04-03-2019
|
|
Discrimination through optimization: How Facebooks ad
delivery can lead to skewed outcomes
by
Muhammad Ali
et al
|
04-02-2019
|
|
Exploring Randomly Wired Neural Networks for Image
Recognition
by
Saining Xie
et al
|
04-04-2019
|
|
Malware Detection using Machine Learning and Deep
Learning
by
Hemant Rathore
et al
|
04-03-2019
|
|
Processing Tweets for Cybersecurity Threat Awareness
by
Fernando Alves
et al
|
04-03-2019
|
|
Hyperbolic Image Embeddings
by
Valentin Khrulkov
et al
|
04-02-2019
|
|
Understanding language-elicited EEG data by predicting
it from a fine-tuned language model
by
Dan Schwartz
et al
|
04-03-2019
|
|
SANNS: Scaling Up Secure Approximate k-Nearest
Neighbors Search
by
Hao Chen
et al
|
04-03-2019
|
|
Deep Landscape Features for Improving Vector-borne
Disease Prediction
by
Nabeel Abdur Rehman
et al
|
04-03-2019
|
|
Consistency by Agreement in Zero-shot Neural Machine
Translation
by
Maruan Al-Shedivat
et al
|
04-03-2019
|
|
Summit: Scaling Deep Learning Interpretability by
Visualizing Activation and Attribution Summarizations
by
Fred Hohman
et al
|
04-03-2019
|
|
VideoBERT: A Joint Model for Video and Language
Representation Learning
by
Chen Sun
et al
|
04-04-2019
|
|
Robust Evaluation of Language-Brain Encoding
Experiments
by
Lisa Beinborn
et al
|
04-03-2019
|
|
Preference-Informed Fairness
by
Michael P. Kim
et al
|
04-04-2019
|
|
A Systematic Literature Review about the impact of
Artificial Intelligence on Autonomous Vehicle Safety
by
A. M. Nascimento
et al
|
04-05-2019
|
|
Structured agents for physical construction
by
Victor Bapst
et al
|
04-04-2019
|
|
Orthogonal Voronoi Diagram and Treemap
by
Yan-Chao Wang
et al
|
04-03-2019
|
|
Constrained Generative Adversarial Networks for
Interactive Image Generation
by
Eric Heim
|
04-04-2019
|
|
Riemannian Normalizing Flow on Variational Wasserstein
Autoencoder for Text Modeling
by
Prince Zizhuang Wang
et al
|
04-03-2019
|
|
75 Languages, 1 Model: Parsing Universal Dependencies
Universally
by
Daniel Kondratyuk
|
04-04-2019
|
|
Can a Robot Become a Movie Director? Learning Artistic
Principles for Aerial Cinematography
by
Mirko Gschwindt
et al
|
04-03-2019
|
|
Massively Multilingual Adversarial Speech Recognition
by
Oliver Adams
et al
|
04-03-2019
|
|
Generative Adversarial Networks for text using word2vec
intermediaries
by
Akshay Budhkar
et al
|
04-04-2019
|
|
Clinically Accurate Chest X-Ray Report Generation
by
Guanxiong Liu
et al
|
04-02-2019
|
|
A Dataset for Semantic Segmentation of Point Cloud
Sequences
by
Jens Behley
et al
|
04-02-2019
|
|
Mirroring to Build Trust in Digital Assistants
by
Katherine Metcalf
et al
|
04-04-2019
|
|
T-Net: Parametrizing Fully Convolutional Nets with a
Single High-Order Tensor
by
Jean Kossaifi
et al
|
04-04-2019
|
|
Learning to Decipher Hate Symbols
by
Jing Qian
et al
|
04-03-2019
|
|
Towards a Robust Aerial Cinematography Platform:
Localizing and Tracking Moving Targets in Unstructured
Environments
by
Rogerio Bonatti
et al
|
04-03-2019
|
|
Linearly Converging Quasi Branch and Bound Algorithms
for Global Rigid Registration
by
Nadav Dym
et al
|
04-04-2019
|
|
Self-Adapting Goals Allow Transfer of Predictive Models
to New Tasks
by
Kai Olav Ellefsen
et al
|
04-04-2019
|
|
Combining Sentiment Lexica with a Multi-View
