prompt
stringlengths
821
12.2k
answer
stringlengths
0
339
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the i10 index of the researcher who co-authored 'Embedded Sensor Networks' in the year 2005 with Ramesh Govindan at Handbook of Networked and Embedded Control Systems? Context: A. S. M. Rizvi et al.: Defending Root DNS Servers Against DDoS Using Layered Defenses. (2022) authored by John S. Heidemann. A. S. M. Rizvi et al.: Defending Root DNS Servers Against DDoS Using Layered Defenses. (2023) authored by John S. Heidemann. A. S. M. Rizvi et al.: Defending Root DNS Servers against DDoS Using Layered Defenses (Extended). (2023) authored by John S. Heidemann. John Heidemann alternativeName John Heidemann. Thomas W. Page Jr. et al.: Management of Replicated Volume Location Data in the Ficus Replicated File System. (1991) authored by John S. Heidemann. Giovane C. M. Moura et al.: When the Dike Breaks: Dissecting DNS Defenses During DDoS. (2018) authored by John S. Heidemann. Nirupama Bulusu et al.: GPS-less low-cost outdoor localization for very small devices. (2000) authored by John S. Heidemann. John Heidemann name John Heidemann. John Heidemann alternativeName John S. Heidemann. Richard G. Guy et al.: The Ficus Replicated File System (Abstract). (1992) authored by John S. Heidemann. Kensuke Fukuda et al.: Detecting Malicious Activity With DNS Backscatter Over Time. (2017) authored by John S. Heidemann. Richard G. Guy et al.: Implementation of the Ficus Replicated File System. (1990) authored by John S. Heidemann. Chengjie Zhang and John S. Heidemann: Accurate Pipeline Blockage Detection with Low-Cost Multi-modal Sensing. (2014) authored by John S. Heidemann. Kensuke Fukuda and John S. Heidemann: Detecting Malicious Activity with DNS Backscatter. (2015) authored by John S. Heidemann. Calvin Ardi and John S. Heidemann: Precise Detection of Content Reuse in the Web. (2019) authored by John S. Heidemann. John Heidemann alternativeName John Shelby Heidemann. Nirupama Bulusu et al.: Self-configuring localization systems: Design and Experimental Evaluation. (2004) authored by John S. Heidemann. Lars Eggert and John S. Heidemann: Application-Level Differentiated Services for Web Servers. (1999) authored by John S. Heidemann. Moritz Müller et al.: Recursives in the wild: engineering authoritative DNS servers. (2017) authored by John S. Heidemann. Peter L. Reiher et al.: Resolving File Conflicts in the Ficus File System. (1994) authored by John S. Heidemann. John Heidemann alternativeName J. Heidemann. Gautam Thatte et al.: Parametric methods for anomaly detection in aggregate traffic. (2011) authored by John S. Heidemann. John Heidemann alternativeName J. S. Heidemann'}. You can help Wikipedia by expanding it output format: answer
149
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the cited by count where the contributor of Cryptography and Information Security in the Post-Snowden Era's article is affiliated? Context: Vincent van der Leest et al.: Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment. (2012) authored by Bart Preneel. Takahito Yoshizawa and Bart Preneel: Verification Schemes of Multi-SIM Devices in Mobile Communication Systems. (2020) authored by Bart Preneel. Alireza Aghabagherloo et al.: On the Brittleness of Robust Features: An Exploratory Analysis of Model Robustness and Illusionary Robust Features. (2023) authored by Bart Preneel. Souradyuti Paul and Bart Preneel: Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries. (2005) authored by Bart Preneel. Joachim Vandersmissen et al.: A White-Box Speck Implementation using Self-Equivalence Encodings (Full Version). (2022) authored by Bart Preneel. Lennert Wouters et al.: Dismantling DST80-based Immobiliser Systems. (2020) authored by Bart Preneel. Vesselin Velichkov et al.: UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX. (2012) authored by Bart Preneel. Atul Luykx et al.: Impossibility Results for Indifferentiability with Resets. (2012) authored by Bart Preneel. Joachim Vandersmissen et al.: A White-Box Speck Implementation Using Self-equivalence Encodings. (2022) authored by Bart Preneel. Amit Singh Bhati et al.: Skye: A Fast KDF based on Expanding PRF and its Application to Signal. (2023) authored by Bart Preneel. Bart Preneel alternativeName Bart Preneel. Alan Szepieniec and Bart Preneel: Short Solutions to Nonlinear Systems of Equations. (2017) authored by Bart Preneel. Alan Szepieniec and Bart Preneel: Short Solutions to Nonlinear Systems of Equations. (2017) authored by Bart Preneel. Michele Bugliesi et al.: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II (2006) edited by Bart Preneel. Bart Preneel name Bart Preneel. Michele Bugliesi et al.: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part I (2006) edited by Bart Preneel. Ruan de Clercq et al.: SOFIA: Software and control flow integrity architecture. (2016) authored by Bart Preneel. Hirotaka Yoshida et al.: MAME: A Compression Function with Reduced Hardware Requirements. (2007) authored by Bart Preneel. Elena Andreeva et al.: The parazoa family: generalizing the sponge hash functions. (2012) authored by Bart Preneel. Bart Preneel alternativeName B. Preneel. Christophe De Cannière et al.: Analysis of Grain's Initialization Algorithm. (2008) authored by Bart Preneel. Elena Andreeva et al.: The Parazoa Family: Generalizing the Sponge Hash Functions. (2011) authored by Bart Preneel. Atul Luykx et al.: Two-permutation-based hashing with binary mixing. (2015) authored by Bart Preneel. An Braeken et al.: Normality of Vectorial Functions. (2005) authored by Bart Preneel. Adrián Ranea and Bart Preneel: On Self-equivalence Encodings in White-Box Implementations. (2020) authored by Bart Preneel. Adrián Ranea and Bart Preneel: On Self-Equivalence Encodings in White-Box Implementations. (2020) authored by Bart Preneel. Aysajan Abidin et al.: Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC. (2023) authored by Bart Preneel. Aysajan Abidin et al.: Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC. (2023) authored by Bart Preneel. Oshrat Ayalon et al.: Not Only for Contact Tracing: Use of Belgium's Contact Tracing App among Young Adults. (2022) authored by Bart Preneel. Kaveh Razavi et al.: Flip Feng Shui: Hammering a Needle in the Software Stack. (2016) authored by Bart Preneel. Sebastiaan Indesteege and Bart Preneel: Preimages for Reduced-Round Tiger. (2007) authored by Bart Preneel. Elena Andreeva et al.: 1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher. (2021) authored by Bart Preneel. Elena Andreeva et al.: 1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher. (2021) authored by Bart Preneel. Ventzislav Nikov et al.: Robust Metering Schemes for General Access Structures. (2004) authored by Bart Preneel. Jens Hermans et al.: Parallel Shortest Lattice Vector Enumeration on Graphics Cards. (2010) authored by Bart Preneel. Dave Singelée and Bart Preneel: Improved Pairing Protocol for Bluetooth. (2006) authored by Bart Preneel. Jens Hermans et al.: Parallel Shortest Lattice Vector Enumeration on Graphics Cards. (2009) authored by Bart Preneel. Pieter Robyns et al.: Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning. (2017) authored by Bart Preneel. Yuri L. Borissov et al.: On a Resynchronization Weakness in a Class of Combiners with Memory. (2002) authored by Bart Preneel. An Braeken et al.: Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality. (2004) authored by Bart Preneel. Sebastiaan Indesteege et al.: Collisions and other Non-Random Properties for Step-Reduced SHA-256. (2008) authored by Bart Preneel. Sebastiaan Indesteege et al.: Collisions and Other Non-random Properties for Step-Reduced SHA-256. (2008) authored by Bart Preneel. Bart Preneel is Person. Kazuo Sakiyama et al.: A fast dual-field modular arithmetic logic unit and its hardware implementation. (2006) authored by Bart Preneel. Bart Preneel 2YrMeanCitedness 1.464285731315612793. Dries Schellekens et al.: Remote attestation on legacy operating systems with trusted platform modules. (2008) authored by Bart Preneel. Sebastiaan Indesteege et al.: Practical Collisions for SHAMATA-256. (2009) authored by Bart Preneel. María Naya-Plasencia and Bart Preneel: Preface. (2017) authored by Bart Preneel. Dries Schellekens et al.: Remote Attestation on Legacy Operating Systems With Trusted Platform Modules. (2007) authored by Bart Preneel. Bart Preneel et al.: Boolean Functions Satisfying Higher Order Propagation Criteria. (1991) authored by Bart Preneel'}. M. Vandewalle and René J output format: answer
345431
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the cited by count of the institution where the author of 'Email Spam Filtering: A Systematic Review' is affiliated? Context: Forbes J. Burkowski et al.: Architectural Support for Synchronous Task Communication. (1989) authored by Gordon V. Cormack. Brad Lushman and Gordon V. Cormack: A larger decidable semiunification problem. (2007) authored by Gordon V. Cormack. Gordon V. Cormack name Gordon V. Cormack. Nima Sadri and Gordon V. Cormack: Continuous Active Learning Using Pretrained Transformers. (2022) authored by Gordon V. Cormack. Gordon V. Cormack: A Calculus for Concurrent Update (Abstract). (1995) authored by Gordon V. Cormack. Nimesh Ghelani et al.: Refresh Strategies in Continuous Active Learning. (2018) authored by Gordon V. Cormack. Gordon V. Cormack alternativeName Gordon Cormack. Gordon V. Cormack alternativeName Gordon V. Cormack. Gordon V. Cormack and R. Nigel Horspool: Data Compression Using Dynamic Markov Modelling. (1987) authored by Gordon V. Cormack. Gordon V. Cormack alternativeName Gordon Villy Cormack. Gordon V. Cormack 2YrMeanCitedness 5.75. Dominic Duggan et al.: Kinded Type Inference for Parametric Overloading. (1996) authored by Gordon V. Cormack. Gordon V. Cormack: A Micro-Kernel for Concurrency in C. (1988) authored by Gordon V. Cormack. Gordon V. Cormack alternativeName G. V. Cormack. Maura R. Grossman and Gordon V. Cormack: MRG_UWaterloo and WaterlooCormack Participation in the TREC 2017 Common Core Track. (2017) authored by Gordon V. Cormack. Maura R. Grossman and Gordon V. Cormack: MRG_UWaterloo and WaterlooCormack Participation in the TREC 2017 Common Core Track. (2017) authored by Gordon V. Cormack. R. Nigel Horspool and Gordon V. Cormack: Hashing as a Compaction Technique for LR Parser Tables. (1987) authored by Gordon V. Cormack. Gordon V. Cormack alternativeName G. Cormack, and Ph. Cheriton School of Computer Science at the University of Waterloo and co-inventor of Dynamic Markov Compression. D output format: answer
2965394
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Who has a higher hIndex, the author of CellSense: An Accurate Energy-Efficient GSM Positioning System or the author of A Gaussian Process Model for Inferring the Dynamic Transcription Factor Activity? Context: Neil D. Lawrence name Neil D. Lawrence. Neil D. Lawrence alternativeName Neil D. Lawrence. Neil D. Lawrence alternativeName Neil David Lawrence. Neil D. Lawrence alternativeName Neil Lawrence. Neil D. Lawrence alternativeName Lawrence Neil D.. Neil D. Lawrence alternativeName N. D. Lawrence. Andrei Paleyes et al.: Exploring the potential of flow-based programming for machine learning deployment in comparison with service-oriented architectures. (2021) authored by Neil D. Lawrence. Neil D. Lawrence primary affiliation University of Cambridge, UK. Andrei Paleyes et al.: An empirical evaluation of flow based programming in the machine learning deployment context. (2022) authored by Neil D. Lawrence. Andrei Paleyes et al.: An Empirical Evaluation of Flow Based Programming in the Machine Learning Deployment Context. (2022) authored by Neil D. Lawrence. Neil D. Lawrence member of University of Cambridge. Brenden M. Lake et al.: The Emergence of Organizing Structure in Conceptual Representation. (2016) authored by Neil D. Lawrence. Neil D. Lawrence and Mark A. Girolami: Preface. (2012) authored by Neil D. Lawrence. Neil D. Lawrence affiliation University of Cambridge, UK. Neil D. Lawrence written paper amount in year2019: 1. Neil D. Lawrence written paper amount in year2019: 1. Neil D. Lawrence written paper amount in year2022: 0. Neil D. Lawrence written paper amount in year2022: 0. Neil D. Lawrence written paper amount in year2012: 11. Neil D. Lawrence written paper amount in year2012: 11. Neil D. Lawrence written paper amount in year2020: 0. Neil D. Lawrence written paper amount in year2020: 0. Bei Wang et al.: Data-Driven Mode Identification and Unsupervised Fault Detection for Nonlinear Multimode Processes. (2020) authored by Neil D. Lawrence. Neil D. Lawrence modified 2023-10-18. Corinna Cortes and Neil D. Lawrence: Inconsistency in Conference Peer Review: Revisiting the 2014 NeurIPS Experiment. (2021) authored by Neil D. Lawrence'}. These efforts have been called "commendable" by Demis Hassabis output format: answer
Moustafa Youssef
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: How many publication citations does the institution of the author who published the paper 'Dissociable amygdala and orbitofrontal responses during reversal fear conditioning' have? Context: Raymond J. Dolan name Raymond J. Dolan. Ray Dolan is Creator. Ray Dolan is Person. Raymond J. Dolan alternativeName Raymond Dolan. Raymond J. Dolan alternativeName Raymond Joseph Dolan. Rani Moran et al.: Model based planners reflect on their model-free propensities. (2021) authored by Ray Dolan. Ray Dolan link http://www.fil.ion.ucl.ac.uk/Dolan/. Ray Dolan link http://www.fil.ion.ucl.ac.uk/Dolan/. Marcos Economides et al.: Model-Based Reasoning in Humans Becomes Automatic with Training. (2015) authored by Ray Dolan. Raymond J. Dolan modified 2023-10-18. Raymond J. Dolan alternativeName Ray Dolan. Raymond J. Dolan i10Index 678. Raymond J. Dolan alternativeName Raymond J. Dolan. Raymond J. Dolan member of UCL Australia. Raymond J. Dolan alternativeName Ray J. Dolan'}. You can help Wikipedia by expanding it output format: answer
762778
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Which academy is the scholar who published The Golden Age of Imaging a member of? Context: Raja Balasubramanian et al.: Sequential scalar quantization of vectors: an analysis. (1995) authored by Charles A. Bouman. Yan Huang et al.: Time-frequency analysis with best local cosine bases. (2004) authored by Charles A. Bouman. Animesh Khemka et al.: Inversion of flow fields from sensor network data. (2005) authored by Charles A. Bouman. Yan Huang et al.: New algorithms for best local cosine basis search. (2004) authored by Charles A. Bouman. Leonardo R. Bachega and Charles A. Bouman: Distributed vector decorrelation and anomaly detection using the vector Sparse Matrix Transform. (2014) authored by Charles A. Bouman. Guangzhi Cao et al.: High dimensional regression using the sparse matrix transform (SMT). (2010) authored by Charles A. Bouman. Maribel Figuera et al.: Hardware-friendly mixed content compression algorithm. (2009) authored by Charles A. Bouman. Leonardo R. Bachega et al.: Fast signal analysis and decomposition on graphs using the Sparse Matrix Transform. (2010) authored by Charles A. Bouman. G. M. Dilshan Godaliyadda et al.: A Supervised Learning Approach for Dynamic Sampling. (2016) authored by Charles A. Bouman. Yan Zhang et al.: SLADS-Net: Supervised Learning Approach for Dynamic Sampling using Deep Neural Networks. (2018) authored by Charles A. Bouman. Charles A. Bouman: An advanced input-output system for a COBOL compiler. (1962) authored by Charles A. Bouman. Cüneyt M. Taskiran et al.: ViBE video database system: an update and further studies. (2000) authored by Charles A. Bouman. Guangzhi Cao et al.: The Sparse Matrix Transform for Covariance Estimation and Analysis of High Dimensional Signals. (2011) authored by Charles A. Bouman. Cüneyt M. Taskiran et al.: Stochastic Models of Video Structure for Program Genre Detection. (2003) authored by Charles A. Bouman. James Z. Chang et al.: Sequential linear interpolation of multidimensional functions. (1997) authored by Charles A. Bouman. Cristian C. Constantinescu et al.: Nonparametric Extraction of Transient Changes in Neurotransmitter Concentration From Dynamic PET Data. (2007) authored by Charles A. Bouman. Gregery T. Buzzard et al.: Plug-and-Play Unplugged: Optimization-Free Reconstruction Using Consensus Equilibrium. (2018) authored by Charles A. Bouman. Gregery T. Buzzard et al.: Plug-and-Play Unplugged: Optimization Free Reconstruction using Consensus Equilibrium. (2017) authored by Charles A. Bouman. Khalid W. Khawaja et al.: A multiscale assembly inspection algorithm. (1996) authored by Charles A. Bouman. Suhail S. Saquib et al.: A non-homogeneous MRF model for multiresolution Bayesian estimation. (1996) authored by Charles A. Bouman. Guangzhi Cao and Charles A. Bouman: Covariance Estimation for High Dimensional Data Vectors Using the Sparse Matrix Transform. (2008) authored by Charles A. Bouman. Ilya Pollak et al.: Parameter estimation for spatial random trees using the EM algorithm. (2003) authored by Charles A. Bouman. Yandong Guo et al.: Text line detection based on cost optimized local text line direction estimation. (2015) authored by Charles A. Bouman. Seungseok Oh et al.: A general framework for nonlinear multigrid inversion. (2005) authored by Charles A. Bouman. Yan Huang et al.: Optimal representations in multitree dictionaries with application to compression. (2005) authored by Charles A. Bouman. Jeffrey H. Fischer et al.: Wide-band packet radio technology. (1987) authored by Charles A. Bouman. Hui Cheng et al.: Rate-distortion-based segmentation for MRC compression. (2002) authored by Charles A. Bouman. Yan Huang et al.: Best basis search in lapped dictionaries. (2006) authored by Charles A. Bouman. Jeffery H. Fischer et al.: Wide-band packet radio for multipath environments. (1988) authored by Charles A. Bouman. Seong Wook Han et al.: AM/FM halftoning: improved cost function and training framework. (2007) authored by Charles A. Bouman. Seungseok Oh et al.: Nonlinear multigrid inversion. (2003) authored by Charles A. Bouman. Yan Huang et al.: Fast Search for Best Representations in Multitree Dictionaries. (2006) authored by Charles A. Bouman. Eri Haneda et al.: Segmentation for MRC compression. (2007) authored by Charles A. Bouman. Soumendu Majee et al.: A Model Based Neuron Detection Approach using Sparse Location Priors. (2017) authored by Charles A. Bouman. Hui Cheng and Charles A. Bouman: Multiscale Bayesian segmentation using a trainable context model. (2001) authored by Charles A. Bouman'}. \n\nThis article about an American electrical engineer is a stub output format: answer
National Academy of Inventors
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Where did the author of Aeroquake: Drone Augmented Dance obtain his undergraduate degree? Context: Sherry Ruan et al.: Comparing Speech and Keyboard Text Entry for Short Messages in Two Languages on Touchscreen Phones. (2017) authored by James A. Landay. Jackie Yang et al.: ReactGenie: An Object-Oriented State Abstraction for Complex Multimodal Interactions Using Large Language Models. (2023) authored by James A. Landay. Xiaodong Jiang and James A. Landay: Modeling Privacy Control in Context-Aware Systems. (2002) authored by James A. Landay. Nancy Xu et al.: Grounding Open-Domain Instructions to Automate Web Support Tasks. (2021) authored by James A. Landay. Nancy Xu et al.: Grounding Open-Domain Instructions to Automate Web Support Tasks. (2021) authored by James A. Landay. Danaë Metaxa et al.: Search Media and Elections: A Longitudinal Investigation of Political Search Results. (2019) authored by James A. Landay. Susumu Harada et al.: VoiceLabel: using speech to label mobile sensor data. (2008) authored by James A. Landay. Allison Woodruff et al.: Constant Density Visualizations of Non-Uniform Distributions of Data. (1998) authored by James A. Landay. Jon Froehlich et al.: The design and evaluation of prototype eco-feedback displays for fixture-level water usage data. (2012) authored by James A. Landay. Sherry Ruan et al.: Speech Is 3x Faster than Typing for English and Mandarin Text Entry on Mobile Devices. (2016) authored by James A. Landay. Michelle S. Lam et al.: End-User Audits: A System Empowering Communities to Lead Large-Scale Investigations of Harmful Algorithmic Behavior. (2022) authored by James A. Landay. Susumu Harada et al.: Voicepen: augmenting pen input with simultaneous non-linguisitic vocalization. (2007) authored by James A. Landay. Michael Toomim et al.: Attaching UI enhancements to websites with end users. (2009) authored by James A. Landay. Michael Toomim et al.: Access control by testing for shared knowledge. (2008) authored by James A. Landay. Douglas K. Van Duyne et al.: The Design of Sites - Patterns for Creating Winning Web Sites (2. ed.). (2007) authored by James A. Landay. Jessica R. Cauchard et al.: Proceedings of the 2015 Workshop on Future Mobile User Interfaces, FutureMobileUI@MobiSys 2015, Florence, Italy, May 18, 2015 (2015) edited by James A. Landay. Darren Edge et al.: MemReflex: adaptive flashcards for mobile microlearning. (2012) authored by James A. Landay. Darren Edge et al.: MemReflex: adaptive flashcards for mobile microlearning. (2012) authored by James A. Landay. Michael Toomim et al.: Utility of human-computer interactions: toward a science of preference measurement. (2011) authored by James A. Landay. Kesler W. Tanner et al.: Poirot: A Web Inspector for Designers. (2019) authored by James A. Landay. Jason I. Hong et al.: End-user perceptions of formal and informal representations of web sites. (2001) authored by James A. Landay. Jason I. Hong et al.: Privacy risk models for designing privacy-sensitive ubiquitous computing systems. (2004) authored by James A. Landay. Yang Li et al.: Experimental analysis of mode switching techniques in pen-based user interfaces. (2005) authored by James A. Landay. Yang Li et al.: FrameWire: a tool for automatically extracting interaction logic from paper prototyping tests. (2010) authored by James A. Landay. Sharon J. Laskowski et al.: Automatic capture, representation, and analysis of user behavior. (2002) authored by James A. Landay. Nina Zhuxiaona Wei and James A. Landay: Evaluating Speech-Based Smart Devices Using New Usability Heuristics. (2018) authored by James A. Landay'}. You can help Wikipedia by expanding it output format: answer
C
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Who is the advisor of Robert T. Morris, a graduate student of the author of 'Concurrent Manipulation of Binary Search Trees'? Context: Hsieh-Chung Chen et al.: Nonlinear compressive sensing for distorted measurements and application to improving efficiency of power amplifiers. (2017) authored by H. T. Kung 0001. H. T. Kung et al.: Localization with snap-inducing shaped residuals (SISR): coping with errors in measurement. (2009) authored by H. T. Kung 0001. Marcus Z. Comiter and H. T. Kung: Localization Convolutional Neural Networks Using Angle of Arrival Images. (2018) authored by H. T. Kung 0001. Xin Dong et al.: Neural Mean Discrepancy for Efficient Out-of-Distribution Detection. (2022) authored by H. T. Kung 0001. Miriam Cha et al.: Language Modeling by Clustering with Word Embeddings for Text Readability Assessment. (2017) authored by H. T. Kung 0001. Miriam Cha et al.: Language Modeling by Clustering with Word Embeddings for Text Readability Assessment. (2017) authored by H. T. Kung 0001. Marcus Z. Comiter et al.: Millimeter-Wave Field Experiments with Many Antenna Configurations for Indoor Multipath Environments. (2017) authored by H. T. Kung 0001. H. T. Kung alternativeName Hanwei Kung. Youngjune Gwon and H. T. Kung: Inferring Origin Flow Patterns in Wi-Fi with Deep Learning. (2014) authored by H. T. Kung 0001. Marcus Z. Comiter et al.: A Data-Driven Approach to Localization for High Frequency Wireless Mobile Networks. (2017) authored by H. T. Kung 0001. Hsieh-Chung Chen et al.: Compressive wireless pulse sensing. (2015) authored by H. T. Kung 0001. Hsieh-Chung Chen et al.: Determining RF angle of arrival using COTS antenna arrays: A field evaluation. (2012) authored by H. T. Kung 0001. Chia-Hsin Huang et al.: Use of Content Tags in Managing Advertisements for Online Videos. (2008) authored by H. T. Kung 0001. Michael J. Foster and H. T. Kung: Design of Special-Purpose VLSI Chips: Example and Opinions. (1980) authored by H. T. Kung 0001. H. T. Kung et al.: CloudSense: Continuous Fine-Grain Cloud Monitoring with Compressive Sensing. (2011) authored by H. T. Kung 0001. Youngjune Gwon et al.: Compressive sensing with optimal sparsifying basis and applications in spectrum sensing. (2012) authored by H. T. Kung 0001. Tsung-Han Lin and H. T. Kung: Compressive sensing medium access control for wireless LANs. (2012) authored by H. T. Kung 0001. H. T. Kung alternativeName Hao‐Ting Kung. James R. Williamson et al.: Detecting Depression using Vocal, Facial and Semantic Communication Cues. (2016) authored by H. T. Kung 0001. Sai Qian Zhang et al.: A Machine Learning Assisted Cell Selection Method for Drones in Cellular Networks. (2018) authored by H. T. Kung 0001. Miriam Cha et al.: Improving Sar Automatic Target Recognition Using Simulated Images Under Deep Residual Refinements. (2018) authored by H. T. Kung 0001. Xin Dong et al.: Lightweight Detection of Out-of-Distribution and Adversarial Samples via Channel Mean Discrepancy. (2021) authored by H. T. Kung 0001. Stephen J. Tarsa and H. T. Kung: Output compression for IC fault detection using compressive sensing. (2012) authored by H. T. Kung 0001. Zong Da Chen et al.: Ad hoc relay wireless networks over moving vehicles on highways. (2001) authored by H. T. Kung 0001. Chen-Mou Cheng et al.: Performance Measurement of 802.11a Wireless Links from UAV to Ground Nodes with Various Antenna Orientations. (2006) authored by H. T. Kung 0001. Yi-Min Tsai et al.: A Chip Architecture for Compressive Sensing Based Detection of IC Trojans. (2012) authored by H. T. Kung 0001. Roberto Bisiani et al.: MISE: Machine for In-System Evaluation of Custom VLSI Chips for Real-Time Systems. (1982) authored by H. T. Kung 0001\nKung was born in Shanghai on November 9, 1945, and grew up in Taiwan. '}. Kung received his bachelor\'s degree in mathematics from National Tsing Hua University in 1968, before moving to the United States. Kung is also a Guggenheim Fellow, member of the Academia Sinica in Taiwan, and president of the Taiwan AI Academy. D. D. From 1999 to 2006, Kung co-chaired a joint Ph. Renewed interest in systolic arrays for deep learning has led Kung to again contribute to hardware for artificial intelligence, including distributed and embedded low-precision neural networks output format: answer
H. T. Kung
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: In what year was the author recognized as an Early Tenure Inventor at IBM in Austin, Texas? Context: Jessica S. Ancker et al.: Should parents see teens' medical records? Answers change when people are prompted to consider teens' risky behavior. (2018) authored by Lauren Wilcox. Jessica S. Ancker et al.: Should parents see their teen's medical record? Asking about the effect on adolescent-doctor communication changes attitudes. (2018) authored by Lauren Wilcox. Lauren Wilcox et al.: Interactive tools for inpatient medication tracking: a multi-phase study with cardiothoracic surgery patients. (2016) authored by Lauren Wilcox. Jennifer E. Prey et al.: Patient engagement in the inpatient setting: a systematic review. (2014) authored by Lauren Wilcox. Mark Schurgin et al.: Isolation in Coordination: Challenges of Caregivers in the USA. (2021) authored by Lauren Wilcox. Lauren Wilcox et al.: Characterizing patient-friendly "micro-explanations"of medical events. (2011) authored by Lauren Wilcox. Lauren Wilcox alternativeName Lauren Wilcox. Marianne Sharko et al.: Variability in adolescent portal privacy features: how the unique privacy needs of the adolescent patient create a complex decision-making process. (2018) authored by Lauren Wilcox. Christina Kelley et al.: Design Features in Games for Health: Disciplinary and Interdisciplinary Expert Perspectives. (2017) authored by Lauren Wilcox. Matthew K. Hong et al.: Visual ODLs: Co-Designing Patient-Generated Observations of Daily Living to Support Data-Driven Conversations in Pediatric Care. (2018) authored by Lauren WilcoxS. S. D. D output format: answer
Not specified
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: For what contributions was the author named an IEEE Fellow in 2018? Context: Yunhui Guo et al.: Depthwise Convolution is All You Need for Learning Multiple Visual Domains. (2019) authored by Tajana Rosing. Yunhui Guo et al.: Depthwise Convolution Is All You Need for Learning Multiple Visual Domains. (2019) authored by Tajana Rosing. Mohsen Imani et al.: Efficient neural network acceleration on GPGPU using content addressable memory. (2017) authored by Tajana Rosing. Behnam Khaleghi et al.: PatterNet: explore and exploit filter patterns for efficient deep neural networks. (2022) authored by Tajana Rosing. Baris Aksanli and Tajana Rosing: Optimal battery configuration in a residential home with time-of-use pricing. (2013) authored by Tajana Rosing. Michael H. Ostertag et al.: Trajectory Planning and Optimization for Minimizing Uncertainty in Persistent Monitoring Applications. (2022) authored by Tajana Rosing. Behnam Khaleghi et al.: Revisiting FPGA Routing under Varying Operating Conditions. (2020) authored by Tajana Rosing. Mohsen Imani et al.: Hierarchical design of robust and low data dependent FinFET based SRAM array. (2015) authored by Tajana Rosing. Gaurav Dhiman et al.: PDRAM: a hybrid PRAM and DRAM main memory system. (2009) authored by Tajana Rosing. Mohsen Imani et al.: NVQuery: Efficient Query Processing in Nonvolatile Memory. (2019) authored by Tajana Rosing. Xiaofan Yu et al.: Async-HFL: Efficient and Robust Asynchronous Federated Learning in Hierarchical IoT Networks. (2023) authored by Tajana Rosing. Xiaofan Yu et al.: Async-HFL: Efficient and Robust Asynchronous Federated Learning in Hierarchical IoT Networks. (2023) authored by Tajana Rosing. Rajib Nath et al.: Temperature aware thread block scheduling in GPGPUs. (2013) authored by Tajana Rosing. Onat Güngör et al.: CAHEROS: Constraint-Aware HEuristic Approach for RObust Sensor Placement. (2021) authored by Tajana Rosing. Henrique Rodrigues et al.: Dynamic Optical Switching for Latency Sensitive Applications. (2015) authored by Tajana Rosing. Yeseong Kim et al.: CAUSE: Critical Application Usage-Aware Memory System using Non-volatile Memory for Mobile Devices. (2015) authored by Tajana Rosing. Onat Güngör et al.: RESPIRE: Robust Sensor Placement Optimization in Probabilistic Environments. (2020) authored by Tajana Rosing. Saransh Gupta et al.: RAPID: A ReRAM Processing in-Memory Architecture for DNA Sequence Alignment. (2019) authored by Tajana Rosing. Francesco Paterna et al.: Ambient variation-tolerant and inter components aware thermal management for mobile system on chips. (2014) authored by Tajana Rosing. Mohsen Imani et al.: Multi-Stage Tunable Approximate Search in Resistive Associative Memory. (2018) authored by Tajana Rosing. Xiao Liu et al.: FPRA: A Fine-grained Parallel RRAM Architecture. (2021) authored by Tajana Rosing. Jason Ma et al.: Frequency-aware Trajectory and Power Control for Multi-UAV Systems. (2021) authored by Tajana Rosing. Daniel Peroni et al.: ARGA: Approximate Reuse for GPGPU Acceleration. (2019) authored by Tajana Rosing. Onat Güngör et al.: DENSE-DEFENSE: Diversity Promoting Ensemble Adversarial Training Towards Effective Defense. (2022) authored by Tajana Rosing. Shruti Patil et al.: Characterization of User's Behavior Variations for Design of Replayable Mobile Workloads. (2015) authored by Tajana Rosing. Armita Peymandoust et al.: Complex instruction and software library mapping for embedded software using symbolic algebra. (2003) authored by Tajana Rosing. Jinhao Liu et al.: Self-Train: Self-Supervised On-Device Training for Post-Deployment Adaptation. (2022) authored by Tajana Rosing. Yunhui Guo et al.: AdaFilter: Adaptive Filter Fine-Tuning for Deep Transfer Learning. (2020) authored by Tajana Rosing. Pietro Mercati et al.: A Linux-governor based Dynamic Reliability Manager for android mobile devices. (2014) authored by Tajana Rosing. Pietro Mercati et al.: VarDroid: Online Variability Emulation in Android/Linux Platforms. (2016) authored by Tajana Rosing. Jagannathan Venkatesh et al.: A Modular Approach to Context-Aware IoT Applications. (2016) authored by Tajana Rosing. Mohammad Moghimi et al.: Context-Aware Mobile Power Management Using Fuzzy Inference as a Service. (2012) authored by Tajana Rosing. Mohsen Imani et al.: Low power data-aware STT-RAM based hybrid cache architecture. (2016) authored by Tajana Rosing. Minxuan Zhou et al.: PIM-DL: Boosting DNN Inference on Digital Processing In-Memory Architectures via Data Layout Optimizations. (2021) authored by Tajana Rosing. Mohamed M. Sabry et al.: Energy-Efficient Multiobjective Thermal Control for Liquid-Cooled 3-D Stacked Architectures. (2011) authored by Tajana Rosing. Uday Mallappa et al.: TermiNETor: Early Convolution Termination for Efficient Deep Neural Networks. (2022) authored by Tajana Rosing. Kazim Ergun et al.: Reinforcement learning based reliability-aware routing in IoT networks. (2022) authored by Tajana Rosing. Pietro Mercati et al.: BLAST: Battery Lifetime-constrained Adaptation with Selected Target in Mobile Devices. (2015) authored by Tajana Rosing. Yunhui Guo et al.: AdaFilter: Adaptive Filter Fine-tuning for Deep Transfer Learning. (2019) authored by Tajana Rosing. Tajana Rosing name Tajana Rosing. Joonseop Sim et al.: UPIM: Unipolar Switching Logic for High Density Processing-in-Memory Applications. (2019) authored by Tajana Rosing. Onat Güngör et al.: STEWART: STacking Ensemble for White-Box AdversaRial Attacks Towards more resilient data-driven predictive maintenance. (2022) authored by Tajana Rosing. Mohsen Imani et al.: GenPIM: Generalized processing in-memory to accelerate data intensive applications. (2018) authored by Tajana Rosing and Susan M. '} output format: answer
power and reliability management of Systems-on-Chip
