|
2D antenna arrangements (1) | 3D antenna arrangements (1) | 3D topology (1) |
5G (1) | acoustical echo (1) | action detection (1) |
action object detection (1) | action-object detection (1) | active learning (1) |
Active Network (1) | Active Probing (1) | actual risk and empirical risk (1) |
Adaptation models (1) | adaptive algorithms (1) | adaptive filters (1) |
adaptive systems (2) | Additive manufacturing (1) | Admission Control (1) |
affinity CNN (1) | Affordance (1) | aged care (1) |
aggregating labels (1) | AI (2) | Algebraic Decision Trees (1) |
Algebraic geometric codes (1) | algebraic number theory (1) | algorithm design and analysis (1) |
algorithmic thinking (1) | Algorithms (4) | all-to-all broadcast (1) |
ambiguity (1) | Amortized Analysis (1) | analog beamforming (1) |
analog equalization (1) | analog equalizing networks design (1) | analog MIMO equalizer (1) |
analog-to-digital converters (1) | analysis and design of algorithms (1) | Analysis of Algorithms (2) |
Analytical models (1) | Android (1) | angle of arrival (1) |
angle of departure (1) | angular embedding (2) | Anonymity (1) |
antenna arrays (4) | antenna elements (1) | antenna positions (1) |
antenna radiation patterns (1) | antennas (1) | anti-virus vendors (1) |
ANTS (1) | AoA (1) | AoD (1) |
application sharing (1) | application-specific (1) | Approximation Algorithm (1) |
Approximation Algorithms (2) | Approximation Ratio (1) | APU (1) |
architected materials (1) | Architecture (1) | arcs (1) |
Arithmetic Complexity (1) | arithmetic reasoning (1) | array signal processing (4) |
Arrays (1) | ART 1-based systems (1) | Artificial Intelligence (1) |
Asian languages (1) | ATM (2) | Atomic (1) |
Attacks (1) | Audio Clustering (1) | audio event classification (1) |
Audio Indexing (1) | Authentication (1) | authorisation (1) |
Automatic Speech Recognition (1) | autonomous agent (1) | autonomous object detection (1) |
autoregressive model (1) | availability constraints (1) | backdoors (1) |
backpropagation (1) | bandwidth allocation (1) | basis function (1) |
Bayes' theorem (1) | beamforming gain (2) | beamforming performance (1) |
behavior-based robotics (2) | behavioral advertising (1) | belief and knowledge (1) |
BGP (1) | bias and variance (1) | big data regime (1) |
Binary Trees (1) | binding detection (1) | biocybersecurity (1) |
BirliX (1) | bit rate 100 Gbit/s (1) | blackbox analysis (1) |
blackbox experiments (1) | Boolean Computation (1) | Bounded Delay Service (1) |
broadcast (1) | browser security (1) | bulk distribution (1) |
Burstiness (1) | Burstiness Function (1) | C++ (1) |
caching (1) | Caltech101 dataset (1) | Caltech256 dataset (1) |
Cameras (1) | canonical PASCAL VOC Challenge datasets (1) | capacity control (1) |
capacity invariant (1) | care triad (1) | catastrophic interference problem (1) |
categories (1) | category-level continuous pose regression (1) | causal inference (1) |
Causality (2) | causation (1) | CE method (1) |
censorship (1) | Censorship Circumvention (1) | channel estimation (4) |
channel length (1) | chaos (1) | Characterization (1) |
Children privacy (1) | choice discrimination (1) | circuit complexity (1) |
circumvention (1) | Citizen Science (1) | classification (2) |
Classifiers (1) | Click fraud (1) | Cloud Computing (1) |
cluster detection (1) | clustering (2) | CNS (2) |
CNS-1 (1) | codebook (1) | cognitive architecture (1) |
cognitive interviews (1) | collaboration (1) | color naming (1) |
color naming; categorization (1) | combination (1) | Combinatorial problems (1) |
communication complexity (2) | Competitive Analysis (3) | Complete Binary Trees (1) |
complex approximation (1) | complex objects (1) | complex-valued neural networks (1) |
complexity measures (1) | Complexity theory (1) | Composite (1) |