Variational Autoencoder
by
Alexander Hoyle
et al
|
04-03-2019
|
|
Continuous Direct Sparse Visual Odometry from RGB-D
Images
by
Maani Ghaffari
et al
|
04-05-2019
|
|
Convolutional Self-Attention Networks
by
Baosong Yang
et al
|
04-02-2019
|
|
Learning Algorithms via Neural Logic Networks
by
Ali Payani
et al
|
04-04-2019
|
|
An End-to-End Baseline for Video Captioning
by
Silvio Olivastri
et al
|
04-02-2019
|
|
An Algorithmic Theory of Integer Programming
by
Friedrich Eisenbrand
et al
|
04-03-2019
|
|
Cost-Sensitive Feature Selection by Optimizing
F-Measures
by
Meng Liu
et al
|
04-04-2019
|
|
Multi-Context Term Embeddings: the Use Case of
Corpus-based Term Set Expansion
by
Jonathan Mamou
et al
|
04-04-2019
|
|
MMED: A Multi-domain and Multi-modality Event Dataset
by
Zhenguo Yan
et al
|
04-03-2019
|
|
Robust Multi-agent Counterfactual Prediction
by
Alexander Peysakhovich
et al
|
04-03-2019
|
|
Subword-Level Language Identification for Intra-Word
Code-Switching
by
Manuel Mager
et al
|
04-02-2019
|
|
FEAFA: A Well-Annotated Dataset for Facial Expression
Analysis and 3D Facial Animation
by
Yanfu Yan
et al
|
04-04-2019
|
|
Neural Models of the Psychosemantics of `Most
by
Lewis O'Sullivan
et al
|
04-02-2019
|
|
Improving Robot Success Detection using Static Object
Data
by
Rosario Scalise
et al
|
04-04-2019
|
|
Density Matching for Bilingual Word Embedding
by
Chunting Zhou
et al
|
04-02-2019
|
|
A PCA-like Autoencoder
by
Saïd Ladjal
et al
|
04-02-2019
|
|
Software Engineering for Intelligent and Autonomous
Systems: Report from the GI Dagstuhl Seminar 18343
by
Simos Gerasimou
et al
|
04-05-2019
|
|
Modeling Recurrence for Transformer
by
Jie Hao
et al
|
04-03-2019
|
|
Jointly Extracting and Compressing Documents with
Summary State Representations
by
Afonso Mendes
et al
|
04-02-2019
|
|
Aiding Intra-Text Representations with Visual Context
for Multimodal Named Entity Recognition
by
Omer Arshad
et al
|
04-04-2019
|
|
Affect-Driven Dialog Generation
by
Pierre Colombo
et al
|
04-03-2019
|
|
Defeats GAN: A Simpler Model Outperforms in Knowledge
Representation Learning
by
Heng Wang
et al
|
04-05-2019
|
|
On the Feasibility of Transfer-learning Code Smells
using Deep Learning
by
Tushar Sharma
et al
|
04-04-2019
|
|
Topic Spotting using Hierarchical Networks with Self
Attention
by
Pooja Chitkara
et al
|
04-04-2019
|
|
Blind Visual Motif Removal from a Single Image
by
Amir Hertz
et al
|
04-02-2019
|
|
Neural Vector Conceptualization for Word Vector Space
Interpretation
by
Robert Schwarzenberg
et al
|
04-03-2019
|
|
A Comparative Study on Hierarchical Navigable Small
World Graphs
by
Peng-Cheng Lin
et al
|
04-02-2019
|
|
Automatic Left Atrial Appendage Orifice Detection for
Preprocedural Planning of Appendage Closure
by
Walid Abdullah Al
et al
|
04-05-2019
|
|
CLEARumor at SemEval-2019 Task 7: ConvoLving ELMo
Against Rumors
by
Ipek Baris
et al
|
04-03-2019
|
|
OpBerg: Discovering causal sentences using optimal
alignments
by
Justin Wood
et al
|
04-02-2019
|
|
DeLTA: GPU Performance Model for Deep Learning
Applications with In-depth Memory System Traffic
Analysis
by
Sangkug Lym
et al
|
04-04-2019
|
|
A Categorisation of Post-hoc Explanations for
Predictive Models
by
John Mitros
et al
|
04-02-2019
|
|
Monocular 3D Human Pose Estimation by Generation and
