1. Compositional Dataflow Circuits Edwards, Stephen A.; Townsend, Richard Morse; Barker, Martha Massee; Kim, Martha Allen 2019 Articles Data flow computingComputer networksBuffer storage (Computer science)Computer science
2. A physical model for efficient ranking in networks De Bacco, Caterina; Larremore, Daniel B.; Moore, Cristopher 2018 Articles Computer scienceComputer networks--Mathematical modelsComputer networksLinear control systemsHierarchies--Mathematical modelsAlgorithms
3. Community-based benchmarking improves spike rate inference from two-photon calcium imaging data Berens, Philipp; Freeman, Jeremy; Deneux, Thomas; Chenkov, Nikolay; McColgan, Thomas; Speiser, Artur; Macke, Jakob H.; Turaga, Srinivas C.; Mineault, Patrick; Rupprecht, Peter; Gerhard, Stephan; Friedrich, Rainer W.; Friedrich, Johannes; Paninski, Liam; Pachitariu, Marius; Harris, Kenneth; Bolte, Ben; Machado, Timothy Aloysius; Ringach, Dario; Stone, Jasmine; Rogerson, Luke E.; Sofroniew, Nicolas J.; Reimer, Jacob; Froudarakis, Emmanouil; Euler, Thomas; Roson, Miroslav Roman; Theis, Lucas; Tolias, Andreas S.; Bethge, Matthias 2018 Articles Computational biologyAlgorithmsNeurosciencesComputer science
4. Divide and conquer approach to quantum Hamiltonian simulation Hadfield, Stuart Andrew; Papageorgiou, Anargyros 2018 Articles Hamiltonian systemsQuantum computersQuantum theoryComputer science
5. Image set for deep learning: field images of maize annotated with disease symptoms Wiesner-Hanks, Tyr; Stewart, Ethan L.; Kaczmar, Nicholas; DeChant, Chad; Wu, Harvey; Nelson, Rebecca J.; Lipson, Hod; Gore, Michael A. 2018 Articles Computer scienceMachine learningPlant diseasesCornImage processingNeural networks (Computer science)
6. Latent human traits in the language of social media: An open-vocabulary approach Kulkarni, Vivek; Kern, Margaret L.; Stillwell, David J.; Kosinski, Michal; Matz, Sandra C.; Ungar, Lyle; Skiena, Steven; Schwartz, H. Andrew 2018 Articles Social mediaPersonalityLanguage and languagesComputer scienceBusiness
7. Readmission prediction via deep contextual embedding of clinical concepts Xiao, Cao; Ma, Tengfei; Dieng, Adji Bousso; Blei, David Meir; Wang, Fei 2018 Articles Computer scienceHospital utilization--ForecastingHospital recordsNeural networks (Computer science)
8. Simulated User Bots: Real Time Testing of Insider Threat Detection Systems Stolfo, Salvatore 2018 Articles Computer scienceComputer networksComputer networks--Security measuresComputer securityIntrusion detection systems (Computer security)
9. Rapid re-identification of human samples using portable DNA sequencing Zaaijer, Sophie; Gordon, Assaf; Speyer, Daniel; Piccone, Robert; Groen, Simon Cornelis; Erlich, Yaniv 2017 Articles CytologyGeneticsGenomicsDNA fingerprintingCell linesComputer science
10. The folded k-spectrum kernel: A machine learning approach to detecting transcription factor binding sites with gapped nucleotide dependencies Elmas, Abdulkadir; Wang, Xiaodong; Dresch, Jacqueline M. 2017 Articles Machine learningNucleotide sequence--Data processingElectrical engineeringComputer science
11. Fox in the Trap: Thwarting Masqueraders via Automated Decoy Document Deployment Voris, Jonathan A.; Jermyn, Jill Louise; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2015 Articles Computer science
12. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
13. Stochastic differential equations for quantum dynamics of spin-boson networks Mandt, Stephan; Sadri, Darius; Houck, Andrew A.; Türeci, Hakan E. 2015 Articles Quantum theoryPhase space (Statistical physics)Quantum opticsStochastic differential equationsComputer science
14. Coherent Somatic Mutation in Autoimmune Disease Ross, Kenneth A. 2014 Articles Mutation (Biology)Antibody diversityAutoimmune diseasesComputer science
15. Measuring Drive-by Download Defense in Depth Boggs, Nathaniel Gordon; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
16. Model Aggregation for Distributed Content Anomaly Detection Whalen, Sean; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2014 Articles Computer science
17. Synthetic Data Generation and Defense in Depth Measurement of Web Applications Boggs, Nathaniel Gordon; Zhao, Hang; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
18. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Articles Computer science
19. Aggregated Word Pair Features for Implicit Discourse Relation Disambiguation Biran, Or; McKeown, Kathleen 2013 Articles Computer scienceLinguistics
20. A negative selection heuristic to predict new transcriptional targets Cerulo, Luigi; Paduano, Vincenzo; Zoppoli, Pietro; Ceccarelli, Michele 2013 Articles BioinformaticsComputer science