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: In which year did the researcher who published the paper 'Secure End-to-End Communication with Optimal Throughput and Resilience against Malicious Adversary' receive a Ph.D.? Context: Nishanth Chandran et al.: Improved algorithms for optimal embeddings. (2008) authored by Rafail Ostrovsky. Nishanth Chandran et al.: Improved Algorithms for Optimal Embeddings. (2006) authored by Rafail Ostrovsky. Vladimir Braverman and Rafail Ostrovsky: Smooth Histograms for Sliding Windows. (2007) authored by Rafail Ostrovsky. Alain J. Mayer et al.: Self-Stabilizing Symmetry Breaking in Constant-Space (Extended Abstract) (1992) authored by Rafail Ostrovsky. Vladimir Braverman et al.: Weighted sampling without replacement from data streams. (2015) authored by Rafail Ostrovsky. Vladimir Braverman et al.: Weighted Sampling Without Replacement from Data Streams. (2015) authored by Rafail Ostrovsky. Xiaoqi Duan et al.: ACCO: Algebraic Computation with Comparison. (2021) authored by Rafail Ostrovsky. Brett Hemenway et al.: Local Correctability of Expander Codes. (2013) authored by Rafail Ostrovsky. Arman Yousefi and Rafail Ostrovsky: Improved Approximation Algorithms for Earth-Mover Distance in Data Streams. (2014) authored by Rafail Ostrovsky. Eyal Kushilevitz et al.: Efficient Search for Approximate Nearest Neighbor in High Dimensional Spaces. (2000) authored by Rafail Ostrovsky. Rafail Ostrovsky et al.: Efficient Consistency Proofs for Generalized Queries on a Committed Database. (2004) authored by Rafail Ostrovsky. Rafail Ostrovsky et al.: Efficient Consistency Proofs for Generalized Queries on a Committed Database. (2004) authored by Rafail Ostrovsky. Julia Chuzhoy et al.: Approximation Algorithms for the Job Interval Selection Problem and Related Scheduling Problems. (2001) authored by Rafail Ostrovsky. Rafail Ostrovsky and William E. Skeith III: A Survey of Single-Database Private Information Retrieval: Techniques and Applications. (2007) authored by Rafail Ostrovsky. Farhad Hormozdiari et al.: Privacy preserving protocol for detecting genetic relatives using rare variants. (2014) authored by Rafail Ostrovsky. Julia Chuzhoy et al.: Approximation Algorithms for the Job Interval Selection Problem and Related Scheduling Problems. (2006) authored by Rafail Ostrovsky. Rafail Ostrovsky and Yuval Rabani: Polynomial Time Approximation Schemes for Geometric k-Clustering. (2000) authored by Rafail Ostrovsky. Alain J. Mayer et al.: Self-Stabilizing Algorithms for Synchronous Unidirectional Rings. (1996) authored by Rafail Ostrovsky. Brett Hemenway et al.: Local Correctability of Expander Codes (2013) authored by Rafail Ostrovsky. Vladimir Braverman et al.: Optimal sampling from sliding windows. (2012) authored by Rafail Ostrovsky. Sandip Banerjee et al.: Min-Sum Clustering (with Outliers). (2020) authored by Rafail Ostrovsky. Sandip Banerjee et al.: Min-Sum Clustering (With Outliers). (2021) authored by Rafail Ostrovsky. Brett Hemenway et al.: Local correctability of expander codes. (2015) authored by Rafail Ostrovsky. Paul Bunn and Rafail Ostrovsky: Oblivious Sampling with Applications to Two-Party k-Means Clustering. (2020) authored by Rafail Ostrovsky. Allan Borodin et al.: Subquadratic Approximation Algorithms for Clustering Problems in High Dimensional Spaces. (2004) authored by Rafail Ostrovsky. Vladimir Braverman et al.: Optimal sampling from sliding windows. (2009) authored by Rafail Ostrovsky. Eyal Kushilevitz et al.: Efficient Search for Approximate Nearest Neighbor in High Dimensional Spaces. (1998) authored by Rafail Ostrovsky. Allan Borodin et al.: Subquadratic Approximation Algorithms for Clustering Problems in High Dimensional Spaces. (1999) authored by Rafail Ostrovsky. Rafail Ostrovsky and Yuval Rabani: Polynomial-time approximation schemes for geometric min-sum median clustering. (2002) authored by Rafail Ostrovsky. Rafail Ostrovsky 2YrMeanCitedness 1.0232558250427246094. Rafail Ostrovsky and William E. Skeith III: A Survey of Single Database PIR: Techniques and Applications. (2007) authored by Rafail Ostrovsky. Rafail Ostrovsky and Yuval Rabani: Low distortion embeddings for edit distance. (2007) authored by Rafail Ostrovsky. Vladimir Braverman et al.: Streaming k-means on Well-Clusterable Data. (2011) authored by Rafail Ostrovsky. Ran Gelles et al.: Efficient Error-Correcting Codes for Sliding Windows. (2014) authored by Rafail Ostrovsky. Rafail Ostrovsky and Yuval Rabani: Low distortion embeddings for edit distance. (2005) authored by Rafail Ostrovsky. Rafail Ostrovsky: HOLMES-I, a prolog-based reason maintenance system for collecting information from multiple experts. (1986) authored by Rafail Ostrovsky. Ran Gelles et al.: Efficient Error-Correcting Codes for Sliding Windows. (2020) authored by Rafail Ostrovsky. Alain J. Mayer et al.: Self-Stabilizing Symmetry Breaking in Constant Space. (2002) authored by Rafail Ostrovsky. Surya Addanki et al.: Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares. (2022) authored by Rafail Ostrovsky. Rafail Ostrovsky is Creator. Surya Addanki et al.: Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares. (2021) authored by Rafail Ostrovsky. Eyal Kushilevitz and Rafail Ostrovsky: One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval. (2000) authored by Rafail Ostrovsky. Vladimir Braverman et al.: Zero-One Laws for Sliding Windows and Universal Sketches. (2015) authored by Rafail Ostrovsky. Fabrizio Grandoni et al.: A Refined Approximation for Euclidean k-Means. (2021) authored by Rafail Ostrovsky. Michele Ciampi et al.: Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions. (2023) authored by Rafail Ostrovsky. Rafail Ostrovsky name Rafail Ostrovsky. Fabrizio Grandoni et al.: A refined approximation for Euclidean k-means. (2022) authored by Rafail Ostrovsky. Yevgeniy Dodis et al.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. (2008) authored by Rafail Ostrovsky. Rafail Ostrovsky is Person. Nir Bitansky et al.: Succinct Non-Interactive Arguments via Linear Interactive Proofs. (2012) authored by Rafail OstrovskyD. from MIT in 1992 output format: answer
2013
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the type of organization of the author who wrote the book 'Rate coherence and event coherence in the visual cortex: a neuronal model of object recognition'? Context: Joseph C. Bardin et al.: Design and Characterization of a 28-nm Bulk-CMOS Cryogenic Quantum Controller Dissipating Less Than 2 mW at 3 K. (2019) authored by Hartmut Neven. Joseph C. Bardin et al.: A 28nm Bulk-CMOS 4-to-8GHz ¡2mW Cryogenic Pulse Modulator for Scalable Quantum Computing. (2019) authored by Hartmut Neven. Hartmut Neven modified 2023-10-18. Hartmut Neven alternativeName Hartmut Neven. Andrew D. King et al.: Scaling advantage in quantum simulation of geometrically frustrated magnets. (2019) authored by Hartmut Neven. Ian D. Kivlichan et al.: Improved Fault-Tolerant Quantum Simulation of Condensed-Phase Correlated Electrons via Trotterization. (2020) authored by Hartmut Neven. Hartmut Neven alternativeName H. Neven. Masoud Mohseni et al.: Nonequilibrium Monte Carlo for unfreezing variables in hard combinatorial optimization. (2021) authored by Hartmut Neven. Hartmut Neven alternativeName Neven Hartmut His team completed the first prototype, codenamed Ant, in 2011. In 2014 he invited John M. D. "'}. In 1996 he received his Ph. Quantum supremacy was then declared by Google in October 2019. Martinis and his group at UC Santa Barbara to join the lab to start a fabrication facility for superconducting quantum processors. He received a scholarship from the Studienstiftung des Deutschen Volkes, Germany’s most prestigious scholarship foundation output format: answer
company
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Between the authors of the papers 'Excessive Gap Technique in Nonsmooth Convex Minimization' and 'Editorial', who has a higher count of citations? Context: Natalia Larios et al.: Automated insect identification through concatenated histograms of local appearance features: feature vector generation and region detection for deformable objects. (2008) authored by Thomas G. Dietterich. Sean McGregor et al.: Facilitating testing and debugging of Markov Decision Processes with interactive visualization. (2015) authored by Thomas G. Dietterich. Sean McGregor et al.: Facilitating testing and debugging of Markov Decision Processes with interactive visualization. (2015) authored by Thomas G. Dietterich. Dídac Busquets et al.: A Multi-agent Architecture Integrating Learning and Fuzzy Techniques for Landmark-Based Robot Navigation. (2002) authored by Thomas G. Dietterich. Sean McGregor et al.: MDPVIS: An Interactive Visualization for Testing Markov Decision Processes. (2015) authored by Thomas G. Dietterich. Michael Lam et al.: Learning to Detect Basal Tubules of Nematocysts in SEM Images. (2013) authored by Thomas G. Dietterich. Sean McGregor et al.: Interactive visualization for testing Markov Decision Processes: MDPVIS. (2017) authored by Thomas G. Dietterich. Ethan W. Dereszynski et al.: Learning Probabilistic Behavior Models in Real-Time Strategy Games. (2011) authored by Thomas G. Dietterich. Thomas G. Dietterich and Ghulum Bakiri: Error-Correcting Output Codes: A General Method for Improving Multiclass Inductive Learning Programs. (1991) authored by Thomas G. Dietterich. Paul Barford et al.: Cyber SA: Situational Awareness for Cyber Defense. (2010) authored by Thomas G. Dietterich. Jianqiang Shen et al.: Detecting and correcting user activity switches: algorithms and interfaces. (2009) authored by Thomas G. Dietterich. Simone Stumpf et al.: Improving Intelligent Assistants for Desktop Activities. (2007) authored by Thomas G. Dietterich. Simone Stumpf et al.: Improving Intelligent Assistants for Desktop Activities. (2007) authored by Thomas G. Dietterich. Jianqiang Shen et al.: A hybrid learning system for recognizing user tasks from desktop activities and email messages. (2006) authored by Thomas G. Dietterich. Luc De Raedt et al.: Probabilistic, Logical and Relational Learning - A Further Synthesis, 15.04. - 20.04.2007 (2008) edited by Thomas G. Dietterich. Natalia Larios et al.: Automated Insect Identification through Concatenated Histograms of Local Appearance Features. (2007) authored by Thomas G. Dietterich. Erich Merrill et al.: Deep Convolution for Irregularly Sampled Temporal Point Clouds. (2021) authored by Thomas G. Dietterich. Luc De Raedt et al.: Probabilistic, Logical and Relational Learning - Towards a Synthesis, 30. January - 4. February 2005 (2006) edited by Thomas G. Dietterich. Jesse Hostetler et al.: Inferring Strategies from Limited Reconnaissance in Real-time Strategy Games. (2012) authored by Thomas G. Dietterich. Thomas G. Dietterich et al.: Machine Learning Methods for High Level Cyber Situation Awareness. (2010) authored by Thomas G. Dietterich. Anton N. Dragunov et al.: TaskTracer: a desktop environment to support multi-tasking knowledge workers. (2005) authored by Thomas G. Dietterich. Jianqiang Shen et al.: Real-Time Detection of Task Switches of Desktop Users. (2007) authored by Thomas G. Dietterich. Natalia Larios Delgado et al.: Stacked spatial-pyramid kernel: An object-class recognition method to combine scores from random trees. (2011) authored by Thomas G. Dietterich. Xiaoqin Zhang et al.: An Ensemble Architecture for Learning Complex Problem-Solving Techniques from Demonstration. (2012) authored by Thomas G. Dietterich. Thomas G. Dietterich et al.: Discovering and Removing Exogenous State Variables and Rewards for Reinforcement Learning. (2018) authored by Thomas G. Dietterich. Thomas G. Dietterich et al.: Discovering and Removing Exogenous State Variables and Rewards for Reinforcement Learning. (2018) authored by Thomas G. Dietterich. Thomas G. Dietterich and Xinlong Bao: Integrating Multiple Learning Components through Markov Logic. (2008) authored by Thomas G. Dietterich. Jesse Hostetler et al.: Inferring Strategies from Limited Reconnaissance in Real-time Strategy Games (2012) authored by Thomas G. Dietterich. Alexander Guyer and Thomas G. Dietterich: Will My Robot Achieve My Goals? Predicting the Probability that an MDP Policy Reaches a User-Specified Behavior Target. (2022) authored by Thomas G. Dietterich And so if there\'s some way that I can use my technical skills to improve both the science base and the tools needed for policy and management decisions, then I would like to do that. I am passionate about that. Machine learning can uncover patterns in data to model the migration of species. \nI realized I wanted to have an impact on something that really mattered – and certainly the whole Earth\'s ecosystem, of which we are a part, is under threat in so many ways. D. His family later moved to New Jersey and then again to Illinois, where Tom graduated from Naperville Central High School. in 1984 and moved to Corvallis, Oregon, where he was hired as an assistant professor in computer science. But to the extent that computer systems are given increasingly dangerous tasks, and asked to learn from and interpret their experiences, he said they may simply make mistakes. First, he is interested in the fundamental questions of artificial intelligence and how machine learning can provide the basis for building integrated intelligent systems output format: answer
Yurii Nesterov
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Where did the author who works on Technology and the inward turn of faith earn his A.B. degree from? Context: Rogério Schmidt Feris et al.: Hierarchical Wavelet Networks for Facial Feature Localization. (2002) authored by Kentaro Toyama. Kentaro Toyama alternativeName Kentaro Toyama. Ming-Yang Kao et al.: An Optimal Parallel Algorithm for Planar Cycle Separators. (1995) authored by Kentaro Toyama. Kentaro Toyama alternativeName Toyama. Kentaro Toyama name Kentaro Toyama. Kentaro Toyama member of Michigan United. Kentaro Toyama et al.: Servomatic: a modular system for robust positioning using stereo visual servoing. (1996) authored by Kentaro Toyama. Kentaro Toyama alternativeName K. Toyama. Ramaswamy Hariharan and Kentaro Toyama: Project Lachesis: Parsing and Modeling Location Histories. (2004) authored by Kentaro Toyama. Nisha Mohan et al.: Food-availability SMS system for U.S. homeless communities. (2019) authored by Kentaro Toyama. Amna Batool et al.: Maternal Complications: Nuances in Mobile Interventions for Maternal Health in Urban Pakistan. (2017) authored by Kentaro Toyama. Antonio Criminisi et al.: Region filling and object removal by exemplar-based image inpainting. (2004) authored by Kentaro Toyama. Saleema Amershi et al.: Multiple mouse text entry for single-display groupware. (2010) authored by Kentaro Toyama. Kentaro Toyama i10Index 94. Gregory D. Hager and Kentaro Toyama: X Vision: Combining Image Warping and Geometric Constraints for Fast Visual Tracking. (1996) authored by Kentaro Toyama. Gregory D. Hager et al.: Feature-Based Visual Servoing and its Application to Telerobotics. (1994) authored by Kentaro Toyama. Kentaro Toyama modified 2023-10-18. Hemant D. Tagare et al.: A Maximum-Likelihood Strategy for Directing Attention during Visual Search. (2001) authored by Kentaro Toyama K. D. '}. B output format: answer
Harvard University
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the two-year mean citedness of the author of the publication in TABLEAUX 1999? Context: Ognjen Savkovic et al.: Theoretical Characterization of Signal Diagnostic Processing Language. (2018) authored by Ian Horrocks 0001. Martin Ringsquandl et al.: Event-Enhanced Learning for KG Completion. (2018) authored by Ian Horrocks 0001. Ouns El Harzli et al.: Minimal Explanations for Neural Network Predictions. (2022) authored by Ian Horrocks 0001. Evgeny Kharlamov et al.: Semantic Rules for Machine Diagnostics: Execution and Management. (2017) authored by Ian Horrocks 0001. Gulnar Mehdi et al.: Semantic Rule-Based Equipment Diagnostics. (2017) authored by Ian Horrocks 0001. Evgeny Kharlamov et al.: Diagnostics of Trains with Semantic Diagnostics Rules. (2018) authored by Ian Horrocks 0001. Gulnar Mehdi et al.: Semantic Rule-Based Equipment Diagnostic. (2017) authored by Ian Horrocks 0001. Despoina Magka et al.: Modelling Structured Domains Using Description Graphs and Logic Programming. (2012) authored by Ian Horrocks 0001. Despoina Magka et al.: Modelling Structured Domains Using Description Graphs and Logic Programming. (2012) authored by Ian Horrocks 0001. Giorgos Stoilos et al.: Reasoning with Very Expressive Fuzzy Description Logics. (2007) authored by Ian Horrocks 0001. Mikalai Yatskevich et al.: Beazley: a new storage systems evaluation. (2010) authored by Ian Horrocks 0001. Gulnar Mehdi et al.: SemDia: Semantic Rule-Based Equipment Diagnostics Tool. (2017) authored by Ian Horrocks 0001. Jiaoyan Chen et al.: Knowledge-aware Zero-Shot Learning: Survey and Perspective. (2021) authored by Ian Horrocks 0001. Jiaoyan Chen et al.: Knowledge-aware Zero-Shot Learning: Survey and Perspective. (2021) authored by Ian Horrocks 0001. Sean Bechhofer et al.: The OWL Instance Store: System Description. (2005) authored by Ian Horrocks 0001. Jiaoyan Chen et al.: Knowledge-based Transfer Learning Explanation. (2018) authored by Ian Horrocks 0001. Jiaoyan Chen et al.: Knowledge-Based Transfer Learning Explanation. (2018) authored by Ian Horrocks 0001. Birte Glimm et al.: Optimized Description Logic Reasoning via Core Blocking. (2010) authored by Ian Horrocks 0001. Benjamin N. Grosof et al.: Description logic programs: combining logic programs with description logic. (2003) authored by Ian Horrocks 0001. Herald Kllapi et al.: Distributed Query Processing on the Cloud: the Optique Point of View (Short Paper). (2013) authored by Ian Horrocks 0001. Ian Horrocks name Ian Horrocks. Jiaoyan Chen et al.: Low-resource Learning with Knowledge Graphs: A Comprehensive Survey. (2021) authored by Ian Horrocks 0001. Nicholas P. Roth et al.: PGX.D/Async: A Scalable Distributed Graph Pattern Matching Engine. (2017) authored by Ian Horrocks 0001. Jiaoyan Chen et al.: Zero-Shot and Few-Shot Learning With Knowledge Graphs: A Comprehensive Survey. (2023) authored by Ian Horrocks 0001. Giorgos B. Stamou et al.: A Fuzzy Extension of SWRL. (2005) authored by Ian Horrocks 0001. Ognjen Savkovic et al.: Semantic Diagnostics of Smart Factories. (2018) authored by Ian Horrocks 0001. Yuan He et al.: Language Models as Hierarchy Encoders. (2024) authored by Ian Horrocks 0001. Despoina Magka et al.: Classifying Chemicals Using Description Graphs and Logic Programming. (2012) authored by Ian Horrocks 0001. Ouns El Harzli et al.: Cardinality-Minimal Explanations for Monotonic Neural Networks. (2023) authored by Ian Horrocks 0001. Diego Calvanese et al.: The Optique Project: Towards OBDA Systems for Industry (Short Paper). (2013) authored by Ian Horrocks 0001. Ronald J. Brachman et al.: Proceedings of the 1997 International Workshop on Description Logics, Université Paris-Sud, Centre d'Orsay, Laboratoire de Recherche en Informatique LRI, France (1997) edited by Ian Horrocks 0001. Evgeny Kharlamov et al.: Capturing Industrial Information Models with Ontologies and Constraints. (2016) authored by Ian Horrocks 0001. Cristina Feier et al.: Extending the Combined Approach Beyond Lightweight Description Logics. (2015) authored by Ian Horrocks 0001. Ian Horrocks alternativeName Ian Horrocks. Sergio Tessaris et al.: Evaluating a Modular Abox Algorithm. (2002) authored by Ian Horrocks 0001. Valentina Carapella et al.: Towards the Semantic Enrichment of Free-Text Annotation of Image Quality Assessment for UK Biobank Cardiac Cine MRI Scans. (2016) authored by Ian Horrocks 0001. Ahmet Soylu et al.: Experiencing OptiqueVQS: a multi-paradigm and ontology-based visual query system for end users. (2016) authored by Ian Horrocks 0001. Giorgos Stoilos et al.: The Fuzzy Description Logic f-SHIN. (2005) authored by Ian Horrocks 0001. Theofilos Mailis et al.: Mv-Index: An Efficient Index for Graph-Query Containment. (2019) authored by Ian Horrocks 0001. Jeff Z. Pan et al.: f-SWRL: A Fuzzy Extension of SWRL. (2005) authored by Ian Horrocks 0001. Frantisek Simancik et al.: Consequence-based and fixed-parameter tractable reasoning in description logics. (2014) authored by Ian Horrocks 0001. Martin Ringsquandl et al.: On event-driven knowledge graph completion in digital factories. (2017) authored by Ian Horrocks 0001. Ian Horrocks: Implementation and Optimization Techniques. (2003) authored by Ian Horrocks 0001. Martin Ringsquandl et al.: On Event-Driven Knowledge Graph Completion in Digital Factories. (2021) authored by Ian Horrocks 0001. Evgeny Kharlamov et al.: Optique: Towards OBDA Systems for Industry. (2013) authored by Ian Horrocks 0001. Peter F. Patel-Schneider et al.: The Semantic Web - ISWC 2010 - 9th International Semantic Web Conference, ISWC 2010, Shanghai, China, November 7-11, 2010, Revised Selected Papers, Part I (2010) edited by Ian Horrocks 0001. Ian Horrocks alternativeName I. Horrocks. Lei Li and Ian Horrocks: A Software Framework for Matchmaking Based on Semantic Web Technology. (2004) authored by Ian Horrocks 0001. Despoina Magka et al.: A rule-based ontological framework for the classification of molecules. (2014) authored by Ian Horrocks 0001. Anthony Potter et al.: Dynamic Data Exchange in Distributed RDF Stores. (2018) authored by Ian Horrocks 00010 International License. \nHis research is partly funded by the Engineering and Physical Sciences Research Council (EPSRC). These languages and associated tools have been used by Open Biomedical Ontologies (OBO) Consortium, the National Cancer Institute (NCI) in America, the United Nations (UN) Food and Agriculture Organization (FAO), the World Wide Web Consortium (W3C) and a range of major corporations and government agencies output format: answer
1.2692307
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the number of papers done by the author of 'KaKs_Calculator 3.0: Calculating Selective Pressure on Coding and Non-coding Sequences'? Context: Zhang Zhang 0002 affiliation Yale University, Department of Ecology and Evolutionary Biology, New Haven, CT, USA. Xiaonan Liu et al.: GWAS Atlas: an updated knowledgebase integrating more curated associations in plants and animals. (2023) authored by Zhang Zhang 0002. Guangyi Niu et al.: Editome Disease Knowledgebase (EDK): a curated knowledgebase of editome-disease associations in human. (2019) authored by Zhang Zhang 0002. Man Li et al.: Plant editosome database: a curated database of RNA editosome in plants. (2019) authored by Zhang Zhang 0002. Rujiao Li et al.: MethBank 3.0: a database of DNA methylomes across a variety of species. (2018) authored by Zhang Zhang 0002. Mochen Zhang et al.: MethBank 4.0: an updated database of DNA methylation across a variety of species. (2023) authored by Zhang Zhang 0002. Yongbing Zhao et al.: NucMap: a database of genome-wide nucleosome positioning map across species. (2019) authored by Zhang Zhang 0002. Zhonghai Li et al.: LSD 3.0: a comprehensive resource for the leaf senescence research community. (2020) authored by Zhang Zhang 0002. Zhang Zhang alternativeName Zhang Zhang Over the past several years, Dr. In 2016, Dr. Based on the BIG Data Center, NGDC and CNCB were officially founded in 2019. Zhang co-founded the BIG Data Center and served as Executive Director responsible for the center development output format: answer
3047
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: From which institute did the writer of Tutorial I: Syntax-guided synthesis get his bachelor's degree? Context: Michael McDougall et al.: A model-based approach to integrating security policies for embedded devices. (2004) authored by Rajeev Alur. Yifei Yuan et al.: Quantitative Network Monitoring with NetQRE. (2017) authored by Rajeev Alur. Rajeev Alur et al.: Static detection of uncoalesced accesses in GPU programs. (2022) authored by Rajeev Alur. Sebastian Burckhardt et al.: CheckFence: checking consistency of concurrent data types on relaxed memory models. (2007) authored by Rajeev Alur. Rajeev Alur et al.: Space-efficient Query Evaluation over Probabilistic Event Streams. (2020) authored by Rajeev Alur. Gera Weiss et al.: Robust stability of multi-hop control networks. (2009) authored by Rajeev Alur. Anton Xue et al.: Stability Guarantees for Feature Attributions with Multiplicative Smoothing. (2023) authored by Rajeev Alur. Anton Xue et al.: Stability Guarantees for Feature Attributions with Multiplicative Smoothing. (2023) authored by Rajeev Alur. Sebastian Burckhardt et al.: Bounded Model Checking of Concurrent Data Types on Relaxed Memory Models: A Case Study. (2006) authored by Rajeev Alur. Rajeev Alur et al.: GPUDrano: Detecting Uncoalesced Accesses in GPU Programs. (2017) authored by Rajeev Alur. Pavol Cerný et al.: Model Checking of Linearizability of Concurrent List Implementations. (2010) authored by Rajeev Alur. Shaull Almagor et al.: Equilibria in Quantitative Concurrent Games. (2018) authored by Rajeev Alur. Houssam Abbas et al.: Quantitative Regular Expressions for Monitoring Cardiac Arrhythmias. (2018) authored by Rajeev Alur. Yifei Yuan et al.: On the feasibility of automation for bandwidth allocation problems in data centers. (2013) authored by Rajeev Alur. Anton Xue et al.: Chordal Sparsity for Lipschitz Constant Estimation of Deep Neural Networks. (2022) authored by Rajeev Alur. Anton Xue et al.: Chordal Sparsity for Lipschitz Constant Estimation of Deep Neural Networks. (2022) authored by Rajeev Alur. Rajeev Alur and Mukund Raghothaman: Decision Problems for Additive Regular Functions. (2013) authored by Rajeev Alur. Konstantinos Mamouras et al.: Data-trace types for distributed stream processing systems. (2019) authored by Rajeev Alur. Sela Mador-Haim et al.: An Axiomatic Memory Model for POWER Multiprocessors. (2012) authored by Rajeev Alur. Rajeev Alur et al.: Optimal scheduling for constant-rate multi-mode systems. (2012) authored by Rajeev Alur. Alessandro D'Innocenzo et al.: Scalable scheduling algorithms for wireless networked control systems. (2009) authored by Rajeev Alur. Rajeev Alur et al.: Model-Checking of Correctness Conditions for Concurrent Objects. (2000) authored by Rajeev Alur. Rajeev Alur et al.: Safe schedulability of bounded-rate multi-mode systems. (2013) authored by Rajeev Alur. Rajeev Alur et al.: Modeling and Analysis of Multi-hop Control Networks. (2009) authored by Rajeev Alur. Rajeev Alur and Mukund Raghothaman: Decision Problems for Additive Regular Functions (2013) authored by Rajeev Alur. Rajeev Alur et al.: Safe Schedulability of Bounded-Rate Multi-Mode Systems (2013) authored by Rajeev Alur. Rajeev Alur et al.: Model-Checking of Correctness Conditions for Concurrent Objects. (1996) authored by Rajeev Alur. Rajeev Alur et al.: Schedulability of Bounded-Rate Multimode Systems. (2017) authored by Rajeev Alur. Rajeev Alur et al.: Systems Computing Challenges in the Internet of Things. (2016) authored by Rajeev Alur. Rajeev Alur and Gadi Taubenfeld: Contention-Free Complexity of Shared Memory Algorithms. (1996) authored by Rajeev Alur. Konstantinos Kallas et al.: Executing Microservice Applications on Serverless, Correctly. (2023) authored by Rajeev Alur. Rajeev Alur and Gadi Taubenfeld: Contention-free Complexity of Shared Memory Algorithms. (1994) authored by Rajeev Alur. Luan Viet Nguyen et al.: Detecting security leaks in hybrid systems with information flow analysis. (2019) authored by Rajeev Alur. Rajeev Alur et al.: Hedging Bets in Markov Decision Processes. (2016) authored by Rajeev Alur. Rajeev Alur et al.: Optimal Reachability for Weighted Timed Games. (2004) authored by Rajeev Alur. Rajeev Alur et al.: Block-Size Independence for GPU Programs. (2018) authored by Rajeev Alur. Lei Shi et al.: Session-layer Attack Traffic Classification by Program Synthesis. (2020) authored by Rajeev Alur. Houssam Abbas et al.: Real-Time Decision Policies With Predictable Performance. (2018) authored by Rajeev Alur. Rajeev Alur et al.: A Robust Theory of Series Parallel Graphs. (2023) authored by Rajeev Alur\nProf. D output format: answer
Indian Institute of Technology Kanpur
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Where did the author of Predictor-based sampled-data stabilization via continuous-discrete observers receive her Ph.D. degree from? Context: Emilia Fridman alternativeName Fridman Emilia. Emilia Fridman alternativeName Emilia Fridman. Emilia Fridman alternativeName Emilia M. Fridman. Emilia Fridman 2YrMeanCitedness 2.5697674751281738281. Emilia Fridman link https://www.eng.tau.ac.il/~emilia/. Emilia Fridman link https://www.eng.tau.ac.il/~emilia/. Emilia Fridman alternativeName Edward Fridman. Emilia Fridman name Emilia Fridman. Emilia Fridman alternativeName Fridman. Emilia Fridman alternativeName Э. Фридман. Emilia Fridman alternativeName E. M. Fridman. Emilia Fridman alternativeName E. Fridman. Emilia Fridman alternativeName Eddie Fridman. Alexey S. Matveev et al.: Comprehending Complexity: Data-Rate Constraints in Large-Scale Networks. (2019) authored by Emilia Fridman. Emilia Fridman et al.: Bounds on the response of a drilling pipe model. (2010) authored by Emilia Fridman. Andrei Polyakov et al.: On homogeneous evolution equation in a Banach space. (2015) authored by Emilia Fridman. Emilia Fridman i10Index 185. Emilia Fridman affiliation Tel Aviv University, Department of Electrical Engineering and Systems, Israel. Emilia Fridman modified 2023-10-18. Robert Griñó et al.: A behavioural dynamic model for constant power loads in single-phase AC systems. (2021) authored by Emilia Fridman. Emilia Fridman primary affiliation Tel Aviv University, Department of Electrical Engineering and Systems, Israel. Emilia Fridman h-index 67. Emilia Fridman link https://en.wikipedia.org/wiki/Emilia_Fridman. Emilia Fridman worksCount 527. Emilia Fridman link http://www.wikidata.org/entity/Q60023547. Emilia Fridman orcidId https://orcid.org/0000-0002-8773-9494. Emilia Fridman scopus http://www.scopus.com/inward/authorDetails.url?authorID=57192275005&partnerID=MN8TOARS. Emilia Fridman written paper amount in year2012: 11. Emilia Fridman written paper amount in year2012: 11. Emilia Fridman written paper amount in year2018: 32. Emilia Fridman written paper amount in year2018: 32. Emilia Fridman written paper amount in year2013: 19. Emilia Fridman written paper amount in year2013: 19. Emilia Fridman is Person. Emilia Fridman written paper amount in year2014: 30 and M. \nProf. They have a son, and live in Tel Aviv. '}. Birkhauser. A. ; Liu, Kun, Fridman, Emilia, Xia, Yuanqing. Vadim Strygin. Springer International Publishing, 2020 output format: answer
Voronezh State University
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: How many works has the author who published 'Approximation of solutions for an initial and terminal value problem for the forced Duffing equation with non-viscous damping' in 2010 at Appl. Math. Comput., contributed to? Context: Sajede Harraz et al.: Protected Quantum Teleportation Through Noisy Channel by Weak Measurement and Environment-Assisted Measurement. (2022) authored by Juan J. Nieto. Sajede Harraz et al.: Optimal tripartite quantum teleportation protocol through noisy channels. (2023) authored by Juan J. Nieto. Juan J. Nieto and Angela Torres: Midpoints for fuzzy sets and their application in medicine. (2003) authored by Juan J. Nieto. Helena Andrade et al.: The number of reduced alignments between two DNA sequences. (2014) authored by Juan J. Nieto. Juan J. Nieto affiliation King Abdulaziz University, Jeddah, Saudi Arabia. Dimitris N. Georgiou et al.: An extension of fuzzy topological approach for comparison of genetic sequences. (2015) authored by Juan J. Nieto. Juan J. Nieto 2YrMeanCitedness 6.9402985572814941406. Juan J. Nieto et al.: A metric space to study differences between polynucleotides. (2003) authored by Juan J. Nieto. Juan J. Nieto alternativeName Juan Nieto. Juan J. Nieto alternativeName Juan NİETO. Juan J. Nieto name Juan J. Nieto. Juan J. Nieto alternativeName J Juan Nieto. Juan J. Nieto alternativeName Juan J. Nieto. Juan J. Nieto alternativeName Juan Jose Nieto. Juan J. Nieto alternativeName Juan José Nieto He received his Ph. "} output format: answer
538
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: How many works has the author with an hIndex of 49 done? Context: David L. Andrews 0002 affiliation University of East Anglia, School of Chemistry, Norwich, UK. David L. Andrews 0002 primary affiliation University of East Anglia, School of Chemistry, Norwich, UK. David L. Andrews: Symmetry and Quantum Features in Optical Vortices. (2021) authored by David L. Andrews 0002. David L. Andrews: Symmetries, Conserved Properties, Tensor Representations, and Irreducible Forms in Molecular Quantum Electrodynamics. (2018) authored by David L. Andrews 0002. Davıd L. Andrews name Davıd L. Andrews He was appointed Professor of Chemical Physics in 1996 and became Emeritus Professor in 2023. In 1978, he became Science Research Council Postdoctoral Fellow and in 1979 he joined the University of East Anglia as a Lecturer. Many others are conferences run by SPIE – the global society for optics and photonics, of which he is a Fellow member and 2021 President output format: answer
824
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Who was the supervisor of Christopher David Godsil during his Ph.D. studies? Context: Chris D. Godsil et al.: Vector coloring the categorical product of graphs. (2020) authored by Chris D. Godsil. Andries E. Brouwer et al.: Width and dual width of subsets in polynomial association schemes. (2003) authored by Chris D. Godsil. Gabriel Coutinho et al.: A New Perspective on the Average Mixing Matrix. (2018) authored by Chris D. Godsil. D. de Caen et al.: On the p-Rank of Incidence Matrices and a Bound of Bruen and Ott. (1992) authored by Chris D. Godsil. Chris D. Godsil et al.: Graph homomorphisms via vector colorings. (2019) authored by Chris D. Godsil. Chris D. Godsil et al.: Graph Cores via Universal Completability. (2015) authored by Chris D. Godsil. Chris D. Godsil et al.: Diagonal entries of the average mixing matrix. (2023) authored by Chris D. Godsil. Chris D. Godsil et al.: Uniform Mixing and Association Schemes. (2017) authored by Chris D. Godsil. Chris D. Godsil et al.: Universal Completability, Least Eigenvalue Frameworks, and Vector Colorings. (2017) authored by Chris D. Godsil. Ameera Chowdhury et al.: Colouring lines in projective space. (2006) authored by Chris D. Godsil. Arnbjörg Soffía Árnadóttir and Chris D. Godsil: Strongly cospectral vertices in normal Cayley graphs. (2023) authored by Chris D. Godsil. Paul Erdös et al.: Intersection Graphs for Families of Balls in Rn. (1988) authored by Chris D. Godsil. Anthony D. Gardiner et al.: Second neighbourhoods of strongly regular graphs. (1992) authored by Chris D. Godsil. Chris D. Godsil et al.: Quantum Walks on Generalized Quadrangles. (2017) authored by Chris D. Godsil'}. D output format: answer