Ordinal Ranking
by
Saurabh Sharma
et al
|
04-04-2019
|
|
Preference Neural Network
by
Ayman Elgharabawy
|
04-02-2019
|
|
Using Multi-Sense Vector Embeddings for Reverse
Dictionaries
by
Michael A. Hedderich
et al
|
04-05-2019
|
|
Information Aggregation for Multi-Head Attention with
Routing-by-Agreement
by
Jian Li
et al
|
04-05-2019
|
|
Learning to Remember: A Synaptic Plasticity Driven
Framework for Continual Learning
by
Oleksiy Ostapenko
et al
|
04-03-2019
|
|
Model Slicing for Supporting Complex Analytics with
Elastic Inference Cost and Resource Constraints
by
Shaofeng Cai
et al
|
04-02-2019
|
|
SADIH: Semantic-Aware DIscrete Hashing
by
Zheng Zhang
et al
|
04-03-2019
|
|
Automated Fact Checking in the News Room
by
Sebastião Miranda
et al
|
04-03-2019
|
|
Differentially Private Model Publishing for Deep
Learning
by
Lei Yu
et al
|
04-04-2019
|
|
Assessment of Faster R-CNN in Man-Machine collaborative
search
by
Arturo Deza
et al
|
04-03-2019
|
|
Recognition of Advertisement Emotions with Application
to Computational Advertising
by
Abhinav Shukla
et al
|
04-04-2019
|
|
Learning Implicit Generative Models by Matching
Perceptual Features
by
Cicero Nogueira dos Santos
et al
|
04-02-2019
|
|
Non-Rigid Point Set Registration Networks
by
Lingjing Wang
et al
|
04-05-2019
|
|
What Object Should I Use? - Task Driven Object
Detection
by
Johann Sawatzky
et al
|
04-03-2019
|
|
Modeling Vocabulary for Big Code Machine Learning
by
Hlib Babii
et al
|
04-03-2019
|
|
Multi-layered Spiking Neural Network with Target
Timestamp Threshold Adaptation and STDP
by
Pierre Falez
et al
|
04-03-2019
|
|
Point Cloud Oversegmentation with Graph-Structured Deep
Metric Learning
by
Loic Landrieu
et al
|
04-04-2019
|
|
Graph Pattern Entity Ranking Model for Knowledge Graph
Completion
by
Takuma Ebisu
et al
|
04-02-2019
|
|
Short Text Classification Improved by Feature Space
Extension
by
Yanxuan Li
|
04-04-2019
|
|
Unsupervised Domain Adaptation of Contextualized
Embeddings: A Case Study in Early Modern English
by
Xiaochuang Han
et al
|
04-04-2019
|
|
Video Classification with Channel-Separated
Convolutional Networks
by
Du Tran
et al
|
04-04-2019
|
|
Neural Networks for Modeling Source Code Edits
by
Rui Zhao
et al
|
04-04-2019
|
|
Learning to Reason: Leveraging Neural Networks for
Approximate DNF Counting
by
Ralph Abboud
et al
|
04-03-2019
|
|
x3ogre: Connecting X3D to a state of the art rendering
engine
by
Pavel Rojtberg
et al
|
04-04-2019
|
|
Learning to Cluster Faces on an Affinity Graph
by
Lei Yang
et al
|
04-03-2019
|
|
Interpreting Adversarial Examples by Activation
Promotion and Suppression
by
Kaidi Xu
et al
|
04-03-2019
|
|
An Improved Upper Bound for the Ring Loading Problem
by
Karl Däubel
|
04-04-2019
|
|
Oceanic Games: Centralization Risks and Incentives in
Blockchain Mining
by
Nikos Leonardos
et al
|
04-04-2019
|
|
Online Risk-Bounded Motion Planning for Autonomous
Vehicles in Dynamic Environments
by
Xin Huang
et al
|
04-03-2019
|
|
Invariance Matters: Exemplar Memory for Domain Adaptive
Person Re-identification
by
Zhun Zhong
et al
|
04-04-2019
|
|
How should my chatbot interact? A survey on
human-chatbot interaction design
by
Ana Paula Chaves
et al
|
04-03-2019
|
|
A Comprehensive Overhaul of Feature Distillation
