set
sequence
[ "Contactless and Partial 3D Fingerprint Recognition using Multi-view Deep Representation", "Learning scale-variant and scale-invariant features for deep image classification", "Learning Methods for Generic Object Recognition with Invariance to Pose and Lighting" ]
[ "Contactless and Partial 3D Fingerprint Recognition using Multi-view Deep Representation", "Learning a similarity metric discriminatively, with application to face verification", "Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels" ]
[ "Contactless and Partial 3D Fingerprint Recognition using Multi-view Deep Representation", "Biometric Recognition: An Overview", "The Collective Resource Approach: the Scandinavian Experience" ]
[ "Contactless and Partial 3D Fingerprint Recognition using Multi-view Deep Representation", "Learning a similarity metric discriminatively, with application to face verification", "Learning to Estimate 3D Hand Pose from Single RGB Images" ]
[ "Contactless and Partial 3D Fingerprint Recognition using Multi-view Deep Representation", "Learning a similarity metric discriminatively, with application to face verification", "Multiband Sierpinski fractal antenna" ]
[ "Detecting Deceptive Behavior via Integration of Discriminative Features From Multiple Modalities", "Deception Detection using Real-life Trial Data", "Distributional Footprints of Deceptive Product Reviews" ]
[ "Detecting Deceptive Behavior via Integration of Discriminative Features From Multiple Modalities", "Syntactic Stylometry for Deception Detection", "Real time detection and recognition of vehicle license plate in Bangla" ]
[ "Detecting Deceptive Behavior via Integration of Discriminative Features From Multiple Modalities", "Deception Detection using Real-life Trial Data", "Multiobjective optimization by decomposition with Pareto-adaptive weight vectors" ]
[ "Detecting Deceptive Behavior via Integration of Discriminative Features From Multiple Modalities", "Good features to track", "The Role of Apolipoprotein E in Alzheimer's Disease" ]
[ "Detecting Deceptive Behavior via Integration of Discriminative Features From Multiple Modalities", "Good features to track", "The internet-based knowledge acquisition and management method to construct large-scale distributed medical expert systems" ]
[ "Automated Personalized Feedback in Introductory Java Programming MOOCs", "Learning Program Embeddings to Propagate Feedback on Student Code", "Mathematical Language Processing: Automatic Grading and Feedback for Open Response Mathematical Questions" ]
[ "Automated Personalized Feedback in Introductory Java Programming MOOCs", "Learning Program Embeddings to Propagate Feedback on Student Code", "High-speed railway catenary components detection using the cascaded convolutional neural networks" ]
[ "Automated Personalized Feedback in Introductory Java Programming MOOCs", "Learning Program Embeddings to Propagate Feedback on Student Code", "On the Scientific Relevance of eSports" ]
[ "Automated Personalized Feedback in Introductory Java Programming MOOCs", "Software Verification and Graph Similarity for Automated Evaluation of Students' Assignments", "Cyberbullying: Another main type of bullying?" ]
[ "Automated Personalized Feedback in Introductory Java Programming MOOCs", "Computational Thinking", "LineNet: a Zoomable CNN for Crowdsourced High Definition Maps Modeling in Urban Environments" ]
[ "A Heterogeneous Parallel Framework for Domain-Specific Languages", "Distributed data-parallel computing using a high-level programming language", "SCOPE: easy and efficient parallel processing of massive data sets" ]
[ "A Heterogeneous Parallel Framework for Domain-Specific Languages", "Distributed data-parallel computing using a high-level programming language", "Information Security Maturity Model for Nist Cyber Security Framework" ]
[ "A Heterogeneous Parallel Framework for Domain-Specific Languages", "Distributed data-parallel computing using a high-level programming language", "Statistical compression-based models for text classification" ]
[ "A Heterogeneous Parallel Framework for Domain-Specific Languages", "A domain-specific approach to heterogeneous parallelism", "Improving Energy Efficiency of MQTT-SN in Lossy Environments Using Seed-Based Network Coding" ]
[ "A Heterogeneous Parallel Framework for Domain-Specific Languages", "Domain-specific languages: an annotated bibliography", "1 metrics for software adaptability # ." ]
[ "Collective Sensemaking in Online Health Forums", "mimir: a market-based real-time question and answer service", "A fully Bayesian approach to unsupervised part-of-speech tagging" ]
