0 | -- | 0 | Mark Cieliebak. Optimising Deep Learning for Infinite Applications in Text Analytics |
0 | -- | 0 | Jean-Baptiste Mouret. Micro-Data Learning: The Other End of the Spectrum |
0 | -- | 0 | Peter Wittek. Making Learning Physical - Machine Intelligence and Quantum Resources |
0 | -- | 0 | András A. Benczúr, Róbert Pálovics, Márton Balassi, Volker Markl, Tilmann Rabl, Juan Soto, Björn Hovstadius, Jim Dowling, Seif Haridi. Towards Streamlined Big Data Analytics |
0 | -- | 0 | Frédéric Alexandre. Autonomous Machine Learning |
0 | -- | 0 | George Potamias. Towards Predictive Pharmacogenomics Models |
0 | -- | 0 | Jan Stampfli, Kurt Stockinger. Applied Data Science: Using Machine Learning for Alarm Verification |
0 | -- | 0 | Karol Kurach, Marcin Andrychowicz, Ilya Sutskever. Neural Random Access Machines |
0 | -- | 0 | Wouter M. Koolen. Robust and Adaptive Methods for Sequential Decision Making |
0 | -- | 0 | Claudio Lucchese, Franco Maria Nardini, Raffaele Perego, Nicola Tonellotto, Salvatore Orlando, Rossano Venturini. Fast Traversal of Large Ensembles of Regression Trees |
0 | -- | 0 | Nicolas Mayer, Jocelyn Aubert, Hervé Cholez, Eric Grandry, Eric Dubois 0001. The TISRIM-Telco Toolset - An IT Regulatory Framework to Support Security Compliance in the Telecommunications Sector |
0 | -- | 0 | José Francisco García Cantos, Manuel Peinado, Miguel A. Salido, Federico Barber. Optimisation System for Cutting Continuous Flat Glass |
0 | -- | 0 | Patrizio Dazzi. BASMATI - Cloud Brokerage Across Borders For Mobile Users And Applications |
0 | -- | 0 | Pierre-Yves Oudeyer, Manuel Lopes, Celeste Kidd, Jacqueline Gottlieb. Curiosity and Intrinsic Motivation for Autonomous Machine Learning |
0 | -- | 0 | Balázs Csanád Csáji, András Kovács, József Váncza. Online Learning for Aggregating Forecasts in Renewable Energy Systems |
0 | -- | 0 | Marios D. Dikaiakos, George Pallis, Evangelos P. Markatos. Mandola: Monitoring and Detecting Online Hate Speech |
0 | -- | 0 | Darko Brodic, Dejan Tanikic, Alessia Amelio. Predicting the Extremely Low Frequency Magnetic Field Radiation Emitted from Laptops: A New Approach to Laptop Design |
0 | -- | 0 | Erkuden Rios, Massimiliano Rak, Samuel Olaiya Afolaranmi. Managing Security in Distributed Computing: Self-Protective Multi-Cloud Applications |
0 | -- | 0 | Dimitrios N. Serpanos, Howard E. Shrobe, Muhammad Taimoor Khan. Behaviour-Based Security for Cyber-Physical Systems |
0 | -- | 0 | Olivier Parisot, Benoît Otjacques. Predictive Modelling from Data Streams |
0 | -- | 0 | Max Welling. Marrying Graphical Models with Deep Learning |
0 | -- | 0 | Bernd Malle, Peter Kieseberg, Sebastian Schrittwieser, Andreas Holzinger. Privacy Aware Machine Learning and the "Right to be Forgotten" |
0 | -- | 0 | Sander M. Bohte, Hung Son Nguyen. Modern Machine Learning: More with Less, Cheaper and Better |
0 | -- | 0 | Olof Görnerup, Theodore Vasiloudis. Mining Similarities and Concepts at Scale |
0 | -- | 0 | Markus Wurzenberger, Florian Skopik. The BÆSE Testbed - Analytic Evaluation of IT Security Tools in Specified Network Environments |
0 | -- | 0 | Bert Kappen, Wim Wiegerinck. Bonaparte: Bayesian Networks to Give Victims back their Names |