DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT : A THROUGH B



.

.

GOOGLE SITES CIS RESEARCH GUIDE SITE MAP DATABASES

 

AMOUNT OF CIS CONTENT IN A WIDE RANGE OF DATABASES 
WITH CONTENT SAMPLES FOR SOME

 

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE 
FROM SELECTED SEARCH ENGINES DISCOVERY TOOLS

http://tinyurl.com/ya4oggx9

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   A THROUGH  B

http://tinyurl.com/ydg8z52h

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   C   PART ONE

http://tinyurl.com/y9my4ppp

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   C    PART TWO

http://tinyurl.com/yc4sfdta

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:   D

http://tinyurl.com/yay8pkc3

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:   E    PART ONE

http://tinyurl.com/ydamheob

 


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:    E    PART TWO

http://tinyurl.com/y72w6xq6

 


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:     F THROUGH G

http://tinyurl.com/ydbxj5o7

 


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT: 
H THROUGH INGENTA
 

http://tinyurl.com/y9vj85y6

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    INSPEC THROUGH  L

http://tinyurl.com/yaxurho3

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    M THROUGH MLA

http://tinyurl.com/yct8k9o9

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    MLA THROUGH N

http://tinyurl.com/ydeyt2d7

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   O

http://tinyurl.com/y8kh4r5u

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   P   PART ONE

http://tinyurl.com/ybe63hl7

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   P   PART TWO
POLLUTION THROUGH PROQUEST STATISTICAL INSIGHT

http://tinyurl.com/y9s24mth

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    PSY THROUGH PZ

http://tinyurl.com/ydgwy6zp

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:   R

http://tinyurl.com/yapzpw7a

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:    S THROUGH SCOPUS

http://tinyurl.com/ydylk7f2

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:
SEARCH.BIOPREPRINT THROUGH SZ

http://tinyurl.com/y8aajt3x

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:     T THROUGH Z

http://tinyurl.com/ya2qprg5

 

 

 



.

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT : A THROUGH B

*

*

Search Strategy

"computer science" OR "information science" OR "computer programming" OR informatics 
OR "data management" OR "information security" OR "network security" OR forensics OR 
"visual computing" OR "data mining" OR "machine learning" OR "multimedia databases" 
OR "artificial intelligence"



*

*


ABI/INFORM Complete 

411,618 results



Content Sample

  • Machine Learning - Artificial Intelligence; Research on Machine Learning - Artificial Intelligence Reported by G. Kumar et al

    Anonymous. Computer Weekly News; Atlanta (Mar 3, 2011): 1030.

    ...Technology, Information and Data Processing, hitMachine hitLearninghitMachine
    ...have been utilized to develop efficient IDS. hitArtificial hitintelligence (AI)
    ...hitIntelligence Review (The use of hitartificial hitintelligence based techniques for

    Preview 
  • Select result item2





    Machine
     Learning - Artificial Intelligence; Studies Conducted at M. Shaheen et al on Machine Learning - Artificial Intelligence Recently Published

    Anonymous. Energy Weekly News; Atlanta (Apr 8, 2011): 493.

    ...hitData hitMininghitMachine hitLearninghitMachine hitLearning - hitArtificial hitIntelligence,
    ...(hitData hitmining applications in hydrocarbon exploration. hitArtificial hitIntelligence
    ...dimensions of data are analyzed by using Statistical Analysis, hitData hitMining,

    Preview 
  • Select result item3





    Machine
     Learning - Artificial Intelligence; Research from University of Toulouse in Machine Learning - Artificial Intelligence Provides New Insights

    Anonymous. Computer Weekly News; Atlanta (Apr 14, 2011): 923.

    ...hitArtificial hitIntelligence, Computers, Emerging Technologies, hitMachine hitLearning,
    ...the field of theoretical hitcomputer hitscience where its formal relationships with
    ... Lorini and colleagues published their study in hitArtificial hitIntelligence (A

    Preview 
  • Select result item4





    Machine
     Learning - Artificial Intelligence; New Machine Learning - Artificial Intelligence Research Has Been Reported by Scientists at Hong Kong Polytechnic University

    Anonymous. Investment Weekly News; Atlanta (Mar 26, 2011): 1010.

    ...in Engineering Applications of hitArtificial hitIntelligence (A review on time series
    ...Investment, hitMachine hitLearninghitMachine hitLearning - hitArtificial hitIntelligence 
    ...development attempts in the field of hitdata hitmining. The abundant research on time


  • Select result item5








    Enhancements to the data mining process

    John, George Harrison. Stanford University, ProQuest Dissertations Publishing, 1997. 9723376.

    ...hitdata hitmining process and presents advances and novel methods for the six steps in


  • Select result item6





    Global Artificial IntelligenceMachine Learning, and Cognitive Computing Market and Outlook 2016-2021 - Communications, Applications, Content and Commerce - Research and Markets

    Business Wire; New York [New York]03 May 2016.

    ..."hitArtificial hitIntelligencehitMachine hitLearning, and Cognitive Computing: Market and
    ...hitIntelligence 3.5 hitMachine hitLearning 3.6 Cognitive
    ...Cognitive Computing involves self-learning systems that use hitdata hitmining, pattern


  • Select result item7





    Research and Markets Adds Report: Artificial IntelligenceMachine Learning, and Cognitive Computing

    Health & Beauty Close - Up; Jacksonville (May 6, 2016).

    ...and approaches. hitMachine hitLearning is a subfield of hitcomputer hitscience
    ... 3.4 Key Characteristics of hitArtificial hitIntelligence 3.5 hitMachine hitLearning
    ...hitIntelligencehitMachine hitLearning, and Cognitive Computing: Market and Outlook for

    Preview 
  • Select result item8





    Research and Markets Offers Report: Artificial IntelligenceMachine Learning, and Cognitive Computing

    Professional Services Close - Up; Jacksonville (May 12, 2016).

    ...and approaches. hitMachine hitLearning is a subfield of hitcomputer hitscience
    ... 3.4 Key Characteristics of hitArtificial hitIntelligence 3.5 hitMachine hitLearning
    ...hitIntelligencehitMachine hitLearning, and Cognitive Computing: Market and Outlook for

    Preview 
  • Select result item9







    Machine Learning - Artificial Intelligence; Iwate University Reports Research in Machine Learning - Artificial Intelligence

    Anonymous. Technology & Business Journal; Atlanta (Jan 25, 2011): 937.

    ...Technologies, hitMachine hitLearninghitMachine hitLearning - hitArtificial hitIntelligence,
    ...hitIntelligence (Sequence-indexed Linear-time Temporal
    ...hitArtificial hitIntelligence is: Taylor & Francis Inc., 325 Chestnut St., Suite

    Preview 
  • Select result item10







    Machine
     learning approaches for elastic localization linkages in high-contrast composite materials

    Liu, Ruoqian; Yabansu, Yuksel C; Agrawal, Ankit; Kalidindi, Surya R; Choudhary, Alok N. Integrating Materials and Manufacturing Innovation; Heidelberg4.1 (Dec 2015): 1-17.

    ...of materials hitinformatics involves the use of hitdata hitmining and hitmachine hitlearning
    ...by various methods in hitmachine hitlearning and hitdata hitmining opens exciting new
    ...hitmachine hitlearning and hitdata hitmining, including feature extraction, feature ranking

    Preview 
  • Select result item11






    Mental Health; UTA researchers use artificial intelligence to enhance cognitive skills in young children

    Computer Weekly News; Atlanta (Nov 2, 2016): 276.

    ...said the project uses the latest methods in computer vision, hitmachine hitlearning
    ...hitdata hitmining. He has established the Vision-Learning-Mining or VLM research lab.
    ...hitData hitMining, University of Texas at Arlington. Our reports deliver

    Preview 
  • Select result item12






    Machine Learning - Artificial Intelligence; Researchers from University of Amsterdam detail findings in machine learning - artificialintelligence

    Anonymous. Economics Week; Atlanta (Nov 12, 2010): 1659.

    ...Technologies, hitMachine hitLearninghitMachine hitLearning - hitArtificial hitIntelligence,
    ...hitArtificial hitIntelligence, 2010;174(15):1222-1246). For additional information
    ...hitArtificial hitIntelligence is: Elsevier Science BV, PO Box 211, 1000 AE Amsterdam,


  • Select result item13






    Machine
     Learning - Artificial Intelligence; Research Results from University of Washington Update Knowledge of Machine Learning - Artificial Intelligence

    Anonymous. Technology & Business Journal; Atlanta (Feb 8, 2011): 2435.

    ...hitArtificial hitIntelligence, Dynamic Programming, Emerging Technologies, hitMachine
    ...their study in Annals of Mathematics and hitArtificial hitIntelligence (Ranking


  • Select result item14






    Machine
     Learning - Artificial Intelligence; New Machine Learning - Artificial Intelligence Research from P. Dybala and Co-Researchers Described

    Anonymous. Computer Weekly News; Atlanta (Mar 17, 2011): 694.

    ...hitIntelligence, Computers, Emerging Technologies, hitMachine hitLearninghitMachine
    ...hitArtificial hitIntelligence Tools (Evaluating Subjective Aspects Of Hci On An

     
  • Select result item15






    Machine Learning - Artificial Intelligence; Studies in the area of machine learning - artificial intelligence reported from Southwest Jiaotong University

    Anonymous. Technology & Business Journal; Atlanta (Jan 11, 2011): 3390.

    ...hitArtificial hitIntelligence, Dimensionality Reduction, Emerging Technologies,
    ...hitArtificial hitIntelligence (Maximum Variance Difference Based Embedding Approach

     
  • Select result item16







    Machine Learning - Artificial Intelligence; Study results from Tianjin University update understanding of machine learning - artificialintelligence

    Anonymous. Entertainment & Travel; Atlanta (Jan 15, 2011): 3646.

    ...hitArtificial hitIntelligence, Digital Video, Emerging Technologies, Leisure, hitMachine
    ...International Journal of Pattern Recognition and hitArtificial hitIntelligence, "A


  • Select result item17






    Machine Learning - Artificial Intelligence; Scientists at University of Alberta publish new data on machine learning - artificial intelligence

    Anonymous. Electronics Business Journal; Atlanta (Nov 3, 2010): 2692.

    ...hitArtificial hitIntelligence, Electronics, Emerging Technologies, hitMachine hitLearning,
    ...hitIntelligence Research can be contacted
    ...at: AI Access Foundation, Usc hitInformation hitSciences Institute


  • Select result item18






    Machine Learning - Artificial Intelligence; Studies from K.R. Soundar et al Further Understanding of Machine Learning - ArtificialIntelligence

    Anonymous. Technology & Business Journal; Atlanta (Mar 1, 2011): 2884.

    ...hitArtificial hitIntelligence, Emerging Technologies, Linear Discriminant Analysis,
    ...International Journal of Pattern Recognition and hitArtificial hitIntelligence report


  • Select result item19trade journals






    Machine
     Learning - Artificial Intelligence; Investigators at Shanghai Jiao Tong University Release New Data on Machine Learning - Artificial Intelligence

    Anonymous. Engineering Business Journal; Atlanta (Mar 23, 2011): 561.

