1. Symposium on Advances in Ocean Observation Rajan, Kanna; Alvera-Azcárate, Aida; Eidsvik, Jo; Subramaniam, Ajit 2023 Articles OceanographyOceanography--ObservationsRoboticsComputer science
2. Compositional Dataflow Circuits Edwards, Stephen A.; Townsend, Richard Morse; Barker, Martha Massee; Kim, Martha Allen 2019 Articles Data flow computingComputer networksBuffer storage (Computer science)Computer science
3. A physical model for efficient ranking in networks De Bacco, Caterina; Larremore, Daniel B.; Moore, Cristopher 2018 Articles Computer scienceComputer networks--Mathematical modelsComputer networksLinear control systemsHierarchies--Mathematical modelsAlgorithms
4. Community-based benchmarking improves spike rate inference from two-photon calcium imaging data Berens, Philipp; Freeman, Jeremy; Deneux, Thomas; Chenkov, Nikolay; McColgan, Thomas; Speiser, Artur; Macke, Jakob H.; Turaga, Srinivas C.; Mineault, Patrick; Rupprecht, Peter; Gerhard, Stephan; Friedrich, Rainer W.; Friedrich, Johannes; Paninski, Liam; Pachitariu, Marius; Harris, Kenneth; Bolte, Ben; Machado, Timothy Aloysius; Ringach, Dario; Stone, Jasmine; Rogerson, Luke E.; Sofroniew, Nicolas J.; Reimer, Jacob; Froudarakis, Emmanouil; Euler, Thomas; Roson, Miroslav Roman; Theis, Lucas; Tolias, Andreas S.; Bethge, Matthias 2018 Articles Computational biologyAlgorithmsNeurosciencesComputer science
5. Divide and conquer approach to quantum Hamiltonian simulation Hadfield, Stuart Andrew; Papageorgiou, Anargyros 2018 Articles Hamiltonian systemsQuantum computersQuantum theoryComputer science
6. Image set for deep learning: field images of maize annotated with disease symptoms Wiesner-Hanks, Tyr; Stewart, Ethan L.; Kaczmar, Nicholas; DeChant, Chad; Wu, Harvey; Nelson, Rebecca J.; Lipson, Hod; Gore, Michael A. 2018 Articles Computer scienceMachine learningPlant diseasesCornImage processingNeural networks (Computer science)
7. Latent human traits in the language of social media: An open-vocabulary approach Kulkarni, Vivek; Kern, Margaret L.; Stillwell, David J.; Kosinski, Michal; Matz, Sandra C.; Ungar, Lyle; Skiena, Steven; Schwartz, H. Andrew 2018 Articles Social mediaPersonalityLanguage and languagesComputer scienceBusiness
8. Readmission prediction via deep contextual embedding of clinical concepts Xiao, Cao; Ma, Tengfei; Dieng, Adji Bousso; Blei, David Meir; Wang, Fei 2018 Articles Computer scienceHospital utilization--ForecastingHospital recordsNeural networks (Computer science)
9. Simulated User Bots: Real Time Testing of Insider Threat Detection Systems Stolfo, Salvatore 2018 Articles Computer scienceComputer networksComputer networks--Security measuresComputer securityIntrusion detection systems (Computer security)
10. Rapid re-identification of human samples using portable DNA sequencing Zaaijer, Sophie; Gordon, Assaf; Speyer, Daniel; Piccone, Robert; Groen, Simon Cornelis; Erlich, Yaniv 2017 Articles CytologyGeneticsGenomicsDNA fingerprintingCell linesComputer science
11. The folded k-spectrum kernel: A machine learning approach to detecting transcription factor binding sites with gapped nucleotide dependencies Elmas, Abdulkadir; Wang, Xiaodong; Dresch, Jacqueline M. 2017 Articles Machine learningNucleotide sequence--Data processingElectrical engineeringComputer science
12. Edición digital y algunas tecnologías aliadas Alles Torrent, Susanna 2015 Articles Information scienceComputer science
13. Fox in the Trap: Thwarting Masqueraders via Automated Decoy Document Deployment Voris, Jonathan A.; Jermyn, Jill Louise; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2015 Articles Computer science
14. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
15. Stochastic differential equations for quantum dynamics of spin-boson networks Mandt, Stephan; Sadri, Darius; Houck, Andrew A.; Türeci, Hakan E. 2015 Articles Quantum theoryPhase space (Statistical physics)Quantum opticsStochastic differential equationsComputer science
16. Coherent Somatic Mutation in Autoimmune Disease Ross, Kenneth A. 2014 Articles Mutation (Biology)Antibody diversityAutoimmune diseasesComputer science
17. Measuring Drive-by Download Defense in Depth Boggs, Nathaniel Gordon; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
18. Model Aggregation for Distributed Content Anomaly Detection Whalen, Sean; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2014 Articles Computer science
19. Synthetic Data Generation and Defense in Depth Measurement of Web Applications Boggs, Nathaniel Gordon; Zhao, Hang; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
20. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Articles Computer science