by
Byeongho Heo
et al
|
04-02-2019
|
|
On the Complexity of Reachability in Parametric Markov
Decision Processes
by
Tobias Winkler
et al
|
04-04-2019
|
|
Interaction-aware Multi-agent Tracking and
Probabilistic Behavior Prediction via Adversarial
Learning
by
Jiachen Li
et al
|
04-02-2019
|
|
Data driven approximation of parametrized PDEs by
Reduced Basis and Neural Networks
by
Niccolò Dal Santo
et al
|
04-05-2019
|
|
Evading Defenses to Transferable Adversarial Examples
by Translation-Invariant Attacks
by
Yinpeng Dong
et al
|
04-02-2019
|
|
Hammering Mizar by Learning Clause Guidance
by
Jan Jakubův
et al
|
04-05-2019
|
|
Scalable Nonlinear Planning with Deep Neural Network
Learned Transition Models
by
Ga Wu
et al
|
04-02-2019
|
|
Stratum: A Serverless Framework for Lifecycle
Management of Machine Learning based Data Analytics
Tasks
by
Anirban Bhattacharjee
et al
|
04-03-2019
|
|
Internal versus external balancing in the evaluation of
graph-based number types
by
Hanna Geppert
et al
|
04-02-2019
|
|
An Efficient Network Intrusion Detection System Based
on Feature Selection and Ensemble Classifier
by
Yu-Yang Zhou
et al
|
04-05-2019
|
|
Reducing Topological Minor Containment to the Unique
Linkage Theorem
by
Fedor V. Fomin
et al
|
04-04-2019
|
|
Proving tree algorithms for succinct data structures
by
Reynald Affeldt
et al
|
04-04-2019
|
|
Sharing a pizza: bisecting masses with two cuts
by
Luis Barba
et al
|
04-04-2019
|
|
An Evolutionary Framework for Automatic and Guided
Discovery of Algorithms
by
Ruchira Sasanka
et al
|
04-05-2019
|
|
Reducing catastrophic forgetting when evolving neural
networks
by
Joseph Early
|
04-05-2019
|
|
Weakly Supervised Action Segmentation Using Mutual
Consistency
by
Yaser Souri
et al
|
04-03-2019
|
|
Identifying Patient Groups based on Frequent Patterns
of Patient Samples
by
Seyed Amin Tabatabaei
et al
|
04-03-2019
|
|
The Satisfiability Threshold for Non-Uniform Random
2-SAT
by
Tobias Friedrich
et al
|
04-02-2019
|
|
A Game of Dice: Machine Learning and the Question
Concerning Art
by
Paul Todorov
|
04-04-2019
|
|
Planning under risk and uncertainty based on
Prospect-theoretic models
by
Aamodh Suresh
et al
|
04-05-2019
|
|
A Conceptual Architecture for Contractual Data Sharing
in a Decentralised Environment
by
Iain Barclay
et al
|
04-04-2019
|
|
Quasi-polynomial Algorithms for List-coloring of Nearly
Intersecting Hypergraphs
by
Khaled Elbassioni
|
04-04-2019
|
|
An End-to-End Conversational Style Matching Agent
by
Rens Hoegen
et al
|
04-05-2019
|
|
Improving Scientific Article Visibility by Neural Title
Simplification
by
Alexander Shvets
|
04-03-2019
|
|
Personalized Bundle List Recommendation
by
Jinze Bai
et al
|
04-02-2019
|
|
Persistent Memory I/O Primitives
by
Alexander van Renen
et al
|
04-02-2019
|
|
A Message-Passing Interpretation of Adjoint Logic
by
Klaas Pruiksma
et al
|
04-02-2019
|
|
Learning a Partitioning Advisor with Deep Reinforcement
Learning
by
Benjamin Hilprecht
et al
|
04-03-2019
|
|
A Visual Neural Network for Robust Collision Perception
in Vehicle Driving Scenarios
by
Qinbing Fu
et al
|
04-02-2019
|
|
Helping Computers Understand Geographically-Bound
Activity Restrictions
by
M. Soll
et al
|
04-05-2019
|
|
Nutty-based Robot Animation -- Principles and Practices
by