    ...hitMachine hitLearninghitMachine hitLearning - hitArtificial hitIntelligence This article
    ...journal Engineering Applications of hitArtificial hitIntelligence, "A method of facial
    ...of hitArtificial hitIntelligence (Robust facial feature points extraction in


  • Select result item20






    Machine
     Learning - Artificial Intelligence; Study Results from Utah State University Broaden Understanding of Machine Learning - ArtificialIntelligence

    Anonymous. Information Technology Business; Atlanta (Apr 12, 2011): 1225.

    ...hitArtificial hitIntelligence, Computers, Data Structures, Emerging Technologies,
    ...study in hitArtificial hitIntelligence (State agnostic planning graphs: deterministic,


  • Select result item21





    Machine Learning - Artificial Intelligence; Findings from University of Jaen Broaden Understanding of Machine Learning - ArtificialIntelligence

    Anonymous. Energy Weekly News; Atlanta (Mar 25, 2011): 244.

    ...Fuel Cell, Fuzzy Logic, hitMachine hitLearninghitMachine hitLearning - hitArtificial
    ...hitArtificial hitIntelligence (Application of cascade and fuzzy logic based control in


*


Content Types

·         Academic Journals(422,500)

·         Magazines(125,851)

·         Books(1,390)

·         News(421,934)

·         Images(54)

·         Videos(324)

·         Audio(1)

    Content Sample

    • Search Terms:Basic Search ("computer science" Or "information science" Or "computer programming" Or informatics Or "data management" Or "information security" Or "network security" Or forensics Or "visual computing" Or"data mining" Or "machine learning" Or "multimedia databases" Or "artificial intelligence")

    • Full-text: 
      REPORT
      How human inspired learning enhances the behavior of autonomous agents
      Martin Fittner and Christian Brandstaetter.Journal of Computers.
      13.2 (Feb. 1, 2018) p154. Word Count: 3056.Abstract: An autonomous agent must deal with unforeseen situations that can't be preprogrammed.
      Therefore, the agent has to make its own experiences, solutions and valuations to situations, actions
      and objects to be able... 
      • Download PDF
      •  
      • Save
    • Full-text: 
      ARTICLE
      Evolutionary computation: the next major transition of artificial intelligence?
      Moshe Sipper, Randal S. Olson, and Jason H. Moore.BioData Mining.
      10.1 (July 29, 2017)  Word Count: 897.Author(s): Moshe Sipper1,2 , Randal S. Olson1 and Jason H. Moore1 Editorial Artificial intelligence (AI),
      a broad field that deals with the ongoing pursuit to render machines capable of performing intelligent tasks, has... 
      • Download PDF
      •  
      • Save
    • Citation:
       ARTICLE
      How machine learning could help to improve climate forecasts
      Nicola Jones.Nature.
      548.7668 (Aug. 24, 2017)  Word Count: 1019.

      • Save
    • Full-text: 
      REPORT
      Mix multiple features to evaluate the content and the linguistic quality of text summaries
      Samira Ellouze, Mahar Jaoua, and Lamia Hadrich Belguith.CIT Journal of Computing and Information Technology.
      25.2 (June 2017) p149. Word Count: 9610.In this article, we propose a method of text summary's content and linguistic quality evaluation that is based
      on a machine learning approach. This method operates by combining multiple features to build predictive... 
      • Download PDF
      •  
      • Save
    • Full-text: 
      REPORT
      Enabling smart navigation by incorporating human inspired evaluation of route sections
      Christian Brandstaetter and Martin Fittner.Journal of Computers.
      13.2 (Feb. 1, 2018) p187. Word Count: 2835.Abstract: It is challenging for every child not becoming lost in the shopping center. Simulated agents have
      the same problem. So they need some localization. On the basis of the existing cognitive architecture in th... 
      • Download PDF
      •  
      • Save
    • Full-text: 
      ARTICLE
      The impact of artificial intelligence on medical innovation
      in the European Union and United States
      Lincoln Tsang, Daniel A. Kracov, Jacqueline Mulryne, Louise Strom, Nancy Perkins,
      Richard Dickinson, et al.
      Intellectual Property & Technology Law Journal.
      29.8 (Aug. 1, 2017) p3. Word Count: 5613.Artificial intelligence (AI) software means computer programs with the capacity to perform operations analogous
      to learning and decision-making in humans. This tool is being increasingly applied in the pharmaceutical,... 
      • Download PDF
      •  
      • Save
    • Full-text: 
      ARTICLE
      Should artificial intelligence be regulated?
      Amitai Etzioni and Oren Etzioni.Issues in Science and Technology.
      33.4 (Summer 2017) p32. Word Count: 3750.New technologies often spur public anxiety, but the intensity of concern about the implications of advances
      n artificial intelligence (AI) is particularly noteworthy. Several respected scholars and technology leaders... 
      • Download PDF
      •  
      • Save
    • Full-text: 
      REPORT
      Generic, scalable and decentralized fault detection for robot swarms
      Danesh Tarapore, Anders Lyhne Christensen, and Jon Timmis.PLoS ONE.
      12.8 (Aug. 14, 2017) pe0182058. Word Count: 12710.Author(s): Danesh Tarapore 1,2,*, Anders Lyhne Christensen 3,4,5, Jon Timmis
      2 Introduction Robot swarms have the potential to take on numerous real-world tasks [1]. In particular, tasks
      that require sensing or action... 
      • Download PDF
      •  
      • Save
    • Full-text: 
      REPORT
      Implementation solutions for deep learning neural networks targeting various
      application fields
      Dana-Mihaela Petrosanu and Alexandru Pirjan.Journal of Information Systems & Operations Management.
      11.1 (May 1, 2017) p154. Word Count: 5992.ABSTRACT In this paper, we tackle important topics related to deep learning neural networks and
      their undisputed usefulness in solving a great variety of applications ranging from image and voice
      recognition to business... 
      • Download PDF
      •  
      • Save
    • Full-text: 
      ARTICLE
      Artificial intelligence and the law
      Barbie E. Keiser.Online Searcher.
      41.3 (May-June 2017) p16. Word Count: 2122.There was a time when, to start a law practice, all you needed was a Juris Doctor (J.D.) degree and a shingle.
      To succeed today, law firms must offer business process and technology expertise to minimize out-of-pocket... 
      • Download PDF
      •  
      • Save
    *

    Academic Search Complete

    662,082 Results

    Content Sample

    A hesitant fuzzy ordered information system.

    Coupled fixed point of firmly nonexpansive mappings
    by Mann's iterative processes in Hilbert spaces.

    Fibonacci periodicity and Fibonacci frequency.

    New oscillation criteria for second-order nonlinear
     delay dynamic equations
    with nonpositive neutral coefficients on time scales.

    The Growth and Zeros of Linear Differential Equations
    with Entire Coefficients of [p, q] - φ(r) Order.

    SOME EQUALITIES AND INEQUALITIES FOR K-G-FRAMES.

    Durrmeyer type (p, q)-Baskakov operators
    for functions of one and two variables.

    A subclass of analytic functions defined
    by a fractional integral operator.


    Normal criteria of meromorphic functions concerning
    holomorphic functions.


    SOME EQUALITIES AND INEQUALITIES FOR K-G-FRAMES.

    Durrmeyer type (p, q)-Baskakov operators for functions
    of one and two variables.

    A subclass of analytic functions defined
    by a fractional integral operator.

    Properties on a subclass of analytic functions defined
    by a fractional integral operator.

    Normal criteria of meromorphic functions concerning
    holomorphic functions.

    New oscillation criteria for second-order nonlinear delay
    dynamic equations with nonpositive neutral coefficients
    on time scales.

    The Growth and Zeros of Linear Differential Equations
    with Entire Coefficients of [p, q] - φ(r) Order.

    Coupled fixed point of firmly nonexpansive mappings
    by Mann's iterative processes in Hilbert spaces.

    Fibonacci periodicity and Fibonacci frequency.

    Computing the monodromy and pole order filtration
    on Milnor fiber cohomology of plane curves.


    *

    Access World News 

    2,198,067 Results

    CONTENT SAMPLE



    Good medicine meets artificial intelligence: New cures for cancer, HIV, and machine learning to make traditional diagnostics smarter - Good medicine meets artificial intelligence: New cures for cancer, HIV, andmachine learning to make traditional diagnostics smarter-- Delivered by Feed43 service

    Hide Details
    Financial Express (India) - December 2, 2017

    B2B Marketing Now Leveraging the Power of Artificial Intelligence and Machine Learning--Clickback is Already There - As 2018 approaches, the B2B marketing industry is witnessing increased demonstrations of the power that artificial intelligence and machine learning bring.
    PR Newswire (USA) - November 25, 2017

    Ex-Baidu and Google scientist will work with Foxconn to bring artificial intelligence to factories
    South China Morning Post (Hong Kong) - December 16, 2017

    Trillium Software Sponsors Cardiff University Data Management - Curriculum - Trillium Software Establishes Educational Alliance With the School of Computer Science & Informatics at One of the United Kingdom's Leading Universities and Offers Software, Guest Lectures and Student Awards
    Market Wire (USA) - November 12, 2012

    Artificial intelligence bot beats humans at reading in a first for machines - Use of machine-learning models in customer service has implications for call-centre armies
    South China Morning Post (Hong Kong) - January 16, 2018

    Tencent names Zhang Tong head of its artificial intelligence lab
    South China Morning Post (Hong Kong) - March 24, 2017

    Google releases its artificial intelligence software into the wild - Google is open-sourcing its machine learning system, TensorFlow, in the hope that it will accelerate research into artificial intelligence
    Daily Telegraph, The/The Sunday Telegraph: Web Edition Articles (London, England) - November 10, 2015
    Web Only Source

    Artificial Intelligence can spot fake, biased news article right from its source - A new program developed by researchers at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in collaboration with the Qatar Computing Research Institute (QCRI) aims to not only look at individual news stories but also their sources.
    International Business Times: Indian Edition (India) - October 4, 2018

    Google buys two more UK artificial intelligence startups - Company funds new computer science research partnership with Oxford University, where three of its new artificial intelligence hires will remain lecturers
    Guardian, The: Web Edition Articles (London, England) - October 23, 2014
    Web-Only Source

    Artificial intelligence: don’t fear AI. It’s already on your phone – and useful - Machine learning and machine intelligence is already incorporated in apps such as Google Photos, Google Now and Apple Maps, and it can make your life easier
    Observer, The (London, England) - June 15, 2015


    *

    AccessEngineering

    11,125 results.