Derek Alan Holton
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the hIndex of the author of Computational and dynamic models in neuroimaging? Context: Raymond J. Dolan name Raymond J. Dolan. Raymond J. Dolan member of UCL Australia. Raymond J. Dolan modified 2023-10-18. Raymond J. Dolan alternativeName Raymond Dolan. Raymond J. Dolan alternativeName Raymond J. Dolan. Ray Dolan link http://www.fil.ion.ucl.ac.uk/Dolan/. Ray Dolan link http://www.fil.ion.ucl.ac.uk/Dolan/. Raymond J. Dolan 2YrMeanCitedness 4.8148150444030761719. Raymond J. Dolan alternativeName Raymond Joseph Dolan. Raymond J. Dolan alternativeName R. Dolan. Raymond J. Dolan alternativeName R. J. Dolan. Ray Dolan is Person. Raymond J. Dolan citedByCount 136352. Raymond J. Dolan worksCount 991. Vinod Goel and Raymond J. Dolan: Social Regulation of Affective Experience of Humor. (2007) authored by Ray Dolan'}. \nIn 2019 he was awarded the Ferrier Medal and Lecture by the Royal Society output format: answer
200
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: In which year did the researcher who published the paper 'Secure End-to-End Communication with Optimal Throughput and Resilience against Malicious Adversary' receive a Ph.D.? Context: Nishanth Chandran et al.: Improved algorithms for optimal embeddings. (2008) authored by Rafail Ostrovsky. Nishanth Chandran et al.: Improved Algorithms for Optimal Embeddings. (2006) authored by Rafail Ostrovsky. Vladimir Braverman and Rafail Ostrovsky: Smooth Histograms for Sliding Windows. (2007) authored by Rafail Ostrovsky. Alain J. Mayer et al.: Self-Stabilizing Symmetry Breaking in Constant-Space (Extended Abstract) (1992) authored by Rafail Ostrovsky. Vladimir Braverman et al.: Weighted sampling without replacement from data streams. (2015) authored by Rafail Ostrovsky. Vladimir Braverman et al.: Weighted Sampling Without Replacement from Data Streams. (2015) authored by Rafail Ostrovsky. Xiaoqi Duan et al.: ACCO: Algebraic Computation with Comparison. (2021) authored by Rafail Ostrovsky. Brett Hemenway et al.: Local Correctability of Expander Codes. (2013) authored by Rafail Ostrovsky. Arman Yousefi and Rafail Ostrovsky: Improved Approximation Algorithms for Earth-Mover Distance in Data Streams. (2014) authored by Rafail Ostrovsky. Eyal Kushilevitz et al.: Efficient Search for Approximate Nearest Neighbor in High Dimensional Spaces. (2000) authored by Rafail Ostrovsky. Rafail Ostrovsky et al.: Efficient Consistency Proofs for Generalized Queries on a Committed Database. (2004) authored by Rafail Ostrovsky. Rafail Ostrovsky et al.: Efficient Consistency Proofs for Generalized Queries on a Committed Database. (2004) authored by Rafail Ostrovsky. Julia Chuzhoy et al.: Approximation Algorithms for the Job Interval Selection Problem and Related Scheduling Problems. (2001) authored by Rafail Ostrovsky. Rafail Ostrovsky and William E. Skeith III: A Survey of Single-Database Private Information Retrieval: Techniques and Applications. (2007) authored by Rafail Ostrovsky. Farhad Hormozdiari et al.: Privacy preserving protocol for detecting genetic relatives using rare variants. (2014) authored by Rafail Ostrovsky. Julia Chuzhoy et al.: Approximation Algorithms for the Job Interval Selection Problem and Related Scheduling Problems. (2006) authored by Rafail Ostrovsky. Rafail Ostrovsky and Yuval Rabani: Polynomial Time Approximation Schemes for Geometric k-Clustering. (2000) authored by Rafail Ostrovsky. Alain J. Mayer et al.: Self-Stabilizing Algorithms for Synchronous Unidirectional Rings. (1996) authored by Rafail Ostrovsky. Brett Hemenway et al.: Local Correctability of Expander Codes (2013) authored by Rafail Ostrovsky. Vladimir Braverman et al.: Optimal sampling from sliding windows. (2012) authored by Rafail Ostrovsky. Sandip Banerjee et al.: Min-Sum Clustering (with Outliers). (2020) authored by Rafail Ostrovsky. Sandip Banerjee et al.: Min-Sum Clustering (With Outliers). (2021) authored by Rafail Ostrovsky. Brett Hemenway et al.: Local correctability of expander codes. (2015) authored by Rafail Ostrovsky. Paul Bunn and Rafail Ostrovsky: Oblivious Sampling with Applications to Two-Party k-Means Clustering. (2020) authored by Rafail Ostrovsky. Allan Borodin et al.: Subquadratic Approximation Algorithms for Clustering Problems in High Dimensional Spaces. (2004) authored by Rafail Ostrovsky. Vladimir Braverman et al.: Optimal sampling from sliding windows. (2009) authored by Rafail Ostrovsky. Eyal Kushilevitz et al.: Efficient Search for Approximate Nearest Neighbor in High Dimensional Spaces. (1998) authored by Rafail Ostrovsky. Allan Borodin et al.: Subquadratic Approximation Algorithms for Clustering Problems in High Dimensional Spaces. (1999) authored by Rafail Ostrovsky. Rafail Ostrovsky and Yuval Rabani: Polynomial-time approximation schemes for geometric min-sum median clustering. (2002) authored by Rafail Ostrovsky. Rafail Ostrovsky 2YrMeanCitedness 1.0232558250427246094. Rafail Ostrovsky and William E. Skeith III: A Survey of Single Database PIR: Techniques and Applications. (2007) authored by Rafail Ostrovsky. Rafail Ostrovsky and Yuval Rabani: Low distortion embeddings for edit distance. (2007) authored by Rafail Ostrovsky. Vladimir Braverman et al.: Streaming k-means on Well-Clusterable Data. (2011) authored by Rafail Ostrovsky. Ran Gelles et al.: Efficient Error-Correcting Codes for Sliding Windows. (2014) authored by Rafail Ostrovsky. Rafail Ostrovsky and Yuval Rabani: Low distortion embeddings for edit distance. (2005) authored by Rafail Ostrovsky. Rafail Ostrovsky: HOLMES-I, a prolog-based reason maintenance system for collecting information from multiple experts. (1986) authored by Rafail Ostrovsky. Ran Gelles et al.: Efficient Error-Correcting Codes for Sliding Windows. (2020) authored by Rafail Ostrovsky. Alain J. Mayer et al.: Self-Stabilizing Symmetry Breaking in Constant Space. (2002) authored by Rafail Ostrovsky. Surya Addanki et al.: Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares. (2022) authored by Rafail Ostrovsky. Rafail Ostrovsky is Creator. Surya Addanki et al.: Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares. (2021) authored by Rafail Ostrovsky. Eyal Kushilevitz and Rafail Ostrovsky: One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval. (2000) authored by Rafail Ostrovsky. Vladimir Braverman et al.: Zero-One Laws for Sliding Windows and Universal Sketches. (2015) authored by Rafail Ostrovsky. Fabrizio Grandoni et al.: A Refined Approximation for Euclidean k-Means. (2021) authored by Rafail Ostrovsky. Michele Ciampi et al.: Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions. (2023) authored by Rafail Ostrovsky. Rafail Ostrovsky name Rafail Ostrovsky. Fabrizio Grandoni et al.: A refined approximation for Euclidean k-means. (2022) authored by Rafail Ostrovsky. Yevgeniy Dodis et al.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. (2008) authored by Rafail Ostrovsky. Rafail Ostrovsky is Person. Nir Bitansky et al.: Succinct Non-Interactive Arguments via Linear Interactive Proofs. (2012) authored by Rafail OstrovskyD. from MIT in 1992 output format: answer
2013
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What award did the author of Using multivariate quantitative genetics theory to assist in EA customization receive from the Evolutionary Programming Society? Context: William M. Spears and Kenneth A. De Jong: Analyzing GAs Using Markov Models with Semantically Ordered and Lumped States. (1996) authored by Kenneth A. De Jong. Kenneth A. De Jong 2YrMeanCitedness 0.25. Kenneth A. De Jong name Kenneth A. De Jong. Kenneth A. De Jong alternativeName Kenneth De Jong. Kenneth A. De Jong alternativeName Kenneth Jong. Kenneth A. De Jong is Person. Kenneth A. De Jong alternativeName Kenneth A. De Jong. Zbigniew Skolicki et al.: Co-evolution of terrorist and security scenarios for water distribution systems. (2008) authored by Kenneth A. De Jong. Kenneth A. De Jong alternativeName Kenneth A. Jong. Kenneth A. De Jong alternativeName Kenneth Alan De Jong. Kenneth A. De Jong alternativeName K. A. De Jong. Xinyun Zou et al.: Neuroevolution of a recurrent neural network for spatial and working memory in a simulated robotic environment. (2021) authored by Kenneth A. De Jong. Xinyun Zou et al.: Neuroevolution of a Recurrent Neural Network for Spatial and Working Memory in a Simulated Robotic Environment. (2021) authored by Kenneth A. De Jong. Kenneth A. De Jong link https://en.wikipedia.org/wiki/Kenneth_A_De_Jong. Rida E. Moustafa et al.: A GA-Based Method for Function Approximation Using Adaptive Interpolation. (2000) authored by Kenneth A. De Jong. Kenneth A. De Jong worksCount 161. William M. Spears and Kenneth A. De Jong: Dining with GAs: Operator Lunch Theorems. (1998) authored by Kenneth A. De Jong. Kenneth A. De Jong link http://www.wikidata.org/entity/Q6389799. Zbigniew Skolicki and Kenneth A. De Jong: The influence of migration sizes and intervals on island models. (2005) authored by Kenneth A. De Jong. Alaa F. Sheta and Kenneth A. De Jong: Time-series forecasting using GA-tuned radial basis functions. (2001) authored by Kenneth A. De Jong. Kenneth A. De Jong is Creator. Alexei V. Samsonovich et al.: Assessment of the Critical Components of a Transformative Self-Regulated Learning Assistant. (2010) authored by Kenneth A. De Jong'}. D output format: answer
lifetime achievement award
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the number of papers for the affiliation of the author of 'A Comparison of Indexing Techniques for Japanese Text Retrieval'? Context: Dirk E. Mahling et al.: Visual interaction between end users and goal-based systems. (1992) authored by W. Bruce Croft. Dirk E. Mahling et al.: Visual Interaction Between End Users and Goal Based Systems. (1990) authored by W. Bruce Croft. W. Bruce Croft alternativeName William Croft. W. Bruce Croft name W. Bruce Croft. W. Bruce Croft alternativeName W. Croft. W. Bruce Croft alternativeName W. B Croft. Warren R. Greiff et al.: Computationally Tractable Probabilistic Modeling of Boolean Operators. (1997) authored by W. Bruce Croft. W. Bruce Croft alternativeName William Bruce Croft. W. Bruce Croft alternativeName W. B. Croft. W. Bruce Croft alternativeName W. Bruce Croft. W. Bruce Croft modified 2023-10-18. W. Bruce Croft is Creator. Dirk E. Mahling and W. Bruce Croft: A visual language for the acquisition and display of plans. (1989) authored by W. Bruce Croft. W. Bruce Croft is Person. W. Bruce Croft 2YrMeanCitedness 4.2142858505249023438. Mohammad Aliannejadi et al.: Context-aware Target Apps Selection and Recommendation for Enhancing Personal Mobile Assistants. (2021) authored by W. Bruce Croft. Mohammad Aliannejadi et al.: Context-Aware Target Apps Selection and Recommendation for Enhancing Personal Mobile Assistants. (2021) authored by W. Bruce Croft. Daniel Cohen et al.: Universal Approximation Functions for Fast Learning to Rank: Replacing Expensive Regression Forests with Simple Feed-Forward Networks. (2018) authored by W. Bruce Croft. Daniel Cohen et al.: Learning a Better Negative Sampling Policy with Deep Neural Networks for Search. (2019) authored by W. Bruce Croft. W. Bruce Croft: TIPSTER Panel - The University of Massachusetts TIPSTER Project. (1992) authored by W. Bruce Croft. Carol A. Broverman and W. Bruce Croft: Reasoning about Exceptions during Plan Execution Monitoring. (1987) authored by W. Bruce Croft. Ruey-Cheng Chen et al.: Correcting for Recency Bias in Job Recommendation. (2019) authored by W. Bruce Croft. Daniel Cohen et al.: Adaptability of Neural Networks on Varying Granularity IR Tasks. (2016) authored by W. Bruce Croft. W. Bruce Croft: Task Management for an Intelligent Interface. (1985) authored by W. Bruce Croft. W. Bruce Croft: The Role of Context and Adaptation in User Interfaces. (1984) authored by W. Bruce Croft. W. Bruce Croft: The University of Massachusetts TIPSTER Project. (1992) authored by W. Bruce Croft. W. Bruce Croft affiliation University of Cambridge, UK. W. Bruce Croft member of University of Massachusetts Amherst. Dik Lun Lee and W. Bruce Croft: Guest Editor's Introduction. (1993) authored by W. Bruce Croft. W. Bruce Croft and Lawrence S. Lefkowitz: Using a planner to support office work. (1988) authored by W. Bruce Croft. Chen Qu et al.: Contextual Re-Ranking with Behavior Aware Transformers. (2020) authored by W. Bruce Croft. W. Bruce Croft i10Index 287. Keping Bi et al.: Asking Clarifying Questions Based on Negative Feedback in Conversational Search. (2021) authored by W. Bruce Croft. Keping Bi et al.: Asking Clarifying Questions Based on Negative Feedback in Conversational Search. (2021) authored by W. Bruce Croft. W. Bruce Croft: Chairman's Message. (1988) authored by W. Bruce Croft. W. Bruce Croft link https://dl.acm.org/profile/81100652508. W. Bruce Croft: Chairman's Message. (1989) authored by W. Bruce Croft. Dirk E. Mahling et al.: From Office Automation to Intelligent Workflow Systems. (1995) authored by W. Bruce Croft. Dirk E. Mahling and W. Bruce Croft: Relating Human Knowledge of Tasks to the Requirements of Plan Libraries. (1989) authored by W. Bruce Croft. W. Bruce Croft and Lawrence S. Lefkowitz: Task Support in an Office System. (1984) authored by W. Bruce Croft. W. Bruce Croft and Lawrence S. Lefkowitz: Task support in an office system. (1984) authored by W. Bruce Croft. W. Bruce Croft worksCount 540. W. Bruce Croft: Editorial. (1991) authored by W. Bruce Croft. W. Bruce Croft: Chairman's Message. (1990) authored by W. Bruce Croft. W. Bruce Croft affiliation University of Massachusetts Amherst, MA, USA. Daniel Cohen and W. Bruce Croft: End to End Long Short Term Memory Networks for Non-Factoid Question Answering. (2016) authored by W. Bruce Croft. W. Bruce Croft citedByCount 32581. W. Bruce Croft link https://en.wikipedia.org/wiki/W._Bruce_Croft. Keping Bi et al.: Leverage Implicit Feedback for Context-aware Product Search. (2019) authored by W. Bruce Croft. Keping Bi et al.: Leverage Implicit Feedback for Context-aware Product Search. (2019) authored by W. Bruce Croft"}. He earned his Ph. D in computer science from the University of Cambridge in 1979 and joined the University of Massachusetts, Amherst faculty later that year output format: answer
85692
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: In which country did the author of Traversable Wormhole Solutions Admitting Noether Symmetry in f(R,T2) Theory complete a postdoctoral Fellowship? Context: M. Sharif name M. Sharif. M. Sharif written paper amount in year2018: 60. M. Sharif written paper amount in year2018: 60. M. Sharif alternativeName Mariam Muhammad Sharif. M. Sharif alternativeName Muhammad Sharif"}. e. \nSharif's father earned his living through agriculture. , from 2013 to 2019 output format: answer
South Korea
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the cited by count where the author of the 'A simple analytical throughput-delay model for clustered FiWi networks' article is affiliated? Context: Gamze Ozogul et al.: Animated engineering tutors: Middle school students' preferences and rationales on multiple dimensions. (2012) authored by Martin Reisslein. Gamze Ozogul et al.: Investigating the impact of pedagogical agent gender matching and learner choice on learning outcomes and perceptions. (2013) authored by Martin Reisslein. Martin Reisslein alternativeName Martin Rd. Shyamprasad Chikkerur et al.: Objective Video Quality Assessment Methods: A Classification, Review, and Performance Comparison. (2011) authored by Martin Reisslein. Martin Reisslein alternativeName RD Martin. Geert Van Der Auwera et al.: Video Texture and Motion based Modeling of Rate Variability-Distortion (VD) Curves of I, P, and B Frames. (2006) authored by Martin Reisslein. Jana Reisslein et al.: Investigating the Presentation and Format of Instructional Prompts in an Electrical Circuit Analysis Computer-Based Learning Environment. (2005) authored by Martin Reisslein. Amy M. Johnson et al.: Supporting multimedia learning with visual signalling and animated pedagogical agent: moderating effects of prior knowledge. (2015) authored by Martin Reisslein. Martin Reisslein alternativeName Ramírez Martín. Geert Van Der Auwera et al.: Video Texture and Motion Based Modeling of Rate Variability-Distortion (VD) Curves. (2007) authored by Martin Reisslein. Martin Reisslein name Martin Reisslein. Martin Reisslein alternativeName Martín Ramírez. Amy M. Johnson et al.: Animated agents in K-12 engineering outreach: Preferred agent characteristics across age levels. (2013) authored by Martin Reisslein. Amy M. Johnson et al.: Learning from abstract and contextualized representations: The effect of verbal guidance. (2013) authored by Martin Reisslein. Martin Reisslein alternativeName Reisslein Martin. Ievgenii Anatolijovuch Tsokalo et al.: Remote Robot Control with Human-in-the-Loop over Long Distances Using Digital Twins. (2019) authored by Martin Reisslein. Peter Sossalla et al.: Optimizing Edge SLAM: Judicious Parameter Settings and Parallelized Map Updates. (2022) authored by Martin Reisslein. Martin Reisslein 2YrMeanCitedness 3.625. Martin Reisslein alternativeName R Martin. Martin Reisslein alternativeName Martin Reisslein. Jussi Kangasharju et al.: Distributing Layered Encoded Video through Caches. (2001) authored by Martin Reisslein. Martin Reisslein is Creator. Mohd Tausif et al.: Lifting-Based Fractional Wavelet Filter: Energy-Efficient DWT Architecture for Low-Cost Wearable Sensors. (2020) authored by Martin Reisslein. Martin Reisslein is Person. Martin Reisslein alternativeName Martín Rey. Martin Reisslein alternativeName Martin Rey. Jussi Kangasharju et al.: Distributing Layered Encoded Video through Caches. (2002) authored by Martin Reisslein. Mohd Tausif et al.: SMFrWF: Segmented Modified Fractional Wavelet Filter: Fast Low-Memory Discrete Wavelet Transform (DWT). (2019) authored by Martin Reisslein. Martin Reisslein alternativeName R.J. Martin. Sifat Rezwan et al.: cXR+ Voxel-Based Semantic Compression for Networked Immersion. (2023) authored by Martin Reisslein. Martin Reisslein alternativeName Martin Raubal He holds B. '} output format: answer
4203461
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What award did Eddie Kohler receive in 2014? Context: Yihe Huang et al.: The Impact of Timestamp Granularity in Optimistic Concurrency Control. (2018) authored by Eddie Kohler. James Larisch et al.: Alto: lightweight VMs using virtualization-aware managed runtimes. (2018) authored by Eddie Kohler. Ram Kumar et al.: Harbor: software-based memory protection for sensor nodes. (2007) authored by Eddie Kohler. Haogang Chen et al.: Specifying Crash Safety for Storage Systems. (2015) authored by Eddie Kohler. Nikitas Liogkas et al.: Exploring the robustness of BitTorrent peer-to-peer content distribution systems. (2008) authored by Eddie Kohler. Ram Kumar et al.: A System For Coarse Grained Memory Protection In Tiny Embedded Processors. (2007) authored by Eddie Kohler. Milan Bradonjic et al.: Near-optimal radio use for wireless network synchronization. (2012) authored by Eddie Kohler. Milan Bradonjic et al.: Near-Optimal Radio Use for Wireless Network Synchronization. (2009) authored by Eddie Kohler. Mike Mammarella et al.: Modular data storage with Anvil. (2009) authored by Eddie Kohler. Nithya Ramanathan et al.: Suelo: human-assisted sensing for exploratory soil monitoring studies. (2009) authored by Eddie Kohler. Nathaniel Herman et al.: Type-aware transactions for faster concurrent code. (2016) authored by Eddie Kohler. Steve Vandebogart et al.: Reducing Seek Overhead with Application-Directed Prefetching. (2009) authored by Eddie Kohler. Milan Bradonjic et al.: Near-Optimal Radio Use For Wireless Network Synchronization (2008) authored by Eddie Kohler Years later, the paper (submitted by another scientist to an ostensibly peer-reviewed technical journal) was accepted for publication, despite a nonsensical body text. \nKohler co-founded Mazu Networks in 2000 and served as its Chief Scientist until it was acquired in 2009 output format: answer
SIGOPS Mark Weiser Award
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: How many publication citations does the co-author of Will Computers Put Us Out of Work?, have? Context: John Leslie King alternativeName John L. King. John Leslie King alternativeName John King. John Leslie King member of Michigan United. John Leslie King alternativeName John Leslie King. John Leslie King name John Leslie King. John Leslie King alternativeName J. L. King. John Leslie King: Dig the Dirt. (2007) authored by John Leslie King. John Leslie King is Person. Ju-Yeon Jung et al.: How Bereaved Parents Make Meaning from Photos for Continuing Bonds. (2023) authored by John Leslie King. Roman Beck et al.: Governance in the Blockchain Economy: A Framework and Research Agenda. (2018) authored by John Leslie King. Hal Berghel et al.: It's On: COVID-19, Risk Ecology, and Preparedness Tips. (2020) authored by John Leslie King. John Leslie King i10Index 74. John Leslie King link https://en.wikipedia.org/wiki/John_Leslie_King. John Leslie King h-index 35. Nicholas A. Valentino et al.: Polling and Prediction in the 2016 Presidential Election. (2017) authored by John Leslie King'}. \nProf output format: answer
6102
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What award did the scholar who received the ACM SIGMOD Edward Codd Innovations Award in 2013 get? Context: Andrea Gulino et al.: Performance Prediction for Data-driven Workflows on Apache Spark. (2020) authored by Stefano Ceri. Francesco Pierri et al.: Topology comparison of Twitter diffusion networks reliably reveals disinformation news. (2019) authored by Stefano Ceri. Pietro Pinoli et al.: Deleterious Impact of Mutational Processes on Transcription Factor Binding Sites in Human Cancer. (2019) authored by Stefano Ceri. Daniele Braga et al.: XQBE: A Graphical Interface for XQuery Engines. (2004) authored by Stefano Ceri. Carolina Testa et al.: Inference of Synthetically Lethal Pairs of Genes Involved in Metastatic Processes via Non-Negative Matrix Tri-Factorization. (2023) authored by Stefano Ceri. Daniele Braga et al.: XQBE: a visual environment for learning XML query languages. (2005) authored by Stefano Ceri. Marco Brambilla et al.: Exception handling in workflow-driven Web applications. (2005) authored by Stefano Ceri. Marco Brambilla et al.: Exception Handling in Workflow-Driven Web Applications. (2005) authored by Stefano Ceri. Daniele Braga et al.: XQBE (XQuery By Example): A visual interface to the standard XML query language. (2005) authored by Stefano Ceri. Stefano Ceri and Susan S. Owicki: On the Use of Optimistic Methods for Concurrency Control in Distributed Databases. (1982) authored by Stefano Ceri. Maurice A. W. Houtsma et al.: Distributed Transitive Closure Computations: The Disconnection Set Approach. (1990) authored by Stefano Ceri. Elena Baralis et al.: Run-time Detection of Non-Terminating Active Rule Systems. (1995) authored by Stefano Ceri. Fabio Casati et al.: Conceptual Modeling of Workflows. (2000) authored by Stefano Ceri. Olha Horlova et al.: Multi-Dimensional Genomic Data Management for Region-Preserving Operations. (2019) authored by Stefano Ceri. Fabio Casati et al.: Conceptual Modelling of WorkFlows. (1995) authored by Stefano Ceri. Stefano Ceri et al.: XML-GL: A Graphical Language for Querying and Restructuring XML Documents. (1999) authored by Stefano Ceri. Stefano Ceri et al.: XML-GL: A Graphical Language for Querying and Restructuring XML Documents. (1999) authored by Stefano Ceri. Tommaso Alfonsi et al.: Supporting data and code for "Data-driven recombination detection in viral genomes". (2023) authored by Stefano Ceri. Alessandro Bozzon et al.: A Framework for Integrating, Exploring, and Searching Location-Based Web Data. (2011) authored by Stefano Ceri. Francesco Pierri et al.: A multi-layer approach to disinformation detection in US and Italian news spreading on Twitter. (2020) authored by Stefano Ceri. Stefano Ceri et al.: Data-Driven, One-To-One Web Site Generation for Data-Intensive Applications. (1999) authored by Stefano Ceri. Stefano Ceri et al.: XML-GL: A Graphical Language for Querying and Reshaping XML Documents. (1998) authored by Stefano Ceri. Tommaso Alfonsi et al.: Expressing Biological Problems with Logical Reasoning Languages. (2022) authored by Stefano Ceri. Fabio Casati et al.: Specification and Implementation of Exceptions in Workflow Management Systems. (1999) authored by Stefano Ceri. Marco Brambilla et al.: Process modeling in Web applications. (2006) authored by Stefano Ceri. Fabio Cumbo et al.: TCGA2BED: extracting, extending, integrating, and querying The Cancer Genome Atlas. (2017) authored by Stefano Ceri. Maurice A. W. Houtsma et al.: Complex Transitive Closure Queries on a Fragmented Graph. (1990) authored by Stefano Ceri. Andrea Gulino et al.: Distributed Company Control in Company Shareholding Graphs. (2021) authored by Stefano Ceri. C. Baldissera et al.: Interactive Specification and Formal Verification of User's Views in Data Bases Design. (1979) authored by Stefano Ceri. Stefano Ceri et al.: Optimal File Allocation for a Distributed Data Base on a Network of Minicomputers. (1980) authored by Stefano Ceri. Vahid Jalili et al.: Explorative visual analytics on interval-based genomic data and their metadata. (2017) authored by Stefano Ceri. Stefano Ceri et al.: Optimal File Allocation in a Computer Network: a Solution Method Based on the Knapsack Problem. (1982) authored by Stefano Ceri. Teodoro Baldazzi et al.: "Please, Vadalog, tell me why": Interactive Explanation of Datalog-based Reasoning. (2024) authored by Stefano Ceri. Francesco Pierri et al.: A multi-layer approach to disinformation detection on Twitter. (2020) authored by Stefano Ceri. Davide Francesco Barbieri et al.: C-SPARQL: a Continuous Query Language for RDF Data Streams. (2010) authored by Stefano Ceri. Stefano Ceri and Jennifer Widom: Managing Semantic Heterogeneity with Production Rules and Persistent Queues. (1993) authored by Stefano Ceri. Francesco Pierri et al.: Investigating Italian disinformation spreading on Twitter in the context of 2019 European elections. (2019) authored by Stefano Ceri. Amirreza Rouhi et al.: Ensemble Feature Selection for Single Cell Chromatin Conformation Analysis. (2021) authored by Stefano Ceri. Stefano Ceri et al.: Effective Scheduling of Detached Rules in Active Databases. (2003) authored by Stefano Ceri. Anna Bernasconi et al.: A Comprehensive Approach for the Conceptual Modeling of Genomic Data. (2022) authored by Stefano Ceri. Elena Baralis et al.: Conservative Timestamp Revisited for Materialized View Maintenance in a Data Warehouse. (1996) authored by Stefano Ceri. Enrico Augurusa et al.: Design and Implementation of a Graphical Interface to Xquery. (2003) authored by Stefano Ceri. Stéphane Bressan et al.: Database and XML Technologies, Third International XML Database Symposium, XSym 2005, Trondheim, Norway, August 28-29, 2005, Proceedings (2005) edited by Stefano Ceri. Marco Brambilla et al.: Spatial Analysis of Social Media Response to Live Events: The Case of the Milano Fashion Week. (2017) authored by Stefano Ceri. Stefano Ceri et al.: Integrated Specification of Static and Dynamic Requirements of Database Applications: The Transaction Definition Language. (1980) authored by Stefano Ceri. Marco Brambilla et al.: Model-driven design and development of semantic Web service applications. (2007) authored by Stefano Ceri. Davide Francesco Barbieri et al.: Querying RDF streams with C-SPARQL. (2010) authored by Stefano Ceri'}. \nHe received two European Research Council Advanced Grants, in 2008 for the Search Computing project and in 2016 for the Genomic Computing project output format: answer
ACM SIGMOD Edward Codd Innovations Award
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the average two years citedness of the scientist who published 'Haptic Exploration of Fine Surface Features' in the ICRA conference in 1999? Context: Zachary A. Pezzementi et al.: Dynamic Guidance with Pseudoadmittance Virtual Fixtures. (2007) authored by Allison M. Okamura. Laura H. Blumenschein et al.: A Tip-Extending Soft Robot Enables Reconfigurable and Deployable Antennas. (2018) authored by Allison M. Okamura. Allison M. Okamura alternativeName Allison Okamura. Allison M. Okamura alternativeName Allison M. Okamura. Laura H. Blumenschein et al.: Geometric Solutions for General Actuator Routing on Inflated-Beam Soft Growing Robots. (2022) authored by Allison M. Okamura. Nathan S. Usevitch et al.: Distributed Control of Truss Robots Using Consensus Alternating Direction Method of Multipliers. (2021) authored by Allison M. Okamura. Allison M. Okamura name Allison M. Okamura. Alexander M. Kübler et al.: A Comparison of Pneumatic Actuators for Soft Growing Vine Robots. (2023) authored by Allison M. Okamura. Allison M. Okamura alternativeName Allison Mariko Okamura. Laura H. Blumenschein et al.: Geometric Solutions for General Actuator Routing on Inflated-Beam Soft Growing Robots. (2020) authored by Allison M. Okamura. Allison M. Okamura affiliation Stanford University, Department of Mechanical Engineering, CA, USA. Alexander M. Gruebele et al.: Distributed Sensor Networks Deployed Using Soft Growing Robots. (2021) authored by Allison M. Okamura. Giada Gerboni et al.: Highly Articulated Robotic Needle Achieves Distributed Ablation of Liver Tissue. (2017) authored by Allison M. Okamura. Laura H. Blumenschein et al.: Modeling of Bioinspired Apical Extension in a Soft Robot. (2017) authored by Allison M. Okamura. Alexander M. Gruebele et al.: Distributed Sensor Networks Deployed Using Soft Growing Robots. (2020) authored by Allison M. Okamura. Allison M. Okamura primary affiliation Stanford University, Department of Mechanical Engineering, CA, USA. Allison M. Okamura alternativeName A. Okamura. Rianna M. Jitosho et al.: Reinforcement Learning Enables Real-Time Planning and Control of Agile Maneuvers for Soft Robot Arms. (2023) authored by Allison M. Okamura. Allison M. Okamura alternativeName A. M. Okamura. Cosima du Pasquier et al.: Finite Element Modeling of Pneumatic Bending Actuators for Inflated-Beam Robots. (2023) authored by Allison M. Okamura. Cosima du Pasquier et al.: Finite Element Modeling of Pneumatic Bending Actuators for Inflated-Beam Robots. (2023) authored by Allison M. Okamura. Laura H. Blumenschein et al.: Design, Modeling, Control, and Application of Everting Vine Robots. (2020) authored by Allison M. Okamura. Nick Colonnese and Allison M. Okamura: Propagation of joint space quantization error to operational space coordinates and their derivatives. (2017) authored by Allison M. Okamura. Brian H. Do et al.: Dynamically Reconfigurable Discrete Distributed Stiffness for Inflated Beam Robots. (2020) authored by Allison M. Okamura. Brian H. Do et al.: Dynamically Reconfigurable Discrete Distributed Stiffness for Inflated Beam Robots. (2020) authored by Allison M. Okamura. Ann Majewicz et al.: Design and evaluation of duty-cycling steering algorithms for robotically-driven steerable needles. (2014) authored by Allison M. Okamura. Margaret M. Coad et al.: Retraction of Soft Growing Robots without Buckling. (2019) authored by Allison M. Okamura. Chad M. Schneider et al.: A Robotic System for Transrectal Needle Insertion into the Prostate with Integrated Ultrasound. (2004) authored by Allison M. Okamura. Allison M. Okamura i10Index 242. Wooram Park et al.: Diffusion-Based Motion Planning for a Nonholonomic Flexible Needle Model. (2005) authored by Allison M. Okamura. Tricia L. Gibo et al.: Design considerations and human-machine performance of moving virtual fixtures. (2009) authored by Allison M. Okamura. Ming Li and Allison M. Okamura: Recognition of Operator Motions for Real-Time Assistance Using Virtual Fixtures. (2003) authored by Allison M. Okamura. Yoshihiro Kuroda et al.: Novel algorithm for real-time onset detection of surface electromyography in step-tracking wrist movements. (2013) authored by Allison M. Okamura. Emad Boctor et al.: Virtual Remote Center of Motion Control for Needle Placement Robots. (2003) authored by Allison M. Okamura. Ioannis Exarchos et al.: Task-Specific Design Optimization and Fabrication for Inflated-Beam Soft Robots with Growable Discrete Joints. (2022) authored by Allison M. Okamura. Lene K. Harbott et al.: Motor learning affects car-to-driver handover in automated vehicles. (2016) authored by Allison M. Okamura. Ioannis Exarchos et al.: Task-Specific Design Optimization and Fabrication for Inflated-Beam Soft Robots with Growable Discrete Joints. (2021) authored by Allison M. Okamura. Margaret M. Coad et al.: Retraction of Soft Growing Robots Without Buckling. (2020) authored by Allison M. Okamura. Crystal Winston et al.: Embedded Laser-Cut Constraints for Elastomeric Soft Actuators. (2021) authored by Allison M. Okamura. Rianna M. Jitosho et al.: A Dynamics Simulator for Soft Growing Robots. (2021) authored by Allison M. Okamura. Rianna M. Jitosho et al.: Passive Shape Locking for Multi-Bend Growing Inflated Beam Robots. (2023) authored by Allison M. Okamura. Rianna M. Jitosho et al.: Passive Shape Locking for Multi-Bend Growing Inflated Beam Robots. (2023) authored by Allison M. Okamura'}. \nOkamura was born in Fontana, California, and grew up in Riverside, California. D output format: answer
2.2121212
