-
1
-
-
0026050115
-
Euclidean distance matrix analysis: a coordinate-free approach for comparing biological shapes using landmark data
-
Lele S, Richtsmeier JT. Euclidean distance matrix analysis: a coordinate-free approach for comparing biological shapes using landmark data. Am J Phys Anthropol. 1991;86(3): 415-27.
-
(1991)
Am J Phys Anthropol
, vol.86
, Issue.3
, pp. 415-427
-
-
Lele, S.1
Richtsmeier, J.T.2
-
2
-
-
0010362121
-
Syntactic clustering of the Web
-
Broder AZ, Glassman SC, Manasse MS, Zweig G. Syntactic clustering of the Web. Comput Netw ISDN Syst. 1997;29(8-13): 1157-66.
-
(1997)
Comput Netw ISDN Syst
, vol.29
, Issue.8-13
, pp. 1157-1166
-
-
Broder, A.Z.1
Glassman, S.C.2
Manasse, M.S.3
Zweig, G.4
-
4
-
-
83155189640
-
-
arXiv. org cs. CR
-
Robiah Y, Rahayu SS, Zaki MM, Shahrin S, Faizal MA, Marliza R. A new generic taxonomy on hybrid malware detection technique. arXiv. org cs. CR.
-
A new generic taxonomy on hybrid malware detection technique
-
-
Robiah, Y.1
Rahayu, S.S.2
Zaki, M.M.3
Shahrin, S.4
Faizal, M.A.5
Marliza, R.6
-
5
-
-
78249255488
-
Automatic discovery of parasitic malware
-
S. Jha, R. Sommer, and C. Kreibich (Eds.), Berlin: Springer
-
Srivastava A, Giffin J. Automatic discovery of parasitic malware. In: Jha S, Sommer R, Kreibich C, editors. Recent advances in intrusion detection (RAID'10). Berlin: Springer; 2010. p. 97-117.
-
(2010)
Recent Advances in Intrusion Detection (RAID'10)
, pp. 97-117
-
-
Srivastava, A.1
Giffin, J.2
-
8
-
-
34047110218
-
Toward automated dynamic malware analysis using CWSandbox
-
Willems C, Holz T, Freiling F. Toward automated dynamic malware analysis using CWSandbox. IEEE Secur Priv. 2007;5: 32-9.
-
(2007)
IEEE Secur Priv
, vol.5
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
9
-
-
78649238134
-
Vulnerability in public malware sandbox analysis systems
-
Washington, DC: IEEE Computer Society
-
Yoshioka K, Hosobuchi Y, Orii T, Matsumoto T. Vulnerability in public malware sandbox analysis systems. In: Proceedings of the 2010 10th IEEE/IPSJ international symposium on applications and the internet. Washington, DC: IEEE Computer Society; 2010. pp. 265-268.
-
(2010)
Proceedings of the 2010 10th IEEE/IPSJ international symposium on applications and the internet
, pp. 265-268
-
-
Yoshioka, K.1
Hosobuchi, Y.2
Orii, T.3
Matsumoto, T.4
-
10
-
-
0001368373
-
Étude comparative de la distribution florale dans une portion des alpes et du jura
-
Jaccard P. Étude comparative de la distribution florale dans une portion des alpes et du jura. Bulletin de la Société Vaudoise des Sciences Naturelles. 1901;37: 547-79.
-
(1901)
Bulletin De La Société Vaudoise Des Sciences Naturelles
, vol.37
, pp. 547-579
-
-
Jaccard, P.1
-
12
-
-
84906947262
-
-
Python
-
Python. Python algorithms complexity. 2010. http://wiki. python. org/moin/TimeComplexity#sethttp://wiki. python. org/moin/TimeComplexity#set.
-
(2010)
Python algorithms complexity
-
-
-
13
-
-
0018456171
-
Universal classes of hash functions
-
Carter JL, Wegman MN. Universal classes of hash functions. J Comput Syst Sci. 1979;18(2): 143-54.
-
(1979)
J Comput Syst Sci
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
15
-
-
84926662675
-
Nearest neighbor pattern classification
-
Cover TM, Hart PE. Nearest neighbor pattern classification. IEEE Trans Inf Theory. 1967;13(1): 21-7.
-
(1967)
IEEE Trans Inf Theory
, vol.13
, Issue.1
, pp. 21-27
-
-
Cover, T.M.1
Hart, P.E.2
-
16
-
-
33745903481
-
Extreme learning machine: theory and applications
-
Huang G-B, Zhu Q-Y, Siew C-K. Extreme learning machine: theory and applications. Neurocomputing. 2006;70: 489-501.