    *

    AccessMedicine 
    324 results in Textbooks


    *

    AccessPharmacy 

    401 results in Textbooks


    *

    AccessSurgery
    73 Results


    *

    ACM Digital Library 
     2,702,209 results


    1
    Visualization and management of digital forensics data
    Guillermo Francia, Monica Trifas, Dorothy Brown, Rahjima Francia, Chrissy Scott
    September 2006 InfoSecCD '06: Proceedings of the 3rd annual conference on Information security curriculum development
    Publisher: ACM
    Bibliometrics:
    Citation Count: 0
    Downloads (6 Weeks): 2,   Downloads (12 Months): 22,   Downloads (Overall): 1,169

    Full text available: 
    The collection, analysis, and preservation of digital forensic data are complementary activities that are ushered by our growing dependence on Information Technology. The training of professionals, who can effectively carry out these activities, suddenly becomes a paramount issue and a major motivation for the IT academic community. This paper presents ...
    Keywords: visualization, computer security, data mining, human perception, computer forensics
    [result highlights]



    2
    Teaching AI through machine learning projects
    Ingrid Russell, Zdravko Markov, Todd Neller
    June 2006 ACM SIGCSE Bulletin: Volume 38 Issue 3, September 2006
    Publisher: ACM
    Bibliometrics:
    Citation Count: 4
    Downloads (6 Weeks): 16,   Downloads (12 Months): 140,   Downloads (Overall): 690

    Full text available: 
    An introductory Artificial Intelligence (AI) course provides students with basic knowledge of the theory and practice of AI as a discipline concerned with the methodology and technology for solving problems that are difficult to solve by other means. It is generally recognized that an introductory Artificial Intelligence course is challenging ...
    Keywords: projects, artificial intelligence
    Also published in:
    June 2006  ITICSE '06: Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education
    [result highlights]

    3
    Replacing Mechanical Turkers? Challenges in the Evaluation of Models with Semantic Properties
    Fred Morstatter, Huan Liu
    October 2016 Journal of Data and Information Quality (JDIQ) - Challenge Papers and Regular Papers: Volume 7 Issue 4, October 2016
    Publisher: ACM
    Bibliometrics:
    Citation Count: 0
    Downloads (6 Weeks): 9,   Downloads (12 Months): 113,   Downloads (Overall): 113

    Full text available: 
    Keywords: Artificial intelligence, automation, data mining, crowdsourcing, evaluation
    [result highlights]

    4
    An undergraduate degree in data science: curriculum and a decade of implementation experience
    Paul Anderson, James Bowring, Renée McCauley, George Pothering, Christopher Starr
    March 2014 SIGCSE '14: Proceedings of the 45th ACM technical symposium on Computer science education
    Publisher: ACM
    Bibliometrics:
    Citation Count: 11
    Downloads (6 Weeks): 16,   Downloads (12 Months): 158,   Downloads (Overall): 507

    Full text available: 


    We describe Data Science, a four-year undergraduate program in predictive analytics, machine learning, and data mining implemented at the College of Charleston, Charleston, South Carolina, USA. We present a ten-year status report detailing the program's origins, successes, and challenges. Our experience demonstrates that education and training for big data concepts ...
    Keywords: data science, interdisciplinary, analytics, big data, curriculum, data mining, cognate, contextualization, machine learning, informatics
    [result highlights]

    5
    Information security across disciplines
    Gabriele H. Meiselwitz
    October 2008 SIGITE '08: Proceedings of the 9th ACM SIGITE conference on Information technology education
    Publisher: ACM
    Bibliometrics:
    Citation Count: 0
    Downloads (6 Weeks): 2,   Downloads (12 Months): 15,   Downloads (Overall): 453

    Full text available: 
    This paper describes a general education course in information security targeting all majors. A steady increase in security incidents in work and personal computing environments requires a trained workforce to respond to these incidents. In addition to educating computer professionals, undergraduate students of all disciplines should have the opportunity to ...
    Keywords: computer science curriculum, information science curriculum, ias education
    [result highlights]

    6
    TextMOLE: text mining operations library and environment
    Daniel B. Waegel, April Kontostathis
    March 2006 SIGCSE '06: Proceedings of the 37th SIGCSE technical symposium on Computer science education
    Publisher: ACM
    Bibliometrics:
    Citation Count: 0
    Downloads (6 Weeks): 1,   Downloads (12 Months): 5,   Downloads (Overall): 257

    Full text available: 
    The paper describes the first version of the TextMOLE (Text Mining Operations Library and Environment) system for textual data mining. Currently TextMOLE acts as an advanced indexing and search engine: it parses a data set, extracts relevant terms, and allows the user to run queries against the data. The system ...
    Keywords: machine learning, information retrieval, textual data mining
    Also published in:
    March 2006  ACM SIGCSE Bulletin: Volume 38 Issue 1, March 2006
    [result highlights]

    7
    MLeXAI: A Project-Based Application-Oriented Model
    Ingrid Russell, Zdravko Markov, Todd Neller, Susan Coleman
    August 2010 ACM Transactions on Computing Education (TOCE): Volume 10 Issue 3, August 2010
    Publisher: ACM
    Bibliometrics:
    Citation Count: 2
    Downloads (6 Weeks): 6,   Downloads (12 Months): 53,   Downloads (Overall): 366

    Full text available: 
    Our approach to teaching introductory artificial intelligence (AI) unifies its diverse core topics through a theme of machine learning, and emphasizes how AI relates more broadly with computer science. Our work, funded by a grant from the National Science Foundation, involves the development, implementation, and testing of a suite of ...
    Keywords: Artificial intelligence, projects
    [result highlights]

    8
    Sustaining learning in critical domains of robotic systems
    Hoimonti Pal
    April 2002 Journal of Computing Sciences in Colleges: Volume 17 Issue 5, April 2002
    Publisher: Consortium for Computing Sciences in Colleges
    Bibliometrics:
    Citation Count: 0
    Downloads (6 Weeks): 32,   Downloads (12 Months): 368,   Downloads (Overall): 748

    Full text available: 
    Previous research in the field of Artificial Intelligence has focused on systems that are based on basic ideas of human long-term learning. These systems are not easily applicable to critical situations for robotic systems. In risky situations robotic systems use hierarchical/instinctual memory to address these perilous situations. However, this instinctual ...
    Keywords: artificial intelligence
    [result highlights]

    9
    Data-Driven Techniques in Disaster Information Management
    Tao Li, Ning Xie, Chunqiu Zeng, Wubai Zhou, Li Zheng, Yexi Jiang, Yimin Yang, Hsin-Yu Ha, Wei Xue, Yue Huang,Shu-Ching Chen, Jainendra Navlakha, S. S. Iyengar
    March 2017 ACM Computing Surveys (CSUR): Volume 50 Issue 1, April 2017
    Publisher: ACM
    Bibliometrics:
    Citation Count: 1
    Downloads (6 Weeks): 50,   Downloads (12 Months): 679,   Downloads (Overall): 679

    Full text available: 
    Improving disaster management and recovery techniques is one of national priorities given the huge toll caused by man-made and nature calamities. Data-driven disaster management aims at applying advanced data collection and analysis technologies to achieve more effective and responsive disaster management, and has undergone considerable progress in the last decade. ...
    Keywords: Disaster information management, application, data management, data mining
    [result highlights]

    10
    Applying online gradient descent search to genetic programming for object recognition
    Will Smart, Mengjie Zhang
    January 2004 ACSW Frontiers '04: Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
    Publisher: Australian Computer Society, Inc.
    Bibliometrics:
    Citation Count: 2
    Downloads (6 Weeks): 1,   Downloads (12 Months): 26,   Downloads (Overall): 404

    Full text available: 
    This paper describes an approach to the use of gradient descent search in genetic programming (GP) for object classification problems. In this approach, pixel statistics are used to form the feature terminals and a random generator produces numeric terminals. The four arithmetic operators and a conditional operator form the function ...
    Keywords: genetic programming, data mining, machine learning, object classification
    [result highlights]



    11
    Workshop Summary of AISec'14: 2014 Workshop on Artificial Intelligent and Security
    Christos Dimitrakakis, Aikateini Mitrokotsa, Benjamin I.P. Rubinstein
    November 2014 CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
    Publisher: ACM
    Bibliometrics:
    Citation Count: 0
    Downloads (6 Weeks): 3,   Downloads (12 Months): 18,   Downloads (Overall): 92

    Full text available: 
    It is our great pleasure to welcome you to the 2014 ACM Workshop Artificial Intelligence and Security (AISec 2014) -- the seventh annual workshop addressing technologies that fuse intelligent systems into computer security applications and the implications of these approaches. The workshop's aim is to advance research at the intersection ...
    Keywords: data mining, privacy, security, machine learning, artificial intelligence, cryptography
    [result highlights]

    12
    Academic careers for experimental computer scientists and engineers
    CORPORATE Computer Science and Telecommunications Board
    April 1994 Communications of the ACM: Volume 37 Issue 4, April 1994
    Publisher: ACM
    Bibliometrics:
    Citation Count: 4
    Downloads (6 Weeks): 18,   Downloads (12 Months): 216,   Downloads (Overall): 683

    Full text available:
    [result highlights]

    13
    Scaling up: a research agenda for software engineering
    CORPORATE Computer Science and Technology Board
    March 1990 Communications of the ACM: Volume 33 Issue 3, March 1990
    Publisher: ACM
    Bibliometrics:
    Citation Count: 25
    Downloads (6 Weeks): 66,   Downloads (12 Months): 343,   Downloads (Overall): 1,177

    Full text available: 
    The following excerpts have been gleaned from a report by the Computer Science and Technology Board that summarizes the deliberations of a group of software engineers participating in a CSTB workshop that focused on setting research priorities.
    [result highlights]

    14
    Opportunities for private and secure machine learning
    Christopher W. Clifton
    October 2008 AISec '08: Proceedings of the 1st ACM workshop on Workshop on AISec
    Publisher: ACM
    Bibliometrics:
    Citation Count: 1
    Downloads (6 Weeks): 15,   Downloads (12 Months): 163,   Downloads (Overall): 518

    Full text available: 
    While the interplay of Artificial Intelligence and Security covers a wide variety of topics, the 2008 AISec program largely focuses on use of artificial intelligence techniques to aid with traditional security concerns: intrusion detection, security policy management, malware detection, etc. This talk will address the flip side of the issue: ...
    Keywords: artificial intelligence, privacy, security
    [result highlights]

    15
    An Image-Text Approach for Extracting Experimental Evidence of Protein-Protein Interactions in the Biomedical Literature
    Luis D. Lopez, Jingyi Yu, Cecilia N. Arighi, Manabu Torii, K. Vijay-Shanker, Hongzhan Huang, Cathy H. Wu
    September 2013 BCB'13: Proceedings of the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics
    Publisher: ACM
    Bibliometrics:
    Citation Count: 0
    Downloads (6 Weeks): 0,   Downloads (12 Months): 15,   Downloads (Overall): 85

    Full text available: 
    Proteins are complex biological polymers that mediate virtually all cellular functions. Typically these functions are modulated by protein-protein interactions (PPI). Tremendous efforts have been made by life scientists to detect PPIs through different experimental approaches and document the results through publications. On the informatics front, however, there lacks an effective ...
    Keywords: Information Extraction, Database Curation, Data Mining, Machine Learning, Protein-Protein Interaction, Knowledge Discovery
    [result highlights]