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the occupation of the individual who has been the editor-in-chief of The Journal of Supercomputing since 1997? Context: Alireza Khatamian and Hamid R. Arabnia: Survey on 3D Surface Reconstruction. (2016) authored by Hamid R. Arabnia. Austin T. New et al.: Non-rigid shape correspondence and description using geodesic field estimate distribution. (2012) authored by Hamid R. Arabnia. Hamid R. Arabnia and Ashu M. G. Solo: Proceedings of the 2009 International Conference on Genetic and Evolutionary Methods, GEM 2009, July 13-16, 2009, Las Vegas Nevada, USA (2009) edited by Hamid R. Arabnia. Hamid R. Arabnia and Youngsong Mun: Proceedings of the 2008 International Conference on Genetic and Evolutionary Methods, GEM 2008, July 14-17, 2008, Las Vegas, Nevada, USA (2008) edited by Hamid R. Arabnia. Hamid R. Arabnia et al.: Proceedings of the 2010 International Conference on Genetic and Evolutionary Methods, GEM 2010, July 12-15, 2010, Las Vegas Nevada, USA (2010) edited by Hamid R. Arabnia. Kai Wang et al.: Comparison of existing triangulation methods for regularly and irregularly spaced height fields. (2001) authored by Hamid R. Arabnia. Hamid R. Arabnia et al.: Proceedings of the 2007 International Conference on Genetic and Evolutionary Methods, GEM 2007, June 25-28, 2007, Las Vegas, Nevada, USA (2007) edited by Hamid R. Arabnia. Ananda S. Chowdhury et al.: Improved Stereo Correlation using Moravec Operator and Kolmogorov-Smirnov Test. (2005) authored by Hamid R. Arabnia. Sahar Voghoei et al.: Students Success Modeling: Most Important Factors. (2023) authored by Hamid R. Arabnia. Rabia Jafri and Hamid R. Arabnia: A Survey of Face Recognition Techniques. (2009) authored by Hamid R. Arabnia. Hamid R. Arabnia: Proceedings of The 2005 International Conference on Modeling, Simulation and Visualization Methods, MSV 2005, Las Vegas, Nevada, USA, June 27-30, 2005 (2005) edited by Hamid R. Arabnia. Mahsa Imani et al.: Improving MAX-MIN ant system performance with the aid of ART2-based Twin Removal method. (2010) authored by Hamid R. Arabnia. Hamid R. Arabnia: Proceedings of the 2006 International Conference on Modeling, Simulation & Visualization Methods, MSV 2006, Las Vegas, Nevada, USA, June 26-29, 2006 (2006) edited by Hamid R. Arabnia. Rabia Jafri and Hamid R. Arabnia: A Survey of Component-Based Face Recognition Approaches. (2007) authored by Hamid R. Arabnia. Rabia Jafri et al.: Computer vision-based object recognition for the visually impaired in an indoors environment: a survey. (2014) authored by Hamid R. Arabnia. Hamid R. Arabnia et al.: Proceedings of the 2010 International Conference on Modeling, Simulation & Visualization Methods, MSV 2010, July 12-15, 2010, Las Vegas Nevada, USA (2010) edited by Hamid R. Arabnia. Ananda S. Chowdhury and Hamid R. Arabnia: A Comprehensive Study of Stereo Correlation Performance. (2004) authored by Hamid R. Arabnia. Rabia Jafri et al.: Visual and Infrared Sensor Data-Based Obstacle Detection for the Visually Impaired Using the Google Project Tango Tablet Development Kit and the Unity Engine. (2018) authored by Hamid R. Arabnia. Farzan Shenavarmasouleh et al.: DRDrV3: Complete Lesion Detection in Fundus Images Using Mask R-CNN, Transfer Learning, and LSTM. (2021) authored by Hamid R. Arabnia. Farid Ghareh Mohammadi and Hamid R. Arabnia: ISEA: Image Steganalysis using Evolutionary Algorithms. (2019) authored by Hamid R. Arabnia. Seyedamin Pouriyeh et al.: Graph-Based Methods for Ontology Summarization: A Survey. (2018) authored by Hamid R. Arabnia. Soheyla Amirian et al.: Automatic Image and Video Caption Generation With Deep Learning: A Concise Review and Algorithmic Overlap. (2020) authored by Hamid R. Arabnia. Hamid R. Arabnia: Proceedings of the 2007 International Conference on Modeling, Simulation & Visualization Methods, MSV 2007, Las Vegas, Nevada, USA, June 25-28, 2007 (2007) edited by Hamid R. Arabnia. Hamid R. Arabnia and Leonidas Deligiannidis: Proceedings of the 2009 International Conference on Modeling, Simulation & Visualization Methods, MSV 2009, July 13-16, 2009, Las Vegas Nevada, USA (2009) edited by Hamid R. Arabnia. Hamid R. Arabnia and Leonidas Deligiannidis: Proceedings of the 2008 International Conference on Modeling, Simulation & Visualization Methods, MSV 2008, Las Vegas, Nevada, USA, July 14-17, 2008 (2008) edited by Hamid R. Arabnia. Rabia Jafri and Hamid R. Arabnia: A Multi-Level Component-Based Approach for Face Recognition. (2007) authored by Hamid R. Arabnia. Rabia Jafri and Hamid R. Arabnia: Analysis of Subspace-based Face Recognition Techniques under Changes in Imaging Factors. (2007) authored by Hamid R. Arabnia. Hamid R. Arabnia: A distributed stereocorrelation algorithm. (1995) authored by Hamid R. Arabnia. Rabia Jafri et al.: A Skeleton-Based Deep Learning Approach for Recognizing Violent Actions in Surveillance Scenarios. (2022) authored by Hamid R. Arabnia. David Luper et al.: Spatial and Temporal Target Association through Semantic Analysis and GPS Data Mining. (2007) authored by Hamid R. Arabnia. Rabia Jafri and Hamid R. Arabnia: PCA-Based Methods for Face Recognition. (2007) authored by Hamid R. Arabnia. Seyed Amin Pouriyeh et al.: Graph-based Ontology Summarization: A Survey. (2018) authored by Hamid R. Arabnia. Hamid R. Arabnia and Anthony Scime: Proceedings of The 2005 International Conference on Data Mining, DMIN 2005, Las Vegas, Nevada, USA, June 20-23, 2005 (2005) edited by Hamid R. Arabnia. Farid Ghareh Mohammadi et al.: 3D-model ShapeNet Core Classification using Meta-Semantic Learning. (2022) authored by Hamid R. Arabnia. William Yang et al.: Identification of genes and pathways involved in kidney renal clear cell carcinoma. (2014) authored by Hamid R. Arabnia. Seyed Amin Pouriyeh et al.: Combining Word Embedding and Knowledge-Based Topic Modeling for Entity Summarization. (2018) authored by Hamid R. Arabnia. Vimala Balakrishnan et al.: Improving cyberbullying detection using Twitter users' psychological features and machine learning. (2020) authored by Hamid R. Arabnia. Hamid R. Arabnia et al.: Proceedings of the 2010 International Conference on Semantic Web & Web Services, SWWS 2010, July 12-15, 2010, Las Vegas, Nevada, USA (2010) edited by Hamid R. Arabnia. Robert Stahlbock et al.: Proceedings of The 2010 International Conference on Data Mining, DMIN 2010, July 12-15, 2010, Las Vegas, Nevada, USA (2010) edited by Hamid R. Arabnia. Hamid R. Arabnia et al.: Proceedings of the 2010 International Conference on Image Processing, Computer Vision, & Pattern Recognition, IPCV 2010, July 12-15, 2010, Las Vegas, Nevada, USA, 2 Volumes (2010) edited by Hamid R. Arabnia. Durga Yeluri et al.: Using Pattern Recognition Techniques in the Gait Analysis to Determine Osteoarthritis in Dogs. (2004) authored by Hamid R. Arabnia. Hamid R. Arabnia: Proceedings of the 2008 International Conference on Image Processing, Computer Vision, & Pattern Recognition, IPCV 2008, July 14-17, 2008, Las Vegas Nevada, USA, 2 Volumes (2008) edited by Hamid R. Arabnia'}. You can help Wikipedia by expanding it output format: answer
editor
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: In terms of cited by count, who has a higher score, the author of 'The Spring Loaded Inverted Pendulum as the Hybrid Zero Dynamics of an Asymmetric Hopper' or the author of '8 Analysis of location and dispersion effects from factorial experiments with a directional response'? Context: Youngil Kim et al.: Graphical methods for evaluating covering arrays. (2016) authored by Christine M. Anderson-Cook. Nathaniel T. Stevens et al.: Bayesian probability of predictive agreement for comparing the outcome of two separate regressions. (2018) authored by Christine M. Anderson-Cook. Christine M. Anderson‐Cook name Christine M. Anderson‐Cook. Jeanette J. Varela et al.: Predicting historical indoor temperatures from available local weather data. (2019) authored by Christine M. Anderson-Cook. Alexander D. Bolton and Christine M. Anderson-Cook: APT malware static trace analysis through bigrams and graph edit distance. (2017) authored by Christine M. Anderson-Cook. Christine M. Anderson‐Cook member of Los Alamos National Laboratory. Claire McKay Bowen et al.: Do Solar Proton Events Reduce the Number of Faults in Supercomputers?: A Comparative Analysis of Faults During and without Solar Proton Events. (2019) authored by Christine M. Anderson-Cook. Christine M. Anderson‐Cook alternativeName Christine Michaela Anderson‐Cook. Christine M. Anderson‐Cook alternativeName Christine Anderson‐Cook. Diane Oyen et al.: Bayesian Networks with Prior Knowledge for Malware Phylogenetics. (2016) authored by Christine M. Anderson-Cook '}. S. She became the first female recipient of the George Box Medal in 2021. , which she completed in 1994. D output format: answer
Jessy W. Grizzle
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Where did the author who wrote Timelines in citation research obtain their doctorate in mathematics? Context: Jan Bogaert et al.: Alternative area-perimeter ratios for measurement of 2D shape compactness of habitats. (2000) authored by Ronald Rousseau 0001. Guoliang Yang et al.: Using multi-level frontiers in DEA models to grade countries/territories. (2016) authored by Ronald Rousseau 0001. Yuxian Liu et al.: Partial orders for zero-sum arrays with applications to network theory. (2017) authored by Ronald Rousseau 0001. Guoliang Yang et al.: Reply to 'Comment on "Using multi-level frontiers in DEA models to grade countries/territories" by G.-l. Yang et al. [Journal of Informetrics 10(1) (2016), 238-253]'. (2017) authored by Ronald Rousseau 0001. Qiuju Zhou et al.: A general framework for describing diversity within systems and similarity between systems with applications in informetrics. (2012) authored by Ronald Rousseau 0001. Guoliang Yang et al.: Grading Countries/Territories Using DEA Frontiers. (2015) authored by Ronald Rousseau 0001. Yuxian Liu et al.: Empirical series of journal h-indices: The JCR category Horticulture as a case study. (2009) authored by Ronald Rousseau 0001. Xiaojun Hu et al.: Heterogeneity in an undirected network: Definition and measurement. (2017) authored by Ronald Rousseau 0001. Yuxian Liu and Ronald Rousseau: Dynamic aspects of domination networks. (2020) authored by Ronald Rousseau 0001. Leo Egghe and Ronald Rousseau: How to measure own-group preference? A novel approach to a sociometric problem. (2004) authored by Ronald Rousseau 0001. Ronald Rousseau: Concentration and Diversity of Availability and Use in Information Systems: A Positive Reinforcement Model. (1992) authored by Ronald Rousseau 0001. Yuxian Liu et al.: Reflections on and a short review of the science of team science. (2020) authored by Ronald Rousseau 0001. Leo Egghe et al.: Equalities between h-type Indices and Definitions of Rational h-type Indicators. (2019) authored by Ronald Rousseau 0001. Raf Guns and Ronald Rousseau: Unnormalized and normalized forms of gefura measures in directed and undirected networks. (2015) authored by Ronald Rousseau 0001. Jin-kun Wan et al.: The journal download immediacy index (DII): experiences using a Chinese full-text database. (2010) authored by Ronald Rousseau 0001. Jan Bogaert and Ronald Rousseau: Spatial aggregation of two-dimensional objects in raster data structures. (2001) authored by Ronald Rousseau 0001. Ronald Rousseau alternativeName Ronald Rousseau. Yuxian Liu et al.: A layered framework to study collaboration as a form of knowledge sharing and diffusion. (2013) authored by Ronald Rousseau 0001. Xiaojun Hu and Ronald Rousseau: A simple approach to describe a company's innovative activities and their technological breadth. (2015) authored by Ronald Rousseau 0001. Yuxian Liu and Ronald Rousseau: Further examples of dominance structure measurement. (2017) authored by Ronald Rousseau 0001. Guoliang Yang et al.: A study on directional returns to scale. (2014) authored by Ronald Rousseau 0001. Ronald Rousseau alternativeName R. M. Rousseau. Ronald Rousseau alternativeName Rousseau Ronald. Jan Bogaert et al.: Percolation as a Model for Informetric Distributions: Fragment Size Distribution Characterised by Bradford Curves. (2000) authored by Ronald Rousseau 0001. Per Ahlgren et al.: Requirements for a cocitation similarity measure, with special reference to Pearson's correlation coefficient. (2003) authored by Ronald Rousseau 0001. Ronald Rousseau: Balassa = revealed competitive advantage = activity. (2019) authored by Ronald Rousseau 0001. Leo Egghe and Ronald Rousseau: The small-world phenomenon: a model, explanations, characterizations and examples. (2024) authored by Ronald Rousseau 0001. Ronald Rousseau name Ronald Rousseau. Ronald Rousseau: Extended Boolean Retrieval: A Heuristic Approach? (1990) authored by Ronald Rousseau 0001. Ronald Rousseau: Merging data sets. (1989) authored by Ronald Rousseau 0001. Leo Egghe and Ronald Rousseau: An approach to similarity measurement of absence-presence data: the case that common zeros matter. (2004) authored by Ronald Rousseau 0001. Ronald Rousseau alternativeName R. Rousseau From 2007 till 2015, he was the seventh chairperson of ISSI. \nBooks\nArticles'} output format: answer
KU Leuven
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: How many publication citations does the institution of the author of 'Econophysics: can physicists contribute to the science of economics?' have? Context: Yanqing Ye et al.: Heterogeneous Graph Based Similarity Measure for Categorical Data Unsupervised Learning. (2019) authored by Harry Eugene Stanley. Hamidreza Mahyar et al.: A Compressive Sensing Framework for Distributed Detection of High Closeness Centrality Nodes in Networks. (2018) authored by Harry Eugene Stanley. Yongtao Zhang et al.: Universal Urban Spreading Pattern of COVID-19 and Its Underlying Mechanism. (2020) authored by Harry Eugene Stanley. Luis Cruz et al.: Generating a model of the three-dimensional spatial distribution of neurons using density maps. (2008) authored by Harry Eugene Stanley. Xuqing Huang et al.: Robustness of interdependent networks under targeted attack (2010) authored by Harry Eugene Stanley. Gaogao Dong et al.: Robustness of Network of Networks with Interdependent and Interconnected links. (2013) authored by Harry Eugene Stanley. Cecilia Lagorio et al.: Quarantine generated phase transition in epidemic spreading (2010) authored by Harry Eugene Stanley. Haipeng Peng et al.: P-Tensor Product in Compressed Sensing. (2019) authored by Harry Eugene Stanley. Chao-Yang Chen et al.: Tracking Performance Limitations of Networked Control Systems With Repeated Zeros and Poles. (2021) authored by Harry Eugene Stanley. Marco G. Mazza et al.: Cluster Monte Carlo and numerical mean field analysis for the water liquid-liquid phase transition. (2009) authored by Harry Eugene Stanley. Yihan Lin et al.: Spatiotemporal Input Control: Leveraging Temporal Variation in Network Dynamics. (2022) authored by Harry Eugene Stanley. Qian Liu et al.: A Spatio-Temporal Co-Clustering Framework for Discovering Mobility Patterns: A Study of Manhattan Taxi Data. (2021) authored by Harry Eugene Stanley The original system consisted of custom parts from a kit made by Park Enterprises, a Private Eye display, and a Twiddler chorded keyboard. S. S. S. He designed the hardware for his system, dubbed "The Lizzy", based on designs of the wearable "hip PC" designed by Doug Platt, who built Starner\'s original wearable. Since 1993, Starner has been wearing his own customized wearable computer system full-time, arguably one of the longest, if not the longest, such instances output format: answer
9090937
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Which award did Boppart receive in 2019 for Biophotonics Technology Innovation? Context: Tyler S. Ralston et al.: Multi-Dimensional Denoising of Real-Time Oct Imaging Data. (2006) authored by Stephen A. Boppart. Matias Carrasco Kind et al.: flimview : A software framework to handle, visualize and analyze FLIM data. (2020) authored by Stephen A. Boppart. Daniel L. Marks et al.: A Method for Dynamically Suppressing Sidelobes in Optical Coherence Tomography. (2004) authored by Stephen A. Boppart. Adam Zysk et al.: Contrast Enhancement and Artifact Reduction for Projected Index Computed Tomography. (2004) authored by Stephen A. Boppart. Guillermo L. Monroy et al.: Automated classification platform for the identification of otitis media using optical coherence tomography. (2019) authored by Stephen A. Boppart. Tyler S. Ralston et al.: Phase stability technique for inverse scattering in optical coherence tomography. (2006) authored by Stephen A. BoppartS. S. {'author_wikipedia_text': "Stephen A. and M. He also developed OCT for intraoperative breast cancer imaging to determine the status of the resection margin. This allows for three-dimensional imaging with extended depth-of-field and digital correction of optical aberrations. In 1991, he received his M. From 1991 to 1993, he developed national laser safety standards at the Air Force Research Laboratory in San Antonio, Texas. D output format: answer
SPIE
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: How many publications are attributed to the institution of the author who published 'Complexity Science and Representation in Robot Soccer'? Context: John Moore et al.: Prototyping lighting schemes to reflect solar energy storage in the home: a light bulb DSL. (2016) authored by Blaine A. Price. Bob Price alternativeName Brittany Nicole Price. Niaz Chowdhury et al.: EV charging: separation of green and brown energy using IoT. (2016) authored by Blaine A. Price. Dmitri S. Katz et al.: Data, Data Everywhere, and Still Too Hard to Link: Insights from User Interactions with Diabetes Apps. (2018) authored by Blaine A. Price. Bob Price alternativeName B.A. Price. Charith Perera et al.: Designing Privacy-aware Internet of Things Applications. (2017) authored by Blaine A. Price. Charith Perera et al.: Designing privacy-aware internet of things applications. (2020) authored by Blaine A. Price. Min Zhang et al.: Attitudes towards Online Community Support Initiatives during the COVID-19 pandemic: A Survey in the UK. (2022) authored by Blaine A. Price. Bob Price alternativeName B.B. Price. Bob Price alternativeName B. Price. Bob Price alternativeName Bob. Price. Bob Price alternativeName Blaine Price'}. Price. \nPrice was born in Montreal, Quebec, Canada. The current version of this module is M812 Digital Forensics. The next year he was made a permanent lecturer and launched a 4-year program to transform the delivery of Open University materials from paper and surface postal delivery to electronic delivery. \nHe appeared on the BBC Today programme on 12 August 2013 in connection with the Monitor Me programme on the BBC2 Horizon the same day output format: answer
36084
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the hIndex of the author of Analog VLSI-Based Modeling of the Primate Oculomotor System? Context: Christof Koch alternativeName Catherine Elizabeth Koch. Christof Koch name Christof Koch. Christof Koch 2YrMeanCitedness 1.6956521272659301758. Christof Koch alternativeName C. Koch. Christof Koch alternativeName Christof Koch. Christof Koch alternativeName Koch Christof. Christof Koch alternativeName Christoph Koch. Christof Koch alternativeName Christoph M. Koch. Christof Koch is Person. Ran Carmi and Christof Koch: Improving peer review with CARMA. (2007) authored by Christof Koch. Christof Koch written paper amount in year2013: 14. Christof Koch written paper amount in year2013: 14. Christof Koch is Creator. Christof Koch modified 2023-10-18. Öjvind Bernander and Christof Koch: Local Cross-Modality Image Alignment Using Unsupervised Learning. (1990) authored by Christof Koch. Christof Koch written paper amount in year2019: 7. Christof Koch written paper amount in year2019: 7. Christof Koch written paper amount in year2015: 21. Christof Koch written paper amount in year2015: 21 Upon losing the bet, Koch gifted Chalmers with a case of fine wine. Whether or not the Internet today feels like something to itself is completely speculative. Koch is the son of German parents; his father was a diplomat, as is his older brother Michael. All three summer schools continue to be taught. He was raised as a Roman Catholic and attended a Jesuit high school in Morocco. Allen. The project seeks to catalogue all the building blocks (ca. Koch advocates for a modern variant of panpsychism, the ancient philosophical belief that some form of consciousness can be found in all things output format: answer
105
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: How many publication citations does the institute of the researcher who publishes Dictionaries Revisited have? Context: David Tench et al.: GraphZeppelin: Storage-Friendly Sketching for Connected Components on Dynamic Graph Streams. (2022) authored by Martin Farach-Colton. David Tench et al.: GraphZeppelin: Storage-Friendly Sketching for Connected Components on Dynamic Graph Streams. (2022) authored by Martin Farach-Colton. Prashant Pandey et al.: Vector Quotient Filters: Overcoming the Time/Space Trade-Off in Filter Design. (2021) authored by Martin Farach-Colton. Richa Agarwala et al.: Local Rules for Protein Folding on a Triangular Lattice and Generalized Hydrophobicity in the HP Model. (1997) authored by Martin Farach-Colton. Richa Agarwala et al.: Local rules for protein folding on a triangular lattice and generalized hydrophobicity in the HP model. (1997) authored by Martin Farach-Colton. Richa Agarwala et al.: Local Rules for Protein Folding on a Triangular Lattice and Generalized Hydrophobicity in the HP Model. (1997) authored by Martin Farach-Colton. Martin Farach-Colton et al.: Streaming Algorithms for Planar Convex Hulls. (2018) authored by Martin Farach-Colton. Martin Farach-Colton et al.: Streaming Algorithms for Planar Convex Hulls. (2018) authored by Martin Farach-Colton. Martin Farach-Colton et al.: Dynamic Windows Scheduling with Reallocation. (2014) authored by Martin Farach-Colton. Martin Farach-Colton et al.: Dynamic Windows Scheduling with Reallocation. (2014) authored by Martin Farach-Colton. Martin Farach-Colton et al.: Dynamic Windows Scheduling with Reallocation. (2021) authored by Martin Farach-Colton. Martin Farach and Sampath Kannan: Efficient Algorithms for Inverting Evolution. (1999) authored by Martin Farach-Colton. Martin Farach-Colton and Sabine Storandt: Proceedings of the Symposium on Algorithm Engineering and Experiments, ALENEX 2021, Virtual Conference, January 10-11, 2021 (2021) edited by Martin Farach-Colton. Martin Farach and Sampath Kannan: Efficient Algorithms for Inverting Evolution. (1996) authored by Martin Farach-Colton. Michael A. Bender et al.: Adversarial Analyses of Window Backoff Strategies. (2004) authored by Martin Farach-Colton. Yang Huang and Martin Farach-Colton: Lattice based Clustering of Temporal Gene-Expression Matrices. (2007) authored by Martin Farach-Colton. Michael A. Bender et al.: Achieving optimal backlog in multi-processor cup games. (2019) authored by Martin Farach-Colton. Michael A. Bender et al.: Achieving Optimal Backlog in Multi-Processor Cup Games. (2019) authored by Martin Farach-Colton. Michael A. Bender et al.: Adversarial contention resolution for simple channels. (2005) authored by Martin Farach-Colton. William Jannen et al.: BetrFS: Write-Optimization in a Kernel File System. (2015) authored by Martin Farach-Colton. William Jannen et al.: BetrFS: A Right-Optimized Write-Optimized File System. (2015) authored by Martin Farach-Colton. Michael A. Bender et al.: Reallocation problems in scheduling. (2013) authored by Martin Farach-Colton. Michael A. Bender et al.: Reallocation Problems in Scheduling. (2015) authored by Martin Farach-Colton. Martin Farach-Colton and Yang Huang: A Linear Delay Algorithm for Building Concept Lattices. (2008) authored by Martin Farach-Colton. Paulo Sérgio Almeida et al.: Fault-tolerant aggregation: Flow-Updating meets Mass-Distribution. (2017) authored by Martin Farach-Colton. Jun Yuan et al.: Optimizing Every Operation in a Write-optimized File System. (2016) authored by Martin Farach-Colton. Jun Yuan et al.: Optimizing Every Operation in a Write-optimized File System. (2016) authored by Martin Farach-Colton. Michael A. Bender et al.: Reallocation Problems in Scheduling (2013) authored by Martin Farach-Colton He obtained his M. '}. While attending medical school, he met his future husband, with whom he now has twin children. He received his black belt from Russell Kerr in 2018. \nAfter completing his Ph output format: answer
5697020
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the cited by count where the contributor of Supporting requirements with video-based analysis is affiliated? Context: Marina Jirotka modified 2023-10-18. Marina Jirotka alternativeName Marina Jirotka. Martim Brandão et al.: Fair navigation planning: A resource for characterizing and designing fairness in mobile robots. (2020) authored by Marina Jirotka. Marina Jirotka alternativeName Martina Jirotka. Marina Jirotka name Marina Jirotka. Marina Jirotka alternativeName M. Jirotka. Marina Jirotka i10Index 5. Marina Jirotka 2YrMeanCitedness 3.5. Marina Jirotka written paper amount in year2015: 0. Marina Jirotka written paper amount in year2015: 0. Marina Jirotka written paper amount in year2020: 1"}. A proposal that robots using AI should be fitted with a type of inflight recorder, similar to those used by aircraft, to track the decisions and actions of the AI when operating in an uncontrolled environment and to aid in post-accident investigations. \nJirotka obtained her BSc in psychology and social anthropology from Goldsmiths College in 1985 and her Master's in Computing and Artificial Intelligence from the University of South Bank in 1987. She is known for her work with Alan Winfield on the 'Ethical Black Box' output format: answer
13055716
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Which author has a higher i10Index, the one who published 'Bouding the diameter of distance-regular graphs' or the writer of 'Memory Model = Instruction Reordering + Store Atomicity'? Context: Utsav Banerjee et al.: An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for Securing Internet-of-Things Applications. (2019) authored by Arvind. Utsav Banerjee et al.: An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for Securing Internet-of-Things Applications. (2019) authored by Arvind. Utsav Banerjee et al.: An energy-efficient reconfigurable DTLS cryptographic engine for End-to-End security in iot applications. (2018) authored by Arvind. Utsav Banerjee et al.: An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for End-to-End Security in IoT Applications. (2019) authored by Arvind. Man Cheuk Ng et al.: Airblue: a system for cross-layer wireless protocol development. (2010) authored by Arvind. Kermin Fleming et al.: H.264 Decoder: A Case Study in Multiple Design Points. (2008) authored by Arvind. Keshav Pingali and Arvind: Clarification of "Feeding Inputs on Demand" in Efficient Demand-Driven Evaluation - Part 1. (1986) authored by Arvind. Arvind and Ram Ratan: Bit-Plane Specific Selective Histogram Equalization for Image Enhancement and Representation. (2018) authored by Arvind. Sang Woo Jun et al.: A transport-layer network for distributed FPGA platforms. (2015) authored by Arvind. Abhinav Agarwal and Arvind: Leveraging rule-based designs for automatic power domain partitioning. (2013) authored by Arvind. Arvind et al.: A Lambda Calculus with Letrecs and Barriers. (1996) authored by Arvind. Arvind et al.: Getting Formal Verification into Design Flow. (2008) authored by Arvind. . Arvind member of Sri Karan Narendra Agriculture University, Jobner. Michael Pellauer et al.: A-Port Networks: Preserving the Timed Behavior of Synchronous Systems for Modeling on FPGAs. (2009) authored by Arvind. Ryan Newton et al.: Building up to macroprogramming: an intermediate language for sensor networks. (2005) authored by Arvind. Arvind: Demand-Driven Evaluation on Dataflow Machine. (1985) authored by Arvind. Zena M. Ariola and Arvind: A Syntactic Approach to Program Transformations. (1991) authored by Arvind. Keshav Pingali and Arvind: Efficient Demand-Driven Evaluation - Part 1. (1985) authored by Arvind. Nirav Dave et al.: Scheduling as Rule Composition. (2007) authored by Arvind. Keshav Pingali and Arvind: Efficient Demand-Driven Evaluation - Part 2. (1986) authored by Arvind S. T. '}. He served as chair from 1998 to 1999. He served as its president until his return to MIT in 2002. Sc. Sc. I. , headquartered in Waltham, Massachusetts output format: answer
Arvind
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: At which university did the author of 'A Combinatorial Solution for Model-Based Image Segmentation and Real-Time Tracking' work as an associate professor from 2005 until 2009? Context: Sherwin Bahmani et al.: Semantic Self-adaptation: Enhancing Generalization with a Single Sample. (2022) authored by Daniel Cremers. Yu Wang et al.: Explicit pairwise factorized graph neural network for semi-supervised node classification. (2021) authored by Daniel Cremers. Yu Wang et al.: Explicit Pairwise Factorized Graph Neural Network for Semi-Supervised Node Classification. (2021) authored by Daniel Cremers. Marvin Eisenberger et al.: A Unified Framework for Implicit Sinkhorn Differentiation. (2022) authored by Daniel Cremers. Marvin Eisenberger et al.: A Unified Framework for Implicit Sinkhorn Differentiation. (2022) authored by Daniel Cremers. Daniel Cremers 2YrMeanCitedness 2.7153847217559814453. Daniel Cremers and Evgeny Strekalovskiy: Total Cyclic Variation and Generalizations. (2013) authored by Daniel Cremers. Daniel Cremers i10Index 301. Daniel Cremers alternativeName Cremers Daniel. Emanuel Laude et al.: Bregman Proximal Mappings and Bregman-Moreau Envelopes Under Relative Prox-Regularity. (2020) authored by Daniel Cremers. Daniel Cremers alternativeName Daniel Cremers. Christian Tomani et al.: Parameterized Temperature Scaling for Boosting the Expressive Power in Post-Hoc Uncertainty Calibration. (2022) authored by Daniel Cremers. Christian Tomani et al.: Post-Hoc Uncertainty Calibration for Domain Drift Scenarios. (2021) authored by Daniel Cremers. Christian Tomani et al.: Post-hoc Uncertainty Calibration for Domain Drift Scenarios. (2020) authored by Daniel Cremers. Marek Schikora et al.: Probabilistic Classification of Disease symptoms caused by Salmonella on Arabidopsis Plants. (2010) authored by Daniel Cremers. Christian Tomani et al.: Parameterized Temperature Scaling for Boosting the Expressive Power in Post-Hoc Uncertainty Calibration. (2021) authored by Daniel Cremers. Martin Burger et al.: Spectral Decompositions Using One-Homogeneous Functionals. (2016) authored by Daniel Cremers. Martin Burger et al.: Spectral Decompositions using One-Homogeneous Functionals. (2016) authored by Daniel Cremers. Zhenzhang Ye et al.: Sublabel-Accurate Multilabeling Meets Product Label Spaces. (2021) authored by Daniel Cremers. Daniel Cremers modified 2023-10-18. Daniel Cremers name Daniel Cremers. Daniel Cremers alternativeName D. Cremers. Deepan Das et al.: Ventriloquist-Net: Leveraging Speech Cues for Emotive Talking Head Generation. (2022) authored by Daniel Cremers. Yan Xia et al.: SOE-Net: A Self-Attention and Orientation Encoding Network for Point Cloud based Place Recognition. (2020) authored by Daniel Cremers. Hoai Nam Dang et al.: Joint MR sequence optimization beats pure neural network approaches for spin-echo MRI super-resolution. (2023) authored by Daniel Cremers. Yan Xia et al.: SOE-Net: A Self-Attention and Orientation Encoding Network for Point Cloud Based Place Recognition. (2021) authored by Daniel Cremers. Kalin Kolev et al.: A variational approach to vesicle membrane reconstruction from fluorescence imaging. (2011) authored by Daniel Cremers. Dominik Schnaus et al.: Learning Expressive Priors for Generalization and Uncertainty Estimation in Neural Networks. (2023) authored by Daniel Cremers. Dominik Schnaus et al.: Learning Expressive Priors for Generalization and Uncertainty Estimation in Neural Networks. (2023) authored by Daniel Cremers. Satish Madhogaria et al.: Pixel-based classification method for detecting unhealthy regions in leaf images. (2011) authored by Daniel Cremers. Qadeer Khan et al.: Towards Generalizing Sensorimotor Control Across Weather Conditions. (2019) authored by Daniel Cremers. Qadeer Khan et al.: Towards Generalizing Sensorimotor Control Across Weather Conditions. (2019) authored by Daniel Cremers. Thomas Möllenhoff et al.: The Primal-Dual Hybrid Gradient Method for Semiconvex Splittings. (2014) authored by Daniel Cremers. Giorgio Fabbro et al.: Speech Synthesis and Control Using Differentiable DSP. (2020) authored by Daniel Cremers. Thomas Möllenhoff et al.: The Primal-Dual Hybrid Gradient Method for Semiconvex Splittings. (2015) authored by Daniel Cremers. Hans Hao-Hsun Hsu et al.: A Graph Is More Than Its Nodes: Towards Structured Uncertainty-Aware Learning on Graphs. (2022) authored by Daniel Cremers. Mahesh Chandra Mukkamala et al.: Bregman Proximal Gradient Algorithms for Deep Matrix Factorization. (2021) authored by Daniel Cremers. Ioannis Chiotellis and Daniel Cremers: Neural Online Graph Exploration. (2020) authored by Daniel Cremers. Ji Yang et al.: Dive into Layers: Neural Network Capacity Bounding using Algebraic Geometry. (2021) authored by Daniel Cremers. Patrick Wenzel et al.: Modular Vehicle Control for Transferring Semantic Information Between Weather Conditions Using GANs. (2018) authored by Daniel Cremers. Yuesong Shen et al.: Variational Learning is Effective for Large Deep Networks. (2024) authored by Daniel Cremers. Daniel Cremers orcidId https://orcid.org/0000-0002-3079-7984. Lukas von Stumberg et al.: Autonomous Exploration with a Low-Cost Quadrocopter using Semi-Dense Monocular SLAM. (2016) authored by Daniel Cremers. Emanuel Laude et al.: A Nonconvex Proximal Splitting Algorithm under Moreau-Yosida Regularization. (2018) authored by Daniel Cremers. Lu Sang et al.: Inferring Super-Resolution Depth from a Moving Light-Source Enhanced RGB-D Sensor: A Variational Approach. (2020) authored by Daniel Cremers. Lu Sang et al.: Inferring Super-Resolution Depth from a Moving Light-Source Enhanced RGB-D Sensor: A Variational Approach. (2019) authored by Daniel Cremers. Lu Sang et al.: High-Quality RGB-D Reconstruction via Multi-View Uncalibrated Photometric Stereo and Gradient-SDF. (2022) authored by Daniel Cremers. Aleksei Vasilev et al.: q-Space Novelty Detection with Variational Autoencoders. (2018) authored by Daniel Cremers. Lu Sang et al.: High-Quality RGB-D Reconstruction via Multi-View Uncalibrated Photometric Stereo and Gradient-SDF. (2023) authored by Daniel Cremers. Daniel Cremers is Creator"'}. He was associate professor at the University of Bonn from 2005 until 2009 output format: answer