[ "Collective Sensemaking in Online Health Forums", "Questions in, knowledge in?: a study of naver's question answering community", "Employee Emotional Intelligence and Employee Performance in the Higher Education Institutions in Saudi Arabia: A Proposed Theoretical Framework" ]
[ "Collective Sensemaking in Online Health Forums", "mimir: a market-based real-time question and answer service", "Review on dermatomycosis: pathogenesis and treatment" ]
[ "Collective Sensemaking in Online Health Forums", "Questions in, knowledge in?: a study of naver's question answering community", "Graph Database Applications and Concepts with Neo4j" ]
[ "Collective Sensemaking in Online Health Forums", "Questions in, knowledge in?: a study of naver's question answering community", "A need for closer examination of FASD by the criminal justice system: has the call been answered?" ]
[ "NOUS: Construction and Querying of Dynamic Knowledge Graphs", "Toward an architecture for never-ending language learning", "Extracting Cybersecurity Related Linked Data from Text" ]
[ "NOUS: Construction and Querying of Dynamic Knowledge Graphs", "Developing an Ontology for Cyber Security Knowledge Graphs", "math 491 project : a matlab implementation of elliptic curve cryptography ." ]
[ "NOUS: Construction and Querying of Dynamic Knowledge Graphs", "Toward an architecture for never-ending language learning", "A survey on leveraging deep neural networks for object tracking" ]
[ "NOUS: Construction and Querying of Dynamic Knowledge Graphs", "DeepDive: Web-scale Knowledge-base Construction using Statistical Learning and Inference", "an rbf neural network approach towards precision motion system with selective sensor fusion ." ]
[ "NOUS: Construction and Querying of Dynamic Knowledge Graphs", "Toward an architecture for never-ending language learning", "PLASMA: a plan-based layered architecture for software model-driven adaptation" ]
[ "Multiple-Kernel Based Vehicle Tracking Using 3D Deformable Model and Camera Self-Calibration", "Online Multi-Target Tracking Using Recurrent Neural Networks", "Image Segmentation in Video Sequences: A Probabilistic Approach" ]
[ "Multiple-Kernel Based Vehicle Tracking Using 3D Deformable Model and Camera Self-Calibration", "Online Multi-Target Tracking Using Recurrent Neural Networks", "The psychosocial impact of Hurricane Katrina: Contextual differences in psychological symptoms, social support, and discrimination" ]
[ "Multiple-Kernel Based Vehicle Tracking Using 3D Deformable Model and Camera Self-Calibration", "Online Multi-Target Tracking Using Recurrent Neural Networks", "PLASMA: a plan-based layered architecture for software model-driven adaptation" ]
[ "Multiple-Kernel Based Vehicle Tracking Using 3D Deformable Model and Camera Self-Calibration", "Mean shift: A robust approach toward feature space analysis", "Evidence for non-linear, diffusive sediment transport on hillslopes and implications for landscape morphology" ]
[ "Multiple-Kernel Based Vehicle Tracking Using 3D Deformable Model and Camera Self-Calibration", "SSD: Single Shot MultiBox Detector", "Toward Provable Security Against Differential and Linear Cryptanalysis for Camellia and Related Ciphers" ]
[ "Development Pattern Recognition Model for the Classification of Circuit Probe Wafer Maps on Semiconductors", "Data Mining: Concepts and Techniques", "Finding interesting rules from large sets of discovered association rules" ]
[ "Development Pattern Recognition Model for the Classification of Circuit Probe Wafer Maps on Semiconductors", "Data Mining: Concepts and Techniques", "A Multimodal Biometric Recognition System Based on Fusion of Palmprint, Fingerprint and Face" ]
[ "Development Pattern Recognition Model for the Classification of Circuit Probe Wafer Maps on Semiconductors", "Data Mining: Concepts and Techniques", "Multi-Objective Reinforced Evolution in Mobile Neural Architecture Search" ]
[ "Development Pattern Recognition Model for the Classification of Circuit Probe Wafer Maps on Semiconductors", "Data Mining: Concepts and Techniques", "Fast and Accurate Tumor Segmentation of Histology Images using Persistent Homology and Deep Convolutional Features" ]
[ "Development Pattern Recognition Model for the Classification of Circuit Probe Wafer Maps on Semiconductors", "Data Mining: Concepts and Techniques", "Statistical compression-based models for text classification" ]
