Search

Your search keyword '"Ingeniería Informática"' showing total 76 results

Search Constraints

Start Over You searched for: Author "Ingeniería Informática" Remove constraint Author: "Ingeniería Informática" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
76 results on '"Ingeniería Informática"'

Search Results

1. Supervised outlier detection for classification and regression

2. Improved max-value entropy search for multi-objective bayesian optimization with constraints

3. Learning Analytics to Detect Evidence of Fraudulent Behaviour in Online Examinations

4. Intrinsic and environmental factors modulating autonomous robotic search under high uncertainty

5. Enhancing decision-making in user-centered web development: a methodology for card-sorting analysis

6. Convex formulation for multi-task L1-, L2-, and LS-SVMs

7. An analytics-based heuristic decomposition of a bilevel multiple-follower cutting stock problem

8. Facet-oriented Modelling

9. A flexible framework for evaluating user and item fairness in recommender systems

10. Automatic segmentation of ventricular volume by 3D ultrasonography in post haemorrhagic ventricular dilatation among preterm infants

11. Tracking News Stories Using Blockchain to Guarantee their Traceability and Information Analysis

12. SocialHaterBERT: A dichotomous approach for automatically detecting hate speech on Twitter through textual analysis and user profiles

13. Adapting usability techniques for application in open source Software: A multiple case study

14. Fall Detection from Electrocardiogram (ECG) Signals and Classification by Deep Transfer Learning

15. Improving girls’ perception of computer science as a viable career option through game playing and design: Lessons from a systematic literature review

16. A pilot empirical study of applying a usability technique in an open source software project

17. Building user profiles based on sequences for content and collaborative filtering

18. Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches

19. Coherence and inconsistencies in rating behavior: estimating the magic barrier of recommender systems

20. Effect of the AlAs capping layer thickness on the structure of InAs/GaAs QD

21. MOOCs and their Influence on Higher Education Institutions: Perspectives from the Insiders

22. Deep Neural Networks for Wind and Solar Energy Prediction

23. On-The-Go VIS + SW − NIR Spectroscopy as a Reliable Monitoring Tool for Grape Composition within the Vineyard

24. Evolution and study of a copycat effect in intimate partner homicides: A lesson from Spanish femicides

25. Aplicaciones practicas de los sistemas multi-UAV y enjambres aéreos

26. Combining unit and specification-based testing for meta-model validation and verification

27. Speeding Up Tumor Growth Simulations Using Parallel Programming and Cellular Automata

28. CEPchain: A graphical model-driven solution for integrating complex event processing and blockchain

29. A Survey on Robotic Technologies for Forest Firefighting: Applying Drone Swarms to Improve Firefighters’ Efficiency and Safety

30. A Clustering-Based Hybrid Support Vector Regression Model to Predict Container Volume at Seaport Sanitary Facilities

31. Design and Evaluation of a Collaborative Educational Game: BECO Games

32. Group Decision-Making Based on Artificial Intelligence: A Bibliometric Analysis

33. Photoacoustic-Based Gas Sensing: A Review

34. Flexible workflows for on-the-fly electron-microscopy single-particle image processing using Scipion

35. Modified Frank–Wolfe algorithm for enhanced sparsity in support vector machine classifiers

36. A memetic algorithm for cardinality-constrained portfolio optimization with transaction costs

37. Diffusion Maps for dimensionality reduction and visualization of meteorological data

38. Developing Mixed Reality Educational Applications: The Virtual Touch Toolkit

39. Small margin ensembles can be robust to class-label noise

40. Fair Trade Metaphor as a Control Privacy Method for Pervasive Environments: Concepts and Evaluation

41. Reusable Solutions for Implementing Usability Functionalities

42. ν-SVM solutions of constrained lasso and elastic net

43. MRC2014: Extensions to the MRC format header for electron cryo-microscopy and tomography

44. A formalisation of deep metamodelling

45. Knowledge-based identification of music suited for places of interest

46. Toward collisions produced in requirements rankings: A qualitative approach and experimental study

47. Detecting and Monitoring Hate Speech in Twitter

48. How large should ensembles of classifiers be?

49. Fine Tuning Explained? Multiverses and Cellular Automata

50. Hierarchical linear support vector machine

Catalog

Books, media, physical & digital resources