Showing 2,001 - 2,020 results of 17,021 for search 'USISL~', query time: 1.70s Refine Results
  1. 2001
  2. 2002

    Depression Recognition Using Daily Wearable-Derived Physiological Data by Xinyu Shui, Hao Xu, Shuping Tan, Dan Zhang

    Published 2025-01-01
    “…For comparison, we also utilized data from fifty-eight matched healthy controls from a publicly available dataset, collected using the same devices over equivalent durations. …”
    Get full text
    Article
  3. 2003

    Unsupervised Domain Adaptation Using Exemplar-SVMs with Adaptation Regularization by Yiwei He, Yingjie Tian, Jingjing Tang, Yue Ma

    Published 2018-01-01
    “…It assumes that source and target domain data are drawn from the same feature space but different margin distributions and its motivation is to utilize the source domain instances to assist in training a robust classifier for target domain tasks. …”
    Get full text
    Article
  4. 2004
  5. 2005

    Efficiency-based prioritization of stakeholders using data envelopment analysis by Soheil Azizi, Reza Rasinojehdehi

    Published 2023-12-01
    “…This paper introduces a novel approach to stakeholder prioritization by employing Data Envelopment Analysis (DEA). The study utilizes five key criteria-stakeholder power, urgency, legitimacy, level of involvement, and project impact-to quantitatively evaluate stakeholder efficiency. …”
    Get full text
    Article
  6. 2006
  7. 2007
  8. 2008
  9. 2009
  10. 2010
  11. 2011
  12. 2012
  13. 2013

    Diagnosis and clinical significance of prostate calcification using computed tomography by Seong Cheol Kim, Tae Young Lee, Woocheol Kang, Hoyoung Bae, Ji Hyung Yoon, Sungchan Park, Kyung Hyun Moon, Sang Hyeon Cheon, Taekmin Kwon

    Published 2025-02-01
    “…CT can be effectively utilized to accurately assess the exact location, size, and number of prostate calcifications. …”
    Get full text
    Article
  14. 2014
  15. 2015

    Defending Against Advanced Persistent Threats Using Game-Theory. by Stefan Rass, Sandra König, Stefan Schauer

    Published 2017-01-01
    “…Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. …”
    Get full text
    Article
  16. 2016
  17. 2017
  18. 2018
  19. 2019
  20. 2020