    16
    9th International Workshop on Artificial Intelligence and Security: AISec 2016
    David Mandell Freeman, Katerina Mitrokotsa, Arunesh Sinha
    October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
    Publisher: ACM
    Bibliometrics:
    Citation Count: 0
    Downloads (6 Weeks): 20,   Downloads (12 Months): 208,   Downloads (Overall): 208

    Full text available: 
    Artificial Intelligence (AI) and Machine Learning (ML) provide a set of useful analytic and decision-making techniques that are being leveraged by an ever-growing community of practitioners, including many whose applications have security-sensitive elements. However, while security researchers often utilize such techniques to address problems and AI/ML researchers develop techniques for ...
    Keywords: privacy, security, machine learning, artificial intelligence
    [result highlights]

    17
    K-12 Computer Science Framework
    K-12 Computer Science Framework Steering Committee
    October 2016
    Bibliometrics:
    Citation Count: 0
    Downloads (6 Weeks): 37,   Downloads (12 Months): 37,   Downloads (Overall): 37

    Full text available: 
    The development of the K--12 Computer Science Framework was led by the Association for Computing Machinery, Code.org, Computer Science Teachers Association, Cyber Innovation Center, and National Math and Science Initiative in collaboration with states, school districts, and the computer science education community. The framework was developed to inform the development ...
    [result highlights]

    18
    Predicting epileptic seizure from MRI using fast single shot proximal support vector machine
    V. Sujitha, P. Sivagami, M. S. Vijaya
    February 2011 ICWET '11: Proceedings of the International Conference & Workshop on Emerging Trends in Technology
    Publisher: ACM
    Bibliometrics:
    Citation Count: 0
    Downloads (6 Weeks): 2,   Downloads (12 Months): 14,   Downloads (Overall): 79

    Full text available: 
    Epilepsy is a neurological condition that produces brief disturbances in the normal electrical functions of the brain and is characterized by intermittent abnormal firing of neurons in the brain. Magnetic Resonance Imaging (MRI) is an important method adopted in epilepsy diagnosis. The detection of the epileptic activity requires a time-consuming ...
    Keywords: classification, epilepsy, machine learning, prediction
    [result highlights]

    19
    Computing in Context: Teaching Intelligence and Security Informatics in Computer Science Courses
    D. R. Plante
    May 2015 CIC '15: Proceedings of The 2015 NSF Workshop on Curricular Development for Computing in Context
    Publisher: ACM
    Bibliometrics:
    Citation Count: 1
    Downloads (6 Weeks): 4,   Downloads (12 Months): 18,   Downloads (Overall): 47

    Full text available: 
    The importance of applying context in pedagogy has been the subject of research for decades and has been explored in many subject areas. Context in pedagogy refers to linking the teaching of a particular subject or topic to some other subject area that is meaningful, making the topic being taught ...
    Keywords: computer and network security, computer science education, homeland security
    [result highlights]

    20
    Intelligently Connecting People with Information
    Changhu Wang
    June 2017 ICMR '17: Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval
    Publisher: ACM
    Bibliometrics:
    Citation Count: 0
    Downloads (6 Weeks): 8,   Downloads (12 Months): 30,   Downloads (Overall): 30

    Full text available: 
    How to effectively connect people with information is a fundamental problem in human society. We are now in the era of mobile first, and everything is digitally connected. With the advent of diverse social contents, information feeds have become a new way to connect people with information. Thus, there is ...
    Keywords: machine learning, artificial intelligence, information feeds
    [result highlights]

    Result 1 – 20 of 163,227


    *

    *































































































































































































































    Agricola [via EbscoHost] 
    8221 Results


    *

    Agricultural and Environmental Science Database
    all("computer science") Or all("information science") Or all("computer programming") Or all(informatics) Or all("data management") Or all("information security") Or all("network security")
    2,708 Results


    Content Sample

    • 1. Three-party authenticated key agreements for optimal communication
      Tian-Fu, Lee; Hwang, Tzonelih. PLoS One; San Francisco12.3 (Mar 2017).
    • Provenance based data integrity checking and verification in cloud environments

      Imran, Muhammad; Hlavacs, Helmut; Inam Ul Haq; Bilal, Jan; Fakhri Alam Khan; et al. 
      PLoS One; San Francisco12.5 (May 2017).

      ...hitComputer hitScience, Sarhad University of Science & Information Technology,
      ... Affiliation: Entertainment Computing, Faculty of hitComputer hitScience, University






    • 3






      Intelligent Informatics in Translational Medicine 2016

      Hao-Teng, Chang; Akutsu, Tatsuya; Ray, Oliver; Draghici, Sorin; Tun-Wen Pai. 
      BioMed Research International; New York (2017).

      ...



      2, Department of hitComputer hitScience and Information Engineering, Asia University,
      ...hitComputer hitScience, University of Bristol, Bristol BS8 1UB, UK 6, Department



    • 4






      Random domain name and address mutation (RDAM)
      for thwarting reconnaissance attacks

      Wang, Kai; Chen, Xi; Zhu, Yuefei. PLoS One; San Francisco12.5 (May 2017).

      ...hitInformation hitScience and Technology Institute, Zhengzhou, Henan, China ORCID
      ...hitInformation hitScience and Technology Institute, Zhengzhou, Henan, China 
      ...platform [23][24], to enhance hitnetwork hitsecurity and resilience. Some network



    •  5

      Research Management Team (RMT): A Model for Research Support -
      Services at Duke University

      Snyder, Denise C; Epps, Shelly; Beresford, Henry F; Ennis, Cory; Levens, Justin S; et al. 
      Clinical and Translational Science; Hoboken5.6 (Dec 2012): 464-469.

      ...for clinical and translational research hitdata hitmanagement and hitinformatics, the
      ...hitdata hitmanagement expertise, methods, and tools. At many institutions, funding

       

    • 6

      Smartphone dependence classification using tensor factorization

      Choi, Jingyun; Mi Jung Rho; Kim, Yejin; In Hye Yook; Yu, Hwanjo; et al. 
      PLoS One; San Francisco12.6 (Jun 2017).

      ...hitComputer hitScience and Engineering, Pohang University of Science and Technology,
      ... Hwanjo Yu Affiliation: Department of hitComputer hitScience and
      ...Jung Rho Affiliation: Department of Medical hitInformatics, College of Medicine,



    • 7

      The Economics of Information Security

      Anderson, Ross; Moore, Tyler. Science; Washington314.5799 (Oct 27, 2006): 610-613.

      ...   The economics of hitinformation hitsecurity has recently become a

      Cited by (‎63)    


    • 8

      Text Mining for Translational Bioinformatics

      Hong-Jie, Dai; Chih-Hsuan Wei; Hung-Yu, Kao; Rey-Long, Liu; Tsai, Richard Tzong-Han; et al. 
      BioMed Research International; New York (2015).

      ...hitComputer hitScience and Information Engineering, National Taitung University,
      ...Bethesda, MD 20894, USA 3, Department of hitComputer hitScience and Information
      ...Hualien 970, Taiwan 5, Department of hitComputer hitScience and Information





    • 9

      Development of a Functional, Internet-Accessible Department
      of Surgery Outcomes Database/DISCUSSION

      Newcomb, William L, MD; Lincourt, Amy E, PHD; Gersin, Keith, MD;
      Kercher, Kent, MD; Iannitti, David, MD; et al. 
      The American Surgeon; Atlanta74.6 (Jun 2008): 548-54; discussion 554.

      ...hitdata hitmanagement systems are limited by inability to stratify outcomes based on
      ...Working with hospital compliance staff, hitnetwork hitsecurity professionals, and the
      ...data collection, data entry, and hitdata hitmanagement processes for each center is

      Cited by (‎1)    References (‎12)    

      • Abstract/Details
      Preview 
    • 10

      What do computer scientists tweet?
      Analyzing the link-sharing practice on Twitter

      Schmitt, Marco; Jäschke, Robert. PLoS One; San Francisco12.6 (Jun 2017).

      ...like computational graphics, software engineering, web technologies, hitdata
      ...hitcomputer hitscience and give a glance at the publications mentioned on Twitter that



    *


    America: History & Life with Full Text 
    1,047 Results

    CONTENT SAMPLE


    The Uncertain Future of Forensic Science.
    Detail Only Available
    Academic Journal
    By: Mnookin, Jennifer L. Daedalus. Fall2018, Vol. 147 Issue 4, p99-118. 20p.
    Historical Period: 1901 to 2000. DOI: 10.1162/daed_a_00523.

    Scientists as Experts Serving the Court.

    By: Rubinfeld, Daniel L.; Cecil, Joe S. Daedalus. 

    Fall 2018, Vol. 147 Issue 4, p152-163. 12p. 

    Historical Period: ca 1970 to ca 1979. DOI: 10.1162/daed_a_00526.

    You’re So Sensitive! How LIS Professionals Define and Discuss Microaggressions Online.

    By: Sweeney, Miriam E.; Cooke, Nicole A. 

    Library Quarterly. Oct2018, Vol. 88 Issue 4, p375-390. 16p. 

    1 Chart. Historical Period: 2015 to 2016. DOI: 10.1086/699270.


    Common Language: 

    Business Programming Languages and the Legibility of Programming.

    By: Allen, Ben. IEEE Annals of the History of Computing. 

    Apr-Jun2018, Vol. 40 Issue 2, p17-31. 15p. Historical Period: 1959 to ca 2018. 

    DOI: 10.1109/MAHC.2018.022921441.



    Critical Failure: 

    Computer-Aided Instruction and the Fantasy of Information.

    By: Crooks, Roderic. 

    IEEE Annals of the History of Computing. 

    Apr-Jun2018, Vol. 40 Issue 2, p85-88. 4p. 

    Historical Period: ca 1965 to ca 2018. 

    DOI: 10.1109/MAHC.2018.022921447.



    Algorithmic psychometrics and the scalable subject.

    By: Stark, Luke. Social Studies of Science 

    (Sage Publications, Ltd.). 

    Apr2018, Vol. 48 Issue 2, p204-231. 28p. 

    Historical Period: 2012 to 2018. 

    DOI: 10.1177/0306312718772094.



    Russia Tries to Get Smart about Artificial Intelligence.

    By: Dougherty, Jill; Jay, Molly. 

    Wilson Quarterly. Spring2018, p1-1. 1p.



    Searching for Privacy in the Internet of Bodies.
    By: Pauwels, Eleonore; Denton, Sarah W. 
    Wilson Quarterly. Spring2018, p2-2. 1p. 
    Historical Period: 1951 to 2018.


    Turing’s Vision: The Birth of Computer Science 
    By: Thomas, Wolfgang. 
    ISIS: Journal of the History of Science in Society. 
    Mar2018, Vol. 109 Issue 1, p213-214. 2p. DOI: 10.1086/696665.


