TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
3 | |
3D modelling | |
A | |
Abductive Reasoning | |
abstract interpretation | |
Access Control | |
advanced persistent threats | |
adverse drug events | |
agent-based systems | |
AI | |
algorithms | |
ANN | |
annotation quality | |
Anomaly Detection | |
Anonymity | |
Ant | |
AODV | |
app reviews | |
app store analysis | |
app store mining | |
Arabic Calligraphy | |
Artefacts | |
Artifacts | |
Artificial Intelligence | |
Artificial Neural Network | |
ASIC AES | |
Astronomy | |
Astrophysics | |
Atomic Decomposition | |
Atomic Force Microscopy | |
auditory processing | |
Authentication | |
automated reasoning | |
Automatic Evaluation | |
B | |
Background Theory | |
Bayesian inference | |
behaviour inference | |
Behavioural modelling | |
BiLSTM-CRF | |
bioinformatics | |
Blockchain | |
Blood pressure | |
botnet | |
Bounded model checking | |
Bulk RNA-seq | |
Bulletin Board Systems | |
C | |
cancer | |
Cancer cells | |
Cardiovascular | |
causal inference | |
Chinese Painting | |
civic technology | |
Class Imbalance | |
Classification | |
Cloud | |
clustering | |
CNN | |
Cognition | |
cognitive robotics | |
Combined models | |
Common-sense knowledge | |
Compiler | |
computational models | |
Computational neuroscience | |
Computational Sustainability | |
Computer graphics | |
Computer Graphics & Visual Computing | |
computer vision | |
Conjunctive query answering | |
Context-aware modelling | |
Convolutional Neural Networks | |
Cooperativeness | |
Corpus | |
Critical switching current | |
crowdsourcing | |
cryptographic algorithms | |
cryptography | |
Cyber Security | |
Cyber-Physical Systems | |
Cybersecurity | |
D | |
data centre | |
data privacy | |
Data science | |
data storage | |
Data storage devices | |
Data Streams | |
data visualisation | |
data visualization | |
Dataflow | |
Decision making | |
Decision procedures | |
Decision Support | |
decision tree | |
deep learning | |
Description Logic (DL) | |
Description Logics | |
design methodology | |
developmental robotics | |
Devices | |
Diagram | |
differential evolution | |
Digital Multimedia | |
Disparity | |
distributed information | |
Distributed models | |
drug-induced LQTS | |
DSDV | |
Dynamic reconstruction | |
E | |
e-Health | |
EA | |
ECG interpretation | |
Echo State Networks | |
Econometrics | |
Edge detection | |
Electric Load Forecasting | |
Electrical transport | |
electromagnetic emission | |
Electron-Beam Lithography | |
Elementary motion decomposition | |
Encoding | |
Encryption | |
Ensemble model | |
evolutionary algorithm | |
exchange | |
Explainable AI | |
F | |
FAIR | |
FAIRfication | |
FAIRness | |
Feature Analysis | |
feature selection | |
FeRh | |
FeRh thin films | |
Few Shot Learning | |
few shots learning | |
Finance | |
Finite Difference Time Domain (FDTD) | |
fixed-point arithmetic | |
forecasting | |
Forgetting | |
FPGA | |
FPGA virtualisation | |
FPGAs | |
Frame Embeddings | |
FrameNet | |
Functional Data Analysis | |
Fuzzing | |
G | |
GA | |
Gaussian process | |
GDPR | |
GDPR Compliance | |
Gene | |
Gene Expression prediction | |
Gene Scores | |
Genetic Algorithm | |
Genetic Variants | |
GraalVM | |
Graded multilayer | |
Graph based approaches | |
Graph building | |
Graph matching | |
Guarded fragment | |
H | |
hand tracking | |
Hansard | |
hardware-software co-design | |
Health | |
hearing | |
Heart health | |
heterogeneous data | |
Heterogeneous systems | |
Heuristic Selection | |
hidden semi-markov model | |
high performance computing | |
High-frequency | |
Higher-order | |
Homing | |
Human memory | |
Human motivation | |
Human-centered computing | |
Human-Computer Interaction | |
Human-computer interaction (HCI) | |
Human-Object Interaction | |
human-robot interaction | |
I | |
Image processing | |
Image Registration | |
Information Retrieval | |
information theory | |
Instantaneous Time Mirror | |
intention reading | |
Inter-chip communication | |
Interconnects | |
Intermediate Representation | |
Internet | |
Internet of Things | |
Ion Milling | |
IoT | |
IoT (Internet of Things) security | |
IoT Attcks | |
IoT Network | |
IoT security | |
Iron-Rhodium | |
J | |
JPEG | |
JVM | |
K | |
Knowledge acquisition | |
Knowledge Graph | |