University of Bonn
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Who has a higher hIndex, Moustafa Youssef or Liu Ling? Context: Bhuvan Bamba et al.: A motion-aware safe period-based framework for spatial alarm processing. (2010) authored by Ling Liu 0001. Kisung Lee et al.: Road Network-Aware Spatial Alarms. (2016) authored by Ling Liu 0001. Tarik Arici et al.: PINCO: a pipelined in-network compression scheme for data collection in wireless sensor networks. (2003) authored by Ling Liu 0001. Bhuvan Bamba et al.: Supporting anonymous location queries in mobile environments with privacygrid. (2008) authored by Ling Liu 0001. Balaji Palanisamy et al.: Location Privacy with Road Network Mix-Zones. (2012) authored by Ling Liu 0001. Gaoyang Liu et al.: Synchronization-Free GPS Spoofing Detection with Crowdsourced Air Traffic Control Data. (2019) authored by Ling Liu 0001. Binh Han et al.: NEAT: Road Network Aware Trajectory Clustering. (2012) authored by Ling Liu 0001. Jianjun Zhang et al.: GeoGrid: A Scalable Location Service Network. (2007) authored by Ling Liu 0001. Kisung Lee et al.: RoadAlarm: A spatial alarm system on road networks. (2013) authored by Ling Liu 0001. Pei Ren et al.: Edge-Assisted Distributed DNN Collaborative Computing Approach for Mobile Web Augmented Reality in 5G Networks. (2020) authored by Ling Liu 0001. Mudhakar Srivatsa et al.: A Scalable Method for Access Control in Location-Based Broadcast Services. (2008) authored by Ling Liu 0001. Gong Zhang et al.: Scalable and Reliable Location Services through Decentralized Replication. (2009) authored by Ling Liu 0001. Binh Han et al.: Road-Network Aware Trajectory Clustering: Integrating Locality, Flow, and Density. (2015) authored by Ling Liu 0001. Emre Yigitoglu et al.: PrivacyZone: A Novel Approach to Protecting Location Privacy of Mobile Users. (2018) authored by Ling Liu 0001. R. Kipp Jones et al.: Improving Wireless Positioning with Look-ahead Map-Matching. (2007) authored by Ling Liu 0001. Bhuvan Bamba et al.: Distributed Processing of Spatial Alarms: A Safe Region-Based Approach. (2009) authored by Ling Liu 0001. Sangeetha Seshadri et al.: A Systematic Approach to System State Restoration during Storage Controller Micro-Recovery. (2009) authored by Ling Liu 0001. Péter Pesti et al.: RoadTrack: Scaling Location Updates for Mobile Clients on Road Networks with Query Awareness. (2010) authored by Ling Liu 0001. Balaji Palanisamy et al.: Road network mix-zones for anonymous location based services. (2013) authored by Ling Liu 0001. Bugra Gedik et al.: Energy efficient exact kNN search in wireless broadcast environments. (2004) authored by Ling Liu 0001. Matt Weber et al.: On map matching of wireless positioning data: a selective look-ahead approach. (2010) authored by Ling Liu 0001. Bhuvan Bamba et al.: Road Network-Aware Anonymization in Mobile Systems with Reciprocity Support. (2015) authored by Ling Liu 0001. Chungheon Yi et al.: Pressure-Pair-Based Floor Localization System Using Barometric Sensors on Smartphones. (2019) authored by Ling Liu 0001. Sung-Hyun Sim et al.: Bagging Recurrent Event Imputation for Repair of Imperfect Event Log With Missing Categorical Events. (2023) authored by Ling Liu 0001. Bugra Gedik et al.: ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks. (2007) authored by Ling Liu 0001. Sung-Hyun Sim et al.: Automatic Discovery of Multi-perspective Process Model using Reinforcement Learning. (2022) authored by Ling Liu 0001. Jingya Zhou et al.: Network Representation Learning: From Preprocessing, Feature Extraction to Node Embedding. (2021) authored by Ling Liu 0001. Jingya Zhou et al.: Network Representation Learning: From Preprocessing, Feature Extraction to Node Embedding. (2023) authored by Ling Liu 0001. Emre Yigitoglu et al.: Foggy: A Framework for Continuous Automated IoT Application Deployment in Fog Computing. (2017) authored by Ling Liu 0001. Stacey Truex et al.: The TSC-PFed Architecture for Privacy-Preserving FL. (2021) authored by Ling Liu 0001. Jianjun Zhang et al.: A Utility-Aware Middleware Architecture for Decentralized Group Communication Applications. (2007) authored by Ling Liu 0001. Yakun Huang et al.: A Lightweight Collaborative Recognition System with Binary Convolutional Neural Network for Mobile Web Augmented Reality. (2019) authored by Ling Liu 0001. Anand Murugappan and Ling Liu: An Energy Efficient Middleware Architecture for Processing Spatial Alarms on Mobile Clients. (2010) authored by Ling Liu 0001. Kisung Lee et al.: Scaling Spatial Alarm Services on Road Networks. (2012) authored by Ling Liu 0001. Rui Zhang et al.: Searchable Encryption for Healthcare Clouds: A Survey. (2018) authored by Ling Liu 0001. Rui Zhang et al.: Clustering Noisy Trajectories via Robust Deep Attention Auto-Encoders. (2019) authored by Ling Liu 0001. Mudhakar Srivatsa et al.: Scalable key management algorithms for location-based services. (2009) authored by Ling Liu 0001. Bugra Gedik et al.: Lira: Lightweight, Region-aware Load Shedding in Mobile CQ Systems. (2007) authored by Ling Liu 0001. Lonnie D. Harvel et al.: Context Cube: Flexible and Effective Manipulation of Sensed Context Data. (2004) authored by Ling Liu 0001. Lakshmish Ramaswamy et al.: Automatic detection of fragments in dynamically generated web pages. (2004) authored by Ling Liu 0001. Emre Yigitoglu et al.: Utility-Aware and Privacy-Preserving Mobile Query Services. (2023) authored by Ling Liu 0001. Emre Yigitoglu et al.: Utility-aware and privacy-preserving mobile query services. (2019) authored by Ling Liu 0001. Bugra Gedik et al.: MobiQual: QoS-aware Load Shedding in Mobile CQ Systems. (2008) authored by Ling Liu 0001. Eladio Martin et al.: Unified analytical models for Location Management costs and optimum design of location areas. (2009) authored by Ling Liu 0001. Renato Fileto et al.: Building a Semantic Web System for Scientific Applications: An Engineering Approach. (2005) authored by Ling Liu 0001. Dohee Kim et al.: Improving Time-Series Classification Accuracy Based on Temporal Feature Representation Learning Using CRU-LSTM Autoencoder. (2023) authored by Ling Liu 0001. Mehmet Emre Gursoy et al.: Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces. (2018) authored by Ling Liu 0001. Juhyun Bae et al.: RDMAbox: Optimizing RDMA for Memory Intensive Workload. (2021) authored by Ling Liu 0001. Stacey Truex et al.: Privacy-Preserving Inductive Learning with Decision Trees. (2017) authored by Ling Liu 0001. Yakun Huang et al.: DeepAdapter: A Collaborative Deep Learning Framework for the Mobile Web Using Context-Aware Network Pruning. (2020) authored by Ling Liu 0001 She was an assistant and associate professor at the Oregon Graduate Institute (now part of the Oregon Health & Science University) from 1997 to 1999 before taking her present position at Georgia Tech in 1999. She is a professor in the Georgia Institute of Technology School of Computer Science output format: answer
Moustafa Youssef
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the cited by count where the contributor of 'Reinforcement Learning with Exogenous States and Rewards' article is affiliated? Context: Tony Fountain et al.: Mining IC test data to optimize VLSI testing. (2000) authored by Thomas G. Dietterich. Natalia Larios et al.: Automated insect identification through concatenated histograms of local appearance features: feature vector generation and region detection for deformable objects. (2008) authored by Thomas G. Dietterich. Daniel Sheldon et al.: Approximate Bayesian Inference for Reconstructing Velocities of Migrating Birds from Weather Radar. (2013) authored by Thomas G. Dietterich. Natalia Larios et al.: Haar Random Forest Features and SVM Spatial Matching Kernel for Stonefly Species Identification. (2010) authored by Thomas G. Dietterich. Andrew Farnsworth et al.: Reconstructing Velocities of Migrating Birds from Weather Radar - A Case Study in Computational Sustainability. (2014) authored by Thomas G. Dietterich. Natalia Larios et al.: Automated Insect Identification through Concatenated Histograms of Local Appearance Features. (2007) authored by Thomas G. Dietterich. Si Liu et al.: Can We Achieve Open Category Detection with Guarantees? (2018) authored by Thomas G. Dietterich. Wei Zhang and Thomas G. Dietterich: High-Performance Job-Shop Scheduling With A Time-Delay TD-lambda Network. (1995) authored by Thomas G. Dietterich. Tadesse Zemicheal and Thomas G. Dietterich: Anomaly detection in the presence of missing values for weather data quality control. (2019) authored by Thomas G. Dietterich. Li-Ping Liu et al.: Transductive Optimization of Top k Precision. (2016) authored by Thomas G. Dietterich. Li-Ping Liu et al.: Transductive Optimization of Top k Precision. (2015) authored by Thomas G. Dietterich. Shiv Shankar et al.: Three-quarter Sibling Regression for Denoising Observational Data. (2019) authored by Thomas G. Dietterich. Risheek Garrepalli et al.: Oracle Analysis of Representations for Deep Open Set Detection. (2022) authored by Thomas G. Dietterich. Shiv Shankar et al.: Three-quarter Sibling Regression for Denoising Observational Data. (2021) authored by Thomas G. Dietterich. Si Liu et al.: PAC Guarantees and Effective Algorithms for Detecting Novel Categories. (2022) authored by Thomas G. Dietterich. Thomas G. Dietterich name Thomas G. Dietterich. Si Liu et al.: Open Category Detection with PAC Guarantees. (2018) authored by Thomas G. Dietterich. Si Liu et al.: Open Category Detection with PAC Guarantees. (2018) authored by Thomas G. Dietterich. Thomas G. Dietterich et al.: Solving the Multiple Instance Problem with Axis-Parallel Rectangles. (1997) authored by Thomas G. Dietterich. Andrew Emmott et al.: Systematic Construction of Anomaly Detection Benchmarks from Real Data. (2015) authored by Thomas G. Dietterich. Thomas G. Dietterich alternativeName Thomas Glen Dietterich. Carlos Jensen et al.: The life and times of files and information: a study of desktop provenance. (2010) authored by Thomas G. Dietterich. Dietrich Wettschereck and Thomas G. Dietterich: An Experimental Comparison of the Nearest-Neighbor and Nearest-Hyperrectangle Algorithms. (1995) authored by Thomas G. Dietterich. Thomas G. Dietterich and Ryszard S. Michalski: Learning and Generalization of Characteristic Descriptions: Evaluation Criteria and Comparative Review of Selected Methods. (1979) authored by Thomas G. Dietterich. Wei Zhang et al.: A Hierarchical Object Recognition System Based on Multi-scale Principal Curvature Regions. (2006) authored by Thomas G. Dietterich. Jianqiang Shen et al.: Real-Time Detection of Task Switches of Desktop Users. (2007) authored by Thomas G. Dietterich. Erich Merrill et al.: Deep Convolution for Irregularly Sampled Temporal Point Clouds. (2021) authored by Thomas G. Dietterich. Dan Hendrycks et al.: Deep Anomaly Detection with Outlier Exposure. (2018) authored by Thomas G. Dietterich. Dan Hendrycks et al.: Deep Anomaly Detection with Outlier Exposure. (2019) authored by Thomas G. Dietterich His family later moved to New Jersey and then again to Illinois, where Tom graduated from Naperville Central High School. 1 million bird observations. This passion has led to several projects including research in wildfire management, invasive vegetation and understanding the distribution and migration of birds. Machine learning can uncover patterns in data to model the migration of species. D. in 2013, he was named "Distinguished Professor". I am passionate about that. \nThomas Dietterich was born in South Weymouth, Massachusetts, in 1954. Instead, much of the work done in the AI safety community does indeed focus around accidents and design flaws output format: answer
2646658
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Who is the spouse of the creator of the paper Dictionaries Revisited? Context: Yang Huang and Martin Farach-Colton: Lattice based Clustering of Temporal Gene-Expression Matrices. (2007) authored by Martin Farach-Colton. Michael A. Bender et al.: Optimal Ball Recycling. (2019) authored by Martin Farach-Colton. Michael A. Bender et al.: Adversarial Analyses of Window Backoff Strategies. (2004) authored by Martin Farach-Colton. Michael A. Bender et al.: Optimal Ball Recycling. (2018) authored by Martin Farach-Colton. Prashant Pandey et al.: Vector Quotient Filters: Overcoming the Time/Space Trade-Off in Filter Design. (2021) authored by Martin Farach-Colton. Paulo Sérgio Almeida et al.: Fault-tolerant aggregation: Flow-Updating meets Mass-Distribution. (2017) authored by Martin Farach-Colton. Paulo Sérgio Almeida et al.: Fault-Tolerant Aggregation: Flow-Updating Meets Mass-Distribution. (2011) authored by Martin Farach-Colton. Paulo Sérgio Almeida et al.: Fault-Tolerant Aggregation: Flow-Updating Meets Mass-Distribution (2011) authored by Martin Farach-Colton. Martin Farach-Colton et al.: Streaming Algorithms for Planar Convex Hulls. (2018) authored by Martin Farach-Colton. Martin Farach-Colton et al.: Streaming Algorithms for Planar Convex Hulls. (2018) authored by Martin Farach-Colton. Rahul Shah and Martin Farach-Colton: Undiscretized dynamic programming: faster algorithms for facility location and related problems on trees. (2002) authored by Martin Farach-Colton. Martin Farach-Colton and Miguel A. Mosteiro: Initializing Sensor Networks of Non-uniform Density in the Weak Sensor Model. (2015) authored by Martin Farach-Colton. David Tench et al.: GraphZeppelin: Storage-Friendly Sketching for Connected Components on Dynamic Graph Streams. (2022) authored by Martin Farach-Colton. David Tench et al.: GraphZeppelin: Storage-Friendly Sketching for Connected Components on Dynamic Graph Streams. (2022) authored by Martin Farach-Colton. Martin Farach-Colton and Miguel A. Mosteiro: Initializing Sensor Networks of Non-uniform Density in the Weak Sensor Model. (2007) authored by Martin Farach-Colton. Michael A. Bender et al.: Achieving optimal backlog in multi-processor cup games. (2019) authored by Martin Farach-Colton. Michael A. Bender et al.: Achieving Optimal Backlog in Multi-Processor Cup Games. (2019) authored by Martin Farach-Colton. Gabriela Hristescu et al.: DNA Strand Separation Prediction: A Parallel Implementation. (1997) authored by Martin Farach-Colton. Martı́n Farach-Colton 2YrMeanCitedness 0.31999999284744262695. Richa Agarwala et al.: Local Rules for Protein Folding on a Triangular Lattice and Generalized Hydrophobicity in the HP Model. (1997) authored by Martin Farach-Colton. Richa Agarwala et al.: Local rules for protein folding on a triangular lattice and generalized hydrophobicity in the HP model. (1997) authored by Martin Farach-Colton. Richa Agarwala et al.: Local Rules for Protein Folding on a Triangular Lattice and Generalized Hydrophobicity in the HP Model. (1997) authored by Martin Farach-Colton. Antonina Mitrofanova et al.: Efficient and Robust Prediction Algorithms for Protein Complexes Using Gomory-Hu Trees. (2009) authored by Martin Farach-Colton. Martin Farach-Colton et al.: Dynamic Windows Scheduling with Reallocation. (2021) authored by Martin Farach-Colton. Martin Farach et al.: A Robust Model for Finding Optimal Evolutionary Trees. (1995) authored by Martin Farach-Colton. Muhammad A. Awad et al.: Engineering a high-performance GPU B-Tree. (2019) authored by Martin Farach-Colton. Martin Farach-Colton et al.: Dynamic Windows Scheduling with Reallocation. (2014) authored by Martin Farach-Colton. Martin Farach-Colton et al.: Dynamic Windows Scheduling with Reallocation. (2014) authored by Martin Farach-Colton He received his black belt from Russell Kerr in 2018. \nFarach-Colton is of Argentine descent, and grew up in South Carolina. \nFarach-Colton is an avid Brazilian jiu-jitsu practitioner and received a bronze medal at the 2015 World Master Jiu-Jitsu IBJJF Championship. He obtained his M. \nAfter completing his Ph output format: answer
Russell Kerr
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: In what year did the author join Princeton as the Hamrick Professor and became one of only three female full professors in engineering at Princeton? Context: Burak Erbagci et al.: A 32kB secure cache memory with dynamic replacement mapping in 65nm bulk CMOS. (2015) authored by Ruby B. Lee. Tianwei Zhang et al.: Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation. (2016) authored by Ruby B. Lee. Timothy E. Levin et al.: Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture. (2009) authored by Ruby B. Lee. Reouven Elbaz et al.: TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. (2007) authored by Ruby B. Lee. Sanchuan Chen et al.: Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses. (2018) authored by Ruby B. Lee. Zecheng He et al.: Detecting Zero-day Controller Hijacking Attacks on the Power-Grid with Enhanced Deep Learning. (2018) authored by Ruby B. Lee. Daniel F. Zucker et al.: Hardware and software cache prefetching techniques for MPEG benchmarks. (2000) authored by Ruby B. Lee. Vasudev Bhaskaran et al.: Algorithmic and architectural enhancements for real-time MPEG-1 decoding on a general purpose RISC workstation. (1995) authored by Ruby B. Lee. Daniel F. Zucker et al.: An Automated Method for Software Controlled Cache Prefetching. (1998) authored by Ruby B. Lee. Zhen Luo and Ruby B. Lee: Cost-effective multiplication with enhanced adders for multimedia applications. (2000) authored by Ruby B. Lee. Yu-Yuan Chen et al.: A software-hardware architecture for self-protecting data. (2012) authored by Ruby B. Lee. Tianwei Zhang et al.: CloudShelter: Protecting Virtual Machines' Memory Resource Availability in Clouds. (2017) authored by Ruby B. Lee. Tianwei Zhang et al.: CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds. (2016) authored by Ruby B. Lee. Jangseop Shin et al.: A hardware-based technique for efficient implicit information flow tracking. (2016) authored by Ruby B. Lee. Tianwei Zhang et al.: Analyzing Cache Side Channels Using Deep Neural Networks. (2018) authored by Ruby B. Lee. Zecheng He et al.: Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning. (2019) authored by Ruby B. Lee. Jakub Szefer et al.: Physical attack protection with human-secure virtualization in data centers. (2012) authored by Ruby B. Lee. David Champagne et al.: Forward-Secure Content Distribution to Reconfigurable Hardware. (2008) authored by Ruby B. Lee. Zecheng He et al.: Machine Learning Based DDoS Attack Detection from Source Side in Cloud. (2017) authored by Ruby B. Lee. Guangyuan Hu and Ruby B. Lee: Protecting Cache States Against Both Speculative Execution Attacks and Side-channel Attacks. (2023) authored by Ruby B. Lee. Jeffrey S. Dwoskin et al.: Secure Key Management Architecture Against Sensor-Node Fabrication Attacks. (2007) authored by Ruby B. Lee. Zhenghong Wang and Ruby B. Lee: New cache designs for thwarting software cache-based side channel attacks. (2007) authored by Ruby B. Lee. Tianwei Zhang and Ruby B. Lee: Design, Implementation and Verification of Cloud Architecture for Monitoring a Virtual Machine's Security Health. (2018) authored by Ruby B. Lee'}. \nAt Hewlett-Packard, Lee designed the PA-RISC architecture and microprocessors based on it, and the multimedia components of the IA-64 (Itanium) architecture. \nIn 2001 Lee was elected as a Fellow of the Association for Computing Machinery "for pioneering multimedia instructions in general-purpose processor architecture and innovations in the design and implementation of the instruction set architecture of RISC processors output format: answer
1998
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Who has more worksCount, Azzedine Boukerche or Katharina Morik? Context: Sibylle Hess et al.: The PRIMPing Routine - Tiling through Proximal Alternating Linearized Minimization. (2019) authored by Katharina Morik. Sibylle Hess et al.: The PRIMPING routine - Tiling through proximal alternating linearized minimization. (2017) authored by Katharina Morik. Sangkyun Lee et al.: Separable Approximate Optimization of Support Vector Machines for Distributed Sensing. (2012) authored by Katharina Morik. Jean-François Boulicaut et al.: Detecting Local Patterns, 12.04. - 16.04.2004 (2004) edited by Katharina Morik. Sebastian Buschjäger et al.: Generalized Isolation Forest: Some Theory and More Applications Extended Abstract. (2020) authored by Katharina Morik. Sebastian Buschjäger et al.: On-Site Gamma-Hadron Separation with Deep Learning on FPGAs. (2020) authored by Katharina Morik. Lukas Pfahler and Katharina Morik: Self-Supervised Pretraining of Graph Neural Network for the Retrieval of Related Mathematical Expressions in Scientific Articles. (2022) authored by Katharina Morik. Felix Gonsior et al.: Structure Search for Normalizing Flows. (2021) authored by Katharina Morik. Mikail Yayla et al.: FeFET-Based Binarized Neural Networks Under Temperature-Dependent Bit Errors. (2022) authored by Katharina Morik. Christian Pölitz et al.: Interpretable domain adaptation via optimization over the Stiefel manifold. (2016) authored by Katharina Morik. Marco Stolpe et al.: Anomaly Detection in Vertically Partitioned Data by Distributed Core Vector Machines. (2013) authored by Katharina Morik. Nico Piatkowski et al.: Open Smartphone Data for Structured Mobility and Utilization Analysis in Ubiquitous Systems. (2013) authored by Katharina Morik. Sebastian Buschjäger et al.: Towards Explainable Bit Error Tolerance of Resistive RAM-Based Binarized Neural Networks. (2020) authored by Katharina Morik. Sibylle Hess et al.: The SpectACl of Nonconvex Clustering: A Spectral Approach to Density-Based Clustering. (2019) authored by Katharina Morik. Sibylle Hess et al.: The SpectACl of Nonconvex Clustering: A Spectral Approach to Density-Based Clustering. (2019) authored by Katharina Morik. Mirco Nanni et al.: Give more data, awareness and control to individual citizens, and they will help COVID-19 containment. (2021) authored by Katharina Morik. Sebastian Buschjäger et al.: Generalized Negative Correlation Learning for Deep Ensembling. (2020) authored by Katharina Morik. Philipp-Jan Honysz et al.: GPU-Accelerated Optimizer-Aware Evaluation of Submodular Exemplar Clustering. (2021) authored by Katharina Morik. Thomas Liebig et al.: Distributed Traffic Flow Prediction with Label Proportions: From in-Network towards High Performance Computation with MPI. (2015) authored by Katharina Morik. Mirco Nanni et al.: Give more data, awareness and control to individual citizens, and they will help COVID-19 containment. (2020) authored by Katharina Morik. Mirco Nanni et al.: Give more data, awareness and control to individual citizens, and they will help COVID-19 containment. (2020) authored by Katharina Morik. Jörg Lässig et al.: Computational Sustainability (2016) edited by Katharina Morik. Sibylle Hess et al.: The Trustworthy Pal: Controlling the False Discovery Rate in Boolean Matrix Factorization. (2019) authored by Katharina Morik. Sibylle Hess et al.: The Trustworthy Pal: Controlling the False Discovery Rate in Boolean Matrix Factorization. (2018) authored by Katharina Morik. Michael R. Berthold et al.: Parallel Universes and Local Patterns, 01.05. - 04.05.2007 (2007) edited by Katharina Morik. Sebastian Buschjäger et al.: Summary Extraction on Data Streams in Embedded Systems. (2017) authored by Katharina Morik. Mirko Bunse et al.: A Data Science Perspective on Deconvolution. (2019) authored by Katharina Morik. Alexandra Poulovassilis et al.: Proceedings of the Workshops of the EDBT/ICDT 2020 Joint Conference, Copenhagen, Denmark, March 30, 2020 (2020) edited by Katharina Morik'}. ) in 1981 at the University of Hamburg, with the dissertation Validierung von Überzeugungssystemen der künstlichen Intelligenz vor dem Hintergrund linguistischer Theorien über implizite Äußerungen supervised by Walther von Hahn output format: answer
Azzedine Boukerche
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: How many publication citations does the institution of the author who published the paper 'Image Quality-Based Illumination-Invariant Face Recognition' have? Context: Marina L. Gavrilova et al.: Optimization Techniques in an Event-Driven Simulation of a Shaker Ball Mill. (2002) authored by Marina L. Gavrilova. Petr Broz et al.: Path planning in dynamic environment using an adaptive mesh. (2007) authored by Marina L. Gavrilova. Russel A. Apu and Marina L. Gavrilova: An Efficient Swarm Neighborhood Management for a 3D Tactical Simulator. (2006) authored by Marina L. Gavrilova. Russel A. Apu and Marina L. Gavrilova: Efficient Swarm Neighborhood Management Using the Layered Delaunay Triangulation. (2008) authored by Marina L. Gavrilova. Priyadarshi Bhattacharya and Marina L. Gavrilova: Roadmap-Based Path Planning - Using the Voronoi Diagram for a Clearance-Based Shortest Path. (2008) authored by Marina L. Gavrilova. Witold Kinsner et al.: Recent Advances in Cognitive Informatics and Cognitive Computing towards Autonomous Systems (Plenary Panel Report-II of IEEE ICCI*CC'22). (2022) authored by Marina L. Gavrilova. Mahmudul Hasan et al.: A Geometric Approach to Clearance Based Path Optimization. (2007) authored by Marina L. Gavrilova. Mahmudul Hasan et al.: Clearance-based homotopic optimal path computation. (2012) authored by Marina L. Gavrilova. Marina L. Gavrilova: 2011 International Conference on Cyberworlds, CW 2011, Calgary, Alberta, Canada, October 4-6, 2011 (2011) edited by Marina L. Gavrilova. Marina L. Gavrilova et al.: Transactions on Computational Science XV - Special Issue on Advances in Autonomic Computing: Formal Engineering Methods for Nature-Inspired Computing Systems (2012) edited by Marina L. Gavrilova. Hossein Talebi et al.: Multi-scale Foreign Exchange Rates Ensemble for Classification of Trends in Forex Market. (2014) authored by Marina L. Gavrilova. Leila Hashemi Beni et al.: Toward 3D spatial dynamic field simulation within GIS using kinetic Voronoi diagram and Delaunay tetrahedralization. (2011) authored by Marina L. Gavrilova. Marina L. Gavrilova et al.: Object-Oriented Library for Granular-Type Materials Simulation. (2000) authored by Marina L. Gavrilova. Mahmudul Hasan and Marina L. Gavrilova: A Geometric Approach to Drill Path Collision Avoidance. (2010) authored by Marina L. Gavrilova. Marina L. Gavrilova and Kushan Ahmadian: On-demand chaotic neural network for broadcast scheduling problem. (2012) authored by Marina L. Gavrilova. Yingxu Wang et al.: Cognitive Informatics: Towards Cognitive Machine Learning and Autonomous Knowledge Manipulation. (2018) authored by Marina L. Gavrilova. Kushan Ahmadian and Marina L. Gavrilova: On-Demand Chaotic Neural Network for Broadcast Scheduling Problem. (2009) authored by Marina L. Gavrilova. Marina L. Gavrilova: Empirical Studies of Optimization Techniques in the Event-Driven Simulation of Mechanically Alloyed Materials. (2004) authored by Marina L. Gavrilova. Mehrdad Valipour et al.: Algorithms for determining semantic relations of formal concepts by cognitive machine learning based on concept algebra. (2016) authored by Marina L. Gavrilova. Yingxu Wang et al.: Cognitive Informatics in Year 10 and Beyond: summary of the plenary panel. (2011) authored by Marina L. Gavrilova. Marina L. Gavrilova name Marina L. Gavrilova. Marina L. Gavrilova and Sergei Bespamyatnikh: On exact solution of a point-location problem in a system of d-dimensional hyperbolic surfaces. (2003) authored by Marina L. Gavrilova. Alexey V. Anikeenko et al.: Shapes of Delaunay Simplexes and Structural Analysis of Hard Sphere Packings. (2008) authored by Marina L. Gavrilova. Yousheng Tian et al.: A Formal Knowledge Representation System (FKRS) for the Intelligent Knowledge Base of a Cognitive Learning Engine. (2011) authored by Marina L. Gavrilova. Kushan Ahmadian et al.: Multi-criteria Optimization in GIS: Continuous K-Nearest Neighbor Search in Mobile Navigation. (2010) authored by Marina L. Gavrilova. Priyadarshi Bhattacharya and Marina L. Gavrilova: Voronoi diagram in optimal path planning. (2007) authored by Marina L. Gavrilova. Russel A. Apu and Marina L. Gavrilova: Adaptive mesh generation for real-time terrain modeling. (2004) authored by Marina L. Gavrilova. Priyadarshi Bhattacharya and Marina L. Gavrilova: Geometric algorithms for clearance based optimal path computation. (2007) authored by Marina L. Gavrilova. Yingxu Wang et al.: Formal Ontology Generation by deep machine learning. (2017) authored by Marina L. Gavrilova. K. N. Pavan Kumar and Marina L. Gavrilova: Latent Personality Traits Assessment From Social Network Activity Using Contextual Language Embedding. (2022) authored by Marina L. Gavrilova. Alexey V. Anikeenko et al.: A Novel Delaunay Simplex Technique for Detection of Crystalline Nuclei in Dense Packings of Spheres. (2005) authored by Marina L. Gavrilova. Marina L. Gavrilova et al.: Constructing Three-Dimensional Models for Surgical Training Simulators. (2017) authored by Marina L. Gavrilova. Yousheng Tian et al.: A formal knowledge representation system for the cognitive learning engine. (2011) authored by Marina L. Gavrilova. Faisal Ahmed et al.: Adaptive Pooling of the Most Relevant Spatio-Temporal Features for Action Recognition. (2016) authored by Marina L. Gavrilova. Sergey Bereg et al.: Voronoi Diagram of Polygonal Chains under the Discrete FRéChet Distance. (2010) authored by Marina L. Gavrilova. Sergey Bereg et al.: Voronoi Diagram of Polygonal Chains under the Discrete Fréchet Distance (2007) authored by Marina L. Gavrilova. Sergey Bereg et al.: Voronoi Diagram of Polygonal Chains under the Discrete Fréchet Distance. (2008) authored by Marina L. Gavrilova. Marina L. Gavrilova and Alexei Sourin: Preface to special issue on Cyberworlds 2011. (2013) authored by Marina L. Gavrilova. Marina L. Gavrilova et al.: Transactions on Computational Science XXVI - Special Issue on Cyberworlds and Cybersecurity (2016) edited by Marina L. Gavrilova"}. D output format: answer
3846558
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Where was the mathematician who published the article Homogenization and Asymptotics for Small Transaction Costs born? Context: H. Meté Soner alternativeName H. Mete. Soner. H. Meté Soner 2YrMeanCitedness 1.4285714626312255859. H. Meté Soner alternativeName H. Mete Soner. H. Meté Soner alternativeName H. Meté Soner. Mykhaylo Shkolnikov et al.: Deep Level-set Method for Stefan Problems. (2023) authored by Halil Mete Soner. H. Meté Soner modified 2023-10-18. H. Meté Soner name H. Meté Soner. H. Mete Soner and Qinxin Yan: Viscosity Solutions for McKean-Vlasov Control on a Torus. (2024) authored by Halil Mete Soner"}. S. Sc. Sc. D output format: answer
Ankara
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the number of citations earned by the co-author from the University of Washington who worked with Mihir Bellare on Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms? Context: Mihir Bellare et al.: Standard Security Does Not Imply Security against Selective-Opening. (2012) authored by Mihir Bellare. Mihir Bellare et al.: Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks. (2015) authored by Mihir Bellare. Mihir Bellare et al.: Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks. (2015) authored by Mihir Bellare. Mihir Bellare et al.: Standard Security Does Not Imply Security Against Selective-Opening. (2011) authored by Mihir Bellare. Mihir Bellare and Thomas Ristenpart: Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme. (2009) authored by Mihir Bellare. Mihir Bellare and Thomas Ristenpart: Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme. (2009) authored by Mihir Bellare. Sriram Keelveedhi et al.: DupLESS: Server-Aided Encryption for Deduplicated Storage. (2013) authored by Mihir Bellare. Mihir Bellare et al.: Key Insulation and Intrusion Resilience over a Public Channel. (2009) authored by Mihir Bellare. Mihir Bellare et al.: Key Insulation and Intrusion Resilience Over a Public Channel. (2009) authored by Mihir Bellare. Mihir Bellare et al.: Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. (2008) authored by Mihir Bellare. Mihir Bellare et al.: Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. (2008) authored by Mihir Bellare. Mihir Bellare et al.: Semantic Security for the Wiretap Channel. (2012) authored by Mihir Bellare. Mihir Bellare et al.: Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability. (2020) authored by Mihir Bellare. Mihir Bellare et al.: Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability. (2020) authored by Mihir Bellare. Mihir Bellare et al.: DupLESS: Server-Aided Encryption for Deduplicated Storage. (2013) authored by Mihir Bellare. Mihir Bellare et al.: Improved Security Analyses for CBC MACs. (2005) authored by Mihir Bellare. Mihir Bellare et al.: Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing. (2012) authored by Mihir Bellare. Mihir Bellare et al.: Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing. (2012) authored by Mihir Bellare. Mihir Bellare et al.: Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. (2004) authored by Mihir Bellare. Mihir Bellare et al.: Identity-Based (Lossy) Trapdoor Functions and Applications. (2012) authored by Mihir Bellare. Mihir Bellare et al.: Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm. (2002) authored by Mihir Bellare. Mihir Bellare et al.: Identity-Based (Lossy) Trapdoor Functions and Applications. (2011) authored by Mihir Bellare. Benedikt Auerbach et al.: Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups. (2018) authored by Mihir Bellare. Benedikt Auerbach et al.: Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups. (2018) authored by Mihir Bellare. Mihir Bellare et al.: Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation. (2014) authored by Mihir Bellare. Mihir Bellare et al.: Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements. (2020) authored by Mihir Bellare. Mihir Bellare et al.: Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements. (2020) authored by Mihir Bellare. Mihir Bellare et al.: The Local Forking Lemma and its Application to Deterministic Encryption. (2019) authored by Mihir Bellare. Mihir Bellare et al.: The Local Forking Lemma and Its Application to Deterministic Encryption. (2019) authored by Mihir Bellare. Mihir Bellare et al.: An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. (2004) authored by Mihir Bellare. Mihir Bellare et al.: The Secure Shell (SSH) Transport Layer Encryption Modes. (2006) authored by Mihir Bellare. Mihir Bellare and Amit Sahai: Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization. (2006) authored by Mihir Bellare. Mihir Bellare et al.: Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. (2002) authored by Mihir Bellare. Mihir Bellare et al.: Forward-Security under Continual Leakage. (2017) authored by Mihir Bellare. Mihir Bellare et al.: Forward-Security Under Continual Leakage. (2017) authored by Mihir Bellare. Mihir Bellare and Amit Sahai: Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. (1999) authored by Mihir Bellare. Mihir Bellare and Amit Sahai: Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. (1999) authored by Mihir Bellare"}. D. You can help Wikipedia by expanding it output format: answer
