate Matter in Injectable Drug Products
1,343
Extreme learning machine: Theory and applications
1,345
Activity recognition and monitoring using multiple sensors on different body positions
1,350
Activity recognition from user-annotated acceleration data
1,351
measuring user engagement .
1,360
The development and evaluation of a survey to measure user engagement
1,361
The Measurement of Web-Customer Satisfaction: An Expectation and Disconfirmation Approach
1,363
Theory and models for creating engaging and immersive ecommerce Websites
1,365
Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research
1,367
Towards Open Set Deep Networks
1,370
Distance-Based Image Classification: Generalizing to New Classes at Near-Zero Cost
1,371
Zero-Shot Learning Through Cross-Modal Transfer
1,373
Fast, Accurate Detection of 100,000 Object Classes on a Single Machine
1,375
Is object localization for free? - Weakly-supervised learning with convolutional neural networks
1,379
Beyond Traditional DTN Routing: Social Networks for Opportunistic Communication
1,380
Epidemic Routing for Partially-Connected Ad Hoc Networks
1,381
Efficient routing in intermittently connected mobile networks: the multiple-copy case
1,383
MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks
1,385
Intent Generation for Goal-Oriented Dialogue Systems based on Schema.org Annotations
1,390
Learning End-to-End Goal-Oriented Dialog
1,391
Verb Semantics And Lexical Selection
1,393