    Tool, toy and tutor: Subjective experiences of digital self-tracking.
    By: Lyall, Ben; Robards, Brady. Journal of Sociology. 
    Mar 2018, Vol. 54 Issue 1, p108-124. 17p. 
    Historical Period: ca 2010 to ca 2018. DOI: 10.1177/1440783317722854.





    *

    American Bibliography of Slavic & East European Studies 
    103 Results


    *

    American Chemical Society Journals
    18,105 Results


    *

    Annual Bibliography of English Language and Literature [via Literature Online] 
    3,150 Results


    *

    Anthropology Plus [via EbscoHost] 
    189 Results

    CONTENT SAMPLE


    Working for the robocracy : critical ethnography of robot futures.
    By: Collins, Samuel Gerald. 
    Anthropology of work review volume 39, issue 1 (2018), pages 5-9. 


    Geophysical correlation : 
    global versus local perspectives.
    By: Kvamme, Kenneth L. Archaeological prospection 
    volume 25, issue 2 (2018), pages 111-120.


    Machine learning identification and classification of historic ceramics
    By: Bickler, Simon H. Archaeology in New Zealand v. 61 no. 1 (2018) p.21-33 
    Journal Code: Archaeol NZ.


    Prospects for machine learning for shell midden analysis
    By: Bickler, Simon H. Archaeology in New Zealand v. 61 no. 1 (2018) p.48-58 
    Journal Code: Archaeol NZ


    Digital containment and its discontents.
    By: Schüll, Natasha Dow, 1971-. History and anthropology 
    volume 29, issue 1 (2018), pages 42-48.



    Measuring usewear on black gloss pottery from Rome through 3D surface analysis.
    By: Banducci, Laura M; Opitz, Rachel S.; Mogetta, Marcello. 
    Internet archaeology volume 50 (2018). 



    Exploring automated pottery identification (Arch-I-Scan).
    By: Tyukin, Ivan; Sofeikov, Konstantin.; Levesley, Jeremy 1964-; Gorbanʹ, 
    A. N. (Aleksandr Nikolaevich); Allison, Penelope M., 1954-; Cooper, Nicholas J. 
    Internet archaeology volume 50 (2018). 



    Modeling the contested relationship between Analects, Mencius, and Xunzi: 
    preliminary evidence from a machine-learning approach
    By: Nichols, Ryan; Slingerland, Nielbo, Kristoffer; Bergeton, Uffe; 
    Logan, Carson; Kleinman, Scott. 
    Journal of Asian studies v. 77 no. 1 (2018) p.19-57 Journal Code: J Asian Stud



    Domesticating artificial intelligence: 
    expanding human self-expression through applications 
    of artificial intelligence in prosumption
    Detail Only Available By: Fox, Stephen. 
    Journal of consumer culture v. 18 no. 1 (2018) p.169-83 
    Journal Code: J consumer Cult.




    Electronic Resource

    Data management in anthropology : the next phase in ethics governance?




    *

    AnthroSource 
    2,747 Results


    Content Sample

    Search Results

    There are 2747 results for: "computer science" OR "information science" OR "computer programming" OR informatics OR "data management" OR "information security" OR "network security" OR forensics OR "visual computing" OR "data mining" OR "machine learning" OR "multimedia databases" OR "artificial intelligence"

    1.  FreeTHE EPIC 2011 CONVERSATION

      Authors:
      Ethnographic Praxis in Industry Conference Proceedings
       
      First Published:
       
      September 2011

    2. New Bottles, Old Wine: Hidden Cultural Assumptions in a Computerized Explanation System for Migraine Sufferers

      Authors:
      Diana E. Forsythe
      Medical Anthropology Quarterly
       
      First Published:
       
      December 1996

    3. FOUR GENEALOGIES FOR A RECOMBINANT ANTHROPOLOGY OF SCIENCE AND TECHNOLOGY

      Authors:
      MICHAEL M. J. FISCHER
      Cultural Anthropology
       
      First Published:
       
      November 2007

    4. ADDITIONAL MATERIALBIOSKETCHES

      Authors:
      Annals of Anthropological Practice
       
      First Published:
       
      May 2014

    5. PRINT ISSUETeaching and Learning

      Authors:
      Anthropology News
       
      First Published:
       
      September 2016

    6. ARTICLE“There's no rules. It's hackathon.”: Negotiating Commitment in a Context of Volatile Sociality

      Authors:
      Graham M. Jones, Beth Semel, Audrey Le
      Journal of Linguistic Anthropology
       
      First Published:
       
      11 December 2015

    7. Studying Those Who Study Us: An Anthropologist in the World of Artificial Intelligence

      Authors:
      David Jacobson
      Medical Anthropology Quarterly
       
      First Published:
       
      March 2003

    8. Studying Those Who Study Us: An Anthropologist in the World of Artificial Intelligence/ Weaving Work and Motherhood/ Who Supports the Family? Gender and Breadwinning in Dual–Earner Marriages/ Learning from Saturn: Possibilities for Corporate Governance and Employee Relations.

      Authors:
      David Hakken, Patricia Marquez, Constance P. DeRoche
      Anthropology of Work Review
       
      First Published:
       
      March 2002

    9. RESEARCH REPORTS AND COMMENTARIESKiller Corn and Capitalist Pigs: Forensic Noir and Television Portrayals of Modern Agricultural Technology

      Authors:
      Annie R. Specht
      Culture, Agriculture, Food and Environment
       
      First Published:
       
      19 December 2013

    10. Scientific Imaginaries and Ethical Plateaus in Contemporary U.S. Toxicology

      Authors:
      KIM FORTUN, MIKE FORTUN
      American Anthropologist
       
      First Published:
       
      March 2005

    11. Galileo Wept: A Critical Assessment of the Use of Race in Forensic Anthropology

      Authors:
      Diana Smay, George Armelagos
      Transforming Anthropology
       
      First Published:
       
      July 2000

    12. Linguistics: The Handbook of Artificial Intelligence. Avron Barr and Edward A. Feigenbaum

      Authors:
      John S. White
      American Anthropologist
       
      First Published:
       
      September 1983

    13. Working for Them: Essays in Honor of Diana Forsythe

      Authors:
      Linda Hogle, Gary Downey
      Anthropology of Work Review
       
      First Published:
       
      September 1999

    14. Producing Absolute Truth: CSI Science as Wishful Thinking

      Authors:
      Corinna Kruse
      American Anthropologist
       
      First Published:
       
      23 February 2010
        Studying Those Who Study Us: An Anthropologist in the World of Artificial Intelligence.
    15. Authors:
      Jennifer Croissant
      American Anthropologist
       
      First Published:
       
      June 2003

    16. Forensic Anthropology and Bioarchaeology in the American Anthropologist Rare but Exquisite Gems

      Authors:
      Jane E. Buikstra, Jason L. King, Kenneth C. Nystrom
      American Anthropologist
       
      First Published:
       
      March 2003

    17. General Anthropology

      Authors:
      General Anthropology
       
      First Published:
       
      September 2002

    18. OPINIONOpinion

      Authors:
      Anthropology News
       
      First Published:
       
      April 2016

    19. The Skill Requirements of Work Activity: An Ethnographic Perspective

      Authors:
      Marietta L. Baba
      Anthropology of Work Review
       
      First Published:
       
      September 1991

    20. ORIGINAL ARTICLEPRACTICING FORENSIC ANTHROPOLOGY:
      A HUMAN RIGHTS APPROACH TO THE GLOBAL PROBLEM OF MISSING AND UNIDENTIFIED PERSONS

      Authors:
      Erin H. Kimmerle
      Annals of Anthropological Practice
       
      First Published:
       
      May 2014

    *

    Applied Social Sciences Index and Abstracts 
    2,670 Results

    CONTENT SAMPLE

    Assessing Suicide Risk and Emotional Distress in Chinese Social Media: A Text Mining and Machine Learning Study

    Cheng, Qijin, PhD; Li, Tim MH, PhD; Kwok, Chi-Leung, PhD; Zhu, Tingshao, PhD; Yip, Paul SF, PhD.Journal of Medical Internet Research; Toronto Vol. 19, Iss. 7,  (Jul 2017): e243

    Solution to Detect, Classify, and Report Illicit Online Marketing and Sales of Controlled Substances via Twitter: Using Machine Learning and Web Forensics to Combat Digital Opioid Accesse

    Mackey, Tim, PhD; Kalyanam, Janani, PhD; Klugman, Josh; Kuzmenko, Ella; Gupta, Rashmi.Journal of Medical Internet Research; Toronto Vol. 20, Iss. 4,  (Apr 2018): e10029.


    Timing, Sequencing, and Quantum of Life Course Events: A Machine Learning Approach
    Billari, Francesco C; Furnkranz, Johannes; Prskawetz, Alexia. European Journal of Population/Revue europeenne de demographie Vol. 22, Iss. 1,  (0, 2006): 37-65.



    A Review of Current Research in Network Forensic Analysis
    Adeyemi, Ikuesan R; Razak, Shukor Abd; Azhan, Nor Amira Nor. 
    International Journal of Digital Crime and Forensics 
    Vol. 5, Iss. 1,  (January 2013): 1-26.


    Themis-ml: A Fairness-Aware Machine Learning Interface for End-To-End Discrimination Discovery and Mitigation

    Bantilan, Niels.Journal of Technology in Human Services; New York Vol. 36, Iss. 1,  (Jan/Mar 2018): 15-30


    Sharing the Educational Wealth: A Nursing and Health Informatics Program Collaboration

    Brewster, Robin, DNP, RN, AGNP-BC; Scully, Cathleen, DNP, RN, AGNP-BC; Saeed, Anam, BS; Chhetri, Shreyi Rimal, BS; Irigoyen, Laura, BS.Journal of Health Care for the Poor and Underserved; Baltimore Vol. 27, Iss. 2,  (May 2016): XIV,XV,XVI,XVII,XVIII,XIX.



    Use of Machine Learning Classifiers and Sensor Data to Detect Neurological Deficit in Stroke Patients

    Park, Eunjeong, PhD; Chang, Hyuk-Jae, MD, PhD; Nam, Hyo Suk, MD, PhD.Journal of Medical Internet Research; Toronto Vol. 19, Iss. 4,  (Apr 2017): E120.


    How Should Health Data Be Used?

    KAPLAN, BONNIE.Cambridge Quarterly of Healthcare Ethics: CQ; New York Vol. 25, Iss. 2,  (Apr 2016): 312-329.


    Machine Learning, Sentiment Analysis, and Tweets: An Examination of Alzheimer's Disease Stigma on Twitter

    Oscar, Nels; Fox, Pamela A; Croucher, Racheal; Wernick, Riana; Keune, Jessica; et al.The Journals of Gerontology: Psychological sciences and social sciences, Series B; Oxford Vol. 72, Iss. 5,  (Sep 2017): 742.


    Informed Consent for Who Knows What: Ethical Dilemmas of Big Data and 
    Machine Learning Approaches in Child and Adolescent Psychiatry

    Deschamps, Peter, MD, PhD. 