Knowledge Representation | |
Knowledge Transfer | |
L | |
language acquisition | |
Linear Regression | |
Linear Systems | |
load | |
Localization | |
Logic | |
logic-based agents | |
long-term companionship | |
Low power | |
LSTM | |
M | |
M2ANET | |
Machine Learning | |
Machine Vision | |
Magnetic Multilayers | |
Magnetic storage data | |
Magnetic tunnel junction | |
Magnetism | |
malware | |
MANET | |
manifold learning | |
MapReduce | |
mathematical discourse | |
MCQs | |
Meta learning | |
Meta-learning | |
MNIST | |
mobile app evolution | |
Mobile Medium | |
Model selection | |
Models' diversity | |
MOOCs | |
motifs | |
MPI | |
Multi-task learning | |
Multilayers | |
Multispectral imaging | |
N | |
Named Entity Recognition | |
Nanoscale Devices | |
Nanostructures | |
Natual Language Processing | |
Natural language processing | |
Natural Query Language | |
Navigation behaviour | |
Navigation System | |
Negative Binomial | |
Nested named entity | |
Network Comparison | |
Network Motifs | |
Network Protocol Implementation | |
networks | |
Neural Network | |
neural networks | |
Neuro-Symbolic Methods | |
Neuromorphic computing | |
Neurorobotics | |
NLP | |
ns2 simulation | |
number recognition | |
O | |
Object Recognition | |
Obstacles | |
Ontologies | |
Ontology | |
Ontology Design Patterns | |
Ontology Engineering | |
Ontology Modularity | |
OpenCL | |
OpenMP | |
Opinion mining | |
Optical Benes Networks | |
Optimisation Algorithm | |
Optimization Algorithm | |
ordinal embedding | |
P | |
Parkinson's disease | |
parliament | |
partial reconfiguration | |
patient self-monitoring | |
personality detection | |
Phase change materials | |
phase transition | |
Physically based modeling | |
Pigment Analysis | |
PNR | |
Politics | |
Polyhedral model | |
Polynomial model | |
post-COMS computing | |
Predictive Analytics | |
Privacy | |
Privacy Policies | |
Private verifiability | |
probabilistic model | |
Pseudonym | |
Public verifiability | |
Python | |
Q | |
QRISK | |
quality control | |
Question Answering | |
R | |
Reasoner | |
Rectification | |
Recurrent Neural Networks | |
Regression | |
regression models | |
Reinforcement Learning | |
Relation Extraction | |
Removal | |
Representation | |
Requirement Engineering | |
Resource-elasticity | |
RNN | |
Robotics | |
routing | |
S | |
SAXS | |
Scalability Analysis | |
Scanning electron microscopy | |
Scattering | |
Scheduling | |
Scientometrics | |
Security | |
security architecture | |
self-organizing mobile network | |
Semantic Analysis | |
Semantic Frame | |
Semiotics | |
sensors | |
Sentiment analysis | |
Service Composition | |
side channel attacks | |
Silicon Photonics | |
simulation | |
single cell RNA-seq | |
SIoTs | |
skyrmion | |
Skyrmions | |
SLAM | |
Small Angle X-ray Scattering | |
Smart Home | |
Smartphone applications | |
smartphone sensing | |
SMMANET | |
smt | |
SNN | |
SNOMED CT | |
Social Networks | |
Solid mechanics | |
Spectral Angle Measure | |
Spectral Correlation Measure | |
spiking neural network | |
Spiking Neural Network Architecture | |
Spiking neural networks | |
SpiNNaker | |
Sputter deposition | |
sputtering | |
Stock market | |
storage device | |
Style Transfer | |
sub-graphs | |
substrate noise coupling | |
Symbolic execution | |
T | |
Tag Generation | |
Tag Verification | |
TAM | |
Task-granularity control | |
technologies | |
Technology Use | |
Text Mining | |
Text Reading | |
Text semantics | |
theorem proving | |
theory reasoning | |
Thin films | |
Time Reversal | |
Topic detection | |
transcription factors | |
Transportability | |
Trend detection | |
Tunnelling magnetoresitance | |
U | |
ultrafast dynamics | |
Uniform Interpolation | |
Unlabelled Data | |
unsupervised learning | |
unsupervised machine learning | |
user review helpfulness | |
UTAUT | |
V | |
Vaccination | |
Validation | |
Vampire | |
Video | |
Virtual Environments | |
Virtual Machine | |
Virtual Reality | |
visual perception | |
Visualization systems and tools | |
Visually guided behavior | |
vulnerability | |
W | |
Wearable devices | |
Web Ontology Language (OWL) | |
WebAssembly | |
wireless mesh network | |
Word Embedding | |
Word Embeddings | |
writing/deleting | |
X | |
X-ray | |
Z | |
zero-inflated Negative Binomial |