compositional hierarchy (1) | Compositional Knowledge (1) | compressed sensing literature (1) |
computational biology (1) | Computational Complexity (2) | computational geometry (1) |
computational linguistics (1) | Computational modeling (1) | Computational representation theory (1) |
computational thinking (1) | computer architecture (1) | computer logic (1) |
Computer science education (1) | computer vision (2) | concept languages (2) |
concurrence (1) | Condensed Matter & Materials Physics (1) | conditional GAN (1) |
conferencing (1) | connection management (1) | connectionism (1) |
connectionist networks (1) | constrained optimization (1) | constraint relaxation (1) |
constraint satisfaction (2) | construct (1) | Construction Grammar (1) |
construction-to-construction relations (1) | constructive methods (1) | constructive network (1) |
consumer protection (1) | contexts (1) | Contigency table (1) |
continued fractions (1) | continuous pose estimates (1) | contrastive learning (1) |
control over wireless (1) | control theory (1) | controllability (1) |
Convolution (2) | convolutional codes (1) | Convolutional Networks (2) |
Cooperative Multimedia Environment (1) | COPPA (2) | corpus query (1) |
Correlation function (1) | Counting Problems (1) | Couplings (2) |
Covering and packing (1) | cross-lingual resources (1) | cross-modal supervision (1) |
cross-view integration (1) | crowdsourcing (1) | Cryptocurrency (1) |
CSCW (1) | cuneiform (1) | curse of dimensionality (1) |
curved surfaces and arbitrary tilted planes (1) | cyberbiosecurity (1) | Cybercrime (1) |
cybersecurity (2) | cyclic codes (1) | cyclotomic fields (3) |
cyclotomic units (1) | data analytics (1) | data fusion (1) |
Data models (1) | data storage systems (1) | data structures (2) |
data transmission (1) | data visualization (1) | data warehouses (1) |
data-driven and error-driven learning (1) | dealy- and loss-sensitive application (1) | decision trees (1) |
Declarative Networking (1) | decoding (1) | Deep Learning (10) |
deep neural networks (1) | Deep Packet Inspection (1) | deformable matching (1) |
Deformable models (1) | Deformable Part Models (2) | Denial-of-Service (1) |
depth-wise convolution (1) | description logics (2) | design centering (1) |
destructive methods (1) | Detection (1) | Detectors (3) |
deterministic MIMO channel (1) | deterministic multiplexing gain (1) | deterministic spherical wave channel model (1) |
developer forums (1) | Devide-and-Conquer Algorithms (1) | Dictionaries (1) |
Differential Evolution (1) | digital biosecurity (1) | digital divide (1) |
digital fountain (2) | Digital Pathology (1) | Directive antennas (1) |
Discrete Event Systems (1) | Discrete Fourier tranform (1) | Discrete Tomography (2) |
dispatching (1) | distributed algorithms (1) | distributed inferencing (1) |
distributed information systems (1) | distributed memory architectures (1) | Distributed Operating Systems (1) |
Distributed Systems (4) | Divergence theorem (1) | Diversity (1) |
domain adaptation (1) | Duration Modeling (1) | dynamic (1) |
dynamic analysis (1) | dynamic binding (1) | dynamic bindings (2) |
dynamic graph algorithms (1) | Dynamic Graph Embeddings (1) | Dynamic Self-Organizing Map (1) |
Dynamics Bindings (1) | e-Health (1) | Earliest-Deadline-First (1) |
east squares methods (1) | ECG (1) | echo cancellation (1) |
Edgy (1) | efficient communication (2) | eigenvalue assignment (1) |
elastic matching (1) | Element Distinctness Problem (1) | EM algorithm (1) |
Embodied Construction Grammar; Semantic parsing; FrameNet (1) | emergent computation (1) | energy efficiency (2) |
Energy resolution (1) | ensemble model (1) | ephemeral domains (1) |
equalisers (2) | equipment failure (1) | Erasure Codes (3) |
error compensation (1) | error correction codes (1) | estimated channel matrix (1) |
