Showing 1,781 - 1,800 results of 14,078 for search 'USISL~', query time: 1.55s Refine Results
  1. 1781
  2. 1782
  3. 1783
  4. 1784

    Depression Recognition Using Daily Wearable-Derived Physiological Data by Xinyu Shui, Hao Xu, Shuping Tan, Dan Zhang

    Published 2025-01-01
    “…For comparison, we also utilized data from fifty-eight matched healthy controls from a publicly available dataset, collected using the same devices over equivalent durations. …”
    Get full text
    Article
  5. 1785

    Unsupervised Domain Adaptation Using Exemplar-SVMs with Adaptation Regularization by Yiwei He, Yingjie Tian, Jingjing Tang, Yue Ma

    Published 2018-01-01
    “…It assumes that source and target domain data are drawn from the same feature space but different margin distributions and its motivation is to utilize the source domain instances to assist in training a robust classifier for target domain tasks. …”
    Get full text
    Article
  6. 1786
  7. 1787

    Efficiency-based prioritization of stakeholders using data envelopment analysis by Soheil Azizi, Reza Rasinojehdehi

    Published 2023-12-01
    “…This paper introduces a novel approach to stakeholder prioritization by employing Data Envelopment Analysis (DEA). The study utilizes five key criteria-stakeholder power, urgency, legitimacy, level of involvement, and project impact-to quantitatively evaluate stakeholder efficiency. …”
    Get full text
    Article
  8. 1788
  9. 1789
  10. 1790
  11. 1791
  12. 1792

    Diagnosis and clinical significance of prostate calcification using computed tomography by Seong Cheol Kim, Tae Young Lee, Woocheol Kang, Hoyoung Bae, Ji Hyung Yoon, Sungchan Park, Kyung Hyun Moon, Sang Hyeon Cheon, Taekmin Kwon

    Published 2025-02-01
    “…CT can be effectively utilized to accurately assess the exact location, size, and number of prostate calcifications. …”
    Get full text
    Article
  13. 1793
  14. 1794

    Defending Against Advanced Persistent Threats Using Game-Theory. by Stefan Rass, Sandra König, Stefan Schauer

    Published 2017-01-01
    “…Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. …”
    Get full text
    Article
  15. 1795
  16. 1796
  17. 1797
  18. 1798
  19. 1799
  20. 1800

    Personalized service recommendations for travel using trajectory pattern discovery by Zongtao Duan, Lei Tang, Xuehui Gong, Yishui Zhu

    Published 2018-03-01
    “…Most existing work on improving service recommendations has continued to utilize the same ratings and rankings of services without consideration of diverse users’ demands. …”
    Get full text
    Article