-
(2006)
Neurocomputing
, vol.70
, pp. 489-501
-
-
Huang, G.-B.1
Zhu, Q.-Y.2
Siew, C.-K.3
-
17
-
-
84859007933
-
Extreme learning machine for regression and multiclass classification
-
Huang G-B, Zhou H, Ding X, Zhang R. Extreme learning machine for regression and multiclass classification. IEEE Trans Syst Man Cybern Part B Cybern. 2012;42(2): 513-29.
-
(2012)
IEEE Trans Syst Man Cybern Part B Cybern
, vol.42
, Issue.2
, pp. 513-529
-
-
Huang, G.-B.1
Zhou, H.2
Ding, X.3
Zhang, R.4
-
18
-
-
33645007988
-
Can threshold networks be trained directly?
-
Huang G-B, Zhu Q-Y, Mao KZ, Siew C-K, Saratchandran P, Sundararajan N. Can threshold networks be trained directly? IEEE Trans Circuits Syst II Express Briefs. 2006;53(3): 187-91.
-
(2006)
IEEE Trans Circuits Syst II Express Briefs
, vol.53
, Issue.3
, pp. 187-191
-
-
Huang, G.-B.1
Zhu, Q.-Y.2
Mao, K.Z.3
Siew, C.-K.4
Saratchandran, P.5
Sundararajan, N.6
-
19
-
-
33745918399
-
Universal approximation using incremental constructive feedforward networks with random hidden nodes
-
Huang G-B, Chen L, Siew C-K. Universal approximation using incremental constructive feedforward networks with random hidden nodes. IEEE Trans Neural Netw. 2006;17(4): 879-92.
-
(2006)
IEEE Trans Neural Netw
, vol.17
, Issue.4
, pp. 879-892
-
-
Huang, G.-B.1
Chen, L.2
Siew, C.-K.3
-
20
-
-
84901200630
-
A meta-cognitive learning algorithm for an extreme learning machine classifier
-
doi: 10. 1007/s12559-013-9223-2
-
Savitha R, Suresh S, Kim H. A meta-cognitive learning algorithm for an extreme learning machine classifier. Cogn Comput. (2013);1-11. doi: 10. 1007/s12559-013-9223-2.
-
(2013)
Cogn Comput.
, pp. 1-11
-
-
Savitha, R.1
Suresh, S.2
Kim, H.3
-
21
-
-
80052259932
-
Sentic web: a new paradigm for managing social media affective information
-
doi:10.1007/s12559-011-9101-8
-
Grassi M, Cambria E, Hussain A, Piazza F. Sentic web: a new paradigm for managing social media affective information. Cogn Comput. 2011;3(3): 480-9. doi: 10. 1007/s12559-011-9101-8.
-
(2011)
Cogn Comput
, vol.3
, Issue.3
, pp. 480-489
-
-
Grassi, M.1
Cambria, E.2
Hussain, A.3
Piazza, F.4
-
22
-
-
84870441970
-
Sentic album: content-, concept-, and context-based online personal photo management system
-
doi:10.1007/s12559-012-9145-4
-
Cambria E, Hussain A. Sentic album: content-, concept-, and context-based online personal photo management system. Cogn Comput. 2012;4(4): 477-96. doi: 10. 1007/s12559-012-9145-4.
-
(2012)
Cogn Comput
, vol.4
, Issue.4
, pp. 477-496
-
-
Cambria, E.1
Hussain, A.2
-
23
-
-
84861198619
-
-
Springer: Dordrecht, doi: 10. 1007/978-94-007-5070-8
-
Cambria E, Hussain A. Sentic computing: techniques, tools, and applications, springerBriefs in cognitive computation. Springer: Dordrecht; 2012. doi: 10. 1007/978-94-007-5070-8.
-
(2012)
Sentic computing: Techniques, tools, and applications, springerBriefs in cognitive computation
-
-
Cambria, E.1
Hussain, A.2
-
24
-
-
84877086482
-
Common sense knowledge for handwritten chinese text recognition
-
doi:10.1007/s12559-012-9183-y
-
Wang Q-F, Cambria E, Liu C-L, Hussain A. Common sense knowledge for handwritten chinese text recognition. Cogn Comput. 2013;5(2): 234-42. doi: 10. 1007/s12559-012-9183-y.