Estimation (1) | ethernet switch (1) | evidential reasoning (1) |
exhaustive search (2) | expectation-maximization (1) | experimental evaluation (1) |
Extended Cubic Lattice (1) | Extended Riemann Hypothesis (1) | Extensibility (1) |
Extensible (1) | extensible and object-oriented database systems (1) | External Processor Scheduler (1) |
face perception (1) | Face recognition (1) | Faces (1) |
failure analysis (1) | Fast Fourier transforms (1) | fault tolerance (1) |
Feature extraction (2) | feature map (2) | feature selection (1) |
feature structures (1) | FEC codes (1) | few-shot learning (1) |
fifth generation (5G) (1) | figure-ground (2) | figure-ground organization (2) |
file reorganizations (1) | fine-grained aerial target recognition (1) | Fine-grained Classification (1) |
Finite cell method (1) | Finite element method (1) | Finite Fields (2) |
first person videos (1) | first-person videos (1) | fixed analog equalizing networks (1) |
Flash Loans (1) | forward-error correcting (FEC) (1) | fractals (1) |
Fraction Representation (1) | frame (1) | frame element (1) |
Frame semantics (4) | frame-to-frame relations (1) | FrameNet (3) |
FrameNet Constructicon (1) | free will (1) | frequency 5 Hz (1) |
frequency 60 GHz (1) | frequency selective surfaces (1) | Frequency-domain analysis (3) |
frequency-domain equalization (1) | frequency-selective MIMO channels (1) | Full duplex communication (1) |
full rank array response matrix estimation (1) | full rank reconstructed channel matrix (1) | full rank spatial channel estimation (1) |
functional join (1) | Fused deposition modeling (1) | fuzzy clustering (1) |
fuzzy control (1) | Fuzzy Logic (1) | fuzzy set theory (1) |
fuzzy sets (1) | Gain (1) | Galois cohomology (1) |
game theory (1) | garbage collection (1) | Gauss periods (1) |
Gaussian Elimination with Partial Pivoting (1) | General Physics (1) | generalized sparselet model (1) |
genetic algorithms (4) | Geographic database management systems (1) | Germ-grain model (1) |
Gestaltist theory (1) | Google (1) | Google Play (1) |
GPU (1) | grammatical construction (1) | graph algorithms (1) |
Graph Embeddings (1) | graph search (1) | graph theory (1) |
graphical user interfaces (1) | graphs (1) | grasp point locations (1) |
Grasping (1) | grasping system (1) | Great Firewall of China (1) |
grid-partitioning and scatter-partitioning network (1) | group convolution (1) | growth (1) |
Handwritten Digit Recognition (1) | Haptic interfaces (1) | Haptics (1) |
hard and soft competitive learning (1) | HBF architecture (1) | HCI (1) |
health apps (1) | heterogeneous conditions (1) | Heterogeneous material (1) |
heuristic algorithms (1) | heuristics (1) | Hidden Markov model (1) |
Hidden Markov models (1) | hierarchical MIMO system (1) | Hierarchical Radial Basis Function network (1) |
high dimensional singular value decomposition (1) | high performance computing (1) | high school education (1) |
high-capacity convolutional networks (1) | Homogenization (2) | HP Model (1) |
HP Side Chain Model (1) | HRTEM (1) | human auditory perception (1) |
human behaviour (1) | human in the loop (1) | human rights (1) |
hybrid beamforming architecture (2) | hybrid HMM-ANN classification (1) | hybrid learning (1) |
Hybrid recognition (1) | Hydrant (1) | Hypercubes (2) |
Hypergraphs (1) | Hyperplanes (1) | hypertext (1) |
Identification (1) | IGMP (1) | image analysis (1) |
image coding (1) | image quality assessment (1) | image reconstruction (1) |
image representation (1) | image segmentation (5) | image texture (1) |
ImageNet dataset (1) | imbalanced classification (1) | implicit parallelism (1) |
Impression fraud (1) | inconsistent knowledge (1) | Incremental Class Learning (1) |
Incremental learning (3) | Indexes (1) | Inductive and deductive types of inference (1) |
