TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
3 | |
3D point cloud | |
3D Wireless Sensor Network | |
A | |
accent component | |
Adaptive MFRAT Filter | |
Agent Based Modeling | |
Agent based Modelling and Simulation | |
agent-based model | |
Algorithms | |
analysis | |
Analytical model | |
Ant Colony Optimization – ACO | |
anytime algorithm | |
application deployment | |
Atheros ath5k | |
Attention | |
B | |
Bayesian optimization | |
BFD-NN | |
Bi-gram | |
Bidirectional LSTM | |
big data speech classification | |
Boundary point | |
Broadcom b43 | |
Brownian motion | |
Bus System | |
Byzantine Attacks | |
C | |
cabinet layout | |
CALL(Computer Assisted Language Learning) | |
Camera | |
Canonical Correlation Analysis | |
cell image segmentation | |
Change Effort Estimation | |
Change Impact Analysis | |
closed high-utility itemset | |
cloud computing | |
Clustering | |
color image | |
Complex Filter | |
Complex systems | |
Compression | |
Conformail Geometric Algebra | |
Consensus Algorithms | |
constrained clustering | |
convolutional neural networks | |
coordinates in 3 dimensional | |
copy detection | |
Correlation | |
CPU Frequency | |
credit scorig | |
crisis situation | |
Cross-domain Sentiment Classification | |
cyber range | |
cybersecurity education | |
cybersecurity practice | |
D | |
data center deployment | |
Data hiding | |
data mining | |
DCT | |
decryption | |
deep learning | |
Deep Neural Network | |
defualt probability | |
Delegating Computation | |
delta feature | |
denoising | |
determinant | |
DGA Botnet detection | |
Diagonal cabling | |
dialog act | |
Dictionary Learning | |
Differential Evolution | |
Diffusion Process | |
Digital holography | |
dissimilarity | |
distance | |
distortion drift | |
distributed configuration | |
Distributed Systems | |
DNA | |
drug-target prediction | |
Duty cycling | |
Dynamic programming | |
dynamic time warping | |
Dynamic VRP – DVRP | |
E | |
ECQV Implicit Certificate | |
Effort Estimation | |
eigenvalue | |
eigenvector | |
Elastic net | |
Elevation surface | |
Embedded system | |
embedding capacity | |
Emotion | |
Encrypted application traffic | |
encryption | |
Energy consumption | |
Energy efficiency | |
Energy-aware virtual machine allocation | |
Energy-balanced unequal clustering | |
Enhancement | |
Entropy | |
Epidemic | |
Euler-Lagrange equation | |
evacuation process | |
exact copy | |
extractive summarization | |
F | |
Fall detection | |
feature selection | |
Fingerprints | |
Foreign ownership | |
four-wave mixing (FWM) | |
FPGA | |
fusion method | |
Fuzzy clustering | |
G | |
Gabor Filter | |
GAMA platform | |
Green cloud | |
H | |
H.264/AVC | |
hand gesture recognition | |
Hardware acceleration | |
high performance computing | |
high-utility itemset | |
Hole filling | |
Human Activity Recognition | |
I | |
image annotation | |
Imbalanced data | |
Impact Analysis | |
in-Memory | |
Indoor environment | |
information retrieval | |
Instance Hiding | |
integration | |
Intention mining | |
interconnection network | |
Intervention | |
Intrusion Detection | |
Inversion Radviz | |
IoT Security | |
J | |
JOCOR | |
K | |
K-mean | |
K-Means Algorithm | |
K-medoids clustering | |
Kalman filter | |
Key Agreement | |
key frames | |
key-value | |
knowledge transmission | |
L | |
language education | |
language grid | |
Lasso | |
Latent Dirichlet Allocation | |
legacy components | |
Lens Free Imager | |
Linear Symmetry Filter | |
lnbnn mapreduce | |
Load balancing | |
local search | |
Location Search | |
logistic approach | |
Long range PON | |
M | |
Machine learning | |
machine translation services | |
Mahalanobis distance | |
MANETs | |
Markov random fields (MRFs) | |
medoid initialization | |
metric | |
Mobile System | |
Motion features | |
multi-hop network | |
multilabel classification | |
multilingual communication | |
Multipath routing | |
multithreading technique | |
Multivariate Data Visualization | |
N | |
natural spoken language understanding | |
near copy | |
Network Functions Virtualization | |
Network lifetime | |
network performance | |
Network security | |
network-based ranking method | |
Neural Network | |
NXDomain | |
O | |
online social media mining | |
open-source code | |
Operating System | |
operation | |
Opposition-Based Differential Evolution | |
optimal algorithm | |
Optimization | |
orthogonal frequency division multiplexing (OFDM) | |
P | |
pairwise constrained clustering | |
paraphrase | |
Particle Swarm Optimization | |
Passive Input Privacy | |
Pattern Recognition | |
Pearson correlation coefficients | |
Person Search | |
person tracking | |
pitch accent | |
Plagiarism | |
plagiarism detection | |
Poisson-Gaussian noise | |
presentation | |
Principal Components Regression | |
Private Outsourcing of Computation | |
Process Scheduler | |
prominence detection | |
prosody | |
Public Transportation Design | |
Q | |
Quality Visualization | |
R | |
Radviz | |
random walk with restart | |
RDMA | |
realtime | |
Recongurable computing | |
Resource Allocation | |
Routing holes | |
S | |
scalar product | |
Scene tracking | |
Segmentation | |
Sentence Compression | |
Shape features | |
significant path | |
similarity | |
similarity measure | |
simulation | |
Single camera | |
SLIC | |
Spark | |
Sparse Coding | |
Speech act | |
speech classification | |
Statecharts | |
Static VRP – SVRP | |
Stock market | |
Subsequence join | |
superpixel | |
Supervised Learning | |
systems pharmacology | |
T | |
Tabu search | |
Tangent plane | |
TDMA scheduling | |
text classification | |
text understanding | |
Time series | |
time varying graphs | |
Topic Modeling | |
total variation | |
Transport Layer Security | |
U | |
uncertain database | |
User Experience | |
user intent identification | |
V | |
Vehicle Routing Problem – VRP | |
Video Instance Search | |
video segments | |
Vietnamese | |
Vietnamese Sign Language | |
Vietnamese spoken text processing | |
Virtual machine allocation | |
VnIndex | |
W | |
Waste Management | |
wavelength division multiplexing (WDM) | |
WiFi | |
Wireless ad-hoc router | |
Wireless sensor network | |
Wireless sensor networks | |
Word Embeddings | |
WordNet | |
Workflow scheduling |