[ "low - rank structure learning via nonconvex heuristic recovery .", "Linearized Alternating Direction Method with Adaptive Penalty for Low-Rank Representation", "Decoding by linear programming" ]
[ "low - rank structure learning via nonconvex heuristic recovery .", "Linearized Alternating Direction Method with Adaptive Penalty for Low-Rank Representation", "Soft Robots Manufacturing: A Review" ]
[ "low - rank structure learning via nonconvex heuristic recovery .", "A Compositional and Dynamic Model for Face Aging", "Evaluation of the Efficacy of Aspirin and Low Molecular Weight Heparin in Patients with Unexplained Recurrent Spontaneous Abortions" ]
[ "low - rank structure learning via nonconvex heuristic recovery .", "A Compositional and Dynamic Model for Face Aging", "Learning to Estimate 3D Hand Pose from Single RGB Images" ]
[ "low - rank structure learning via nonconvex heuristic recovery .", "A Compositional and Dynamic Model for Face Aging", "New classification system of radical hysterectomy: emphasis on a three-dimensional anatomic template for parametrial resection." ]
[ "Effective attack models for shilling item-based collaborative filtering systems", "Identifying Attack Models for Secure Recommendation", "Data Preparation for Mining World Wide Web Browsing Patterns" ]
[ "Effective attack models for shilling item-based collaborative filtering systems", "Identifying Attack Models for Secure Recommendation", "Computing pure nash equilibria in graphical games via markov random fields" ]
[ "Effective attack models for shilling item-based collaborative filtering systems", "Shilling recommender systems for fun and profit", "Fast Model Predictive Control for Redistributive Lithium-Ion Battery Balancing" ]
[ "Effective attack models for shilling item-based collaborative filtering systems", "Limited knowledge shilling attacks in collaborative filtering systems", "A 65-fJ/Conversion-Step 0.9-V 200-kS/s Rail-to-Rail 8-bit Successive Approximation ADC" ]
[ "Effective attack models for shilling item-based collaborative filtering systems", "Limited knowledge shilling attacks in collaborative filtering systems", "Context-sensitive multimodal emotion recognition from speech and facial expression using bidirectional LSTM modeling" ]
[ "Feminist HCI: taking stock and outlining an agenda for design", "COVER STORYThe washing machine that ate my sari---mistakes in cross-cultural design", "Technology as Experience" ]
[ "Feminist HCI: taking stock and outlining an agenda for design", "Empathy and experience in HCI", "A STRUCTURAL APPROACH TO ETHICAL REASONING: THE INTEGRATION OF MORAL PHILOSOPHY" ]
[ "Feminist HCI: taking stock and outlining an agenda for design", "Empathy and experience in HCI", "Security Issues in NoSQL Databases" ]
[ "Feminist HCI: taking stock and outlining an agenda for design", "COVER STORYThe washing machine that ate my sari---mistakes in cross-cultural design", "2D Line Matching Using Geometric and Intensity Data" ]
[ "Feminist HCI: taking stock and outlining an agenda for design", "Empathy and experience in HCI", "Big Data Analytics for Program Popularity Prediction in Broadcast TV Industries" ]
[ "Placeless Place-Recognition", "Surf: Speeded up robust features", "FAB-MAP: Probabilistic Localization and Mapping in the Space of Appearance" ]
[ "Placeless Place-Recognition", "the malaga urban dataset : high - rate stereo and lidar in a realistic urban scenario .", "Prefetching on Storage Servers through Mining Access Patterns on Blocks" ]
[ "Placeless Place-Recognition", "the malaga urban dataset : high - rate stereo and lidar in a realistic urban scenario .", "fine - grained image classification via combining vision and language ." ]
[ "Placeless Place-Recognition", "Surf: Speeded up robust features", "A control engineer's guide to sliding mode control" ]
[ "Placeless Place-Recognition", "the malaga urban dataset : high - rate stereo and lidar in a realistic urban scenario .", "Graph Database Applications and Concepts with Neo4j" ]
[ "Dynamic Data Replication Scheme in the Cloud Computing Environment", "Above the Clouds: A Berkeley View of Cloud Computing", "Bigtable: A Distributed Storage System for Structured Data" ]
[ "Dynamic Data Replication Scheme in the Cloud Computing Environment", "Above the Clouds: A Berkeley View of Cloud Computing", "A power-on-reset circuit with precisely triggered threshold voltages" ]
[ "Dynamic Data Replication Scheme in the Cloud Computing Environment", "Above the Clouds: A Berkeley View of Cloud Computing", "Implementing lattice Boltzmann computation on graphics hardware" ]