    Journal of the American Academy of Child and Adolescent Psychiatry, 
    suppl. Supplement 1; 
    Baltimore Vol. 55, Iss. 10,  (Oct 2016): S308.



    *

    Art & Architecture Source (formerly Art Source) 
    5,480 Results


    *

    ARTBibliographies Modern 
    364 Results


    *

    ArticleFirst 
    407,119 Results


    Content Sample

    Previous page of results 
    Prev
    Next page of results 
    Next
    1.Toward Effective and Reliable Digital Forensics 
    Author: Mazurczyk, Wojciech; Szczypiorski, Krzysztof Source: The Computer Journal 55, no. 6 (2012): 651-652 Libraries Worldwide: 1010  
    2.Too Much Information? Political Science, the University, and the Public Sphere 
    Source: Perspectives on Politics 10, no. 2 (2012): 385-396 Libraries Worldwide: 1545  
    3.Spatio-temporal querying recurrent multimedia databases using a semantic sequence state graph 
    Author: Naik, M. M.; Aygun, R. S.; Aygun, R. S. Source: Multimedia Systems 18, no. 3 (2012): 263-281 Libraries Worldwide: 1023   
      
    4.Introduction to special issue on modelling Popov v. Hayashi 
    Author: Atkinson, Katie Source: Artificial Intelligence and Law 20, no. 1 (2012): 1-14  
    5.A Carneades reconstruction of Popov v Hayashi 
    Author: Gordon, Thomas F.; Walton, Douglas Source: Artificial Intelligence and Law 20, no. 1 (2012): 37-56  
    6.A legal case OWL ontology with an instantiation of Popov v. Hayashi 
    Author: Wyner, Adam; Hoekstra, Rinke Source: Artificial Intelligence and Law 20, no. 1 (2012): 83-107 
    7.Representing Popov v Hayashi with dimensions and factors 
    Author: Bench-Capon, T. J. M. Source: Artificial Intelligence and Law 20, no. 1 (2012): 15-35 
    8.Reconstructing Popov v. Hayashi in a framework for argumentation with structured arguments and Dungean semantics 
    Author: Prakken, Henry Source: Artificial Intelligence and Law 20, no. 1 (2012): 57-82 
    9.Cameron Browne: Evolutionary game design, Springer briefs in computer science series 
    Author: Boumaza, Amine Source: Genetic Programming and Evolvable Machines 13, no. 3 (2012): 407-409 
    10.Health Informatics a Frontline Activity Everyone Needs to Understand 
    Author: Roberts, Jean Source: ITNow 54, no. 2 (2012): 22-23 
    11.Configuration Tool for a Wireless Sensor Network Integrated Security Framework 
    Author: DÄdãarlat, Vasile Teodor; DÄdãarlat, Vasile Teodor; DÄdãarlat, Vasile Teodor Source: Journal of Network and Systems Management 20, no. 3 (2012): 417-452 
    12.Phrase-Level Sentiment Polarity Classification Using Rule-Based Typed Dependencies and Additional Complex Phrases Consideration 
    Author: Tan, Luke Kien-Weng; Na, Jin-Cheon; Theng, Yin-Leng, and others Source: Journal of Computer Science and Technology 27, no. 3 (2012): 650-666 
    13.Exploiting Consumer Reviews for Product Feature Ranking 
    Author: Li, Su-Ke; Guan, Zhi; Tang, Li-Yong, and others Source: Journal of Computer Science and Technology 27, no. 3 (2012): 635-649 
    14.Topology-Based Recommendation of Users in Micro-Blogging Communities 
    Author: Armentano, Marcelo G.; Godoy, Daniela; Amandi, Analâia Source: Journal of Computer Science and Technology 27, no. 3 (2012): 624-634 
    15.Performance Characterization of Game Recommendation Algorithms on Online Social Network Sites 
    Author: Leroux, Philip; Dhoedt, Bart; Demeester, Piet, and others Source: Journal of Computer Science and Technology 27, no. 3 (2012): 611-623 
    16.Community-Aware Resource Profiling for Personalized Search in Folksonomy 
    Author: Xie, Hao-Ran; Li, Qing; Cai, Yi Source: Journal of Computer Science and Technology 27, no. 3 (2012): 599-610 
    17.Personalized Semantic Based Blog Retrieval 
    Author: Sathianesan, Godfrey Winster; Sankaranarayanan, Swamynathan Source: Journal of Computer Science and Technology 27, no. 3 (2012): 591-598 
    18.An Effective Framework for Fast Expert Mining in Collaboration Networks: A Group-Oriented and Cost-Based Method 
    Author: Farhadi, Farnoush; Sorkhi, Maryam; Hashemi, Sattar, and others Source: Journal of Computer Science and Technology 27, no. 3 (2012): 577-590 
    19.Exponential Fuzzy C-Means for Collaborative Filtering 
    Author: Treerattanapitak, Kiatichai; Jaruskulchai, Chuleerat Source: Journal of Computer Science and Technology 27, no. 3 (2012): 567-576 
    20.Improving Web Document Clustering through Employing User-Related Tag Expansion Techniques 
    Author: Li, Peng; Wang, Bin; Jin, Wei Source: Journal of Computer Science and Technology 27, no. 3 (2012): 554-566 

    *

    Results: 2,636


    CONTENT SAMPLE

    JavaScript Affogato: Programming a Culture of Improvised Expertise
    By: Lennon, Brian
    CONFIGURATIONS   Volume: 26   Issue:   Pages: 47-72   Published: WIN 2018

    MODERNIST
     INFORMATICS: LITERATURE, INFORMATION, AND THE STATE

    Introduction to special issue on Forensic Linguistics: European Perspective
    From dignity to security protocols: a scientometric analysis of digital ethics

    DIGITAL SCHOLARSHIP IN THE HUMANITIES  


    *

    ASCE Research Library
    8,679 Results

    *







    *

    ATLA Religion Database with ATLASerials 

    446 Results

    CONTENT SAMPLE


    THE HEART OF THE MACHINE: Our Future in a World of Artificial Intelligence
    By: Kendall, Peggy. Source: Perspectives on Science and Christian Faith, 
    70 no 2 Jun 2018, p 141-143. Publication Type: Review


    The Overlooked Science of Genealogical Ancestry
    By: Swamidass, S Joshua. 
    Source: Perspectives on Science and Christian Faith, 
    70 no 1 Mar 2018, p 19-35. Publication Type: Article


    THINKING MACHINES: The Quest for Artificial Intelligence and Where It's Taking Us Next
    By: Norman, Victor T. Source: Perspectives on Science and Christian Faith, 
    70 no 1 Mar 2018, p 71-72. Publication Type: Review


    Rogue Pixels: Indexicality and Algorithmic Camouflage
    By: Paulsen, Kris. Source: Signs and Society, 
    6 no 2 Spr 2018, p 412-434. Publication Type: Article


    AI, Karma & Our Robot Future: Two artificial intelligence scientists discuss what’s to come: 
    A conversation with Steve Omohundro and Nikki Mirghafori
    By: Mirghafori, Nikki (Interviewer); Omohundro, Stephen M. (Stephen Malvern) (Interviewee); 
    Varvaloucas, Emma ("Author of introduction, etc. "). 
    Source: Tricycle, 27 no 3 Spr 2018. Publication Type: Article


    Artificial Intelligence ('AI') is an interdisciplinary endeavour to make machines intelligent
    By: Holzer, Philippe-André. Source: Oikonomia, 16 no 3 Oct 2017, p 5-8. 
    Publication Type: Article


    Religious Identity, Expression, and Civility in Social Media: 
    Results of Data Mining Latter-Day Saint Twitter Accounts
    By: Kimmons, Royce; Stauffer, McKell; Gregson, Marie; McGuire, 
    Kristin; Jones, J Evan; Austin, Madison. 
    Source: Journal for the Scientific Study of Religion, 
    56 no 3 Sep 2017, p 1-21. Publication Type: Article


    Introduction to Evolutionary Informatics
    By: Isaac, Randy. Source: Perspectives on Science and Christian Faith, 
    69 no 2 Jun 2017, p 99-104. Publication Type: Review


    In our own image: Savior or Destroyer? 
    The History and Future of Artificial Intelligence
    By: Fayter, Paul. Source: Perspectives on Science and Christian Faith, 
    69 no 2 Jun 2017, p 123-125. Publication Type: Review


    Algorithms to Live by: The Computer Science of Human Decisions
    By: Nyhoff, Jeffrey. Source: Perspectives on Science and Christian Faith, 
    69 no 2 Jun 2017, p 127-128. Publication Type: Review



    *

    Avery Index to Architectural Periodicals

    233 Results

    CONTENT SAMPLE

    Emergent Design: a crosscutting research program and design curriculum 
    integrating architecture and artificial intelligence
    Testa, Peter. Environment and planning B, planning & design 
    Vol. 28, Iss. 4,  (July 2001): 481-498.


    Using the ART-MMAP neural network to model and predict urban growth: 
    a spatiotemporal data mining approach
    Liu, Weiguo; Seto, Karen C. Environment and planning B, planning & design 
    Vol. 35, Iss. 2,  (March 2008): 296-317


    Battle of the 'bots: the machines are coming. 
    Though construction robots are limited to working in controlled environments, 
    developers of the following four 'bots are prepping for a future 
    in which automation rules on even the most unwieldy jobsites.
    Ferro, Shaunacy. Architect (Washington, D.C.) 
    Vol. 103, Iss. 6,  (June 2014): 105,140,142,144,146,148


    Artificial intelligence assisted urban planning.
    Wu, Zhiqiang. Shi dai jian zhu = Time + architecture Iss. 1159,  (January 2018): 6-11.


    Artificial intelligence design, from research to practice.
    Yang, Xiaodi; He, Wanyu. Shi dai jian zhu = Time + architecture 
    Iss. 1159,  (January 2018): 37-43.


    Artificial intelligence: a future for CAD
    Evans, Barrie. Architects' journal Vol. 193, Iss. 24, 
    (June 12, 1991): 55-60



    Architecture: biological form and artificial intelligence
    Salingaros, Nikos A; Masden, Kenneth G. Structurist 
    Iss. 45-46,  (0, 2005): 54-61.


    Viewpoint : the future of artificial intelligence.
    Qiu, Haoxiu; Zhang, Yuxing; Ding, Junfeng; Fan, Ling; Zhang, Malu; et al. 
    Shi dai jian zhu = Time + architecture Iss. 1159,  (January 2018): 69-75


    Artificial intelligence in the CAD system environment
    Pohl, Jens. Architectural & engineering systems Vol. 5, Iss. 6,  (June 1989): 48-50.


    Glass box and black box, or, Can artificial intelligence help solve design problems?
    Barnett, Jonathan. Architectural record Vol. 144, Iss. 1,  (July 1968): 127-128.




