TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| A | |
| Abstractive summarization | |
| Action Recognition | |
| activating shopping areas | |
| Agent-based Monitoring | |
| ALICA | |
| ALNS | |
| android malware detection | |
| Anholt | |
| Anomaly Detection | |
| Anomaly-based Attack Detection | |
| Answer Set Programming | |
| AQM | |
| Artificial Intelligence | |
| Artificial Intelligent | |
| assessment of the cluster tendency | |
| Autoencoder | |
| Automated Program Repair | |
| automated testing | |
| B | |
| background subtraction | |
| bagging | |
| Bayesian Networks | |
| behavior | |
| BFS | |
| Bidirectional Recurrent Neural Network | |
| Big code | |
| Big Data Analytics | |
| bilinear attention | |
| biometric template protection | |
| Biometrics | |
| bird’s eye image | |
| Blockchain | |
| Blockchain adoption | |
| boosting | |
| Breath Analysis | |
| C | |
| calf | |
| CAPE | |
| cattle | |
| Certificate Verification | |
| Change Detection | |
| Chatbot | |
| Checkpointing Aided Parallel Execution | |
| circle fitting | |
| citation network analysis | |
| classification of gene expression data | |
| Closeness Centrality | |
| Clothes recognition | |
| cloud computing | |
| clustering | |
| co-operative caching | |
| Code bloat | |
| Code Growth | |
| combined objective | |
| community | |
| community extraction | |
| convolutional neural network | |
| Convolutional Neural Networks | |
| Counterfeit | |
| cow | |
| cow estrus detection | |
| CPM | |
| Crowd Density Estimation | |
| Crowded Scene Counting | |
| D | |
| Data Integration | |
| Decentralization | |
| Decentralized Application | |
| Decision Tree | |
| deep learning | |
| Denmark | |
| depth camera | |
| discord discovery | |
| discrete wavelet transformation | |
| Distributed Computing | |
| document clustering | |
| document network | |
| drone delivery | |
| drug responses | |
| drug-cell line responses | |
| dynamic content popularity | |
| dynamic time wrapping | |
| E | |
| edge detection | |
| Electronics nose | |
| ellipse fitting | |
| Emulation | |
| ensemble | |
| Entailment | |
| episode-rule mining | |
| F | |
| Fashion search system | |
| Fast Food Restaurant | |
| Feature extraction | |
| Fingerprint matching | |
| fingerprint recognition | |
| first local maximization | |
| Fisher Criterion | |
| fog computing | |
| Frozen shoulder rehabilitation | |
| Fully Convolutional Neural Network | |
| Future trends of Blockchain | |
| fuzzy commitment scheme | |
| G | |
| Gabor wavelet | |
| gait authentication | |
| Gated Recurrent Units | |
| Gaussian mixture model | |
| genetic algorithm | |
| Genetic Programming | |
| Geometrical features | |
| GPS | |
| graph algorithm | |
| graph theory | |
| GRASP | |
| H | |
| Health screening | |
| Helpful review retrieval | |
| High Availability Distributed Cluster | |
| HPC | |
| hybrid caching | |
| Hybrid testbed | |
| I | |
| iJoint | |
| ILP | |
| Image captioning | |
| image detection | |
| Image similarity learning | |
| Importance Sampling | |
| incentive design | |
| Information extraction | |
| Information security evaluation | |
| Information security level | |
| Intelligent Assistant | |
| interaction | |
| Internet of Things | |
| IoT | |
| IoT networks | |
| IoT Services | |
| ISO/IEC 15408 | |
| K | |
| Kanban | |
| Knowledge graphs | |
| L | |
| Large-scale testbed | |
| LDA | |
| Lifelog processing | |
| Local features | |
| Local minutiae matching | |
| Location Pattern | |
| Louvain Method | |
| Low-rate DDoS attack | |
| M | |
| Machine learning | |
| Machine Learning-based Attack Detection | |
| Malware Detection | |
| MapReduce | |
| matrix completion | |
| maximum induced matching | |
| Micro-Services | |
| minutiae fingerprint extraction | |
| missing region reconstruction problems | |
| MMPP/D/1 queuing | |
| model adaptation | |
| model checking | |
| Monte Carlo | |
| multi-agent planning | |
| Multi-threaded Parallel Computing | |
| Multiple linear regression model with the elastic net regularization method | |
| mutual information | |
| N | |
| N-gram | |
| natural language processing | |
| Neural network | |
| neural network model | |
| NFC | |
| noisy condition | |
| Normalized Discounted Cumulative Gain | |
| number of clusters | |
| O | |
| object detection | |
| Offshore | |
| OpenMP | |
| Outlier detection | |
| Outsourcing | |
| P | |
| Packet Loss Probability | |
| Parallel Programming | |
| Pavement crack detection | |
| permutation graph | |
| Personalized medicine | |
| polynomial algorithm | |
| Portfolio optimization | |
| Prediction | |
| prediction problems | |
| Probabilistic topic models | |
| Profile matching | |
| Project Risks | |
| Project Scheduling | |
| Q | |
| Quantitative trading | |
| Quantization indexing | |
| R | |
| random ensemble oblique decision stumps | |
| range of motion | |
| real-time system architecture | |
| record and replay | |
| RED | |
| Redundancy Dynamic Control | |
| reinforced mechanism | |
| Remote sensing imagery | |
| Renewable energy | |
| Residual Learning | |
| Residual Networks | |
| Review helpfulness prediction | |
| Rice seed inspection | |
| Risk Factors | |
| Roedsand | |
| routing algorithm | |
| S | |
| satellites | |
| Scrum | |
| Security | |
| Semantic Image Segmentation | |
| Semantics | |
| Sentence Scoring | |
| Sentiment Analysis | |
| Service Evolution | |
| Service Function Chaining (SFC) | |
| SFC Monitoring | |
| Shape descriptor | |
| simulation | |
| Smart city | |
| Smart Learning Environment | |
| Smart Tourist | |
| smartphone authentication | |
| Social Network Analysis | |
| Social networks | |
| Software Defined Networking (SDN) | |
| Spark | |
| Spatial | |
| Speaker Authentication | |
| speech corpus | |
| static analysis | |
| stereo camera | |
| Stock prediction | |
| Streaming time series | |
| sub-optimal content placement | |
| Supervised dimension reduction | |
| system combination | |
| T | |
| Task scheduling | |
| TCP | |
| Text classification | |
| text mining | |
| tf-idf | |
| Threats | |
| three-dimensional reconstruction | |
| Time Series | |
| Time series analysis | |
| topic detection | |
| topic model | |
| Trading strategy | |
| traffic surveillance | |
| Transportation | |
| TSP-D | |
| TSP-mD | |
| U | |
| Ubiquitous system | |
| UiTiOt | |
| Unity 3D | |
| unsupervised learning | |
| user interface testing | |
| V | |
| vehicle-routing | |
| Verification | |
| Vietnamese speech recognition | |
| W | |
| walk rally application | |
| water body segmentation | |
| Web Application Firewall | |
| Web attack detection | |
| Web Document Summarizaion | |
| Web-portal security | |
| Web-site traversal pattern | |
| Website Defacement Attack | |
| Website Defacement Detection | |
| weight estimation | |
| Wind energy | |
| Windows application | |