34932
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: How many publication citations does the institution of the author of the paper 'Learning Mixtures of Linear Dynamical Systems' have? Context: Sreechakra Goparaju et al.: Data secrecy in distributed storage systems under exact repair. (2013) authored by H. Vincent Poor. Sreechakra Goparaju et al.: Data Secrecy in Distributed Storage Systems under Exact Repair (2013) authored by H. Vincent Poor. Yali Chen et al.: Reconfigurable Intelligent Surface Assisted Device-to-Device Communications. (2020) authored by H. Vincent Poor. Yali Chen et al.: Reconfigurable Intelligent Surface Assisted Device-to-Device Communications. (2021) authored by H. Vincent Poor. Ruoqi Deng et al.: Reconfigurable Holographic Surfaces for Ultra-Massive MIMO in 6G: Practical Design, Optimization and Implementation. (2023) authored by H. Vincent Poor. Jingzhi Hu et al.: Reconfigurable Intelligent Surface Based RF Sensing: Design, Optimization, and Implementation. (2020) authored by H. Vincent Poor. Erdal Panayirci et al.: Spatial Modulation Aided Physical Layer Security for NOMA-VLC Systems. (2023) authored by H. Vincent Poor. Jingzhi Hu et al.: Reconfigurable Intelligent Surfaces based RF Sensing: Design, Optimization, and Implementation. (2019) authored by H. Vincent Poor. Ruoqi Deng et al.: Reconfigurable Holographic Surfaces for Future Wireless Communications. (2021) authored by H. Vincent Poor. Binbin Su et al.: Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping. (2022) authored by H. Vincent Poor. Hoang Duong Tuan et al.: Quantized RIS-Aided Multi-User Secure Beamforming Against Multiple Eavesdroppers. (2023) authored by H. Vincent Poor. Xuanyu Cao et al.: An Optimal Auction Mechanism for Mobile Edge Caching. (2018) authored by H. Vincent Poor. Xuanyu Cao et al.: Mobile Edge Caching: An Optimal Auction Approach. (2017) authored by H. Vincent Poor. Hongliang Zhang et al.: Intelligent Omni-Surfaces for Full-Dimensional Wireless Communications: Principles, Technology, and Implementation. (2022) authored by H. Vincent Poor. Hui-Ming Wang et al.: Secure Short-Packet Communications for Mission-Critical IoT Applications. (2019) authored by H. Vincent Poor. Hui-Ming Wang et al.: Secure Short-Packet Communications for Mission-Critical IoT Applications. (2019) authored by H. Vincent Poor. Wayes Tushar et al.: Roles of Retailers in the Peer-to-Peer Electricity Market: A Single Retailer Perspective. (2021) authored by H. Vincent Poor. Xiaojun Tang et al.: Interference-assisted secret communication. (2008) authored by H. Vincent Poor. Zhiguo Ding et al.: NOMA Assisted Wireless Caching: Strategies and Performance Analysis. (2017) authored by H. Vincent Poor. Zhiguo Ding et al.: NOMA Assisted Wireless Caching: Strategies and Performance Analysis. (2018) authored by H. Vincent Poor. Yinan Ding et al.: Tradeoff of Content Sharing Efficiency and Secure Transmission in Coded Caching Systems. (2018) authored by H. Vincent Poor. Yi-Peng Wei et al.: Residual-Quantization Based Code Design for Compressing Noisy Sources With Arbitrary Decoder Side Information. (2016) authored by H. Vincent Poor. Yifei Yuan et al.: NOMA for Next-generation Massive IoT: Performance Potential and Technology Directions. (2021) authored by H. Vincent Poor. Yifei Yuan et al.: NOMA for Next-Generation Massive IoT: Performance Potential and Technology Directions. (2021) authored by H. Vincent Poor. Xuelin Cao et al.: AI-Assisted MAC for Reconfigurable Intelligent Surface-Aided Wireless Networks: Challenges and Opportunities. (2021) authored by H. Vincent Poor. Shuhang Zhang et al.: Intelligent Omni-Surfaces: Ubiquitous Wireless Transmission by Reflective-Refractive Metasurfaces. (2022) authored by H. Vincent Poor. Woon Hau Chin et al.: Guest Editorial: Emerging Security Technologies for 6G. (2021) authored by H. Vincent Poor. Sinan Gezici et al.: Localization via ultra-wideband radios: a look at positioning aspects for future sensor networks. (2005) authored by H. Vincent Poor. Shuhang Zhang et al.: Intelligent Omni-Surface: Ubiquitous Wireless Transmission by Reflective-Transmissive Metasurface. (2020) authored by H. Vincent Poor. Ahmed Arafa et al.: Relay-Aided Secure Broadcasting for Visible Light Communications. (2018) authored by H. Vincent Poor. Saleh Soltan et al.: Protecting the Grid against IoT Botnets of High-Wattage Devices. (2018) authored by H. Vincent Poor. Ahmed Arafa et al.: Relay-Aided Secure Broadcasting for Visible Light Communications. (2019) authored by H. Vincent Poor. Xuelin Cao et al.: AI-Assisted MAC for Reconfigurable Intelligent-Surface-Aided Wireless Networks: Challenges and Opportunities. (2021) authored by H. Vincent Poor. Onur Günlü et al.: Quality of Service Guarantees for Physical Unclonable Functions. (2021) authored by H. Vincent Poor. Onur Günlü et al.: Quality of Service Guarantees for Physical Unclonable Functions. (2021) authored by H. Vincent Poor. Chen-Feng Liu et al.: Fronthaul-Aware Software-Defined Wireless Networks: Resource Allocation and User Scheduling. (2017) authored by H. Vincent Poor. Zhiguo Ding et al.: Interference masking for secure wireless broadcast communications. (2014) authored by H. Vincent Poor. Yurun Tian et al.: Analysis of the Impact of Mask-wearing in Viral Spread: Implications for COVID-19. (2020) authored by H. Vincent Poor. Yurun Tian et al.: Analysis of the Impact of Mask-wearing in Viral Spread: Implications for COVID-19. (2021) authored by H. Vincent Poor. Xiaojun Tang et al.: Interference-Assisted Secret Communication (2008) authored by H. Vincent Poor. Chen-Feng Liu et al.: Fronthaul-Aware Software-Defined Wireless Networks: Resource Allocation and User Scheduling. (2018) authored by H. Vincent Poor. Xiaojun Tang et al.: Interference Assisted Secret Communication. (2011) authored by H. Vincent Poor. Zhongxiang Wei et al.: Physical Layer Anonymous Precoding: The Path to Privacy-Preserving Communications. (2022) authored by H. Vincent Poor. Eva C. Song et al.: Rate-Distortion-Based Physical Layer Secrecy with Applications to Multimode Fiber. (2014) authored by H. Vincent Poor. Zhiguo Ding and H. Vincent Poor: Utilizing Imperfect Resolution of Near-Field Beamforming: A Hybrid-NOMA Perspective. (2023) authored by H. Vincent Poor. Arsenia Chorti et al.: Context-Aware Security for 6G Wireless: The Role of Physical Layer Security. (2022) authored by H. Vincent Poor. Shaofeng Zou et al.: K-user degraded broadcast channel with secrecy outside a bounded range. (2016) authored by H. Vincent Poor. Chen Feng et al.: Reliable and Secure Short-Packet Communications. (2021) authored by H. Vincent Poor. Phu X. Nguyen et al.: Backscatter-Assisted Data Offloading in OFDMA-Based Wireless-Powered Mobile Edge Computing for IoT Networks. (2021) authored by H. Vincent Poor. Henri Hentilä et al.: Key Generation for Secure Distributed Detection in IoT using Polar Quantization. (2019) authored by H. Vincent Poor output format: answer
7380733
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Which author has more publications, the writer of 'A Fast Algorithm for Performance-Driven Module Implementation Selection' or the author of 'Construction of Hilbert Transform Pairs of Wavelet Bases and Gabor-like Transforms'? Context: Yekta Kesenci et al.: Probing Intracellular Elasticity with Minimal-Hessian Registration. (2023) authored by Michael Unser. Emrah Bostan et al.: Phase retrieval by using transport-of-intensity equation and differential interference contrast microscopy. (2014) authored by Michael Unser. Fangshu Yang et al.: Robust Phase Unwrapping via Deep Image Prior for Quantitative Phase Imaging. (2021) authored by Michael Unser. Fangshu Yang et al.: Robust Phase Unwrapping via Deep Image Prior for Quantitative Phase Imaging. (2020) authored by Michael Unser. Mehrsa Pourya et al.: Graphic: Graph-Based Hierarchical Clustering For Single-Molecule Localization Microscopy. (2021) authored by Michael Unser. Thanh-An Pham et al.: Diffraction Tomography From Single-Molecule Localization Microscopy: Numerical Feasibility. (2021) authored by Michael Unser. Denis Fortun et al.: Reconstruction From Multiple Particles for 3D Isotropic Resolution in Fluorescence Microscopy. (2018) authored by Michael Unser. Junhong Min et al.: Continuous localization using sparsity constraints for high-density super-resolution microscopy. (2013) authored by Michael Unser. Virginie Uhlmann and Michael Unser: Tip-seeking active contours for bioimage segmentation. (2015) authored by Michael Unser. Ildar Khalidov et al.: Improved MRSI with field inhomogeneity compensation. (2006) authored by Michael Unser. Thanh-An Pham et al.: Closed-Form Expression Of The Fourier Ring-Correlation For Single-Molecule Localization Microscopy. (2019) authored by Michael Unser. Virginie Uhlmann et al.: Hermite Snakes With Control of Tangents. (2016) authored by Michael Unser. Anais Badoual et al.: Locally refinable parametric snakes. (2015) authored by Michael Unser. Hagai Kirshner et al.: A PSF-based approach to Biplane calibration in 3D super-resolution microscopy. (2012) authored by Michael Unser. Harshit Gupta et al.: CryoGAN: A New Reconstruction Paradigm for Single-Particle Cryo-EM Via Deep Adversarial Learning. (2021) authored by Michael Unser. Chulhee Lee et al.: Unsupervised connectivity-based thresholding segmentation of midsagittal brain MR images. (1998) authored by Michael Unser. François Aguet et al.: Model-Based 2.5-D Deconvolution for Extended Depth of Field in Brightfield Microscopy. (2008) authored by Michael Unser. Michael J. Vrhel and Michael Unser: Multichannel restoration with limited a priori information [electron microscopy of biological macromolecules]. (1999) authored by Michael Unser. Mona Zehni et al.: Joint density map and continuous angular refinement in cryo-electron microscopy. (2019) authored by Michael Unser. Emrah Bostan et al.: Variational Phase Imaging Using the Transport-of-Intensity Equation. (2016) authored by Michael Unser. Ildar Khalidov et al.: BSLIM: Spectral Localization by Imaging With Explicit B0 Field Inhomogeneity Compensation. (2007) authored by Michael Unser. Denis Fortun et al.: Isotropic resolution in fluorescence imaging by single particle reconstruction. (2016) authored by Michael Unser. Anaïs Badoual et al.: Active Subdivision Surfaces for the Semiautomatic Segmentation of Biomedical Volumes. (2021) authored by Michael Unser. Chandra Sekhar Seelamantula et al.: Zero-Order-Free Image Reconstruction in Digital Holographic Microscopy. (2009) authored by Michael Unser. Arash Amini et al.: The analog formulation of sparsity implies infinite divisibility and rules out Bernoulli-Gaussian priors. (2012) authored by Michael Unser. Ricard Delgado-Gonzalo et al.: Spline-Based Deforming Ellipsoids for Interactive 3D Bioimage Segmentation. (2013) authored by Michael Unser. Pakshal Bohra et al.: Bayesian Inversion for Nonlinear Imaging Models Using Deep Generative Priors. (2022) authored by Michael Unser. Pakshal Bohra et al.: Bayesian Inversion for Nonlinear Imaging Models using Deep Generative Priors. (2022) authored by Michael Unser. Martin Storath et al.: Fast Segmentation From Blurred Data in 3D Fluorescence Microscopy. (2017) authored by Michael Unser. Hagai Kirshner et al.: On the Unique Identification of Continuous-Time Autoregressive Models From Sampled Data. (2014) authored by Michael Unser. Michaël Unser name Michaël Unser. Michaël Unser alternativeName Michael Unser. Michaël Unser alternativeName Michaël Unser. Ricard Delgado-Gonzalo et al.: Snakes on a Plane: A perfect snap for bioimage analysis. (2015) authored by Michael Unser. Mathews Jacob et al.: 3-D reconstruction of DNA filaments from stereo cryo-electron micrographs. (2002) authored by Michael Unser. Erik Meijering et al.: A Novel Approach to Neurite Tracing in Fluorescence Microscopy Images. (2003) authored by Michael Unser. Stamatios Lefkimmiatis et al.: Hessian-based regularization for 3-D microscopy image restoration. (2012) authored by Michael Unser. Michaël Unser alternativeName Michael A. Unser. Thomas Debarre et al.: Hessian Splines for Scanning Transmission X-Ray Microscopy. (2020) authored by Michael Unser. Alexis Goujon et al.: A Neural-Network-Based Convex Regularizer for Inverse Problems. (2023) authored by Michael Unser. Michael T. McCann et al.: Region of interest X-ray computed tomography via corrected back projection. (2018) authored by Michael Unser. Ricard Delgado-Gonzalo et al.: Multi-target tracking of packed yeast cells. (2010) authored by Michael Unser. Virginie Uhlmann et al.: Snakes with tangent-based control and energies for bioimage analysis. (2014) authored by Michael Unser. Anais Badoual et al.: A non-stationary subdivision scheme for the construction of deformable models with sphere-like topology. (2017) authored by Michael Unser. Sathish Ramani et al.: Deconvolution of 3D fluorescence micrographs with automatic risk minimization. (2008) authored by Michael Unser. Harshit Gupta et al.: CNN-Based Projected Gradient Descent for Consistent Image Reconstruction. (2017) authored by Michael Unser. Germán González et al.: Steerable Features for Statistical 3D Dendrite Detection. (2009) authored by Michael Unser. Michaël Unser alternativeName Unser. Harshit Gupta et al.: CNN-Based Projected Gradient Descent for Consistent CT Image Reconstruction. (2018) authored by Michael Unser. Erik Meijering et al.: Neurite Tracing in Fluorescence Microscopy Images using Ridge Filtering and Graph Searching: Principles and Validation. (2004) authored by Michael UnserS. "}. Blu). \nUnser obtained a M output format: answer
Sartaj Sahni
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Who has a higher hIndex, the author of the paper 'Post-processing techniques for making reliable measurements from curve-skeletons' or the author of the paper 'Building cyberinfrastructure for translational impact: The WIFIRE example'? Context: Mai H. Nguyen et al.: Land Cover Classification at the Wildland Urban Interface using High-Resolution Satellite Imagery and Deep Learning. (2018) authored by Ilkay Altintas. Bosung Seo et al.: Cardiac MRI Image Segmentation for Left Ventricle and Right Ventricle using Deep Learning. (2019) authored by Ilkay Altintas. Ilkay Altıntaş name Ilkay Altıntaş. Mehrdad Yazdani et al.: Scalable Detection of Rural Schools in Africa Using Convolutional Neural Networks and Satellite Imagery. (2018) authored by Ilkay Altintas. Ehab Abdelmaguid et al.: Left Ventricle Segmentation and Volume Estimation on Cardiac MRI using Deep Learning. (2018) authored by Ilkay Altintas. Susanne Benz et al.: Understanding a Rapidly Expanding Refugee Camp Using Convolutional Neural Networks and Satellite Imagery. (2019) authored by Ilkay Altintas. Ilkay Altıntaş alternativeName Ilkay Altıntaş. Behnam Hedayatnia et al.: Determining feature extractors for unsupervised learning on satellite images. (2016) authored by Ilkay Altintas. Ilkay Altıntaş alternativeName Altintas Ilkay. Jessica Block et al.: An Unsupervised Deep Learning Approach for Satellite Image Analysis with Applications in Demographic Analysis. (2017) authored by Ilkay Altintas. Ilkay Altıntaş alternativeName Ilkay Altintas. Ilkay Altıntaş alternativeName I. Altıntaş. Mai H. Nguyen et al.: Analytics Pipeline for Left Ventricle Segmentation and Volume Estimation on Cardiac MRI Using Deep Learning. (2018) authored by Ilkay Altintas. Mai H. Nguyen et al.: Automated scalable detection of location-specific Santa Ana conditions from weather data using unsupervised learning. (2017) authored by Ilkay Altintas. Ilkay Altıntaş alternativeName I. Altintas. Anshuman Dewangan et al.: FIgLib & SmokeyNet: Dataset and Deep Learning Model for Real-Time Wildland Fire Smoke Detection. (2022) authored by Ilkay Altintas. Anshuman Dewangan et al.: FIgLib & SmokeyNet: Dataset and Deep Learning Model for Real-Time Wildland Fire Smoke Detection. (2021) authored by Ilkay Altintas. Ilkay Altıntaş orcidId https://orcid.org/0000-0002-2196-0305. Mai H. Nguyen et al.: A scalable approach for location-specific detection of Santa Ana conditions. (2016) authored by Ilkay Altintas. Ilkay Altıntaş i10Index 55 In addition, she is a big data MOOC instructor through Coursera and edX, having taught over a million learners till date. She allotted much of her time thereafter to learning about California's fire-adapted ecosystem, and the two factors, weather and fuel, that contribute significantly to the spread and dynamic behavior of wildfires. \nOn October 26, 2003, Altintas experienced California wildfires for the first time, after witnessing the Cedar Fire in San Diego County. g. , landscape data, real-time weather information and camera imagery, and remote sensor data). While pursuing her career as a research scientist, she completed her PhD at the University of Amsterdam in 2011. The environmental and economic toll that this natural disaster had on the residents of San Diego County inspired Altintas to contribute to improving the then-current systems of managing and predicting wildfires output format: answer
Philip J. Withers
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: How many articles are attributed to the author's institute in which the paper 'Automated Surgical Skill Assessment in RMIS Training' was published? Context: R. Mitchell Parry and Irfan A. Essa: Phase-Aware Non-negative Spectrogram Factorization. (2007) authored by Irfan A. Essa. R. Mitchell Parry and Irfan A. Essa: Incorporating Phase Information for Source Separation via Spectrogram Factorization. (2007) authored by Irfan A. Essa. Vivek Kwatra et al.: Texture optimization for example-based synthesis. (2005) authored by Irfan A. Essa. Lijun Yu et al.: Language Model Beats Diffusion - Tokenizer is Key to Visual Generation. (2023) authored by Irfan A. Essa. Agrim Gupta et al.: Photorealistic Video Generation with Diffusion Models. (2023) authored by Irfan A. Essa. Edison Thomaz et al.: Recognizing water-based activities in the home through infrastructure-mediated sensing. (2012) authored by Irfan A. Essa. Daniel Nkemelu et al.: Tackling Hate Speech in Low-resource Languages with Context Experts. (2023) authored by Irfan A. Essa. Julia Deeb-Swihart et al.: Selfie-Presentation in Everyday Life: A Large-Scale Characterization of Selfie Contexts on Instagram. (2017) authored by Irfan A. Essa. Erik Wijmans et al.: Embodied Question Answering in Photorealistic Environments With Point Cloud Perception. (2019) authored by Irfan A. Essa. Erik Wijmans et al.: Embodied Question Answering in Photorealistic Environments with Point Cloud Perception. (2019) authored by Irfan A. Essa. Yavor Angelov et al.: Experiences with optimizing two stream-based applications for cluster execution. (2005) authored by Irfan A. Essa. Lijun Yu et al.: MAGVIT: Masked Generative Video Transformer. (2022) authored by Irfan A. Essa. Lijun Yu et al.: MAGVIT: Masked Generative Video Transformer. (2023) authored by Irfan A. Essa. Steven Hickson et al.: Sharing Decoders: Network Fission for Multi-task Pixel Prediction. (2022) authored by Irfan A. Essa. Dan Kondratyuk et al.: VideoPoet: A Large Language Model for Zero-Shot Video Generation. (2023) authored by Irfan A. Essa. Raffay Hamid et al.: A visualization framework for team sports captured using multiple static cameras. (2014) authored by Irfan A. Essa. Pei Yin et al.: Bilayer Segmentation of Webcam Videos Using Tree-Based Classifiers. (2011) authored by Irfan A. Essa. Unaiza Ahsan et al.: Towards using visual attributes to infer image sentiment of social events. (2017) authored by Irfan A. Essa. Dina Bashkirova et al.: MaskSketch: Unpaired Structure-guided Masked Image Generation. (2023) authored by Irfan A. Essa. Dina Bashkirova et al.: MaskSketch: Unpaired Structure-guided Masked Image Generation. (2023) authored by Irfan A. Essa. Raffay Hamid et al.: Player localization using multiple static cameras for sports visualization. (2010) authored by Irfan A. Essa. David Minnen et al.: Detecting Subdimensional Motifs: An Efficient Algorithm for Generalized Multivariate Pattern Discovery. (2007) authored by Irfan A. Essa. Apoorva Beedu et al.: VideoPose: Estimating 6D object pose from videos. (2021) authored by Irfan A. Essa. Apoorva Beedu et al.: Video based Object 6D Pose Estimation using Transformers. (2022) authored by Irfan A. Essa. Xiang Kong et al.: BLT: Bidirectional Layout Transformer for Controllable Layout Generation. (2022) authored by Irfan A. Essa. Ted E. Senator et al.: Detecting insider threats in a real corporate database of computer usage activity. (2013) authored by Irfan A. Essa. David Minnen et al.: Discovering Multivariate Motifs using Subsequence Density Estimation and Greedy Mixture Learning. (2007) authored by Irfan A. Essa. Xiang Kong et al.: BLT: Bidirectional Layout Transformer for Controllable Layout Generation. (2021) authored by Irfan A. Essa. Antonio Haro and Irfan A. Essa: Exemplar-Based Surface Texture. (2003) authored by Irfan A. Essa. Steven Hickson et al.: Eyemotion: Classifying Facial Expressions in VR Using Eye-Tracking Cameras. (2019) authored by Irfan A. Essa. Vinay Bettadapura et al.: Leveraging Contextual Cues for Generating Basketball Highlights. (2016) authored by Irfan A. Essa"}. \nMost recently, Essa has worked as a researcher / consultant with Google to develop a video stabilization algorithm alongside two of his doctoral students, Matthias Grundmann and Vivek Kwatra, which now runs on YouTube, and allows users to stabilize their uploaded videos in real-time. D output format: answer
22642
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: How many articles are associated with the author's institution who authored 'Barriers to Robust and Effective Human-Agent Teamwork'? Context: Mary L. Cummings alternativeName Mary L. ‘Missy’ Cummings. Mary L. Cummings alternativeName Mary Louise Cummings. Mary L. Cummings alternativeName Mary Cummings. Jacqueline M. Tappan et al.: Mobile application for utility domains. (2011) authored by Mary L. Cummings. Mary L. Cummings name Mary L. Cummings. Mary L. Cummings alternativeName Mary L. Cummings. Yves Boussemart et al.: Supervised vs. Unsupervised Learning for Operator State Modeling in Unmanned Vehicle Settings. (2011) authored by Mary L. Cummings. Mary L. Cummings 2YrMeanCitedness 0.64285713434219360352. Mary L. Cummings alternativeName M. L. Cummings. Mary L. Cummings alternativeName M. Cummings. Jacqueline M. Tappan et al.: Display Requirements for an Interactive Rail Scheduling Display. (2011) authored by Mary L. Cummings. Mary L. Cummings member of George Mason University. Erin Treacy Solovey et al.: CODA: Mobile interface for enabling safer navigation of unmanned aerial vehicles in real-world settings. (2021) authored by Mary L. Cummings'}. She resigned and sold all of her shares in October 2021 prior to starting at the NHTSA. She became a full professor at Duke University in 2016. She currently teaches at George Mason University. U. In November 2021, Dr output format: answer
55575
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the works count of the author who published AR interfacing with prototype 3D applications based on user-centered interactivity in the Comput. Aided Des. journal in 2010? Context: Xuhai Xu et al.: Leveraging Routine Behavior and Contextually-Filtered Features for Depression Detection among College Students. (2019) authored by Anind K. Dey. Jin-Hyuk Hong et al.: Understanding physiological responses to stressors during physical activity. (2012) authored by Anind K. Dey. Sangwon Bae et al.: Detecting Drinking Episodes in Young Adults Using Smartphone-based Sensors. (2017) authored by Anind K. Dey. Tadashi Okoshi et al.: Towards attention-aware adaptive notification on smart phones. (2016) authored by Anind K. Dey. Brian D. Ziebart et al.: Learning Selectively Conditioned Forest Structures with Applications to DBNs and Classification. (2007) authored by Anind K. Dey. Xuhai Xu et al.: TypeOut: Leveraging Just-in-Time Self-Affirmation for Smartphone Overuse Reduction. (2022) authored by Anind K. Dey. Brian D. Ziebart et al.: Learning Selectively Conditioned Forest Structures with Applications to DBNs and Classification (2012) authored by Anind K. Dey. Varun Jain et al.: Depression Estimation Using Audiovisual Features and Fisher Vector Encoding. (2014) authored by Anind K. Dey. Gonzalo J. Martínez et al.: Improved Sleep Detection Through the Fusion of Phone Agent and Wearable Data Streams. (2020) authored by Anind K. Dey. Jin-Hyuk Hong et al.: A smartphone-based sensing platform to model aggressive driving behaviors. (2014) authored by Anind K. Dey. Anind K. Dey alternativeName Anind Dey. Anind K. Dey alternativeName A. Dey. Xuhai Xu et al.: Leveraging Collaborative-Filtering for Personalized Behavior Modeling: A Case Study of Depression Detection among College Students. (2021) authored by Anind K. Dey. Anind K. Dey alternativeName Dey Anind. Anind K. Dey alternativeName Anind K. Dey. Anind K. Dey alternativeName A. K. Dey. Prerna Chikersal et al.: Detecting Depression and Predicting its Onset Using Longitudinal Symptoms Captured by Passive Sensing: A Machine Learning Approach With Robust Feature Selection. (2021) authored by Anind K. Dey. Yasaman S. Sefidgar et al.: Passively-sensed Behavioral Correlates of Discrimination Events in College Students. (2019) authored by Anind K. Dey. Xuhai Xu et al.: Mental-LLM: Leveraging Large Language Models for Mental Health Prediction via Online Text Data. (2024) authored by Anind K. Dey. Afsaneh Doryab et al.: If It's Convenient: Leveraging Context in Peer-to-Peer Variable Service Transaction Recommendations. (2017) authored by Anind K. Dey. Choonsung Shin and Anind K. Dey: Automatically detecting problematic use of smartphones. (2013) authored by Anind K. Dey. Yuuki Nishiyama et al.: Senbay: a platform for instantly capturing, integrating, and restreaming of synchronized multiple sensor-data stream. (2018) authored by Anind K. Dey. Anind K. Dey alternativeName Anind Kumar Dey. Senaka Buthpitiya et al.: Soft Authentication with Low-Cost Signatures. (2014) authored by Anind K. Dey. Xuhai Xu et al.: Leveraging Large Language Models for Mental Health Prediction via Online Text Data. (2023) authored by Anind K. Dey. Runze Yan et al.: A Computational Framework for Modeling Biobehavioral Rhythms from Mobile and Wearable Data Streams. (2022) authored by Anind K. Dey. Scott Davidoff et al.: Learning patterns of pick-ups and drop-offs to support busy family coordination. (2011) authored by Anind K. Dey. Runze Yan et al.: Exploratory machine learning modeling of adaptive and maladaptive personality traits from passively sensed behavior. (2022) authored by Anind K. Dey. Katarzyna Wac et al.: Body area networks for ambulatory psychophysiological monitoring: a survey of off-the-shelf sensor systems. (2010) authored by Anind K. Dey. Denzil Ferreira et al.: Securacy: an empirical investigation of Android applications' network usage, privacy and security. (2015) authored by Anind K. Dey. Ian Li et al.: Know thyself: monitoring and reflecting on facets of one's life. (2010) authored by Anind K. Dey. Hongbo Ni et al.: Automated recognition of hypertension through overnight continuous HRV monitoring. (2018) authored by Anind K. Dey. Brian D. Ziebart et al.: Maximum Entropy Inverse Reinforcement Learning. (2008) authored by Anind K. Dey. Afsaneh Doryab et al.: Extraction of Behavioral Features from Smartphone and Wearable Data. (2018) authored by Anind K. Dey. Brian D. Ziebart et al.: Probabilistic pointing target prediction via inverse optimal control. (2012) authored by Anind K. Dey'}. In 2019, he was elected a Foreign Member of the Chinese Academy of Sciences. S. S. \nHe served as a member of the U output format: answer
416
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Whose twoYearMeanCitedness is higher, the author of 'A framework for testing security mechanisms for program-based attacks' or the author of 'Intuitionistic fuzzy logics as tools for evaluation of Data Mining processes'? Context: Tom Way et al.: Region Formation Analysis with Demand-Driven Inlining for Region-Based Optimization. (2000) authored by Lori L. Pollock. Lori Pollock name Lori Pollock. Anthony Danalis et al.: Automatic MPI application transformation with ASPhALT. (2007) authored by Lori L. Pollock. Lori Pollock alternativeName Lori L. Pollock. Lori Pollock alternativeName Lori Pollock. Lori Pollock alternativeName L. Pollock. Lori Pollock alternativeName L. L. Pollock. Anthony Danalis et al.: Gravel: A Communication Library to Fast Path MPI. (2008) authored by Lori L. Pollock. Lori Pollock 2YrMeanCitedness 3.9333333969116210938. Lori Pollock i10Index 94. Lori Pollock written paper amount in year2012: 8. Lori Pollock written paper amount in year2012: 8. Lori Pollock written paper amount in year2020: 8. Lori Pollock written paper amount in year2020: 8. Lori L. Pollock link https://en.wikipedia.org/wiki/Lori_L._Pollock. Lori Pollock written paper amount in year2022: 6. Lori Pollock written paper amount in year2022: 6. Thomas P. Way and Lori L. Pollock: Demand-driven Inlining in a Region-based Optimizer for ILP Architectures (2006) authored by Lori L. Pollock. Anthony Danalis et al.: Introducing gravel: An MPI companion library. (2008) authored by Lori L. Pollock. Lori Pollock written paper amount in year2015: 11. Lori Pollock written paper amount in year2015: 11. Lori Pollock written paper amount in year2018: 9. Lori Pollock written paper amount in year2018: 9. Lori Pollock worksCount 267{'author_wikipedia_text': 'Lori L. \nHer other notable awards include:'}. She became a Visiting Assistant Professor at the University of Delaware in 1991 and then an Assistant Professor in 1992. in Economics from Allegheny College in 1981. She has been a board member of CRA-W since 2001 and was the Co-Chair of CRA-W from 2005 to 2009. She received a M output format: answer
Lori Pollock
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the name of the university where the creator of Rethinking computer architecture for throughput computing received their PhD? Context: Bowen Cheng et al.: SPGNet: Semantic Prediction Guidance for Scene Parsing. (2019) authored by Wen-Mei W. Hwu. Bowen Cheng et al.: SPGNet: Semantic Prediction Guidance for Scene Parsing. (2019) authored by Wen-Mei W. Hwu. Raymond A. Yeh et al.: Interpretable and Globally Optimal Prediction for Textual Grounding using Image Concepts. (2018) authored by Wen-Mei W. Hwu. Raymond A. Yeh et al.: Interpretable and Globally Optimal Prediction for Textual Grounding using Image Concepts. (2017) authored by Wen-Mei W. Hwu. Bowen Cheng et al.: Decoupled Classification Refinement: Hard False Positive Suppression for Object Detection. (2018) authored by Wen-Mei W. Hwu. Omer Anjum et al.: PhraseScope: An Effective and Unsupervised Framework for Mining High Quality Phrases. (2021) authored by Wen-Mei W. Hwu. Jiachen Li et al.: Pseudo-IoU: Improving Label Assignment in Anchor-Free Object Detection. (2021) authored by Wen-Mei W. Hwu. Jiachen Li et al.: Pseudo-IoU: Improving Label Assignment in Anchor-Free Object Detection. (2021) authored by Wen-Mei W. Hwu. Jie Huang et al.: Understanding Jargon: Combining Extraction and Generation for Definition Modeling. (2022) authored by Wen-Mei W. Hwu. Omer Anjum et al.: PaRe: A Paper-Reviewer Matching Approach Using a Common Topic Space. (2019) authored by Wen-Mei W. Hwu. Omer Anjum et al.: PaRe: A Paper-Reviewer Matching Approach Using a Common Topic Space. (2019) authored by Wen-Mei W. Hwu. Omer Anjum et al.: Submission-Aware Reviewer Profiling for Reviewer Recommender System. (2022) authored by Wen-Mei W. Hwu. Zhonghao Wang et al.: Alleviating Semantic-level Shift: A Semi-supervised Domain Adaptation Method for Semantic Segmentation. (2020) authored by Wen-Mei W. Hwu. Zhonghao Wang et al.: Alleviating Semantic-level Shift: A Semi-supervised Domain Adaptation Method for Semantic Segmentation. (2020) authored by Wen-Mei W. Hwu. Zhonghao Wang et al.: Differential Treatment for Stuff and Things: A Simple Unsupervised Domain Adaptation Method for Semantic Segmentation. (2020) authored by Wen-Mei W. Hwu. Zhonghao Wang et al.: Differential Treatment for Stuff and Things: A Simple Unsupervised Domain Adaptation Method for Semantic Segmentation. (2020) authored by Wen-Mei W. Hwu. Jie Huang et al.: DEER: Descriptive Knowledge Graph for Explaining Entity Relationships. (2022) authored by Wen-Mei W. Hwu. Jie Huang et al.: Exploring Semantic Capacity of Terms. (2020) authored by Wen-Mei W. Hwu. Jie Huang et al.: Exploring Semantic Capacity of Terms. (2020) authored by Wen-Mei W. Hwu. Bowen Cheng et al.: A Simple Non-i.i.d. Sampling Approach for Efficient Training and Better Generalization. (2018) authored by Wen-Mei W. Hwu. John W. Sias et al.: Accurate and efficient predicate analysis with binary decision diagrams. (2000) authored by Wen-Mei W. Hwu. Mert Hidayetoglu et al.: MemXCT: Design, Optimization, Scaling, and Reproducibility of X-Ray Tomography Imaging. (2022) authored by Wen-Mei W. Hwu. Xiaofan Zhang et al.: SkyNet: A Champion Model for DAC-SDC on Low Power Object Detection. (2019) authored by Wen-Mei W. Hwu. Jie Huang et al.: DKG: A Descriptive Knowledge Graph for Explaining Relationships between Entities. (2022) authored by Wen-Mei W. Hwu. Hongyu Gong et al.: Reinforcement Learning Based Text Style Transfer without Parallel Training Corpus. (2019) authored by Wen-Mei W. Hwu. Hongyu Gong et al.: Reinforcement Learning Based Text Style Transfer without Parallel Training Corpus. (2019) authored by Wen-Mei W. Hwu. Wen mei Hwu 2YrMeanCitedness 0.36363637447357177734. Subho S. Banerjee et al.: Efficient and Scalable Workflows for Genomic Analyses. (2016) authored by Wen-Mei W. Hwu. Jeffrey P. Monks et al.: Transmission Power Control for Multiple Access Wireless Packet Networks. (2000) authored by Wen-Mei W. Hwu. Jie Huang et al.: Measuring Fine-Grained Domain Relevance of Terms: A Hierarchical Core-Fringe Approach. (2021) authored by Wen-Mei W. Hwu. Jie Huang et al.: Measuring Fine-Grained Domain Relevance of Terms: A Hierarchical Core-Fringe Approach. (2021) authored by Wen-Mei W. Hwu. Yun Heo et al.: BLESS: Bloom filter-based error correction solution for high-throughput sequencing reads. (2014) authored by Wen-Mei W. Hwu. Arpandeep Khatua et al.: IGB: Addressing The Gaps In Labeling, Features, Heterogeneity, and Size of Public Graph Datasets for Deep Learning Research. (2023) authored by Wen-Mei W. Hwu. Arpandeep Khatua et al.: IGB: Addressing The Gaps In Labeling, Features, Heterogeneity, and Size of Public Graph Datasets for Deep Learning Research. (2023) authored by Wen-Mei W. Hwu. Erik M. Nystrom et al.: Bottom-Up and Top-Down Context-Sensitive Summary-Based Pointer Analysis. (2004) authored by Wen-Mei W. Hwu. Wen mei Hwu name Wen mei Hwu. Li-Wen Chang et al.: Parallel implementation of Multi-dimensional Ensemble Empirical Mode Decomposition. (2011) authored by Wen-Mei W. Hwu. Jeffrey P. Monks et al.: Energy saving and capacity improvement potential of power control in multi-hop wireless networks. (2003) authored by Wen-Mei W. Hwu. Wen mei Hwu h-index 24. Zhonghao Wang et al.: Interpretable Visual Reasoning via Induced Symbolic Space. (2021) authored by Wen-Mei W. Hwu. Teresa L. Johnson et al.: Run-Time Spatial Locality Detection and Optimization. (1997) authored by Wen-Mei W. Hwu. Zhonghao Wang et al.: Interpretable Visual Reasoning via Induced Symbolic Space. (2020) authored by Wen-Mei W. Hwu. Jie Huang et al.: Open Relation Modeling: Learning to Define Relations between Entities. (2021) authored by Wen-Mei W. Hwu. Jie Huang et al.: Open Relation Modeling: Learning to Define Relations between Entities. (2022) authored by Wen-Mei W. Hwu. Wen-mei W. Hwu and Krishna V. Palem: Guest Editors' Introduction. (2005) authored by Wen-Mei W. Hwu"}. {'author_wikipedia_text': "Wen-mei Hwu (Chinese: 胡文美; pinyin: Hú Wénměi) is the Walter J. \nDr output format: answer