[ "Dynamic Data Replication Scheme in the Cloud Computing Environment", "Above the Clouds: A Berkeley View of Cloud Computing", "A Multimodal Biometric Recognition System Based on Fusion of Palmprint, Fingerprint and Face" ]
[ "Dynamic Data Replication Scheme in the Cloud Computing Environment", "Above the Clouds: A Berkeley View of Cloud Computing", "MIDDLE EAST RESPIRATORY SYNDROME CORONAVIRUS (MERS-COV): THREAT TO GLOBAL PUBLIC HEALTH & CHALLENGES" ]
[ "Teachers’ Use of Technology and Constructivism", "Integrating technology into K-12 teaching and learning: current knowledge gaps and recommendations for future research", "association what makes professional development effective ? results from a national sample of teachers ." ]
[ "Teachers’ Use of Technology and Constructivism", "Integrating technology into K-12 teaching and learning: current knowledge gaps and recommendations for future research", "Face Verification from Depth using Privileged Information" ]
[ "Teachers’ Use of Technology and Constructivism", "Integrating technology into K-12 teaching and learning: current knowledge gaps and recommendations for future research", "Browser Language Preferences as a Metric for Identifying ESL Speakers in MOOCs" ]
[ "Teachers’ Use of Technology and Constructivism", "Integrating technology into K-12 teaching and learning: current knowledge gaps and recommendations for future research", "Automatic generation of release notes" ]
[ "Teachers’ Use of Technology and Constructivism", "Integrating technology into K-12 teaching and learning: current knowledge gaps and recommendations for future research", "Colonoscopy training for nurse endoscopists: a feasibility study" ]
[ "Continuous software engineering and beyond: trends and challenges", "user acceptance of information technology : toward a unified view .", "Trust in close relationships." ]
[ "Continuous software engineering and beyond: trends and challenges", "user acceptance of information technology : toward a unified view .", "Citalopram therapy for depression: a review of 10 years of European experience and data from U.S. clinical trials." ]
[ "Continuous software engineering and beyond: trends and challenges", "Climbing the \"Stairway to Heaven\" -- A Mulitiple-Case Study Exploring Barriers in the Transition from Agile Development towards Continuous Deployment of Software", "The Anatomic Relationship Between the Common Femoral Artery and Common Femoral Vein in Frog Leg Position Versus Straight Leg Position in Pediatric Patients" ]
[ "Continuous software engineering and beyond: trends and challenges", "Climbing the \"Stairway to Heaven\" -- A Mulitiple-Case Study Exploring Barriers in the Transition from Agile Development towards Continuous Deployment of Software", "How Team-Level and Individual-Level Conflict Influences Team Commitment: A Multilevel Investigation" ]
[ "Continuous software engineering and beyond: trends and challenges", "Trust and TAM in online shopping: an integrated model", "Very Deep Convolutional Networks for Large-Scale Image Recognition" ]
[ "A Transforming Insurance Company and the 4 Types of Health Data Challenges that Arise: A Finnish Case Study", "Research Commentary - The Digital Transformation of Healthcare: Current Status and the Road Ahead", "Empirical Analysis of Predictive Algorithms for Collaborative Filtering" ]
[ "A Transforming Insurance Company and the 4 Types of Health Data Challenges that Arise: A Finnish Case Study", "Research Commentary - The Digital Transformation of Healthcare: Current Status and the Road Ahead", "Cue-Based Dialogue Act Classification" ]
[ "A Transforming Insurance Company and the 4 Types of Health Data Challenges that Arise: A Finnish Case Study", "Bringing Big Data to Personalized Healthcare: A Patient-Centered Framework", "Anatomic modeling of deformable human bodies" ]
[ "A Transforming Insurance Company and the 4 Types of Health Data Challenges that Arise: A Finnish Case Study", "Research Commentary - The Digital Transformation of Healthcare: Current Status and the Road Ahead", "Computer vision based feature extraction of leaves for identification of medicinal values of plants" ]
[ "A Transforming Insurance Company and the 4 Types of Health Data Challenges that Arise: A Finnish Case Study", "value of information systems and products : understanding the users ’ perspective and values .", "From risk factors to detection and intervention: A metareview and practical proposal for research on cyberbullying" ]