    *

    *

    B

    *

    *

    SEARCH STRATEGY

    ("computer science" OR "information science" OR "computer programming" OR informatics OR "data management" OR "information security" OR "network security" OR forensics OR "visual computing" OR "data mining" OR "machine learning" OR "multimedia databases" OR "artificial intelligence")

    *

     Bibliography of Asian Studies

    712 Results

    *

    Bibliography of the History of Art
    Results 533  for BHA and RILA


    Content Sample


    Computer art : artificial intelligence and the arts

    Wilson, Stephen

    1983

    2
    Dialogue with Alexander Tzonis : artificial intelligence for intelligent architects.
    Dialogue with Alexander Tzonis : artificial intelligence for intelligent architects.
    Material Type:
    ArticleAdd to e-Shelf

    Dialogue with Alexander Tzonis : artificial intelligence for intelligent architects.

    Tzonis, Alexander

    1993

    3
    Artificial intelligence.
    Artificial intelligence.
    Material Type:
    ArticleAdd to e-Shelf

    Artificial intelligence.

    Spring, Justin

    1999

    4
    The history of art history in the 21st century, as viewed from computer science : 20-20 hindsight from the year of the same name.
    The history of art history in the 21st century, as viewed from computer science : 20-20 hindsight from the year of the same name.
    Material Type:
    ArticleAdd to e-Shelf

    The history of art history in the 21st century, as viewed from computer science: 20-20 hindsight from the year of the same name.

    Kirsch, Russell A.

    1990


    On mouse-up : object oriented programming and architectural modelling.

    Coates, Paul





    Architecture of the mind : machine intelligence and abstract painting.

    Moos, David

    1996

    14
    An analysis of image queries in the field of art history.
    An analysis of image queries in the field of art history.
    Material Type:
    ArticleAdd to e-Shelf

    An analysis of image queries in the field of art history.

    Chen, Hsin-liang

    2001

    15
    Adaptive computer graphics for research in aesthetics.
    Adaptive computer graphics for research in aesthetics.
    Material Type:
    ArticleAdd to e-Shelf

    Adaptive computer graphics for research in aesthetics.

    Lewis, Elaine

    1989

      *

      Biological Abstracts 
      41,376 Results

      Content Sample


      1.
      Scanning electron microscopic studies on antenna of Hemipyrellia ligurriens (Wiedemann, 1830) (Diptera: Calliphoridae)-A blow fly species of forensic importance
      By: Hore, Garima; Maity, Aniruddha; Naskar, Atanu; et al.
      Acta Tropica  Volume: 172   Pages: 20-28   Published: AUG 2017

       
       
      Times Cited: 0
      (from Web of Science Core Collection)
      Usage Count
       
      2.
      Recipes for neighborhood development: A machine learning approach toward understanding the impact of mixing in neighborhoods
      By: Hipp, John R.; Kane, Kevin; Kim, Jae Hong
      Landscape and Urban Planning  Volume: 164   Pages: 1-12   Published: AUG 2017
       Full Text from Publisher
       
       View AbstractView Abstract
      Times Cited: 0
      (from Web of Science Core Collection)
      Usage Count
       
      3.
      Machine learning performance for predicting soil salinity using different combinations of geomorphometric covariates
      By: Vermeulen, Divan; Van Niekerk, Adriaan
      Geoderma  Volume: 299   Pages: 1-12   Published: AUG 1 2017
       
       View AbstractView Abstract
      Times Cited: 0
      (from Web of Science Core Collection)
      Usage Count
       
      4.
      Automated EEG artifact elimination by applying machine learning algorithms to ICA-based features
      By: Raduentz, Thea; Scouten, Jon; Hochmuth, Olaf; et al.
      Journal of Neural Engineering  Volume: 14   Issue:   Pages: Article No.: 046004   Published: AUG 2017
       
       View AbstractView Abstract
      Times Cited: 0
      (from Web of Science Core Collection)
      Usage Count
       
      5.
      Bioaffinity-based assay for the sensitive detection and discrimination of sweat aimed at forensic applications
      By: Huynh, Crystal; Brunelle, Erica; Agudelo, Juliana; et al.
      Talanta  Volume: 170   Pages: 210-214   Published: AUG 1 2017
       
       View AbstractView Abstract
      Times Cited: 0
      (from Web of Science Core Collection)
      Usage Count
       
      6.
      Re-evaluation of the hydrogen stable isotopic composition of keratin calibration standards for wildlife and forensic science applications
      By: Soto, David X.; Koehler, Geoff; Wassenaar, Leonard I.; et al.
      Rapid Communications in Mass Spectrometry  Volume: 31   Issue: 14   Pages: 1193-1203   Published: JUL 30 2017
       
       View AbstractView Abstract
      Times Cited: 0
      (from Web of Science Core Collection)
      Usage Count
       
      7.
      Artificial intelligence in research
      By: Musib, Mrinal
      Science (Washington D C)  Volume: 357   Issue: 6346, Sp. Iss. SI   Pages: 28   Published: JUL 7 2017
       
      Times Cited: 0
      (from Web of Science Core Collection)
      Usage Count
       
      8.
      Artificial intelligence in research
      By: Wang, Feng
      Science (Washington D C)  Volume: 357   Issue: 6346, Sp. Iss. SI   Pages: 28-29   Published: JUL 7 2017
       
      Times Cited: 0
      (from Web of Science Core Collection)
      Usage Count
       
      9.
      Artificial intelligence in research
      By: Greenwald, Noah F.
      Science (Washington D C)  Volume: 357   Issue: 6346, Sp. Iss. SI   Pages: 29   Published: JUL 7 2017
       
      Times Cited: 0
      (from Web of Science Core Collection)
      Usage Count
       
      10.
      Artificial intelligence in research
      By: Medina Andres, Rigoberto
      Science (Washington D C)  Volume: 357   Issue: 6346, Sp. Iss. SI   Pages: 29   Published: JUL 7 2017
       
      Times Cited: 0
      (from Web of Science Core Collection)
      Usage Count
       

      *

      BioMed Central 
      38588 Results
      http://www.biomedcentral.com/

      Content Sample

      1. BOOK REVIEW

        BioMedical Engineering OnLine 2006 5:51

        Published on: 29 September 2006

      2. PROCEEDINGS

        Machine learning and data mining in complex genomic data—a review on the lessons learned in Genetic Analysis Workshop 19

        In the analysis of current genomic data, application of machine learning and data mining techniques has become more attractive given the rising complexity of the projects. As part of the Genetic Analysis Works...

        Inke R. König, Jonathan Auerbach, Damian Gola, Elizabeth Held, Emily R. Holzinger, Marc-André Legault, Rui Sun, Nathan Tintle and Hsin-Chou Yang

        BMC Genetics 2016 17(Suppl 2):S1

        Published on: 3 February 2016

        This article is part of a Supplement: Volume 17 Supplement 2

      3. RESEARCH ARTICLE

        Quantification of histone modification ChIP-seq enrichment for data mining and machine learning applications

        The advent of ChIP-seq technology has made the investigation of epigenetic regulatory networks a computationally tractable problem. Several groups have applied statistical computing methods to ChIP-seq dataset...

        Stephen A Hoang, Xiaojiang Xu and Stefan Bekiranov

        BMC Research Notes 2011 4:288

        Published on: 11 August 2011

      4. INTRODUCTION

        Development of Multiscale Biological Image Data Analysis: Review of 2006 International Workshop on Multiscale Biological Imaging, Data Mining and Informatics, Santa Barbara, USA (BII06)

        The 2006 International Workshop on Multiscale Biological Imaging, Data Mining and Informatics was held at Santa Barbara, on Sept 7–8, 2006. Based on the presentations at the workshop, we selected and compiled ...

        Manfred Auer, Hanchuan Peng and Ambuj Singh

        BMC Cell Biology 2007 8(Suppl 1):S1

        Published on: 10 July 2007

        This article is part of a Supplement: Volume 8 Supplement 1

      5. ORIGINAL ARTICLE

        Data mining in proteomic mass spectrometry

        Data mining application to proteomic data from mass spectrometry has gained much interest in recent years. Advances made in proteomics and mass spectrometry have resulted in considerable amount of data that ca...

        Asha Thomas, Georgia D. Tourassi, Adel S. Elmaghraby, Roland Valdes Jr. and Saeed A. Jortani

        Clinical Proteomics 2006 2:20113

        Published on: March 2006

      6. REVIEW

        BMC Bioinformatics 2014 15(Suppl 6):I1

        Published on: 16 May 2014

        This article is part of a Supplement: Volume 15 Supplement 6

      7. EDITORIAL

        BioData Mining 2016 9:1

        Published on: 4 January 2016

      8. PROCEEDINGS

        MINER: exploratory analysis of gene interaction networks by machine learning from expression data

        The reconstruction of gene regulatory networks from high-throughput "omics" data has become a major goal in the modelling of living systems. Numerous approaches have been proposed, most of which attempt only "...

        Sidath Randeni Kadupitige, Kin Chun Leung, Julia Sellmeier, Jane Sivieng, Daniel R Catchpoole, Michael E Bain and Bruno A Gaëta

        BMC Genomics 2009 10(Suppl 3):S17

        Published on: 3 December 2009

        This article is part of a Supplement: Volume 10 Supplement 3

      9. RESEARCH

        Quad-phased data mining modeling for dementia diagnosis

        The number of people with dementia is increasing along with people’s ageing trend worldwide. Therefore, there are various researches to improve a dementia diagnosis process in the field of computer-aided diagn...

        Sunjoo Bang, Sangjoon Son, Hyunwoong Roh, Jihye Lee, Sungyun Bae, Kyungwon Lee, Changhyung Hong and Hyunjung Shin

        BMC Medical Informatics and Decision Making 2017 17(Suppl 1):60

        Published on: 18 May 2017

        This article is part of a Supplement: Volume 17 Supplement 1


      *

      Results: 55,686


      *

      Black Studies Center 

      Black Studies Center found the following results:





      *

      Blackwell Reference Online 
      1048 Results

      *

      Book Review Index Online 
      11,027 Results


      *

      Business Source Complete 

      291,975 Results

      Content Sample

    • Post, Mine, Repeat: social media data mining becomes ordinary.

      Review

      By: Gerrard, Ysabel. Information, Communication & Society. 2017, Vol. 20 Issue 12, p1817-1820. 4p. DOI: 10.1080/1369118X.2017.1364781. 


    • 2.

      Machine learning algorithms for the creation of clinical healthcare enterprise systems.

      Detail Only Available

      Academic Journal

      By: Mandal, Indrajit. Enterprise Information Systems. Nov2017, Vol. 11 Issue 9, p1374-1400. 27p. DOI: 10.1080/17517575.2016.1251617.

      Subjects: Quality control; Machine theory; Industrial engineering; Nurse training; Robust control; Machine learning


    • 3.

      Forward Observer system for radar data workflows: Big data management in the field.

      Detail Only Available

      Academic Journal

      By: Knepper, Richard; Standish, Matthew. Future Generation Computer Systems. Nov2017, Vol. 76, p92-97. 6p. DOI: 10.1016/j.future.2017.05.031.

      Subjects: Cluster analysis (Statistics); Data analysis; Data structures (Computer science); Information theory; Electrical supplies; Big data


    • 4.

