359 results on '"Slavin AN"'
Search Results
2. Identifying Self-Disclosures of Use, Misuse and Addiction in Community-based Social Media Posts.
3. Putting the S back into IoT: Tutorial on Sensor and Actor Systems in Small Portable Ad-Hoc Networks.
4. IoT Device Classification Using Link-Level Features for Traditional Machine Learning and Large Language Models.
5. A Large Language Model Approach to Code and Privacy Policy Alignment.
6. Enabling High-Performance Visual Computing with Jetstream 2.
7. Protocol-agnostic IoT Device Classification on Encrypted Traffic Using Link-Level Flows.
8. A Vision-Based Low-Cost Power Wheelchair Assistive Driving System for Smartphones.
9. Lightweight Collaborative Inferencing for Real-Time Intrusion Detection in IoT Networks.
10. Ambiguity and Generality in Natural Language Privacy Policies.
11. ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis.
12. Benchmarks, Algorithms, and Metrics for Hierarchical Disentanglement.
13. Evaluating the Interpretability of Generative Models by Interactive Reconstruction.
14. Potent and Selective Oral STAT6 Degraders Inhibit IL-4 and IL-13 Functions in Human Cells and Block TH2 Inflammation in a House Dust Mite Mouse Model of Asthma
15. How does misconfiguration of analytic services compromise mobile privacy?
16. Disambiguating Requirements Through Syntax-Driven Semantic Analysis of Information Types.
17. Memory Consumption and Computation Efficiency Improvements of Viola-Jones Object Detection Method for UAVs.
18. Ensembles of Locally Independent Prediction Models.
19. Recess-type waveguide integrated germanium on silicon avalanche photodiode.
20. Assessment of financial returns on investments in cyberinfrastructure facilities: A survey of current methods.
21. Modernizing parsing tools: parsing and analysis with object-oriented programming.
22. IoT Device Classification Using Link-Level Features for Traditional Machine Learning and Large Language Models
23. Learning Predictive and Interpretable Timeseries Summaries from ICU Data.
24. GUILeak: tracing privacy policy claims on user input data for Android applications.
25. Human-in-the-Loop Interpretability Prior.
26. Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing Their Input Gradients.
27. 50-Gbps Receiver Subsystem using Ge/Si Avalanche Photodiode and Integrated Bypass Capacitor.
28. Positive Health Outcomes Associated with Live Microbe Intake from Foods, Including Fermented Foods, Assessed using the NHANES
29. Right for the Right Reasons: Training Differentiable Models by Constraining their Explanations.
30. Smart IDReader: Document Recognition in Video Stream.
31. High Performance Computing Enabled Simulation of the Food-Water-Energy System: Simulation of Intensively Managed Landscapes.
32. Empirical Evaluation of Convolutional Neural Networks Prediction Time in Classifying German Traffic Signs.
33. Toward A Code Pattern Based Vulnerability Measurement Model.
34. Application of modified Levenshtein distance for classification of noisy business document images.
35. On-Line STEAM Outreach with Remote Robot Access.
36. Toward a framework for detecting privacy policy violations in android application code.
37. The Effect of Gender, Native English Speaking, and Age on Game Genre Preference and Gaming Motivations.
38. Balancing Priorities: A Field Study of Coordination in Distributed Elder Care.
39. BITxBIT: Encouraging Behavior Change with N=2 Experiments.
40. The method of search for falsifications in copies of contractual documents based on N-grams.
41. The important role people play in advancing the use of cloud cyberinfrastructure in research.
42. Improving Sepsis Treatment Strategies by Combining Deep and Kernel-Based Reinforcement Learning.
43. Privacy Assurance for Android Augmented Reality Apps.
44. Improving Coordination of Care Centers for the Elderly through IT Support.
45. Protocol-agnostic IoT Device Classification on Encrypted Traffic Using Link-Level Flows
46. Identifying optimal cut points of National Institutes of Health Stroke Scale to Predict Mortality: A Population-based Assessment (P11-5.016)
47. Managing security requirements patterns using feature diagram hierarchies.
48. Control and estimation with threshold sensing for Inertial Measurement Unit calibration using a piezoelectric microstage.
49. On modeling the neuronal activity in movement disorder patients by using the Ornstein Uhlenbeck Process.
50. Comparison of scanned administrative document images.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.