1. A Pen-Based Database of Isolated Handwritten Characters - LREC ...
  2. Data Clustering: 50 Years Beyond K-Means - Semantic Scholar
  3. Scaling-up Support Vector Machines Using Boosting ... - UCI Datalab
  4. A Comparison of Different Classification Techniques for - CiteSeerX
  5. Clustering by a genetic algorithm with biased mutation ... - CiteSeerX
  6. WEKA Manual for Version 3-7-8
  7. RSA Risk Engine Introduction to the machine learning risk engine
  8. Hybrid Fuzzy Data Clustering Algorithm Using Different ... - CiteSeerX
  9. Introduction to stream: An Extensible Framework ... - Semantic Scholar
  10. active learning: theory and applications - Stanford Artificial ...
  11. "Big Data Analytics Options on AWS" white paper
  12. Learning to Create Data-Integrating Queries - CIS @ UPenn
  13. Combining Multiple Clusterings Using Evidence ... - CiteSeerX
  14. Mining Software Repositories for Accurate Authorship - Description
  15. A Survey & Current Research Challenges in Meta Learning ...
  16. Statistical and Machine Learning Approach in Forex Prediction - Core
  17. Big data: changing the way businesses compete and operate - EY
  18. A Learning Method for Developing PROAFTN Classifiers and ... - icdst
  19. On the Impact of Kernel Approximation on Learning Accuracy
  20. The Partial Weighted Set Cover Problem with Applications to Outlier ...
  21. A New Method to Measure the Similarity ... - Semantic Scholar
  22. International Journal of Innovative Technology and Exploring ...
  23. Performance Evaluation of Kernels in Multiclass ... - Semantic Scholar
  24. Learning Explainable User Sentiment and Preferences - Infoscience
  25. A Feature Selection Method Based on ∩ - Fuzzy ... - Semantic Scholar
  26. A Hybrid Approach Based On Association Rule Mining - CiteSeerX
  27. A Survey of Software Fault Localization - UT Dallas
  28. Comparison and Integration of Target Prediction Algorithms - BieColl
  29. Data Mining - icdst
  30. Finding the number of clusters in a data set - University of Southern ...
  31. Voice analysis for detecting patients with Parkinson's disease using ...
  32. The Apprentice Learner architecture - Educational Data Mining
  33. Data-intensive applications, challenges, techniques and ...
  34. IjISME - International Journal of Innovative Science and Modern - icdst
  35. SemEval-2016 Task 4: Sentiment Analysis in Twitter - QCRI
  36. enhancing the relationship between learning and assessment
  37. IMPROVEMENTS TO DEEP CONVOLUTIONAL NEURAL ...
  38. CiteSeerX Related Publications - C. Lee Giles
  39. Big Data for Remote Sensing - UMBC
  40. k-Anonymization Revisited - CiteSeerX
  41. An Empirical Study on Real Bug Fixes - Computer Science- UC Davis
  42. Modularization of the Learning Architecture - Skolan för elektroteknik ...
  43. Download MongoDB Tutorial (PDF Version) - Tutorialspoint
  44. THE TEXT MINING HANDBOOK: Advanced Approaches in ...
  45. IjISME
  46. An Investigation of Practical Approximate Nearest Neighbor Algorithms
  47. Information Retrieval and Question Answering ... - Semantic Scholar
  48. Untitled - icdst
  49. R Project - useR! - The R Project for Statistical Computing
  50. 2012 workshop book - NIPS
  51. Untitled - ICDST.org pdf depository
  52. Quality Assessment of Preclassification Maps Generated From ...
  53. Bayesian treed Gaussian process models - Bobby Gramacy
  54. Big Data Challenges for E-governess System in ... - CiteSeerX
  55. Effective teaching practices for students with and without learning ...
  56. Historical Painting Techniques, Materials, and Studio - The Getty
  57. Technology and Engineering International Journal of Recent - IJRTE
  58. The Theory and Practice of Online Learning - UFDC Image Array 2
  59. here - icdst
  60. An incremental prototype set building technique - Soft Computing ...
  61. On Their Own Terms - Princeton University
  62. Constraint-based Validation of e-Learning ... - DORAS - DCU
  63. AUC Optimization vs. Error Rate Minimization - CiteSeerX
  64. Online Behavioral Analysis and Modeling Methodology - Dartmouth ...
  65. Analog Genetic Encoding for the Evolution of Circuits ... - Infoscience
  66. Report of the Joint Task Force on Textbook and ... - Academic Senate
  67. defining digital preservation work - Social Security Online
  68. A Guidebook On Conceptual Frameworks For Research - CRLT-Engin
  69. A Joint Local-Global Approach for Medical ... - Semantic Scholar
  70. DATA INTENSIVE QUERY PROCESSING FOR - UT Dallas
  71. Building Intelligent Web Applications Using Lightweight Wrappers
  72. The eclectic paradigm as an envelope for ... - Semantic Scholar
  73. Controlling a Supply Chain Agent Using Value-Based Decomposition
  74. Ubiquitous Computing - EECS/QMUL - Queen Mary University of ...
  75. Accident Investigation Handbook - DOE Technical Standards Program
  76. Middleware support for context-awareness in distributed sensor ...
  77. SOURCE-FREE BINARY MUTATION FOR OFFENSE ... - UT Dallas
  78. PRIVACY-PRESERVING SOCIAL NETWORK ... - UT Dallas
  79. Automatically generating reading lists - Cambridge Computer ...
  80. Learning Reverse Engineering
  81. A Comparison of Two Different Methods for Score-Informed Source ...
  82. Strategic Plan for IT services 2012-2017 - University of Glasgow
  83. Faculty of Arts and Sciences Dean's Annual Report - Harvard Web ...
  84. Untitled - ICDST.org pdf depository
  85. Duplicity Detection System for Digital Documents - Semantic Scholar
  86. Discussion of J. Kevin O'Regan's “Why Red Doesn't Sound ... - NYU
  87. A Novel Approach for Knowledge Extraction ... - Semantic Scholar
  88. The Passions of the soul and Descartes's machine psychology
  89. Big Data White Paper - Axiante
  90. Securing Untrusted Code via Compiler-Agnostic Binary ... - UT Dallas
  91. Untitled - ICDST.org pdf depository
  92. OLOGS - MIT Mathematics
  93. Towards a Unified University Information System ... - CiteSeerX
  94. Currents - the Asian American Studies Center - UCLA.edu
  95. How Computational Statistics Became the Backbone of Modern ...
  96. in healthcare - Donald Bren School of Information and Computer ...
  97. Cyber-Physical System (CPS) - UCI
  98. Content-based Recommender Systems - Semantic Scholar
  99. Adult Teaching and Learning Theory: A Psychoanalytic ... - icdst
  100. MAST: Triage for Market-scale Mobile Malware Analysis - William Enck

All rights reserved for ICDST 2017-2019