University of California, Berkeley
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Whose institute has more publications cited by count, the creator of Tantra: A Fast PRNG Algorithm and its Implementation or the writer of On Basing Private Information Retrieval on NP-Hardness? Context: Jonathan Valamehr et al.: Inspection resistant memory: Architectural support for security from physical examination. (2012) authored by Vinod Vaikuntanathan. Aparna Gupte et al.: Continuous LWE is as Hard as LWE & Applications to Learning Gaussian Mixtures. (2022) authored by Vinod Vaikuntanathan. Aparna Gupte et al.: Continuous LWE is as Hard as LWE & Applications to Learning Gaussian Mixtures. (2022) authored by Vinod Vaikuntanathan. Aparna Gupte et al.: Continuous LWE is as Hard as LWE & Applications to Learning Gaussian Mixtures. (2022) authored by Vinod Vaikuntanathan. S. Dov Gordon et al.: A Group Signature Scheme from Lattice Assumptions. (2011) authored by Vinod Vaikuntanathan. Elette Boyle et al.: Adversarially Robust Property Preserving Hash Functions. (2018) authored by Vinod Vaikuntanathan. Alex Lombardi et al.: Lattice Trapdoors and IBE from Middle-Product LWE. (2019) authored by Vinod Vaikuntanathan. Alex Lombardi et al.: Lattice Trapdoors and IBE from Middle-Product LWE. (2019) authored by Vinod Vaikuntanathan. Elette Boyle et al.: Adversarially Robust Property-Preserving Hash Functions. (2019) authored by Vinod Vaikuntanathan. S. Dov Gordon et al.: A Group Signature Scheme from Lattice Assumptions. (2010) authored by Vinod Vaikuntanathan. Sebastian Faust et al.: Protecting Circuits from Computationally Bounded and Noisy Leakage. (2014) authored by Vinod Vaikuntanathan. Mark Braverman et al.: A Tight Bound for Set Disjointness in the Message-Passing Model. (2013) authored by Vinod Vaikuntanathan. Jonathan Kaveh Valamehr et al.: Inspection-Resistant Memory Architectures. (2013) authored by Vinod Vaikuntanathan. Jonathan Katz and Vinod Vaikuntanathan: One-Round Password-Based Authenticated Key Exchange. (2010) authored by Vinod Vaikuntanathan. Adi Akavia et al.: Simultaneous Hardcore Bits and Cryptography against Memory Attacks. (2009) authored by Vinod Vaikuntanathan. Sebastian Faust et al.: Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. (2010) authored by Vinod Vaikuntanathan. Rafael Pass et al.: Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. (2006) authored by Vinod Vaikuntanathan. Thibaut Horel et al.: How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts. (2018) authored by Vinod Vaikuntanathan. Thibaut Horel et al.: How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts. (2018) authored by Vinod Vaikuntanathan. Shweta Agrawal et al.: Functional Encryption for Inner Product Predicates from Learning with Errors. (2011) authored by Vinod Vaikuntanathan. Shweta Agrawal et al.: Functional Encryption for Inner Product Predicates from Learning with Errors. (2011) authored by Vinod Vaikuntanathan. K. Srinathan et al.: Brief announcement: efficient perfectly secure communication over synchronous networks. (2003) authored by Vinod Vaikuntanathan. Zvika Brakerski et al.: Obfuscating Conjunctions under Entropic Ring LWE. (2016) authored by Vinod Vaikuntanathan. Thibaut Horel et al.: How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts. (2019) authored by Vinod Vaikuntanathan. Sergey Gorbunov et al.: Attribute-Based Encryption for Circuits. (2015) authored by Vinod Vaikuntanathan. Sergey Gorbunov et al.: Attribute-based encryption for circuits. (2013) authored by Vinod Vaikuntanathan. Sergey Gorbunov et al.: Attribute-Based Encryption for Circuits. (2013) authored by Vinod Vaikuntanathan. Aparna Gupte et al.: Sparse Linear Regression and Lattice Problems. (2024) authored by Vinod Vaikuntanathan. Mark Braverman et al.: Tight Bounds for Set Disjointness in the Message Passing Model (2013) authored by Vinod Vaikuntanathan. Jonathan Katz and Vinod Vaikuntanathan: Round-Optimal Password-Based Authenticated Key Exchange. (2011) authored by Vinod Vaikuntanathan. Jonathan Katz and Vinod Vaikuntanathan: Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices. (2009) authored by Vinod Vaikuntanathan. Jonathan Katz and Vinod Vaikuntanathan: Round-Optimal Password-Based Authenticated Key Exchange. (2013) authored by Vinod Vaikuntanathan. Vinod Vaikuntanathan name Vinod Vaikuntanathan"}. From Fall 2011 to Spring 2013, he was a professor at the University of Toronto output format: answer
Ruby B. Lee
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the two-year mean citedness of the scholar who co-authored the 'Capacity of optical reading, Part 1' with Saikat Guha in 2012? Context: John J. Fratamico et al.: Adaptive Diversity Combining for Improved Millimeter Wave Communication through Rain. (1983) authored by Jeffrey H. Shapiro. Ziwen Pan et al.: Secret key distillation over a pure loss quantum wiretap channel under restricted eavesdropping. (2019) authored by Jeffrey H. Shapiro. Ziwen Pan et al.: Secret key distillation across a quantum wiretap channel under restricted eavesdropping. (2019) authored by Jeffrey H. Shapiro. Ranjith Nair et al.: Quantum M-ary phase shift keying. (2012) authored by Jeffrey H. Shapiro. Jeffrey H. Shapiro name Jeffrey H. Shapiro. Dongeek Shin et al.: Single-Photon Depth Imaging Using a Union-of-Subspaces Model. (2015) authored by Jeffrey H. Shapiro. Dongeek Shin et al.: Performance Analysis of Low-Flux Least-Squares Single-Pixel Imaging. (2016) authored by Jeffrey H. Shapiro. Catherine Lee et al.: Finite-key analysis of high-dimensional time-energy entanglement-based quantum key distribution. (2015) authored by Jeffrey H. Shapiro. Jeffrey H. Shapiro alternativeName Jeffrey Shapiro He became a Julius A. M. B. From 1973 to 1985, he was an associate professor of electrical engineering at MIT, and in 1985, he was promoted to professor of electrical engineering. D output format: answer
2.2222223
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Where did the writer of Integrated relative position and attitude control of spacecraft in proximity operation missions obtain his doctor's degree? Context: Bin Zhou et al.: Truncated predictor feedback for linear systems with long time-varying input delays. (2012) authored by Guangren Duan 0001. Guang‐Ren Duan alternativeName Guangren Duan. Bin Zhou et al.: Closed form solutions for matrix linear systems using double matrix exponential functions. (2009) authored by Guangren Duan 0001. Guang‐Ren Duan name Guang‐Ren Duan. Guang‐Ren Duan alternativeName Duan Guangren. Ai-Guo Wu et al.: Comments on 'An efficient iterative method for solving the matrix equation AXB+CYD=E'. (2010) authored by Guangren Duan 0001. Bin Zhou et al.: A truncated prediction approach to stabilization of linear systems with long time-varying input delay. (2011) authored by Guangren Duan 0001. Zhao-Yan Li et al.: Detectability and observability of discrete-time stochastic systems and their applications. (2009) authored by Guangren Duan 0001. Bin Zhou et al.: On Semiglobal Stabilization of Discrete-Time Periodic Systems With Bounded Controls. (2011) authored by Guangren Duan 0001. Guang‐Ren Duan alternativeName Guang‐Ren Duan. Guang‐Ren Duan alternativeName Duan Guang‐Ren. Bin Zhou et al.: Stability and stabilization of discrete-time periodic linear systems with actuator saturation. (2011) authored by Guangren Duan 0001. Bin Zhou et al.: A parametric periodic Lyapunov equation with application in semi-global stabilization of discrete-time periodic systems subject to actuator saturation. (2011) authored by Guangren Duan 0001. Guang‐Ren Duan alternativeName Duan Guang‐‐Ren. Ai-Guo Wu et al.: A stabilizing slow-switching law for switched discrete-time linear systems. (2010) authored by Guangren Duan 0001. Bin Zhou et al.: A parametric periodic Lyapunov equation with application in semi-global stabilization of discrete-time periodic systems subject to actuator saturation. (2010) authored by Guangren Duan 0001. Bin Zhou et al.: L∞ and L2 semi-global stabilisation of continuous-time periodic linear systems with bounded controls. (2013) authored by Guangren Duan 0001. Bin Zhou and Guang-Ren Duan: Periodic Lyapunov Equation Based Approaches to the Stabilization of Continuous-Time Periodic Linear Systems. (2012) authored by Guangren Duan 0001. Bin Zhou et al.: On Smith-type iterative algorithms for the Stein matrix equation. (2009) authored by Guangren Duan 0001. Guang‐Ren Duan 2YrMeanCitedness 7.7692308425903320312. Ai-Guo Wu et al.: Improved Robust H-Infinity Estimation for Uncertain Continuous-Time Systems. (2007) authored by Guangren Duan 0001. Zhao-Yan Li et al.: On unified concepts of detectability and observability for continuous-time stochastic systems. (2010) authored by Guangren Duan 0001. Ai-Guo Wu et al.: Finite iterative solutions to a class of complex matrix equations with conjugate and transpose of the unknowns. (2010) authored by Guangren Duan 0001. Bin Zhou et al.: Global and Semi-Global Stabilization of Linear Systems With Multiple Delays and Saturations in the Input. (2010) authored by Guangren Duan 0001. Ai-Guo Wu et al.: Solutions to the matrix equation AX-EXF=BY. (2009) authored by Guangren Duan 0001. Guang-Ren Duan et al.: Robust pole assignment for discrete-time linear periodic systems via output feedback. (2009) authored by Guangren Duan 0001. Mingzhe Hou et al.: Finite-time H∞ filtering for non-linear stochastic systems. (2016) authored by Guangren Duan 0001. Bin Zhou et al.: Gradient-based maximal convergence rate iterative method for solving linear matrix equations. (2010) authored by Guangren Duan 0001. Zhikai Zhang et al.: Global finite time stabilization of pure-feedback systems with input dead-zone nonlinearity. (2017) authored by Guangren Duan 0001. Ai-Guo Wu et al.: On conjugate product of complex polynomials. (2011) authored by Guangren Duan 0001. Chunyan Gao and Guang-Ren Duan: Robust Adaptive Fault Estimation for a Class of Nonlinear Systems Subject to Multiplicative Faults. (2012) authored by Guangren Duan 0001. Xiaoling Liang et al.: Output Feedback Stabilization of Switched Stochastic Nonlinear Systems Under Arbitrary Switchings. (2013) authored by Guangren Duan 0001. Dongjun Wu and Guangren Duan: Local properties of exponential contractive systems. (2021) authored by Guangren Duan 0001. Mingzhe Hou et al.: Global stabilization of switched stochastic nonlinear systems in strict-feedback form under arbitrary switchings. (2013) authored by Guangren Duan 0001. Guang‐Ren Duan alternativeName G. Duan. Bin Zhou et al.: Stabilization of a Class of Linear Systems With Input Delay and the Zero Distribution of Their Characteristic Equations. (2011) authored by Guangren Duan 0001"}. \nDuan was born in Heilongjiang province in 1962 output format: answer
Harbin Institute of Technology
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Where did the author of the paper 'An Algorithm to Determine Peer-Reviewers' get his Ph.D. degree from? Context: Krishna C. Bathina et al.: Quantifying societal emotional resilience to natural disasters from geo-located social media content. (2022) authored by Johan Bollen. Johan Bollen alternativeName Bollen Johan. Johan Bollen alternativeName Johan Bollen. Huina Mao et al.: Predicting Financial Markets: Comparing Survey,News, Twitter and Search Engine Data (2011) authored by Johan Bollen. Johan Bollen et al.: A ranking and exploration service based on large-scale usage data. (2008) authored by Johan Bollen. Johan Bollen name Johan Bollen. Huina Mao et al.: Quantifying socio-economic indicators in developing countries from mobile phone communication data: applications to Côte d'Ivoire. (2015) authored by Johan Bollen. Marko A. Rodriguez et al.: Using RDF to Model the Structure and Process of Systems (2007) authored by Johan Bollen. Johan Bollen et al.: Video Recommendations for the Open Video Project. (2005) authored by Johan Bollen. Johan Bollen et al.: Video recommendations for the open video project. (2005) authored by Johan Bollen. Johan Bollen alternativeName Bollen Jc. Johan Bollen et al.: Reply to Schmidt et al.: A robust surge of cognitive distortions in historical language. (2021) authored by Johan Bollen. Marko A. Rodriguez et al.: Automatic metadata generation using associative networks. (2009) authored by Johan Bollen. Johan Bollen alternativeName JC Bollen. Steen Rasmussen et al.: Collective intelligence for decision support in very large stakeholder networks: The future US energy system. (2007) authored by Johan Bollen. Marko A. Rodriguez et al.: Automatic Metadata Generation using Associative Networks (2008) authored by Johan Bollen However, it later shut down after thirteen months. g. D. In his free time, he DJs at the Root Cellar Lounge in Bloomington, Indiana output format: answer
Free University of Brussels
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Among the author of 'Texture Segmentation Using Fractal Dimension' and the creator of 'What Size Net Gives Valid Generalization?', who has a higher hIndex? Context: Charles W. Sugnet et al.: Transcriptome and Genome Conservation of Alternative Splicing Events in Humans and Mice. (2004) authored by David Haussler. Alex Spaeth et al.: Neuromorphic Closed-Loop Control of a Flexible Modular Robot by a Simulated Spiking Central Pattern Generator. (2020) authored by David Haussler. Alex Spaeth et al.: Spiking neural state machine for gait frequency entrainment in a flexible modular robot. (2020) authored by David Haussler. Jian Ma et al.: A Heuristic Algorithm for Reconstructing Ancestral Gene Orders with Duplications. (2007) authored by David Haussler. Charles W. Sugnet et al.: Unusual Intron Conservation near Tissue-Regulated Exons Found by Splicing Microarrays. (2006) authored by David Haussler. Hui Wang et al.: Gene structure-based splice variant deconvolution using a microarry platform. (2003) authored by David Haussler. Evan O. Paull et al.: Discovering causal pathways linking genomic events to transcriptional states using Tied Diffusion Through Interacting Events (TieDIE). (2013) authored by David Haussler. Chen-Hsiang Yeang and David Haussler: Detecting Coevolution in and among Protein Domains. (2007) authored by David Haussler. Kimmen Sjölander et al.: Dirichlet mixtures: a method for improved detection of weak but significant protein sequence homology. (1996) authored by David Haussler. Maximilian Haeussler et al.: Navigating protected genomics data with UCSC Genome Browser in a Box. (2015) authored by David Haussler. Kate R. Rosenbloom et al.: ENCODE whole-genome data in the UCSC Genome Browser: update 2012. (2012) authored by David Haussler. Brian J. Raney et al.: ENCODE whole-genome data in the UCSC genome browser (2011 update). (2011) authored by David Haussler. Glenn Hickey et al.: HAL: a hierarchical format for storing and analyzing multiple genome alignments. (2013) authored by David Haussler. Kate R. Rosenbloom et al.: ENCODE Data in the UCSC Genome Browser: year 5 update. (2013) authored by David Haussler. Kate R. Rosenbloom et al.: ENCODE whole-genome data in the UCSC Genome Browser. (2010) authored by David Haussler. David Haussler and Philip M. Long: A Generalization of Sauer's Lemma. (1995) authored by David Haussler. Robert M. Kuhn et al.: The UCSC genome browser and associated tools. (2013) authored by David Haussler. Betty Lazareva-Ulitsky and David Haussler: A Probabilistic Approach to a Consensus Multiple Alignment. (1999) authored by David Haussler. Krishna M. Roskin et al.: Scoring two-species local alignments to try to statistically separate neutrally evolving from selected DNA segments. (2003) authored by David Haussler. Michael Brown et al.: Using Dirichlet Mixture Priors to Derive Hidden Markov Models for Protein Families. (1993) authored by David Haussler. Roadmap Epigenomics Consortium et al.: Integrative analysis of 111 reference human epigenomes Open. (2015) authored by David Haussler. Rachel Karchin et al.: Classifying G-protein coupled receptors with support vector machines. (2002) authored by David Haussler. David Haussler: Ultraconserved Elements, Living Fossil Transposons, and Rapid Bursts of Change: Reconstructing the Uneven Evolutionary History of the Human Genome. (2006) authored by David Haussler They were the first to measure the levels of Calcitriol, the hormonal form of vitamin D, in the human bloodstream. '}. Between 1975 and 1979 he traveled and worked a variety of jobs, including a job at a petroleum refinery in Burghausen, Germany, tomato farming on Crete, and farming kiwifruit, almonds, and walnuts in Templeton, CA. While in Templeton he worked on his master\'s degree at nearby California Polytechnic University. His group collaborates with researchers at medical centers nationally, including members of the Stand Up To Cancer "Dream Teams" and the Cancer Genome Atlas, to discover molecular causes of cancer and develop a new personalized, genomics-based approach to cancer treatment. \nHaussler studied art briefly at the Academy of Art in San Francisco in 1971 and then psychotherapy at Immaculate Heart College in Hollywood until 1973, when he transferred to Connecticut College, finishing in 1975 with a major in mathematics and minor in physics output format: answer
B. B. Chaudhuri
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: From which institution did the author of A Speculative Control Scheme for an Energy-Efficient Banked Register Fil receive his PhD? Context: Michael Zhang and Krste Asanovic: Fine-grain CAM-tag cache resizing using miss tags. (2002) authored by Krste Asanovic. Scott Beamer et al.: Reducing Pagerank Communication via Propagation Blocking. (2017) authored by Krste Asanovic. Brian Zimmer et al.: SRAM Assist Techniques for Operation in a Wide Voltage Range in 28-nm CMOS. (2012) authored by Krste Asanovic. Juan A. Colmenares et al.: Tessellation: refactoring the OS around explicit resource containers with continuous adaptation. (2013) authored by Krste Asanovic. Juan A. Colmenares et al.: Tessellation operating system: Building a real-time, responsive, high-throughput client OS for many-core architectures. (2011) authored by Krste Asanovic. Jae W. Lee et al.: Continual hashing for efficient fine-grain state inconsistency detection. (2007) authored by Krste Asanovic. Jeff A. Bilmes et al.: Using PHiPAC to speed error back-propagation learning. (1997) authored by Krste Asanovic. Aydin Buluç et al.: Distributed-Memory Breadth-First Search on Massive Graphs. (2017) authored by Krste Asanovic. Brian Zimmer et al.: Reprogrammable Redundancy for SRAM-Based Cache Vmin Reduction in a 28-nm RISC-V Processor. (2017) authored by Krste Asanovic. Seongmoo Heo et al.: Dynamic Fine-Grain Leakage Reduction Using Leakage-Biased Bitlines. (2002) authored by Krste Asanovic. Brian Zimmer et al.: Reprogrammable redundancy for cache Vmin reduction in a 28nm RISC-V processor. (2016) authored by Krste Asanovic. Scott Beamer et al.: Direction-optimizing breadth-first search. (2012) authored by Krste Asanovic. Scott Beamer et al.: Direction-optimizing breadth-first search. (2013) authored by Krste Asanovic. Christopher Batten et al.: Designing Chip-Level Nanophotonic Interconnection Networks. (2012) authored by Krste Asanovic. Ameer Haj-Ali et al.: AutoPhase: Juggling HLS Phase Orderings in Random Forests with Deep Reinforcement Learning. (2020) authored by Krste Asanovic. Martin Maas et al.: Taurus: A Holistic Language Runtime System for Coordinating Distributed Managed-Language Applications. (2016) authored by Krste Asanovic. Qijing Huang et al.: AutoPhase: Juggling HLS Phase Orderings in Random Forests with Deep Reinforcement Learning. (2020) authored by Krste Asanovic. Krste Asanović name Krste Asanović. Martin Maas et al.: Trash Day: Coordinating Garbage Collection in Distributed Systems. (2015) authored by Krste Asanovic. Hasan Genc et al.: Gemmini: Enabling Systematic Deep-Learning Architecture Evaluation via Full-Stack Integration. (2021) authored by Krste Asanovic. Krste Asanovic is Person You can help Wikipedia by expanding it. '} output format: answer
Berkeley
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: How many citations does the institution where the author of 'A variance decomposition approach to the analysis of genetic algorithms' works have? Context: Nick Barton 2YrMeanCitedness 1.5. Nick Barton name Nick Barton. Nick Barton alternativeName Nick Barton. Nick Barton alternativeName Nick H. Barton. Nick Barton is Person. Nick Barton alternativeName N. BartonG. "}. \nIn 2007, Barton, along with Derek E output format: answer
106453
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Where does the author who published Principles of management efficiency and organizational inefficiency currently reside with his family? Context: Hongyang Li et al.: Low-Velocity Impact Localization on Composites Under Sensor Damage by Interpolation Reference Database and Fuzzy Evidence Theory. (2018) authored by Jeffrey Forrest. Yong Liu et al.: Grey dominance variable precision rough set model based on grey dominance relationship. (2014) authored by Jeffrey Forrest. Huan Guo et al.: A research on a comprehensive adaptive grey prediction model CAGM(1, N). (2013) authored by Jeffrey Forrest. Sifeng Liu et al.: On algorithm rules of interval grey numbers based on the "Kernel" and the degree of greyness of grey numbers. (2010) authored by Jeffrey Forrest. Zaiwu Gong et al.: The optimal group consensus models for 2-tuple linguistic preference relations. (2013) authored by Jeffrey Forrest. Oguzhan Ahmet Arik et al.: Simple assembly line balancing problem of Type 1 with grey demand and grey task durations. (2019) authored by Jeffrey Forrest. Sifeng Liu et al.: Explanation of terms of sequence operators and grey data mining. (2016) authored by Jeffrey Forrest. Davood Darvishi et al.: Grey linear programming: a survey on solving approaches and applications. (2021) authored by Jeffrey Forrest. Sifeng Liu et al.: On Positioned Solution of Linear Programming with Grey Parameters. (2009) authored by Jeffrey Forrest. Tianxiang Yao et al.: Generalized Discrete GM (1, 1) Model. (2011) authored by Jeffrey ForrestB. E. D. M. , E output format: answer
Grove City, Pennsylvania
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the alma mater of the contributor of Active Image Segmentation Propagation? Context: Kristen Grauman alternativeName Kristen Lorraine Grauman. Kristen Grauman name Kristen Grauman. Kristen Grauman alternativeName Kristen Grauman. Kristen Grauman alternativeName Kristen L Grauman. Kristen Grauman alternativeName K. Grauman. Kristen Grauman is Author. Santhosh Kumar Ramakrishnan et al.: NaQ: Leveraging Narrations as Queries to Supervise Episodic Memory. (2023) authored by Kristen Grauman. Santhosh Kumar Ramakrishnan et al.: NaQ: Leveraging Narrations as Queries to Supervise Episodic Memory. (2023) authored by Kristen Grauman. Bo Xiong and Kristen Grauman: Text detection in stores using a repetition prior. (2016) authored by Kristen Grauman. Kristen Grauman i10Index 188. Kristen Grauman is Creator. Kristen Grauman orcidId https://orcid.org/0000-0002-9591-5873. Ke Zhang et al.: Video Summarization with Long Short-term Memory. (2016) authored by Kristen Grauman. Ke Zhang et al.: Video Summarization with Long Short-Term Memory. (2016) authored by Kristen Grauman. Kristen Grauman 2YrMeanCitedness 3.5185184478759765625. Boqing Gong et al.: Diverse Sequential Subset Selection for Supervised Video Summarization. (2014) authored by Kristen Grauman. Kristen Grauman is Person. Kristen Grauman worksCount 418. Sukjin Han et al.: Shapes as Product Differentiation: Neural Network Embedding in the Analysis of Markets for Fonts. (2021) authored by Kristen Grauman. Kristen Grauman written paper amount in year2015: 16. Kristen Grauman written paper amount in year2015: 16. Kristen Grauman written paper amount in year2022: 18. Kristen Grauman written paper amount in year2022: 18. Kristen Grauman written paper amount in year2012: 13. Kristen Grauman written paper amount in year2012: 13. Kristen Grauman written paper amount in year2019: 32. Kristen Grauman written paper amount in year2019: 32. Kristen Grauman written paper amount in year2016: 34. Kristen Grauman written paper amount in year2016: 34. Ziad Al-Halah and Kristen Grauman: From Paris to Berlin: Discovering Fashion Style Influences Around the World. (2020) authored by Kristen Grauman. Ziad Al-Halah and Kristen Grauman: From Paris to Berlin: Discovering Fashion Style Influences Around the World. (2020) authored by Kristen Grauman. Kristen Grauman written paper amount in year2017: 45. Kristen Grauman written paper amount in year2017: 45. Kristen Grauman written paper amount in year2014: 17. Kristen Grauman written paper amount in year2014: 17. Kristen Grauman written paper amount in year2023: 24. Kristen Grauman written paper amount in year2023: 24. Wei-Lin Hsiao et al.: Fashion++: Minimal Edits for Outfit Improvement. (2019) authored by Kristen Grauman. Wei-Lin Hsiao et al.: Fashion++: Minimal Edits for Outfit Improvement. (2019) authored by Kristen Grauman. Kristen Grauman written paper amount in year2013: 15 During her PhD Grauman worked as a research intern at Intel and Lawrence Berkeley National Laboratory. As of May 2018, Grauman is on leave at Facebook AI Research (FAIR). She was promoted to Associate Professor with tenure in 2011 output format: answer
Boston College
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the average two years citedness of the scholar who published Monte Carlo Localization and registration to prior data for outdoor navigation at IROS 2011? Context: David Silver name David Silver. David Silver alternativeName David Silver. Max Jaderberg et al.: Decoupled Neural Interfaces using Synthetic Gradients. (2017) authored by David Silver. David Silver is Creator. David Silver alternativeName David Lawrence Silver. David Silver alternativeName D. Silver. David Silver et al.: Password Managers: Attacks and Defenses. (2014) authored by David Silver. David Silver alternativeName D.L. Silver. Andrew W. Senior et al.: Improved protein structure prediction using potentials from deep learning. (2020) authored by David Silver. David Silver is Person. David Silver member of DeepMind (United Kingdom). Tom Schaul et al.: Unit Tests for Stochastic Optimization. (2014) authored by David Silver. David Silver i10Index 139. Hamid Reza Maei et al.: Convergent Temporal-Difference Learning with Arbitrary Smooth Function Approximation. (2009) authored by David Silver. David Silver modified 2023-10-18. Johannes Heinrich et al.: Fictitious Self-Play in Extensive-Form Games. (2015) authored by David Silver. David Silver link https://www.davidsilver.uk/. David Silver link https://www.davidsilver.uk/. Alhussein Fawzi et al.: Discovering faster matrix multiplication algorithms with reinforcement learning. (2022) authored by David Silver. Tom Zahavy et al.: A Self-Tuning Actor-Critic Algorithm. (2020) authored by David Silver. David Silver is Author. David Silver orcidId https://orcid.org/0000-0002-5197-2892"}. Silver consulted for Google DeepMind from its inception, joining full-time in 2013. \nHis recent work has focused on combining reinforcement learning with deep learning, including a program that learns to play Atari games directly from pixels output format: answer
138.78723
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the Works Count of the author who published Some Issues in the Design of an Extensible Operating System (Panel Statement) at OSDI in 1994 with Brian N. Bershad from University of Washington, Seattle, Washington, USA? Context: Grant Ho et al.: Hopper: Modeling and Detecting Lateral Movement. (2021) authored by Stefan Savage. Justin Ma et al.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. (2009) authored by Stefan Savage. Justin Ma et al.: Learning to detect malicious URLs. (2011) authored by Stefan Savage. Grant Ho et al.: Hopper: Modeling and Detecting Lateral Movement (Extended Report). (2021) authored by Stefan Savage. Audrey Randall et al.: Home is where the hijacking is: understanding DNS interception by residential routers. (2021) authored by Stefan Savage. Gautam Akiwate et al.: Retroactive identification of targeted DNS infrastructure hijacking. (2022) authored by Stefan Savage. Sushma Nagesh Bannur et al.: Judging a site by its content: learning the textual, structural, and visual features of malicious web pages. (2011) authored by Stefan Savage. Qing Zhang et al.: Got traffic?: an evaluation of click traffic providers. (2011) authored by Stefan Savage. Cristian Estan et al.: Automated measurement of high volume traffic clusters. (2002) authored by Stefan Savage. Audrey Randall et al.: Trufflehunter: Cache Snooping Rare Domains at Large Public DNS Resolvers. (2020) authored by Stefan Savage. Chris Kanich et al.: Spamalytics: an empirical analysis of spam marketing conversion. (2008) authored by Stefan Savage. Chris Kanich et al.: Spamalytics: an empirical analysis of spam marketing conversion. (2009) authored by Stefan Savage. Feng Lu et al.: When Good Services Go Wild: Reassembling Web Services for Unintended Purposes. (2012) authored by Stefan Savage. David Ely et al.: Robust Congestion Signaling. (2001) authored by Stefan Savage. Louis F. DeKoven et al.: Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser. (2017) authored by Stefan Savage. Marti Motoyama et al.: Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context. (2010) authored by Stefan Savage. Stefan Savage alternativeName S. Savage. Eric J. Anderson et al.: A quantitative evaluation of traffic-aware routing strategies. (2002) authored by Stefan Savage. Stefan Savage name Stefan Savage. Stefan Savage alternativeName Stefan Savage. Alper Tugay Mizrak et al.: Fatih: Detecting and Isolating Malicious Routers. (2005) authored by Stefan Savage. Wilson Lian et al.: A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations. (2017) authored by Stefan Savage. Grant Ho et al.: Detecting and Characterizing Lateral Phishing at Scale. (2019) authored by Stefan Savage Propagating traffic is a strong indicator for network worm outbreaks, a key unsolved problem in network security. IP traceback is a major open networking research question, with significant implications towards DDOS mitigation: if IP traffic can be traced, Internet Service Providers can track down and halt DDOS floods. Follow-on work has provided insight into the spread of network worms, including Code Red II and SQL Slammer. By exploiting these flaws, Savage proposed means for attackers to evade congestion control, allowing attackers to monopolize crowded network connections that would otherwise be shared by multiple users. 11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions, which introduced practical attacks on 802 output format: answer
235
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: How many articles are attributed to the academic institution where the author of 'The Dynamic Programming Equation for Second Order Stochastic Target Problems' works? Context: H. Meté Soner 2YrMeanCitedness 1.4285714626312255859. Halil Mete Soner primary affiliation ETH Zürich. H. Meté Soner alternativeName H. Mete Soner. H. Meté Soner alternativeName H. Meté Soner. H. Meté Soner alternativeName H. Mete. Soner. H. Meté Soner name H. Meté Soner. H. Meté Soner alternativeName H. Soner. Halil Mete Soner affiliation ETH ZürichS. \nHe has a son, Mehmet Ali. Sc. Sc. "} output format: answer
148866