inductive rule learning (1) | inference (1) | inference mechanisms (1) |
information architecture (1) | information entropy (1) | information flow (1) |
information flow analysis (1) | information science (1) | information security (1) |
information sharing (1) | Information theory (6) | input-space representation (1) |
instance checking (1) | integer linear programming (1) | Interdisciplinary Physics (1) |
Interference (2) | interference reduction (1) | interference suppression (2) |
interference-aware multiiterative detection (1) | interference-aware multiiterative equalization (1) | Interlingual Comparison (1) |
Internet (3) | interpolation (1) | intersymbol interference (1) |
intersymbol interferences (1) | intrinsic image decomposition (2) | intrinsics images in the wild (2) |
IP multicast (1) | ISI (1) | IXP (1) |
Java (1) | JDK (1) | joint-working (1) |
JPEG (1) | k-NN (1) | Kernel Density Estimation (1) |
kernel function (1) | Kinematics (1) | Knapsack Problem (1) |
knowledge representation (2) | Kohonen (1) | label transfer (1) |
labeling problem (1) | labyrinth problems (1) | Laminate (1) |
language documentation (2) | language evolution (2) | laptop computer (1) |
laptop computers (1) | large scale learning (1) | layered video (1) |
LCAS (1) | Leaky Bucket (1) | Learning (artificial intelligence) (1) |
learning algorithms (4) | learning classifier systems (3) | learning from data (1) |
lexical resources (1) | Lexical semantics (2) | Lexicography (1) |
line-of-sight MIMO (1) | line-of-sight MIMO communication (1) | linear algebra (1) |
Linear Lists (2) | linear programming (2) | linguistic variation (1) |
list-update (1) | load sharing (1) | local texture-like measures (1) |
locality of reference (1) | Logic Programming (2) | logical shared address space (1) |
logics for truth (1) | long-tail distribution (1) | long-term memory (1) |
long-term potentiation (1) | lookahead (1) | LOS channel (1) |
LOS MIMO arrays (1) | LOS MIMO backhaul design (1) | lossy channels (1) |
Low Resolution (1) | low resolution quantization (1) | low-level vision (2) |
low-resource languages (1) | Lower Bounds (3) | Lyapunov equation (1) |
M0 (1) | machine learning (6) | Machine Learning/NLP (1) |
macrocell backhaul links (1) | magnetic resonance imaging (MRI) (1) | Management (1) |
Manual annotation (1) | many-to-many matching (1) | mAP (1) |
MAR Apps (1) | mark and sweep (1) | Markov Random Field (1) |
massively parallel (1) | massively parallel systems (1) | matching theory (1) |
Material model (1) | matrix algebra (2) | matrix factorization (1) |
Matrix rigidity (1) | MAX Problem (1) | max-margin optimization (1) |
maximum clique problem (1) | maximum likelihood estimation (1) | maximum spatial degree-of-freedom gain (1) |
MDS-Codes (1) | mean average precision (1) | mean field annealing (1) |
Measurement (1) | measurements (1) | meibomian gland atrophy (1) |
membership (1) | memorization (1) | memory management (1) |
memory systems (1) | memory-efficient learning (1) | Mesoamerican languages (1) |
meta-level (1) | MetaNet (4) | Micro-Kernel (1) |
microkernel family (1) | Microstructure reconstruction (1) | microwave links (1) |
millimeter wave (1) | millimeter wave communication (1) | millimeter wave system (2) |
millimeter wave systems (1) | millimetre wave propagation (1) | millimetre waves (1) |
MIMD systems (1) | MIMO (6) | MIMO communication (5) |
MIMO radar (1) | Minimal Cutsets (1) | Minkowski functionals (1) |
MIT intrinsics (2) | mmW link (1) | mmW systems (1) |
Mobile (1) | mobile applications (1) | mobile apps (1) |
Mobile DNS traffi (1) | Mobile Security (1) | mobility (1) |
model comparison (1) | modeling (1) | modeling and recovery of physical attributes (1) |
models (1) | modulation schemes (1) | Molecular & Optical (1) |
Molecular sequence analysis (1) | Moment fitting equations (1) | Monitoring (1) |