Tiago Ribeiro
et al
|
04-04-2019
|
|
Learning Numeracy: Binary Arithmetic with Neural Turing
Machines
by
Jacopo Castellini
|
04-03-2019
|
|
HoloDetect: Few-Shot Learning for Error Detection
by
Alireza Heidari
et al
|
04-02-2019
|
|
Empirical Study of Deep Learning for Text
Classification in Legal Document Review
by
Fusheng Wei
et al
|
04-04-2019
|
|
VeST: Very Sparse Tucker Factorization of Large-Scale
Tensors
by
Moonjeong Park
et al
|
04-02-2019
|
|
VRGym: A Virtual Testbed for Physical and Interactive
AI
by
Xu Xie
et al
|
04-05-2019
|
|
A Literature Study of Embeddings on Source Code
by
Zimin Chen
et al
|
04-02-2019
|
|
The Tower of Babel Meets Web 2.0: User-Generated
Content and its Applications in a Multilingual Context
by
B. Hecht
et al
|
04-03-2019
|
|
Group-wise classification approach to improve Android
malicious apps detection accuracy
by
Ashu Sharma
et al
|
04-04-2019
|
|
Automated Fortran--C++ Bindings for Large-Scale
Scientific Applications
by
Seth R. Johnson
et al
|
04-04-2019
|
|
Goal-setting And Achievement In Activity Tracking Apps:
A Case Study Of MyFitnessPal
by
Mitchell L. Gordon
et al
|
04-04-2019
|
|
Mining Precision Interfaces From Query Logs
by
Qianrui Zhang
et al
|
04-04-2019
|
|
Learning Analytics Made in France: The METALproject
by
Armelle Brun
et al
|
04-02-2019
|
|
Improving Interaction with Virtual Globes through
Spatial Thinking: Helping Users Ask Why?
by
J. Schöning
et al
|
04-02-2019
|
|
Testing Self-Organizing Multiagent Systems
by
Nathalia Nascimento
et al
|
04-02-2019
|
|
The Impact of Systematic Edits in History Slicing
by
Ryosuke Funaki
et al
|
04-02-2019
|
|
Verification and Validation of Semantic Annotations
by
Oleksandra Panasiuk
et al
|
04-04-2019
|
|
Numerical Simulation of Metal Machining Process with
Eulerian and Total Lagrangian SPH
by
Md Rushdie Ibne Islam
et al
|
04-02-2019
|
|
Lab Hackathons to Overcome Laboratory Equipment
Shortages in Africa: Opportunities and Challenges
by
Helena Webb
et al
|
04-02-2019
|
|
Out of Site: Empowering a New Approach to Online
Boycotts
by
H. Li
et al
|
04-05-2019
|
|
An Experimental Study of Algorithms for Geodesic
Shortest Paths in the Constant-Workspace Model
by
Jonas Cleve
et al
|
04-05-2019
|
|
Drawing k-linear Metro Maps
by
Soeren Nickel
et al
|
04-02-2019
|
|
NELA-GT-2018: A Large Multi-Labelled News Dataset for
The Study of Misinformation in News Articles
by
Jeppe Norregaard
et al
|
04-02-2019
|
|
A Review of Critical Infrastructure Protection
Approaches: Improving Security through Responsiveness
to the Dynamic Modelling Landscape
by
Uchenna D Ani
et al
|
04-03-2019
|
|
Learning Nash Equilibria in Monotone Games
by
Tatiana Tatarenko
et al
|
04-05-2019
|
|
On the Equivalence of Forward Mode Automatic
Differentiation and Symbolic Differentiation
by
Soeren Laue
|
04-04-2019
|
|
A Faster Algorithm for the Limited-Capacity
Many-to-Many Point Matching in One Dimension
by
Fatemeh Rajabi-Alni
et al
|
04-03-2019
|
|
CloudCAMP: Automating Cloud Services Deployment \&
Management
by
Anirban Bhattacharjee
et al
|
04-02-2019
|
|
Different Spirals of Sameness: A Study of Content
Sharing in Mainstream and Alternative Media
by
Benjamin D. Horne
et al
|
04-02-2019
|
|
Rating Reliability and Bias in News Articles: Does AI
Assistance Help Everyone?
