Browsing by Subject Machine learning


jump to:
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 120 to 139 of 164 < previous   next >
Published DateTitleAuthor(s)
6-Nov-2016Real time News Story Detection and Tracking with HashtagsPoghosyan, GevorgIfrim, Georgiana
23-Jul-2019Recommender Systems: A Healthy ObsessionSmyth, Barry
1356998Recommending topics for web curationSaaya, ZurinaSchaal, MarkusRafter, RachaelSmyth, Barry
31-Jan-2014Reconstruction et analyse smantique de chronologies cybercriminellesKechadi, TaharChabot, YoanBertaux, AurélieNicolle, Christophe
2014Reference Architecture for a Cloud Forensic Readiness SystemDe Marco, LuciaFerrucci, FilomenaKechadi, Tahar
2-Oct-2015Reformulation Strategies of Repeated References in the Context of Robot Perception Errors in Situated DialogueSchutte, NeilsKelleher, JohnMacNamee, Brian
28-Aug-2015Reformulations of the Map Equation for Community Finding and BlockmodellingHurley, Neil J.Duriakova, Erika
12-Sep-2018Resilience of airborne networksAhmadi, HamedFontanesi, GianlucaKatzis, KonstantinosShakir, Muhammad ZeeshanZhu, Anding
2020Review: Language and Chronology: Text Dating by Machine Learning (Toner and Han)Qiu, Fangzhe
Jan-2017Robot perception errors and human resolution strategies in situated human-robot dialogueSchutte, NielsKelleher, JohnMacNamee, Brian
2015Role Analysis in Networks Using Mixtures of Exponential Random Graph ModelsSalter-Townshend, MichaelMurphy, Thomas Brendan
Jun-2020SCLpred-EMS: Subcellular localization prediction of endomembrane system and secretory pathway proteins by Deep N-to-1 Convolutional Neural NetworksKaleel, ManazZheng, YandanChen, JialiangFeng, XuanmingSimpson, Jeremy C.Pollastri, GianlucaMooney, Catherine
Sep-2015Security Threats of URL Shortening: A Users PerspectiveLe-Khac, Nhien-AnKechadi, Tahar
1-Jan-2020Segmentation of shoulder rehabilitation exercises for single and multiple inertial sensor systemsBrennan, LouiseBevilacqua, AntonioKechadi, TaharCaulfield, Brian
Sep-2008Sentence-Level Event Classification in Unstructured TextsNaughton, MartinaStokes, NicolaCarthy, Joe
28-Aug-2013Simmelian Backbones: Amplifying Hidden Homophily in Facebook NetworksNick, BoboLee, ConradCunningham, PádraigBrandes, Ulrik
13-Feb-2015Simulating SQL-Injection Cyber-attacks using GNS3Al-Mahrouqi, AadilTobin, PatrickAbdalla, SamehKechadi, Tahar
22-May-2015SLAFM: A Service Level Agreements Formal Model for Cloud ComputingDe Marco, LuciaFerrucci, FilomenaKechadi, Tahar
2014Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial ToolFaheem, MuhammadLe-Khac, Nhien-AnKechadi, Tahar
24-Sep-2010Spectral co-clustering for dynamic bipartite graphsGreene, DerekCunningham, Pádraig