TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
A | |
Abstractive summarization | |
Action Recognition | |
activating shopping areas | |
Agent-based Monitoring | |
ALICA | |
ALNS | |
android malware detection | |
Anholt | |
Anomaly Detection | |
Anomaly-based Attack Detection | |
Answer Set Programming | |
AQM | |
Artificial Intelligence | |
Artificial Intelligent | |
assessment of the cluster tendency | |
Autoencoder | |
Automated Program Repair | |
automated testing | |
B | |
background subtraction | |
bagging | |
Bayesian Networks | |
behavior | |
BFS | |
Bidirectional Recurrent Neural Network | |
Big code | |
Big Data Analytics | |
bilinear attention | |
biometric template protection | |
Biometrics | |
bird’s eye image | |
Blockchain | |
Blockchain adoption | |
boosting | |
Breath Analysis | |
C | |
calf | |
CAPE | |
cattle | |
Certificate Verification | |
Change Detection | |
Chatbot | |
Checkpointing Aided Parallel Execution | |
circle fitting | |
citation network analysis | |
classification of gene expression data | |
Closeness Centrality | |
Clothes recognition | |
cloud computing | |
clustering | |
co-operative caching | |
Code bloat | |
Code Growth | |
combined objective | |
community | |
community extraction | |
convolutional neural network | |
Convolutional Neural Networks | |
Counterfeit | |
cow | |
cow estrus detection | |
CPM | |
Crowd Density Estimation | |
Crowded Scene Counting | |
D | |
Data Integration | |
Decentralization | |
Decentralized Application | |
Decision Tree | |
deep learning | |
Denmark | |
depth camera | |
discord discovery | |
discrete wavelet transformation | |
Distributed Computing | |
document clustering | |
document network | |
drone delivery | |
drug responses | |
drug-cell line responses | |
dynamic content popularity | |
dynamic time wrapping | |
E | |
edge detection | |
Electronics nose | |
ellipse fitting | |
Emulation | |
ensemble | |
Entailment | |
episode-rule mining | |
F | |
Fashion search system | |
Fast Food Restaurant | |
Feature extraction | |
Fingerprint matching | |
fingerprint recognition | |
first local maximization | |
Fisher Criterion | |
fog computing | |
Frozen shoulder rehabilitation | |
Fully Convolutional Neural Network | |
Future trends of Blockchain | |
fuzzy commitment scheme | |
G | |
Gabor wavelet | |
gait authentication | |
Gated Recurrent Units | |
Gaussian mixture model | |
genetic algorithm | |
Genetic Programming | |
Geometrical features | |
GPS | |
graph algorithm | |
graph theory | |
GRASP | |
H | |
Health screening | |
Helpful review retrieval | |
High Availability Distributed Cluster | |
HPC | |
hybrid caching | |
Hybrid testbed | |
I | |
iJoint | |
ILP | |
Image captioning | |
image detection | |
Image similarity learning | |
Importance Sampling | |
incentive design | |
Information extraction | |
Information security evaluation | |
Information security level | |
Intelligent Assistant | |
interaction | |
Internet of Things | |
IoT | |
IoT networks | |
IoT Services | |
ISO/IEC 15408 | |
K | |
Kanban | |
Knowledge graphs | |
L | |
Large-scale testbed | |
LDA | |
Lifelog processing | |
Local features | |
Local minutiae matching | |
Location Pattern | |
Louvain Method | |
Low-rate DDoS attack | |
M | |
Machine learning | |
Machine Learning-based Attack Detection | |
Malware Detection | |
MapReduce | |
matrix completion | |
maximum induced matching | |
Micro-Services | |
minutiae fingerprint extraction | |
missing region reconstruction problems | |
MMPP/D/1 queuing | |
model adaptation | |
model checking | |
Monte Carlo | |
multi-agent planning | |
Multi-threaded Parallel Computing | |
Multiple linear regression model with the elastic net regularization method | |
mutual information | |
N | |
N-gram | |
natural language processing | |
Neural network | |
neural network model | |
NFC | |
noisy condition | |
Normalized Discounted Cumulative Gain | |
number of clusters | |
O | |
object detection | |
Offshore | |
OpenMP | |
Outlier detection | |
Outsourcing | |
P | |
Packet Loss Probability | |
Parallel Programming | |
Pavement crack detection | |
permutation graph | |
Personalized medicine | |
polynomial algorithm | |
Portfolio optimization | |
Prediction | |
prediction problems | |
Probabilistic topic models | |
Profile matching | |
Project Risks | |
Project Scheduling | |
Q | |
Quantitative trading | |
Quantization indexing | |
R | |
random ensemble oblique decision stumps | |
range of motion | |
real-time system architecture | |
record and replay | |
RED | |
Redundancy Dynamic Control | |
reinforced mechanism | |
Remote sensing imagery | |
Renewable energy | |
Residual Learning | |
Residual Networks | |
Review helpfulness prediction | |
Rice seed inspection | |
Risk Factors | |
Roedsand | |
routing algorithm | |
S | |
satellites | |
Scrum | |
Security | |
Semantic Image Segmentation | |
Semantics | |
Sentence Scoring | |
Sentiment Analysis | |
Service Evolution | |
Service Function Chaining (SFC) | |
SFC Monitoring | |
Shape descriptor | |
simulation | |
Smart city | |
Smart Learning Environment | |
Smart Tourist | |
smartphone authentication | |
Social Network Analysis | |
Social networks | |
Software Defined Networking (SDN) | |
Spark | |
Spatial | |
Speaker Authentication | |
speech corpus | |
static analysis | |
stereo camera | |
Stock prediction | |
Streaming time series | |
sub-optimal content placement | |
Supervised dimension reduction | |
system combination | |
T | |
Task scheduling | |
TCP | |
Text classification | |
text mining | |
tf-idf | |
Threats | |
three-dimensional reconstruction | |
Time Series | |
Time series analysis | |
topic detection | |
topic model | |
Trading strategy | |
traffic surveillance | |
Transportation | |
TSP-D | |
TSP-mD | |
U | |
Ubiquitous system | |
UiTiOt | |
Unity 3D | |
unsupervised learning | |
user interface testing | |
V | |
vehicle-routing | |
Verification | |
Vietnamese speech recognition | |
W | |
walk rally application | |
water body segmentation | |
Web Application Firewall | |
Web attack detection | |
Web Document Summarizaion | |
Web-portal security | |
Web-site traversal pattern | |
Website Defacement Attack | |
Website Defacement Detection | |
weight estimation | |
Wind energy | |
Windows application |