by
Benjamin D. Horne
et al
|
04-02-2019
|
|
Source Camera Attribution of Multi-Format Devices
by
Samet Taspinar
et al
|
04-04-2019
|
|
Wont We Fix this Issue? Qualitative Characterization
and Automated Identification of Wontfix Issues on
GitHub
by
Andrea Di Sorbo
et al
|
04-02-2019
|
|
Pharos: improving navigation instructions on
smartwatches by including global landmarks
by
N. Wenig
et al
|
04-02-2019
|
|
Multiparty Session Type-safe Web Development with
Static Linearity
by
Jonathan King
et al
|
04-02-2019
|
|
Concurrent Typestate-Oriented Programming in Java
by
Rosita Gerbo
et al
|
04-02-2019
|
|
FreeST: Context-free Session Types in a Functional
Language
by
Bernardo Almeida
et al
|
04-02-2019
|
|
Service Equivalence via Multiparty Session Type
Isomorphisms
by
Assel Altayeva
et al
|
04-02-2019
|
|
Value-Dependent Session Design in a Dependently Typed
Language
by
Jan de Muijnck-Hughes
et al
|
04-02-2019
|
|
Empirical Evaluations of Active Learning Strategies in
Legal Document Review
by
Rishi Chhatwal
et al
|
04-02-2019
|
|
Context-Aware Misbehavior Detection Scheme for
Vehicular Ad Hoc Networks using Sequential Analysis of
the Temporal and Spatial Correlation of the Cooperative
Awareness Messages
by
Fuad A. Ghaleb
|
04-02-2019
|
|
Styler: Learning Formatting Conventions to Repair
Checkstyle Errors
by
Benjamin Loriot
et al
|
04-05-2019
|
|
Tensor B-Spline Numerical Methods for PDEs: a
High-Performance Alternative to FEM
by
Dmytro Shulga
et al
|
04-04-2019
|
|
Transfer Learning for Performance Modeling of Deep
Neural Network Systems
by
Md Shahriar Iqbal
et al
|
04-05-2019
|
|
Safe Disassociation of Set-Valued Datasets
by
Nancy Awad
et al
|
04-04-2019
|
|
Triplet-Based Deep Hashing Network for Cross-Modal
Retrieval
by
Cheng Deng
et al
|
04-04-2019
|
|
The prospects of a quantitative measurement of agility:
A validation study on an agile maturity model
by
Lucas Gren
et al
|
04-04-2019
|
|
Work Motivational Challenges Regarding the Interface
Between Agile Teams and a Non-Agile Surrounding
Organization: A case study
by
Lucas Gren
et al
|
04-03-2019
|
|
Economics of Age of Information Management under
Network Externalities
by
Shugang Hao
et al
|
04-04-2019
|
|
Trying to Increase the Mature Use of Agile Practices by
Group Development Psychology Training - An Experiment
by
Lucas Gren
et al
|
04-03-2019
|
|
Health and Kinship Matter: Learning About
Direct-To-Consumer Genetic Testing User Experiences via
Online Discussions
by
Zhijun Yin
et al
|
04-03-2019
|
|
Adopting a software product line engineering approach
in industrial development contexts: A protocol for a
systematic literature review
by
José L. Barros-Justo
et al
|
04-04-2019
|
|
The Systems Approach to Change and the Agile Software
Development Context
by
Lucas Gren
|
04-04-2019
|
|
Agility Measurements Mismatch: A Validation Study on
Three Agile Team Assessments in Software Engineering
by
Konstantinos Chronis
et al
|
04-04-2019
|
|
Group development and group maturity when building
agile teams: A qualitative and quantitative
investigation at eight large companies
by
Lucas Gren
et al
|
04-04-2019
|
|
DevOps and its Philosophy : Education Matters!