-
(2013)
Cogn Comput
, vol.5
, Issue.2
, pp. 234-242
-
-
Wang, Q.-F.1
Cambria, E.2
Liu, C.-L.3
Hussain, A.4
-
28
-
-
80051671932
-
TROP-ELM: a double-regularized ELM using LARS and tikhonov regularization
-
doi:10.1016/j.neucom.2010.12.042
-
Miche Y, van Heeswijk M, Bas P, Simula O, Lendasse A. TROP-ELM: a double-regularized ELM using LARS and tikhonov regularization. Neurocomputing. 2011;74(16): 2413-21. doi: 10. 1016/j. neucom. 2010. 12. 042.
-
(2011)
Neurocomputing
, vol.74
, Issue.16
, pp. 2413-2421
-
-
Miche, Y.1
van Heeswijk, M.2
Bas, P.3
Simula, O.4
Lendasse, A.5
-
29
-
-
84906951414
-
-
Group E. The op-elm toolbox. 2009. http://www. cis. hut. fi/projects/eiml/research/downloads/op-elm-toolbox.
-
(2009)
The op-elm toolbox
-
-
Group, E.1
-
30
-
-
73949154686
-
OP-ELM: optimally-pruned extreme learning machine
-
doi:10.1109/TNN.2009.2036259
-
Miche Y, Sorjamaa A, Bas P, Simula O, Jutten C, Lendasse A. OP-ELM: optimally-pruned extreme learning machine. IEEE Trans Neural Netw. 2010;21(1): 158-62. doi: 10. 1109/TNN. 2009. 2036259.
-
(2010)
IEEE Trans Neural Netw
, vol.21
, Issue.1
, pp. 158-162
-
-
Miche, Y.1
Sorjamaa, A.2
Bas, P.3
Simula, O.4
Jutten, C.5
Lendasse, A.6
-
31
-
-
84887010852
-
A methodology for building regression models using extreme learning machine: OP-ELM
-
In: Verleysen M, editor, Belgium: Evere
-
Miche Y, Bas P, Jutten C, Simula O, Lendasse A. A methodology for building regression models using extreme learning machine: OP-ELM. In: Verleysen M, editor. ESANN 2008, European Symposium on Artificial Neural Networks, Bruges, Belgium, d-side publ. Belgium: Evere; 2008. p. 247-52.
-
(2008)
ESANN 2008, European Symposium on Artificial Neural Networks, Bruges, Belgium, d-side publ
, pp. 247-252
-
-
Miche, Y.1
Bas, P.2
Jutten, C.3
Simula, O.4
Lendasse, A.5
-
32
-
-
80051584618
-
GPU-accelerated and parallelized ELM ensembles for large-scale regression
-
doi:10.1016/j.neucom.2010.11.034
-
van Heeswijk M, Miche Y, Oja E, Lendasse A. GPU-accelerated and parallelized ELM ensembles for large-scale regression. Neurocomputing. 2011;74(16): 2430-7. doi: 10. 1016/j. neucom. 2010. 11. 034.
-
(2011)
Neurocomputing
, vol.74
, Issue.16
, pp. 2430-2437
-
-
van Heeswijk, M.1
Miche, Y.2
Oja, E.3
Lendasse, A.4
-
33
-
-
84883390552
-
Solving large regression problems using an ensemble of GPU-accelerated ELMs
-
In: Verleysen M, editor, Belgium: Bruges
-
van Heeswijk M, Miche Y, Oja E, Lendasse A. Solving large regression problems using an ensemble of GPU-accelerated ELMs. In: Verleysen M, editor. ESANN2010: 18th European symposium on artificial neural networks, computational intelligence and machine learning, d-side publications. Belgium: Bruges; 2010. p. 309-14.
-
(2010)
ESANN2010: 18th European symposium on artificial neural networks, computational intelligence and machine learning, d-side publications
, pp. 309-314
-
-
van Heeswijk, M.1
Miche, Y.2
Oja, E.3
Lendasse, A.4
-
34
-
-
78650310346
-
Constructive hidden nodes selection of extreme learning machine for regression
-
Lan Y, Soh YC, Huang G-B. Constructive hidden nodes selection of extreme learning machine for regression. Neurocomputing. 2010;73(16-18): 3191-9.
-
(2010)
Neurocomputing
, vol.73
, Issue.16-18
, pp. 3191-3199
-
-
Lan, Y.1
Soh, Y.C.2
Huang, G.-B.3
|