monte carlo techniques (1) | mooney faces (1) | motion planning (1) |
Motion segmentation (1) | MPEG (2) | MPI Sintel (2) |
MRI fingerprinting (1) | multi-band processing (1) | multi-connectivity (1) |
multi-layer annotation and alignment (1) | Multi-Layer-Perceptron (1) | multi-methods (1) |
multiantenna interference reduction (1) | multicast (1) | multicast connection (1) |
multicast tree (1) | multiclass inference (1) | Multicommodity flow (1) |
multiconnectivity (1) | multiconvolutional inference (1) | multidimensional access methods (1) |
multiiterative receiver (1) | Multilingual FrameNet (1) | Multimedia Applications (2) |
multimedia communication (1) | multimedia networking (1) | multipath channels (1) |
multiple channel paths (1) | multiple-input multiple-output systems (2) | Multiplexing (4) |
Multiscale queries (1) | Multiscale structure modeling (1) | Multiservice Networks (1) |
Multivariate Polynomials (1) | nature (1) | NC class (1) |
NC-Class (2) | nearest neighbor (1) | Nearest Neighbors (1) |
negation (1) | Neighborhood size (1) | network coding (1) |
Network Measurements (1) | Network Steiner Tree Problem (1) | networked control systems (1) |
Networks (1) | Neural Gas algorithm (1) | neural network (2) |
neural networks (8) | neural oscillations (1) | Next-generation sequencing (1) |
NFT (1) | Nick Weaver (1) | NLU (1) |
Noise measurement (2) | non-line-of-sight channels (1) | Nondivisibility (1) |
nonmonotonic reasoning (1) | nonorthogonal steering vector (1) | normal bases (1) |
normal rational curves (1) | NP-completeness (1) | number restrictions (1) |
Numerical integration (1) | NV (1) | Object Detection (5) |
object matching (1) | object orientation (1) | object recognition (3) |
object segmentation (3) | object-category measures (1) | Object-oriented programming languages (1) |
Octree (1) | OFDM (1) | older adults (1) |
on demand download (1) | on-board antennas (1) | On-line Algorithms (4) |
on-line graph coloring (1) | one- and two-stage learning (1) | one-shot learning (1) |
one-way transmission (1) | online tracking (1) | open long-tailed recognition (1) |
open-set recognition (1) | optimal 2D arrangements (1) | optimal antenna arrangements (1) |
Optimal Control (1) | optimization (1) | optimization techniques (1) |
orthogonal phase relations (1) | orthogonal steering vector set (1) | orthogonal steering vectors (1) |
outage probability (1) | Outsourced Cloud Computation (1) | oxygen absorption (1) |
P-complete problems (1) | Packet Scheduling (1) | Packet video (2) |
page load time (PLT) (1) | paging (1) | Parallel Algorithms (2) |
parallel corpora (2) | parallel garbage collection (1) | parallel languages (1) |
parallel operating systems (1) | parallel processing (1) | parallelism (1) |
parallelization (2) | partially structured connectionism (1) | Particles & Fields (1) |
PASCAL VOC (1) | pattern classification (1) | pattern recognition (1) |
perceptually grounded semantics (1) | performance analysis (3) | performance evaluation (2) |
persistent storage (1) | perturbation (1) | PET (1) |
Petrinet (1) | Pfaffian Activation Functions and Formulas (1) | Phase noise (1) |
Phase shift keying (1) | phonetics (1) | Pipelines (1) |
pointer swizzling (1) | Policy (1) | Polymer Structure Prediction (1) |
Polymers & Soft Matter (1) | polynomial speedup (1) | polyominoes (1) |
polysemy (1) | portable (1) | pose estimation (1) |
poselets (1) | Power amplifiers (1) | power of compass (1) |
power usage (1) | predictive learning (1) | Printed model (1) |
privacy (4) | privacy champions (1) | Privacy compliance (1) |
Privacy settings (1) | Privacy-Preserving (1) | Probabilistic logic (1) |
Probabilistic Recurrence Relations (1) | procedural discourse (1) | processing complexity (1) |