by
Evgeny Bobrov
et al
|
04-04-2019
|
|
Bounties in Open Source Development on GitHub: A Case
Study of Bountysource Bounties
by
Jiayuan Zhou
et al
|
04-03-2019
|
|
Tropical Differential Groebner Basis
by
Youren Hu
et al
|
04-03-2019
|
|
Symbolic Exact Inference for Discrete Probabilistic
Programs
by
Steven Holtzen
et al
|
04-02-2019
|
|
SubwayPS: Towards Enabling Smartphone Positioning in
Underground Public Transportation Systems
by
T. Stockx
et al
|
04-04-2019
|
|
Is it Possible to Disregard Obsolete Requirements? - An
Initial Experiment on a Potentially New Bias in
Software Effort Estimation
by
Lucas Gren
et al
|
04-04-2019
|
|
A fourth explanation to Brooks Law - The aspect of
group developmental psychology
by
Lucas Gren
|
04-02-2019
|
|
Explainable Text Classification in Legal Document
Review A Case Study of Explainable Predictive Coding
by
Rishi Chhatwal
et al
|
04-02-2019
|
|
An Empirical Study of the Application of Machine
Learning and Keyword Terms Methodologies to
Privilege-Document Review Projects in Legal Matters
by
Peter Gronvall
et al
|
04-04-2019
|
|
Group Maturity and Agility, Are They Connected? - A
Survey Study
by
Lucas Gren
et al
|
04-02-2019
|
|
Using Google Analytics to Support Cybersecurity
Forensics
by
Han Qin
et al
|
04-04-2019
|
|
Useful Statistical Methods for Human Factors Research
in Software Engineering: A Discussion on Validation
with Quantitative Data
by
Lucas Gren
et al
|
04-05-2019
|
|
RADICAL-Cybertools: Middleware Building Blocks for
Scalable Science
by
Vivek Balasubramanian
et al
|
04-05-2019
|
|
EvoCreeper: Automated Black-Box Model Generation for
Smart TV Applications
by
Bestoun S. Ahmed
et al
|
04-04-2019
|
|
Size Matters: Microservices Research and Applications
by
Manuel Mazzara
et al
|
04-05-2019
|
|
Security Landscape for Robotics
by
Ryan Shah
|
04-05-2019
|
|
A New Approach to Speed up Combinatorial Search
Strategies Using Stack and Hash Table
by
Bestoun S. Ahmed
et al
|
04-05-2019
|
|
Towards a Realistic Simulation Framework for Vehicular
Platooning Applications
by
Bruno Vieira
et al
|
04-04-2019
|
|
20 Years of DDoS: a Call to Action
by
Eric Osterweil
et al
|
04-05-2019
|
|
Sensory Regimes of Effective Distributed Searching
without Leaders
by
Ravid Cohen
et al
|
04-02-2019
|
|
Empirical Evaluations of Preprocessing Parameters
Impact on Predictive Codings Effectiveness
by
Rishi Chhatwal
et al
|
04-05-2019
|
|
A Surface Integral Formulation for Scattering Modeling
by 2D Penetrable Objects
by
Xiaochao Zhou
et al
|