TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| 3 | |
| 3D point cloud | |
| 3D Wireless Sensor Network | |
| A | |
| accent component | |
| Adaptive MFRAT Filter | |
| Agent Based Modeling | |
| Agent based Modelling and Simulation | |
| agent-based model | |
| Algorithms | |
| analysis | |
| Analytical model | |
| Ant Colony Optimization – ACO | |
| anytime algorithm | |
| application deployment | |
| Atheros ath5k | |
| Attention | |
| B | |
| Bayesian optimization | |
| BFD-NN | |
| Bi-gram | |
| Bidirectional LSTM | |
| big data speech classification | |
| Boundary point | |
| Broadcom b43 | |
| Brownian motion | |
| Bus System | |
| Byzantine Attacks | |
| C | |
| cabinet layout | |
| CALL(Computer Assisted Language Learning) | |
| Camera | |
| Canonical Correlation Analysis | |
| cell image segmentation | |
| Change Effort Estimation | |
| Change Impact Analysis | |
| closed high-utility itemset | |
| cloud computing | |
| Clustering | |
| color image | |
| Complex Filter | |
| Complex systems | |
| Compression | |
| Conformail Geometric Algebra | |
| Consensus Algorithms | |
| constrained clustering | |
| convolutional neural networks | |
| coordinates in 3 dimensional | |
| copy detection | |
| Correlation | |
| CPU Frequency | |
| credit scorig | |
| crisis situation | |
| Cross-domain Sentiment Classification | |
| cyber range | |
| cybersecurity education | |
| cybersecurity practice | |
| D | |
| data center deployment | |
| Data hiding | |
| data mining | |
| DCT | |
| decryption | |
| deep learning | |
| Deep Neural Network | |
| defualt probability | |
| Delegating Computation | |
| delta feature | |
| denoising | |
| determinant | |
| DGA Botnet detection | |
| Diagonal cabling | |
| dialog act | |
| Dictionary Learning | |
| Differential Evolution | |
| Diffusion Process | |
| Digital holography | |
| dissimilarity | |
| distance | |
| distortion drift | |
| distributed configuration | |
| Distributed Systems | |
| DNA | |
| drug-target prediction | |
| Duty cycling | |
| Dynamic programming | |
| dynamic time warping | |
| Dynamic VRP – DVRP | |
| E | |
| ECQV Implicit Certificate | |
| Effort Estimation | |
| eigenvalue | |
| eigenvector | |
| Elastic net | |
| Elevation surface | |
| Embedded system | |
| embedding capacity | |
| Emotion | |
| Encrypted application traffic | |
| encryption | |
| Energy consumption | |
| Energy efficiency | |
| Energy-aware virtual machine allocation | |
| Energy-balanced unequal clustering | |
| Enhancement | |
| Entropy | |
| Epidemic | |
| Euler-Lagrange equation | |
| evacuation process | |
| exact copy | |
| extractive summarization | |
| F | |
| Fall detection | |
| feature selection | |
| Fingerprints | |
| Foreign ownership | |
| four-wave mixing (FWM) | |
| FPGA | |
| fusion method | |
| Fuzzy clustering | |
| G | |
| Gabor Filter | |
| GAMA platform | |
| Green cloud | |
| H | |
| H.264/AVC | |
| hand gesture recognition | |
| Hardware acceleration | |
| high performance computing | |
| high-utility itemset | |
| Hole filling | |
| Human Activity Recognition | |
| I | |
| image annotation | |
| Imbalanced data | |
| Impact Analysis | |
| in-Memory | |
| Indoor environment | |
| information retrieval | |
| Instance Hiding | |
| integration | |
| Intention mining | |
| interconnection network | |
| Intervention | |
| Intrusion Detection | |
| Inversion Radviz | |
| IoT Security | |
| J | |
| JOCOR | |
| K | |
| K-mean | |
| K-Means Algorithm | |
| K-medoids clustering | |
| Kalman filter | |
| Key Agreement | |
| key frames | |
| key-value | |
| knowledge transmission | |
| L | |
| language education | |
| language grid | |
| Lasso | |
| Latent Dirichlet Allocation | |
| legacy components | |
| Lens Free Imager | |
| Linear Symmetry Filter | |
| lnbnn mapreduce | |
| Load balancing | |
| local search | |
| Location Search | |
| logistic approach | |
| Long range PON | |
| M | |
| Machine learning | |
| machine translation services | |
| Mahalanobis distance | |
| MANETs | |
| Markov random fields (MRFs) | |
| medoid initialization | |
| metric | |
| Mobile System | |
| Motion features | |
| multi-hop network | |
| multilabel classification | |
| multilingual communication | |
| Multipath routing | |
| multithreading technique | |
| Multivariate Data Visualization | |
| N | |
| natural spoken language understanding | |
| near copy | |
| Network Functions Virtualization | |
| Network lifetime | |
| network performance | |
| Network security | |
| network-based ranking method | |
| Neural Network | |
| NXDomain | |
| O | |
| online social media mining | |
| open-source code | |
| Operating System | |
| operation | |
| Opposition-Based Differential Evolution | |
| optimal algorithm | |
| Optimization | |
| orthogonal frequency division multiplexing (OFDM) | |
| P | |
| pairwise constrained clustering | |
| paraphrase | |
| Particle Swarm Optimization | |
| Passive Input Privacy | |
| Pattern Recognition | |
| Pearson correlation coefficients | |
| Person Search | |
| person tracking | |
| pitch accent | |
| Plagiarism | |
| plagiarism detection | |
| Poisson-Gaussian noise | |
| presentation | |
| Principal Components Regression | |
| Private Outsourcing of Computation | |
| Process Scheduler | |
| prominence detection | |
| prosody | |
| Public Transportation Design | |
| Q | |
| Quality Visualization | |
| R | |
| Radviz | |
| random walk with restart | |
| RDMA | |
| realtime | |
| Recongurable computing | |
| Resource Allocation | |
| Routing holes | |
| S | |
| scalar product | |
| Scene tracking | |
| Segmentation | |
| Sentence Compression | |
| Shape features | |
| significant path | |
| similarity | |
| similarity measure | |
| simulation | |
| Single camera | |
| SLIC | |
| Spark | |
| Sparse Coding | |
| Speech act | |
| speech classification | |
| Statecharts | |
| Static VRP – SVRP | |
| Stock market | |
| Subsequence join | |
| superpixel | |
| Supervised Learning | |
| systems pharmacology | |
| T | |
| Tabu search | |
| Tangent plane | |
| TDMA scheduling | |
| text classification | |
| text understanding | |
| Time series | |
| time varying graphs | |
| Topic Modeling | |
| total variation | |
| Transport Layer Security | |
| U | |
| uncertain database | |
| User Experience | |
| user intent identification | |
| V | |
| Vehicle Routing Problem – VRP | |
| Video Instance Search | |
| video segments | |
| Vietnamese | |
| Vietnamese Sign Language | |
| Vietnamese spoken text processing | |
| Virtual machine allocation | |
| VnIndex | |
| W | |
| Waste Management | |
| wavelength division multiplexing (WDM) | |
| WiFi | |
| Wireless ad-hoc router | |
| Wireless sensor network | |
| Wireless sensor networks | |
| Word Embeddings | |
| WordNet | |
| Workflow scheduling | |