program access (1) | Programmable Hardware (1) | programming languages (2) |
progressive multigrid (1) | pronunciation models (1) | Proposals (2) |
Protein Folding (1) | prototype vectors (1) | pruning (1) |
Public Internet (1) | PVC (1) | PVM (1) |
QoS (2) | qualification problem (1) | Quality of Service (4) |
quality-of-service (QoS) (1) | quantisation (signal) (1) | QUANTITEM (1) |
Quantization (signal) (1) | quantization error (1) | Queries (2) |
query optimization (1) | query processing (1) | radial basis function (1) |
Radial Basis Function network (1) | radiation patterns (1) | Radio frequency (4) |
radio links (1) | Radio transmitters (1) | radiocommunication (1) |
Ramification Problem (1) | ran- domized numerical linear algebra (1) | random walk (1) |
Randomized Algebraic Decision Trees (1) | Randomized Branching Programs (1) | ransomware (1) |
rapid reasoning (1) | RBF networks (1) | RDRAM (1) |
reactive search (1) | Read-k Branching Programs (1) | Read-Once Formulas (2) |
Real Time (2) | real-time communication (2) | real-time multiclass object detection (1) |
real-time multiclass object recognition (1) | Real-time Networks (1) | real-time systems (1) |
real-time vision (1) | reasonable antenna sizes (1) | Reasoning About Actions (2) |
received signals (1) | Receivers (4) | Receiving antennas (3) |
recognition (1) | reconstruction sparsity (1) | recruitment learning (1) |
Rectilinear Steiner Tree Problem (1) | redundancy (1) | Reed-Solomon codes (1) |
ReedSolomon codes (1) | region-based convolutional networks (1) | regression analysis (1) |
reinforcement learning (2) | reliability (3) | reliability engineering (1) |
reliability theory (1) | reliable broadcast (1) | reliable data distribution (1) |
reliable multicast (1) | Representation (1) | Resource management (2) |
result checking (1) | reverberation (1) | RF specificity (1) |
Robot kinematics (1) | Robot sensing systems (1) | robot vision (1) |
Robotic perception (1) | robotics (2) | Robots (3) |
robust audio (1) | Robustness (4) | rotation counting (1) |
run time model (1) | saliency (1) | sampling (1) |
satellite (1) | scalable video (1) | scale and rotation invariant matching (1) |
scaling (1) | scheduling theory (1) | SDKs (1) |
SDRAM (1) | secure machine learning (1) | Secure Sockets Layer (1) |
Security (1) | Security Protocols (1) | security settings (1) |
Segmentation (1) | selected array propagation vectors (1) | Selection Problems (1) |
self-efficacy (1) | Self-organization (1) | Self-Organizing Map (1) |
Semantic computing (1) | semantic phrases similarity (1) | Semantic roles (2) |
semantic segmentation (3) | semantic typology (2) | sensitivity (1) |
Sequencing and genotyping technologies (1) | SES (1) | set theory (1) |
shape matching (1) | Shape sensitivity analysis (1) | ShapeNet (1) |
Shared Annotation (1) | shared representation (1) | Short Proofs (1) |
short range mmWave communication (1) | Short-term Memory (1) | signal components (1) |
signal detection (1) | Signal resolution (1) | signal to noise ratio (1) |
SIMT (1) | simulation (1) | Simulation of Algorithms (2) |
singular value decomposition (1) | SINR (1) | situations (1) |
skill assessment (1) | Sky Computing (1) | Snap! (1) |
SNR (1) | social computing (1) | soft and hard competitive clustering algorithms (1) |
Software developers (2) | software development (1) | software reuse (1) |
source code (1) | source coding (1) | space division multiplexing (2) |
Sparse Coding (2) | sparse connectionist networks (1) | Sparse matrices (1) |
sparse mmW channel (1) | Sparse Networks (1) | Sparse Rational Interpolation (2) |
spatial beamforming (1) | spatial channel properties (1) | spatial databases (1) |
spatial frequency (1) | spatial frequency domain (1) | spatial frequency indices (1) |