      A PRNU-based counter-forensic method to manipulate smartphone image source identification techniques.

      Detail Only Available

      Academic Journal

      By: García Villalba, Luis Javier; Sandoval Orozco, Ana Lucila; Rosales Corripio, Jocelin; Hernandez-Castro, Julio. Future Generation Computer Systems. Nov2017, Vol. 76, p418-427. 10p. DOI: 10.1016/j.future.2016.11.007.

      Subjects: Smartphones; Problem solving; Computer algorithms; Computer Terminal and Other Computer Peripheral Equipment Manufacturing; Photographic and Photocopying Equipment Manufacturing; Imaging systems; Digital images; Wavelet transforms


    • 5.

      Machine learning for nano-scale particulate matter distribution from gasoline direct injection engine.

      Detail Only Available

      Academic Journal

      By: Pu, Yi-Hao; Keshava Reddy, Jayanth; Samuel, Stephen. Applied Thermal Engineering. Oct2017, Vol. 125, p336-345. 10p. DOI: 10.1016/j.applthermaleng.2017.07.021.

      Subjects: MATHEMATICAL models; Multiple correspondence analysis (Statistics); Machine learning; Nanoparticle synthesis; Particulate matter; Heat of combustion; Heat of mixing


    • 6.

      Optimized neural network-based fault diagnosis strategy for VRF system in heating mode using data mining.

      Detail Only Available

      Academic Journal

      By: Guo, Yabin; Li, Guannan; Chen, Huanxin; Wang, Jiangyu; Guo, Mengru; Sun, Shaobo; Hu, Wenju. Applied Thermal Engineering. Oct2017, Vol. 125, p1402-1413. 12p. DOI: 10.1016/j.applthermaleng.2017.07.065.

      Subjects: Data mining; Correlation (Statistics); Steam and Air-Conditioning Supply; Plumbing, Heating, and Air-Conditioning Contractors; Appliance Repair and Maintenance; Neural circuitry; Fault diagnosis (Chemical engineering); Air conditioning


    • 7.

      A priori evaluation of simulation models preparation processes using artificial intelligence techniques.

      Detail Only Available

      Academic Journal

      By: Danglade, Florence; Pernot, Jean-Philippe; Véron, Philippe; Fine, Lionel. Computers in Industry. Oct2017, Vol. 91, p45-61. 17p. DOI: 10.1016/j.compind.2017.06.001.

      Subjects: Artificial intelligence; New product development; Computer-aided design; Computer-aided engineering; Computer Systems Design Services; Marketing Consulting Services; Computer simulation; Computational fluid dynamics


    • 8.

      Creating caring institutions for community informatics.

      Detail Only Available

      Academic Journal

      By: Sweeney, Miriam E.; Rhinesmith, Colin. Information, Communication & Society. Oct2017, Vol. 20 Issue 10, p1482-1497. 16p. DOI: 10.1080/1369118X.2016.1234635.

      Subjects: Community informatics; Feminist ethics; Techno culture; Communities; Gender


    • 9.

      A machine learning-based framework for preventing video freezes in HTTP adaptive streaming.

      Detail Only Available

      Academic Journal

      By: Petrangeli, Stefano; Wu, Tingyao; Wauters, Tim; Huysegems, Rafael; Bostoen, Tom; De Turck, Filip. Journal of Network & Computer Applications. Sep2017, Vol. 94, p78-92. 15p. DOI: 10.1016/j.jnca.2017.07.009.

      Subjects: HTTP (Computer network protocol); Streaming video; Motion Picture and Video Production; Video recording merchant wholesalers; Audio and Video Equipment Manufacturing; Machine learning; Video recordings; Fuzzy logic


    • 10.

      Developing news-based Economic Policy Uncertainty index with unsupervised machine learning.

      Detail Only Available

      Academic Journal

      By: Azqueta-Gavaldón, Andrés. Economics Letters. Sep2017, Vol. 158, p47-50. 4p. DOI: 10.1016/j.econlet.2017.06.032.

      Subjects: Economic policy; Bayesian analysis; Stock prices; Machine learning; Uncertainty


    • 11.

      Embracing Internet of Things (IoT) and big data for industrial informatics.

      Detail Only Available

      Academic Journal

      By: Bi, Zhuming. Enterprise Information Systems. Sep2017, Vol. 11 Issue 7, p949-951. 3p. DOI: 10.1080/17517575.2016.1258734.

      Subjects: Information science; Technological innovations; Information technology; Internet of things; Big data


    • 12.

      Prioritizing and Ranking the Big Data Information Security Risk Spectrum.

      Detail Only Available

      Academic Journal

      By: Bharathi, S. Vijayakumar. Global Journal of Flexible Systems Management. Sep2017, Vol. 18 Issue 3, p183-201. 19p. DOI: 10.1007/s40171-017-0157-5.

      Subjects: Delphi method; Decision making; Information storage & retrieval system security measures; Ranking; Big data



    • 13.

      Artificial Intelligence in Healthcare: The Current, Compelling Wave of Interest.

      Full Text Available

      Periodical

      By: Radick, Lea E. Healthcare Executive. Sep/Oct2017, Vol. 32 Issue 5, p21-28. 7p.

      Subjects: Health care industry; All Other Health and Personal Care Stores; Artificial intelligence in medicine; Medical care -- United States; Medical innovations; Kim, Lee


    • 14.

      BHI-2018 IEEE International Conference on Biomedical and Health Informatics.

      Detail Only Available

      Academic Journal

      IEEE Transactions on Biomedical Engineering. Sep2017, Vol. 64 Issue 9, p2309-2309. 1p. DOI: 10.1109/TBME.2017.2737758. Add to folder
    • 15.

      Decision-making framework with double-loop learning through interpretable black-box machine learning models.

      Detail Only Available

      Academic Journal

      By: Bohanec, Marko; Robnik-Šikonja, Marko; Kljajić Borštnar, Mirjana. Industrial Management & Data Systems. 2017, Vol. 117 Issue 7, p1389-1406. 18p. DOI: 10.1108/IMDS-09-2016-0409.

      Subjects: Decision making in business; Problem solving; Organizational performance; Economic impact; Machine learning


    • 16.

      A passive forensic method for video: Exposing dynamic object removal and frame duplication in the digital video using sensor noise features.

      Detail Only Available

      Academic Journal

      By: Pandey, Ramesh C.; Singh, Sanjay K.; Shukla, K. K. Journal of Intelligent & Fuzzy Systems. 2017, Vol. 32 Issue 5, p3339-3353. 15p. DOI: 10.3233/JIFS-169275.

      Subjects: Bayesian analysis; Video editing; Forensic sciences; Gaussian mixture models (Statistics); Thresholding algorithms

      Add to folder Cited References: (44)

    • 17.

      Forensic Psychological Assessment in Forensic Practice: Case Studies.

      Detail Only Available

      Review

      By: Hass, Giselle A. Journal of Personality Assessment. Sep/Oct2017, Vol. 99 Issue 5, p556-557. 2p. DOI: 10.1080/00223891.2017.1318889.

      Subjects: Forensic psychology; Nonfiction; Forensic Psychological Assessment in Forensic Practice: Case Studies (Book); De Ruiter, Corine; Kaser-Boyd, Nancy


    • 18.

      Developments in Research Data Management in Academic Libraries: Towards an Understanding of Research Data Service Maturity.

      Detail Only Available

      Academic Journal

      By: Cox, Andrew M.; Kennan, Mary Anne; Lyon, Liz; Pinfield, Stephen. Journal of the Association for Information Science & Technology. Sep2017, Vol. 68 Issue 9, p2182-2199. 18p.

      Subjects: Database management; Questionnaires; Research; Australia; Europe; Great Britain; New Zealand; United States; Data Processing, Hosting, and Related Services; Libraries and Archives; Library education; Academic libraries -- United States; Academic libraries -- Great Britain; Academic libraries -- Australia; Academic libraries -- Europe; Academic libraries -- New Zealand; Surveys; Technical services (Libraries)


    • 19.

      Quality Data Management Software Improves Process Reliability.

      Full Text Available

      Periodical

      Modern Machine Shop. Sep2017, Vol. 90 Issue 4, p94-102. 5p.

      Subjects: MANAGEMENT; Zeiss Industrial Metrology (Company); Data; SOFTWARE; Manufacturing processes -- Software


    • 20.

      The long game: Re-engineering your business for artificial intelligence.

      Full Text Available

      Periodical

      By: Gray, Annie. NZ Business + Management. Sep2017, pM8-M10. 3p.

      Subjects: Artificial intelligence; Business planning; International Business Machines Corp.; Facebook Inc.; PredPol (Company)




    • David Dillard


      NET-GOLD

      http://groups.yahoo.com/group/net-gold

      https://groups.io/org/groupsio/net-gold/archives

      http://net-gold.3172864.n2.nabble.com/

       

      Research Guides

      https://sites.google.com/site/researchguidesonsites/

       

       

      Research Paper Writing

      https://sites.google.com/site/howtowriteasuperresearchpaper/
      Employment

      https://sites.google.com/site/employmentsources/

      Internships

      https://sites.google.com/site/internshipsarticles/

      Hospitality

      https://sites.google.com/site/hospitalitydatabasesandtools/
      |
      Disabilities And Employment

      https://sites.google.com/site/disabilitynetsources/Home/employment-and-disabilities

      Indoor Gardening

      https://groups.yahoo.com/neo/groups/indoorgardeningurban/info

      Educator-Gold

      http://groups.yahoo.com/group/educator-gold/

      K12ADMINLIFE

      http://groups.yahoo.com/group/k12adminlife/

       


       

      Blog

      https://educatorgold.wordpress.com/

       

      Research Guide:

      Information Literacy

      http://tinyurl.com/78a4shn

       

      Twitter: davidpdillard


      Bushell, R. & Sheldon, P. (Eds),

      Wellness and Tourism: Mind, Body, Spirit,

      Place, New York: Cognizant Communication Books.

      Wellness Tourism: Bibliographic and Webliographic Essay

      David P. Dillard


       

      Railtram Discussion Group

      from the union pacific to britrail and beyond

      https://groups.yahoo.com/neo/groups/railtram/info

       

      Indoor Gardening

      improve your chances for indoor gardening success

      http://tech.groups.yahoo.com/group/indoorgardeningurban/

       

      Sport-Med

      https://www.jiscmail.ac.uk/lists/sport-med.html

      http://groups.yahoo.com/group/sports-med/


       

      Health Diet Fitness Recreation Sports Tourism

      https://groups.yahoo.com/neo/groups/healthrecsport/info


       

       

       

       

       

       

      .

       

      .

       

      Please Ignore All Links to JIGLU

      in search results for Net-Gold and related lists.

      The Net-Gold relationship with JIGLU has

      been terminated by JIGLU and these are dead links.

      http://groups.yahoo.com/group/Net-Gold/message/30664

      http://health.groups.yahoo.com/group/healthrecsport/message/145


       

      .

       

      .

       






      Comments