[ "Human-level AI's Killer Application: Interactive Computer Games", "Automated Intelligent Pilots for Combat Flight Simulation", "Mechanisms of frequency and pattern control in the neural rhythm generators" ]
[ "Human-level AI's Killer Application: Interactive Computer Games", "Automated Intelligent Pilots for Combat Flight Simulation", "Splitting Gaussians in Mixture Models" ]
[ "Human-level AI's Killer Application: Interactive Computer Games", "Automated Intelligent Pilots for Combat Flight Simulation", "Refining Bounding-Box Regression for Object Localization" ]
[ "Human-level AI's Killer Application: Interactive Computer Games", "The Cog Project : Building a Humanoid Robot", "Smart homes automation using Z-wave protocol" ]
[ "Human-level AI's Killer Application: Interactive Computer Games", "Automated Intelligent Pilots for Combat Flight Simulation", "Computer vision based feature extraction of leaves for identification of medicinal values of plants" ]
[ "Combining Misuse Cases with Attack Trees and Security Activity Models", "Specifying reusable security requirements", "Handling Obstacles in Goal-Oriented Requirements Engineering" ]
[ "Combining Misuse Cases with Attack Trees and Security Activity Models", "Specifying reusable security requirements", "hyperqa : hyperbolic embeddings for fast and e icient ranking of estion answer pairs ." ]
[ "Combining Misuse Cases with Attack Trees and Security Activity Models", "Eliciting security requirements with misuse cases", "THE COPA MODEL: A Comprehensive Framework Designed to Promote Quality Care and Competence for Patient Safety" ]
[ "Combining Misuse Cases with Attack Trees and Security Activity Models", "Specifying reusable security requirements", "Optical and Electronic Packaging Processes for Silicon Photonic Systems" ]
[ "Combining Misuse Cases with Attack Trees and Security Activity Models", "Using abuse case models for security requirements analysis", "Next-generation proteomics: towards an integrative view of proteome dynamics" ]
[ "Neural network based attack on a masked implementation of AES", "A time series approach for profiling attack", "Correlation Power analysis with a leakage model" ]
[ "Neural network based attack on a masked implementation of AES", "black - box side - channel attacks highlight the importance of countermeasures - an analysis of the xilinx virtex - 4 and virtex - 5 bitstream encryption mechanism .", "Electromagnetic brain mapping - IEEE Signal Processing Magazine" ]
[ "Neural network based attack on a masked implementation of AES", "black - box side - channel attacks highlight the importance of countermeasures - an analysis of the xilinx virtex - 4 and virtex - 5 bitstream encryption mechanism .", "Multiobjective optimization by decomposition with Pareto-adaptive weight vectors" ]
[ "Neural network based attack on a masked implementation of AES", "Electromagnetic Analysis: Concrete Results", "strategy - proofness and arrow ’ s conditions : existence and correspondence theorems for voting procedures and social welfare functions * ." ]
[ "Neural network based attack on a masked implementation of AES", "Electromagnetic Analysis: Concrete Results", "The internet-based knowledge acquisition and management method to construct large-scale distributed medical expert systems" ]
[ "Self-Compassion and Psychological Well-Being in Older Adults", "Relation of threatened egotism to violence and aggression: The dark side of high self-esteem.", "self - compassion and reactions to unpleasant self - relevant events : the implications of treating oneself kindly ." ]
[ "Self-Compassion and Psychological Well-Being in Older Adults", "Self-compassion versus global self-esteem: Two different ways of relating to oneself", "Kissing nevus of the penis. Report of two cases and review of the literature*" ]
[ "Self-Compassion and Psychological Well-Being in Older Adults", "Relation of threatened egotism to violence and aggression: The dark side of high self-esteem.", "Detection of forest fires using machine learning technique: A perspective" ]
[ "Self-Compassion and Psychological Well-Being in Older Adults", "Relation of threatened egotism to violence and aggression: The dark side of high self-esteem.", "Fecal parasite identification by microscopy and PCR in scimitar-horned oryx, Oryx dammah, managed at two sites" ]
[ "Self-Compassion and Psychological Well-Being in Older Adults", "Self-compassion versus global self-esteem: Two different ways of relating to oneself", "A Comparative Performance Investigation of Single-Stage Dimmable Electronic Ballasts for Electrodeless Fluorescent Lamp Applications" ]