spatial multiplexing (1) | spatial multiplexing gain (1) | spatial multiplexing gains (1) |
spatially orthogonal MIMO system (1) | spatio-temporal representation (1) | Speaker Diarization (1) |
Speaking Rate (2) | speckle noise (1) | speckled radiance (1) |
spectral embedding (1) | spectral graph partitioning (2) | spectral methods (1) |
speech recognition (5) | SRAM (1) | SSL (1) |
standard structured output prediction formulation (1) | static analysis (2) | Static-Priority (1) |
statistical analysis (1) | statistical computing (1) | Statistical Physics (1) |
steering angle (1) | strict P-completeness (1) | strong line-of-sight MIMO approach (1) |
strong line-of-sight MIMO communication (1) | Strong LOS channel (1) | structural malware (1) |
successive channel equalization (1) | supervised and unsupervised learning (1) | supervised and unsupervised learning from data (1) |
supervised learning (2) | Supervisor Synthesis (1) | Support vector machines (1) |
surveillance (1) | SVD (1) | Swing (1) |
syllabic onsets (1) | syllable (2) | Sylvester equation (1) |
symbol grounding (1) | Symbolic Manipulation (1) | symmetry (2) |
synaptic links (1) | synchrony (1) | synthesizing (1) |
T0 (2) | tabu search (1) | tactile Internet (1) |
Tactile sensing (1) | tagging (1) | temporal Hebbian learning (1) |
Temporal Logic (1) | temporal reasoning (1) | temporal synchrony (1) |
Tenet protocols (1) | Testbeds (1) | testing (2) |
Texture synthesis (1) | The Big Bang (1) | three dimensional (1) |
Three-dimensional displays (1) | Threshold Functions (1) | throughput (1) |
tied block convolution (1) | time to live (TTL) (1) | time-domain analysis (1) |
time-domain sphere detection (1) | Time-series classification (1) | time-varying channels (1) |
titration analysis (1) | TLS (1) | TOMCAD (1) |
Tor (1) | Tornado codes (1) | Torrent (3) |
tracking (1) | tractable reasoning (1) | Traffic Characterization (1) |
Traffic exchanges (1) | Training (4) | Training data (2) |
Transceivers (2) | transfer (1) | transfer learning (4) |
translation (1) | translation properties (1) | translation shifts (1) |
translation studies (1) | Transmission line matrix methods (1) | transmit direction (1) |
transmit power (1) | Transmitters (2) | Transmitting antennas (5) |
transparency (1) | Transport Layer Protocols (1) | Transport Layer Security (1) |
trap constructions (1) | tree searching (1) | tree-search based MIMO detection technique (1) |
TSP (1) | turbo equalization (1) | two spiral problem (1) |
two-stage scheme (1) | Two-way Communication Game (1) | ubiquitous (1) |
Unification (1) | uniform rectangular arrays (1) | unrolled reconstruction (1) |
unsupervised learning (4) | unsupervised representation learning (1) | Upper Bounds on Probability Distribution (1) |
URLLC (2) | usable privacy (1) | Usable security (1) |
user privacy (1) | user-defined predicates (1) | valence (1) |
valence extraction (1) | Valency (1) | variable bit rate traffic (1) |
variable-speed CPU (1) | VC Dimension (1) | Vector Microprocessor (2) |
Vectors (1) | verification (1) | video images (1) |
Video Indexing (1) | video traffic characterization (1) | Viral quasispecies (1) |
virtualization (1) | Vision (1) | visual attention (1) |
visual grasp affordance estimation (1) | Visualization (3) | VLSI (1) |
VPN (1) | Walsh-functions (1) | warnings (1) |
weak constraint satisfaction (1) | weakly supervised segmentation (1) | Weaver (1) |
Web (1) | web security (1) | Web sites (1) |
web technologies (1) | white-box model (1) | Willow Garage PR2 robot (1) |
wireless (1) | wireless channels (3) | Wireless communication (4) |
wireless data bus (1) | wireless factory automation (1) | wireless systems (1) |
wireless transmission (1) | word predictability (1) | working memory (1) |
Workstation Cluster (1) | writing systems (1) | X-net (1) |
X-rays (1) | z-ordering (1) | |