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: In 2004, what award did the scholar who published 'Bundle Reduction and the Alignment Distance on Spaces of State-Space LTI Systems' receive? Context: Jinqi Luo et al.: Knowledge Pursuit Prompting for Zero-Shot Multimodal Synthesis. (2023) authored by René Vidal. Effrosyni Mavroudi and René Vidal: Weakly-Supervised Generation and Grounding of Visual Descriptions with Conditional Generative Models. (2022) authored by René Vidal. Yutao Tang et al.: Facial Tic Detection in Untrimmed Videos of Tourette Syndrome Patients. (2022) authored by René Vidal. Yutao Tang et al.: Facial Tic Detection in Untrimmed Videos of Tourette Syndrome Patients. (2022) authored by René Vidal. Aditya Chattopadhyay et al.: Learning Graph Variational Autoencoders with Constraints and Structured Priors for Conditional Indoor 3D Scene Generation. (2023) authored by René Vidal. Benjamin D. Haeffele et al.: An Optical Model of Whole Blood for Detecting Platelets in Lens-Free Images. (2019) authored by René Vidal. Ferda Ofli et al.: Berkeley MHAD: A comprehensive Multimodal Human Action Database. (2013) authored by René Vidal. Ambar Pal et al.: Adversarial Examples Might be Avoidable: The Role of Data Concentration in Adversarial Robustness. (2023) authored by René Vidal. Ambar Pal et al.: Adversarial Examples Might be Avoidable: The Role of Data Concentration in Adversarial Robustness. (2023) authored by René Vidal. Yutao Tang et al.: Semantic-aware Video Representation for Few-shot Action Recognition. (2023) authored by René Vidal. Aditya Chattopadhyay et al.: Interpretable by Design: Learning Predictors by Composing Interpretable Queries. (2022) authored by René Vidal. René Vidal et al.: Formation control of nonholonomic mobile robots with omnidirectional visual servoing and motion segmentation. (2003) authored by René Vidal. Aditya Chattopadhyay et al.: Interpretable by Design: Learning Predictors by Composing Interpretable Queries. (2023) authored by René Vidal. Effrosyni Mavroudi et al.: Actor-Centric Tubelets for Real-Time Activity Detection in Extended Videos. (2022) authored by René Vidal. Colin Lea et al.: Segmental Spatiotemporal CNNs for Fine-Grained Action Segmentation. (2016) authored by René Vidal. Giann Gorospe et al.: Automated Grouping of Action Potentials of Human Embryonic Stem Cell-Derived Cardiomyocytes. (2014) authored by René Vidal. Aastha Jain et al.: Coarse-to-Fine Semantic Video Segmentation Using Supervoxel Trees. (2013) authored by René Vidal. René Vidal alternativeName Rene Esteban Vidal. René Vidal alternativeName Vidal Rene. Colin Lea et al.: Efficient Segmental Inference for Spatiotemporal Modeling of Fine-grained Actions. (2016) authored by René Vidal. René Vidal name René Vidal. Narges Ahmidi et al.: String Motif-Based Description of Tool Motion for Detecting Skill and Gestures in Robotic Surgery. (2013) authored by René Vidal. René Vidal alternativeName Rene Vidal. René Vidal alternativeName Renè Vidal. René Vidal alternativeName René Vidal. Colin Lea et al.: Learning convolutional action primitives for fine-grained action recognition. (2016) authored by René Vidal. Aditya Chattopadhyay et al.: Structured Graph Variational Autoencoders for Indoor Furniture layout Generation. (2022) authored by René Vidal. Dheeraj Singaraju and René Vidal: Interactive image matting for multiple layers. (2008) authored by René Vidal. Effrosyni Mavroudi et al.: End-to-End Fine-Grained Action Segmentation and Recognition Using Conditional Random Field Models and Discriminative Sparse Coding. (2018) authored by René Vidal. Effrosyni Mavroudi et al.: End-to-End Fine-Grained Action Segmentation and Recognition Using Conditional Random Field Models and Discriminative Sparse Coding. (2018) authored by René Vidal. Colin Lea et al.: Temporal Convolutional Networks for Action Segmentation and Detection. (2016) authored by René Vidal. Colin Lea et al.: Temporal Convolutional Networks for Action Segmentation and Detection. (2017) authored by René Vidal. Darshan Thaker et al.: A Linearly Convergent GAN Inversion-based Algorithm for Reverse Engineering of Deceptions. (2023) authored by René Vidal. María Cecilia Bastarrica et al.: How does Quality of Formalized Software Processes Affect Adoption? (2014) authored by René Vidal. Romain Robbes et al.: Are Software Analytics Efforts Worthwhile for Small Companies? The Case of Amisoft. (2013) authored by René Vidal. Ehsan Jahangiri et al.: Information Pursuit: A Bayesian Framework for Sequential Scene Parsing. (2017) authored by René Vidal. Wanxin Qu et al.: High angular resolution light field reconstruction with coded-aperture mask. (2017) authored by René Vidal. Ziqing Xu et al.: Linear Convergence of Gradient Descent For Finite Width Over-parametrized Linear Networks With General Initialization. (2023) authored by René Vidal. Carolina Pacheco et al.: A Detection-based Approach to Multiview Action Classification in Infants. (2020) authored by René Vidal. René Vidal alternativeName R. Vidal. Ambar Pal and René Vidal: A Game Theoretic Analysis of Additive Adversarial Attacks and Defenses. (2020) authored by René VidalK. and a Ph. D. '}. Sc. In medical image computing, Vidal developed algorithms for recognition of surgical gestures output format: answer
National Science Foundation CAREER Awards
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: From which university did the writer of 'Introduction to the Special Issue: Embodied and Situated Cognition' receive their Ph.D.? Context: Giovanni Luca Ciampaglia et al.: Computational fact checking from knowledge networks. (2015) authored by Luis M. Rocha. Rion Brattig Correia et al.: Monitoring Potential Drug Interactions and Reactions via Network Analysis of Instagram User Timelines. (2015) authored by Luis M. Rocha. Rion Brattig Correia et al.: Monitoring Potential Drug Interactions and Reactions via Network Analysis of Instagram User Timelines. (2016) authored by Luis M. Rocha. Rion Brattig Correia et al.: Contact networks have small metric backbones that maintain community structure and are primary transmission subgraphs. (2023) authored by Luis M. Rocha. Rion Brattig Correia et al.: CANA: A python package for quantifying control and canalization in Boolean Networks. (2018) authored by Luis M. Rocha. Alaa Abi-Haidar and Luis M. Rocha: Adaptive Spam Detection Inspired by the Immune System. (2008) authored by Luis M. Rocha. Luis M. Rocha: Semi-metric Behavior in Document Networks and its Application to Recommendation Systems (2003) authored by Luis M. Rocha. Felipe Xavier Costa et al.: Effective Connectivity and Bias Entropy Improve Prediction of Dynamical Regime in Automata Networks. (2023) authored by Luis M. Rocha. Chien-Feng Huang and Luis M. Rocha: A Systematic Study of Genetic Algorithms with Genotype Editing. (2004) authored by Luis M. Rocha. David Soriano Paños et al.: Semi-metric topology characterizes epidemic spreading on complex networks. (2023) authored by Luis M. Rocha. Chien-Feng Huang et al.: Agent-Based Model of Genotype Editing. (2007) authored by Luis M. Rocha. Anália Lourenço et al.: A linear classifier based on entity recognition tools and a statistical approach to method extraction in the protein-protein interaction literature. (2011) authored by Luis M. Rocha. Chien-Feng Huang and Luis M. Rocha: Tracking extrema in dynamic environments using a coevolutionary agent-based model of genotype edition. (2005) authored by Luis M. Rocha. Thomas Parmer and Luis M. Rocha: Dynamical Modularity in Automata Models of Biochemical Networks. (2023) authored by Luis M. Rocha a strict genotype-phenotype separation. S. plus M. Rocha is the George J. Rocha studies the systems properties of natural and artificial systems which enable them to adapt and evolve. e output format: answer
Binghamton University
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: How many publication citations does Erik Winfree's co-author and author of The program-size complexity of self-assembled squares (extended abstract), have? Context: Paul W. K. Rothemund alternativeName Paul Wilhelm Karl Rothemund. Paul W. K. Rothemund alternativeName Paul. Rothemund. Paul W. K. Rothemund name Paul W. K. Rothemund. Paul W. K. Rothemund alternativeName Paul W. K Rothemund. Paul W. K. Rothemund alternativeName Paul W. K. Rothemund. Paul W. K. Rothemund alternativeName Paul W.K. Rothemund He was the team captain of the championship Laconia team for the television quiz show Granite State Challenge. '}. D output format: answer
13415
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Whose hIndex is higher, the author of the paper on Bezier Gaussian Processes for Tall and Wide Data or the author of the paper on Long-time dynamics and control of subsonic flow-structure interactions? Context: Irena Lasiecka alternativeName Lasiecka Irena. Irena Lasiecka 2YrMeanCitedness 0.69230771064758300781. Irena Lasiecka alternativeName Irena Lasiecka. Irena Lasiecka name Irena Lasiecka. Irena Lasiecka alternativeName I. Lasiecka. Irena Lasiecka affiliation University of Virginia, Charlottesville, USA. Irena Lasiecka is Person\nLasiecka earned her Ph. The output in this system is temperature, and the control is turning the dial on or off, or to a higher or lower temperature. Her first teaching job was at the Polish Academy of Sciences in 1975, and she later ventured to the United States a few years later, teaching at the University of California, Los Angeles. \n'}. In order to better understand this concept, it is useful to know a few key phrases. She has been teaching in the US ever since. She studied math for many years at the University of Warsaw, where she earned her Master of Science degree in applied mathematics in 1972 output format: answer
Irena Lasiecka
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What paper by Antoine Joux specifically earned him the 2013 Gödel Prize laureate recognition? Context: Côme Berbain et al.: Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers. (2008) authored by Antoine Joux. Marcel Medwed et al.: Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs. (2012) authored by Antoine Joux. Dahmun Goudarzi et al.: How to Securely Compute with Noisy Leakage in Quasilinear Complexity. (2018) authored by Antoine Joux. Thibauld Feneuil et al.: Shared Permutation for Syndrome Decoding: New Zero-Knowledge Protocol and Code-Based Signature. (2021) authored by Antoine Joux. Dahmun Goudarzi et al.: How to Securely Compute with Noisy Leakage in Quasilinear Complexity. (2017) authored by Antoine Joux. Thibauld Feneuil et al.: Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature. (2023) authored by Antoine Joux. Antoine Joux et al.: New Attacks against Standardized MACs. (2003) authored by Antoine Joux. Anja Becker et al.: Decoding Random Binary Linear Codes in 2n/20: How 1+1=0 Improves Information Set Decoding. (2012) authored by Antoine Joux. Anja Becker et al.: Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding. (2012) authored by Antoine Joux. Anja Becker et al.: Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search. (2015) authored by Antoine Joux. Antoine Joux et al.: Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC. (2002) authored by Antoine Joux. Jean-Sébastien Coron et al.: Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. (2010) authored by Antoine Joux. Jean-Sébastien Coron et al.: Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. (2011) authored by Antoine Joux. Loïc Bidoux et al.: RYDE: A Digital Signature Scheme based on Rank-Syndrome-Decoding Problem with MPCitH Paradigm. (2023) authored by Antoine Joux. Dipayan Das et al.: Fiat-Shamir signatures without aborts using Ring-and-Noise assumptions. (2022) authored by Antoine Joux. Antoine Joux et al.: Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms. (2008) authored by Antoine Joux. Jonathan Allcock et al.: Classical and quantum dynamic programming for Subset-Sum and variants. (2021) authored by Antoine Joux. Guilhem Castagnos et al.: Factoring pq2 with Quadratic Forms: Nice Cryptanalyses. (2009) authored by Antoine Joux. Antoine Joux et al.: Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms. (2009) authored by Antoine Joux. Jean-Sébastien Coron et al.: Fault Attacks on RSA Signatures with Partially Unknown Messages. (2009) authored by Antoine Joux"}. \nHe was associate professor\xa0[fr] at the Université de Versailles Saint-Quentin-en-Yvelines and researcher in the CRYPT team of the laboratory of computer science PRISM of CNRS, currently he is Chair of Cryptology of the Fondation partenariale of UPMC, professeur associé at the Laboratoire d'informatique de Paris 6, and Senior Crypto-Security Expert at CryptoExperts output format: answer
A one round protocol for tripartite Diffie-Hellman
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: How many papers does the academic institution of the author who wrote 'Haptische User Experience' have? Context: Jonas Witt et al.: A Divide-Align-Conquer Strategy for Program Synthesis. (2023) authored by Claus-Christian Carbon. Claus-Christian Carbon modified 2023-10-18. Claus-Christian Carbon alternativeName Carbon Cc. Claus-Christian Carbon alternativeName CCC. Claus-Christian Carbon alternativeName Claus Carbon. Claus-Christian Carbon alternativeName Claus‐Christian Carbon. Claus-Christian Carbon alternativeName Claus Christian Carbon'}. Since 2009 she has headed the laboratory of computational and quantitative biology output format: answer
9026
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What recommendation did the author make to improve the organization of information at Social Services offices? Context: T. D. Wilson: Review of: Disk Drill PRO. Atlanta, GA: 508 Software LLC. (2016) authored by Thomas D. Wilson 0001. Michael Bolin et al.: Automation and customization of rendered web pages. (2005) authored by Thomas D. Wilson 0001. Tom Wilson modified 2023-10-18. Tom Wilson name Tom Wilson. Tom Wilson i10Index 60. Tom Wilson: Sixth IEEE International Conference on Consumer Electronics-Berlin [Conference Reports]. (2017) authored by Thomas D. Wilson 0001. Tom Wilson alternativeName Tom Wilson. Pieta Eklund et al.: EURIDICE project: The evaluation of image database use in online learning. (2006) authored by Thomas D. Wilson 0001. Tom Wilson alternativeName Tom D. Wilson. T. D. Wilson: Review of: Jones, R. Internet forensics. Sebastopol, CA: O'Reilly, 2005. (2006) authored by Thomas D. Wilson 0001. Tom Wilson 2YrMeanCitedness 2.3333332538604736328. T. D. Wilson: Review of: Innocenti, Perla Cultural networks in migrating heritage: intersencting theories and practices across Europe. Farnham, UK: Ashgate, 2015. (2015) authored by Thomas D. Wilson 0001. Tom Wilson alternativeName Taryn Wilson. Tom Wilson alternativeName Thomas D. Wilson. T. D. Wilson: Review of: Galla, Preston. Windows XP Hacks: 100 industrial strength tips and tools. Sebastopol, CA: O'Reilly, 2003. (2005) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Geert Lovink. Uncanny networks: dialogues with the virtual intelligentsia. Cambridge, MA: MIT Press, 2004. xv, [1] 374pp. ISBN 0-262-62187-8 (2004) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Galla, Preston. Windows XP Hacks: tips and tools for optimizing your OS. (2nd ed.) Sebastopol, CA: O'Reilly, 2005. (2005) authored by Thomas D. Wilson 0001. Tom Wilson alternativeName T.D Wilson. Tom Wilson member of Glasgow Caledonian University. Tom Wilson alternativeName T D. Wilson. Tom Wilson alternativeName T. Wilson. T. D. Wilson: Review of: Sejnowski, Terrence J. The deep learning revolution Cambridge, MA: MIT Press, 2018. (2018) authored by Thomas D. Wilson 0001. Tom Wilson alternativeName T. D. Wilson. Tom Wilson worksCount 360. T. D. Wilson: Review of: Cronin, Blaise. Cathedrals of learning: great and ancient universities of Western Europe Cambridge, MA: Chandos Publishing, 2016. (2017) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Gazzard, Alison. Now the chips are down. The BBC micro. Cambridge, MA: MIT Press, 2016. (2016) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Sunstein, C.R. Republic.com 2.0. Princeton, PA: Princeton University Press, 2007. (2008) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Software review Onfolio. Academic and scientific. Version 2.02 Cambridge, MA: Onfolio, Inc., 2005. (2006) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Baldwin, Peter. The copyright wars: three centuries of trans-Atlantic battle. Princeton, NJ: Princeton University Press, 2014. (2014) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Tidwell, Jenifer. Designing interfaces. Sebastopol, CA: O'Reilly, 2006. (2006) authored by Thomas D. Wilson 0001. Thomas D. Wilson: Review of: Suarez, Michael E. & Woudhuysen, H.R. The book: a global history. Oxford: Oxford University Press, 2013. (2013) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Ray, Erik T. Learning XML (2nd ed.) Sebastopol, CA: O'Reilly, 2003. xiv, 400, [1] p. ISBN 0-596-00420-6. (2003) authored by Thomas D. Wilson 0001. Tom Wilson written paper amount in year2013: 13. Tom Wilson written paper amount in year2013: 13. Tom Wilson orcidId https://orcid.org/0000-0003-4941-8443. T. D. Wilson: Review of: Griffiths, Dawn Head first statistics Sebastopol, CA: O'Reilly, 2008. (2008) authored by Thomas D. Wilson 0001. Thomas D. Wilson 0001 is Creator. T. D. Wilson: Review of: Pogue, D., Zacker, C. & Zacker, L.J. Windows XP Pro: the missing manual. 2nd. ed. Sebastopol, CA: O'Reilly, 2004. (2005) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Healy, Kieran. Data visualization: a practical introduction. Princeton, NJ: Princeton University Press, 2019. (2019) authored by Thomas D. Wilson 0001. Thomas D. Wilson 0001 affiliation University of Borås, Sweden. T. D. Wilson: Hacking the systems. Review of: Tara Calishain and Rael Dornfest, Google hacks; Paul Bausch, Amazon hacks. Preston Grall, Windows XP hacks. Sebastopol, CA: O'Reilly, 2003 (2003) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Morville, Peter. Ambient findability. Sebastopol, CA: O'Reilly, 2005. (2006) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Brundage, Barbara. Photshop Elements 6. The missing manual. Sebastopol, CA: Pogue Press/O'Reilly, 2007. (2008) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Heinström, Jannica. From fear to flow. Oxford: Chandos Publishing, 2010. (2011) authored by Thomas D. Wilson 0001. Tom Wilson is Author. T. D. Wilson: Review of: Derrick Story. Digital photography hacks: 100 industrial-strength tips and tools. Sebastopol, CA: O'Reilly. 2004. xx, 309pp. ISBN 0-596-00666-7 (2004) authored by Thomas D. Wilson 0001. Tom Wilson citedByCount 4914. T. D. Wilson: Review of: Poibeau, Thierry. Machine translation Cambridge, MA: MIT Press, 2017. (2017) authored by Thomas D. Wilson 00018 million Swedish kronor ($1. '}. \nThomas Daniel Wilson was born in 1935 at Shincliffe Station in County Durham, England. A. There are four steps in the process, problem identification, problem definition, problem resolution, and solution statement. \nRecently, Dr. Thomas D. \nMore recently, Dr. He is a member of the group at the Swedish School which is participating in the SHAMAN project on long-term digital preservation, funded by the European Union output format: answer
establishment of a central library for Social Services information and training staff
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: In which country was the co-founder and CEO of GV20 Therapeutics born? Context: Pengyu Hong et al.: A boosting approach for motif modeling using ChIP-chip data. (2005) authored by Xiaole Shirley Liu. Hyunjin Shin et al.: Computational methodology for ChIP-seq analysis. (2013) authored by Xiaole Shirley Liu. X. Shirley Liu alternativeName Xu Liu. X. Shirley Liu alternativeName XIANGYU LIU. Johannes Köster et al.: A Bayesian model for single cell transcript expression analysis on MERFISH data. (2019) authored by Xiaole Shirley Liu. Johannes Köster et al.: A Bayesian model for single cell transcript expression analysis on MERFISH data. (2019) authored by Xiaole Shirley Liu. X. Shirley Liu written paper amount in year2013: 1D. Little output format: answer
China
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the hIndex of the author with the worksCount of 768 and citedByCount of 10076? Context: M. Sharif name M. Sharif. M. Sharif alternativeName Mariam Muhammad Sharif. M. Sharif alternativeName Muhammad Sharif. M. Sharif alternativeName M. Sharif. M. Sharif alternativeName M. SharifM. Sharif Now, Sharif has been appointed as Dean, Faculty of Science at University of the Punjab. "}. In this respect, Sharif was enrolled at QAU in Islamabad where he excelled in courses of mathematics and physics and received MSc Mathematics in 1985. e output format: answer
45
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: How many publication citations does the academic institution of the researcher who authored the article 'Data Analysis, Spatial' have? Context: Michael F. Goodchild alternativeName Michael Frank Goodchild. Michael F. Goodchild alternativeName Michael Goodchild. Michael F. Goodchild alternativeName Michael F. Goodchild. Michael F. Goodchild alternativeName M. F. Goodchild. Guofeng Cao et al.: Prediction and simulation in categorical fields: a transition probability combination approach. (2009) authored by Michael F. Goodchild. Shaowen Wang et al.: CyberGIS software: a synthetic review and integration roadmap. (2013) authored by Michael F. Goodchild. Michael F. Goodchild name Michael F. Goodchild. Wenwen Li et al.: Semantic similarity measurement based on knowledge mining: an artificial neural net approach. (2012) authored by Michael F. Goodchild. Wenwen Li and Michael F. Goodchild: An optimization technique for addressing DEM misregistration in hilly terrain. (2016) authored by Michael F. Goodchild. Michael F. Goodchild i10Index 200. Michael F. Goodchild is Person. Michael F. Goodchild et al.: New questions and a changing focus in advanced VGI research. (2017) authored by Michael F. Goodchild. Michael F. Goodchild is Creator. Trevor J. Barrett et al.: Interpreting Visualizations of Uncertainty on Smartphone Displays. (2015) authored by Michael F. Goodchild. Michael F. Goodchild orcidId https://orcid.org/0000-0003-1075-3471. Wenwen Li et al.: An extendable heuristic framework to solve the p-compact-regions problem for urban economic modeling. (2014) authored by Michael F. Goodchild. Michael F. Goodchild modified 2023-10-18'}. 8 kilometers long) output format: answer
4659042
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Who has a higher hIndex, the author of 'Wavelet-Galerkin method for the Kolmogorov equation' or the author of 'Say EM for Selecting Probabilistic Models for Logical Sequences'? Context: Mirwaes Wahabzada et al.: Automated interpretation of 3D laserscanned point clouds for plant organ segmentation. (2015) authored by Kristian Kersting. Lukas Struppek et al.: Image Classifiers Leak Sensitive Attributes About Their Classes. (2023) authored by Kristian Kersting. Mina Ameli et al.: Unsupervised Multi-sensor Anomaly Localization with Explainable AI. (2022) authored by Kristian Kersting. Karl Stelzner et al.: Decomposing 3D Scenes into Objects via Unsupervised Volume Segmentation. (2021) authored by Kristian Kersting. Shuo Yang et al.: Modeling Coronary Artery Calcification Levels from Behavioral Data in a Clinical Study. (2015) authored by Kristian Kersting. Rudolph Triebel et al.: Robust 3D Scan Point Classification using Associative Markov Networks. (2006) authored by Kristian Kersting. Christian Bauckhage et al.: How players lose interest in playing a game: An empirical study based on distributions of total playing times. (2012) authored by Kristian Kersting. Steven Lang et al.: DAFNe: A One-Stage Anchor-Free Deep Model for Oriented Object Detection. (2021) authored by Kristian Kersting. Rafet Sifa et al.: Matrix- and Tensor Factorization for Game Content Recommendation. (2020) authored by Kristian Kersting. Frieder Uhlig et al.: Transformer-Boosted Anomaly Detection with Fuzzy Hashes. (2022) authored by Kristian Kersting. Nafise Sadat Moosavi et al.: Adaptable Adapters. (2022) authored by Kristian Kersting. Nafise Sadat Moosavi et al.: Adaptable Adapters. (2022) authored by Kristian Kersting. Patrick Schramowski and Kristian Kersting: Inferring Offensiveness In Images From Natural Language Supervision. (2021) authored by Kristian Kersting. Anna Brugger et al.: Extending Hyperspectral Imaging for Plant Phenotyping to the UV-Range. (2019) authored by Kristian Kersting. Marion Neumann et al.: Erosion Band Features for Cell Phone Image Based Plant Disease Classification. (2014) authored by Kristian Kersting. Jens Behley et al.: Learning to hash logistic regression for fast 3D scan point classification. (2010) authored by Kristian Kersting. Martin Mundt et al.: CLEVA-Compass: A Continual Learning EValuation Assessment Compass to Promote Research Transparency and Comparability. (2021) authored by Kristian Kersting. Lukas Struppek et al.: Be Careful What You Smooth For: Label Smoothing Can Be a Privacy Shield but Also a Catalyst for Model Inversion Attacks. (2023) authored by Kristian Kersting. Martin Mundt et al.: CLEVA-Compass: A Continual Learning Evaluation Assessment Compass to Promote Research Transparency and Comparability. (2022) authored by Kristian Kersting. Ahmed Jawad et al.: Where traffic meets DNA: mobility mining using biological sequence analysis revisited. (2011) authored by Kristian Kersting. Niyati Rawal et al.: ExGenNet: Learning to Generate Robotic Facial Expression Using Facial Expression Recognition. (2021) authored by Kristian Kersting. Rafet Sifa et al.: Predicting Purchase Decisions in Mobile Free-to-Play Games. (2015) authored by Kristian Kersting. Lukas Struppek et al.: Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash. (2022) authored by Kristian Kersting. Dominik Hintersdorf et al.: CLIPping Privacy: Identity Inference Attacks on Multi-Modal Machine Learning Models. (2022) authored by Kristian Kersting. Gopika Sudhakaran et al.: Vision Relation Transformer for Unbiased Scene Graph Generation. (2023) authored by Kristian Kersting. Gopika Sudhakaran et al.: Vision Relation Transformer for Unbiased Scene Graph Generation. (2023) authored by Kristian Kersting. Christian Thurau et al.: Yes we can: simplex volume maximization for descriptive web-scale matrix factorization. (2010) authored by Kristian Kersting. Mayukh Deb et al.: AtMan: Understanding Transformer Predictions Through Memory Efficient Attention Manipulation. (2023) authored by Kristian Kersting. Lukas Struppek et al.: Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash. (2021) authored by Kristian Kersting. Lukas Struppek et al.: Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks. (2022) authored by Kristian Kersting. Lukas Struppek et al.: Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks. (2022) authored by Kristian Kersting. Aidmar Wainakh et al.: User-Level Label Leakage from Gradients in Federated Learning. (2022) authored by Kristian Kersting. Sriraam Natarajan et al.: A Machine Learning Pipeline for Three-Way Classification of Alzheimer Patients from Structural Magnetic Resonance Images of the Brain. (2012) authored by Kristian Kersting. Aidmar Wainakh et al.: User Label Leakage from Gradients in Federated Learning. (2021) authored by Kristian Kersting. Alejandro Molina et al.: Mixed Sum-Product Networks: A Deep Architecture for Hybrid Domains. (2018) authored by Kristian Kersting. Manuel Brack et al.: Distilling Adversarial Prompts from Safety Benchmarks: Report for the Adversarial Nibbler Challenge. (2023) authored by Kristian Kersting. Lukas Struppek et al.: Exploiting Cultural Biases via Homoglyphs in Text-to-Image Synthesis. (2023) authored by Kristian Kersting. Zhao Xu et al.: Graph Enhanced Memory Networks for Sentiment Analysis. (2017) authored by Kristian Kersting. Lukas Struppek et al.: Rickrolling the Artist: Injecting Backdoors into Text Encoders for Text-to-Image Synthesis. (2023) authored by Kristian Kersting. Jannik Kossen et al.: Structured Object-Aware Physics Prediction for Video Modeling and Planning. (2019) authored by Kristian Kersting. Jannik Kossen et al.: Structured Object-Aware Physics Prediction for Video Modeling and Planning. (2020) authored by Kristian Kersting. Johannes Czech et al.: Representation Matters: The Game of Chess Poses a Challenge to Vision Transformers. (2023) authored by Kristian Kersting. Olana Missura et al.: Towards Engaging Games. (2008) authored by Kristian Kersting. Marco Bellagente et al.: MultiFusion: Fusing Pre-Trained Models for Multi-Lingual, Multi-Modal Image Generation. (2023) authored by Kristian Kersting. Marco Bellagente et al.: MultiFusion: Fusing Pre-Trained Models for Multi-Lingual, Multi-Modal Image Generation. (2023) authored by Kristian Kersting. Christopher Morris et al.: Glocalized Weisfeiler-Lehman Graph Kernels: Global-Local Feature Maps of Graphs. (2017) authored by Kristian Kersting. Sriraam Natarajan et al.: Early Prediction of Coronary Artery Calcification Levels Using Machine Learning. (2013) authored by Kristian Kersting. Björn Deiseroth et al.: ATMAN: Understanding Transformer Predictions Through Memory Efficient Attention Manipulation. (2023) authored by Kristian Kersting. Kristian Kersting affiliation University of Bonn, Faculty of Agriculture, Germany. Kristian Kersting 2YrMeanCitedness 0.936363637447357177735 million euros over five years. '}. D. in 2006 output format: answer
Kristian Kersting
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Where did the author of SPAA 1999 - Guest Editors' Foreword receive a B.Tech degree from? Context: Lin Yang et al.: Online Linear Optimization with Inventory Management Constraints. (2020) authored by Ramesh K. Sitaraman. Lin Yang et al.: Online Linear Optimization with Inventory Management Constraints. (2020) authored by Ramesh K. Sitaraman. Russell Lee et al.: Competitive Bidding Strategies for Online Linear Optimization with Inventory Management Constraints. (2022) authored by Ramesh K. Sitaraman. Russell Lee et al.: Competitive bidding strategies for online linear optimization with inventory management constraints. (2021) authored by Ramesh K. Sitaraman. Diptyaroop Maji et al.: The Green Mirage: Impact of Location- and Market-based Carbon Intensity Estimation on Carbon Optimization Efficacy. (2024) authored by Ramesh K. Sitaraman. Diptyaroop Maji et al.: The Green Mirage: Impact of Location- and Market-based Carbon Intensity Estimation on Carbon Optimization Efficacy. (2024) authored by Ramesh K. Sitaraman. Shivi Vats et al.: Semantic-Aware View Prediction for 360-Degree Videos at the 5G Edge. (2022) authored by Ramesh K. Sitaraman. Jounsup Park et al.: SEAWARE: Semantic Aware View Prediction System for 360-degree Video Streaming. (2020) authored by Ramesh K. Sitaraman. Darshan S. Palasamudram et al.: Using batteries to reduce the power costs of internet-scale distributed networks. (2012) authored by Ramesh K. Sitaraman. Qian Zhou et al.: 360TripleView: 360-Degree Video View Management System Driven by Convergence Value of Viewing Preferences. (2023) authored by Ramesh K. Sitaraman. Ramesh K. Sitaraman and Niraj K. Jha: Optimal Design of Checks for Error Detection and Location in Fault-Tolerant Multiprocessor Systems. (1993) authored by Ramesh K. Sitaraman. Vimal Mathew et al.: Reducing energy costs in Internet-scale distributed systems using load shifting. (2014) authored by Ramesh K. Sitaraman. Ramesh K. Sitaraman and Niraj K. Jha: Optimal Design of Checks for Error Detection and Location in Fault Tolerant Multiprocessors Systems. (1991) authored by Ramesh K. Sitaraman. Ramesh K. Sitaraman and Azriel Rosenfeld: Probabilistic analysis of two stage matching. (1989) authored by Ramesh K. Sitaraman. Benjamin Heintz et al.: Optimizing Grouped Aggregation in Geo-Distributed Streaming Analytics. (2015) authored by Ramesh K. Sitaraman. Yoonheui Kim et al.: Cluster-Swap: A Distributed K-median Algorithm for Sensor Networks. (2009) authored by Ramesh K. Sitaraman. Lin Yang et al.: Competitive Algorithms for Online Multidimensional Knapsack Problems. (2022) authored by Ramesh K. Sitaraman. Lin Yang et al.: Competitive Algorithms for Online Multidimensional Knapsack Problems. (2021) authored by Ramesh K. Sitaraman. Lixin Gao et al.: Optimal architecture-independent scheduling of fine-grain tree-sweep computations. (1995) authored by Ramesh K. Sitaraman. Anirudh Sabnis and Ramesh K. Sitaraman: TRAGEN: a synthetic trace generator for realistic cache simulations. (2021) authored by Ramesh K. Sitaraman. Aditya Akella et al.: A measurement-based analysis of multihoming. (2003) authored by Ramesh K. Sitaraman Later, serving as a principal architect, he helped build the Akamai network, a large overlay network that currently delivers 15-30% of all web traffic using 190,000 servers in 110 countries in over 1,100 networks. '}. He is also known for his early work in building large-scale video delivery networks, measuring their performance, and more recently studying the impact of streaming video performance on users output format: answer
Indian Institute of Technology, Madras
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the hIndex of the author from Leuphana University? Context: Gonzalo C. de Guzman et al.: Embedded artificial gestures: Modulating behavioral coupling in human-machine interaction via motion modification. (2010) authored by J. A. Scott Kelso. Kelly J. Jantzen et al.: Coordination Dynamics of Large-scale Neural Circuitry Underlying Rhythmic Sensorimotor Behavior. (2009) authored by J. A. Scott Kelso. Collins G. Assisi et al.: Dynamics of multifrequency coordination using parametric driving: theory and experiment. (2005) authored by J. A. Scott Kelso. Dawei W. Dong et al.: Spatio-temporal decorrelated activity patterns in functional MRI data during real and imagined motor tasks. (2002) authored by J. A. Scott Kelso. John J. Wade et al.: Self-repair in a Bidirectionally Coupled Astrocyte-Neuron (AN) System based on Retrograde Signaling. (2012) authored by J. A. Scott Kelso. J. J. Buchanan et al.: Coordination dynamics of trajectory formation. (1995) authored by J. A. Scott Kelso. Emmanuelle Tognoli et al.: Behavioral and Brain Dynamics of Team Coordination Part I: Task Design. (2011) authored by J. A. Scott Kelso. John J. Wade et al.: Exploring retrograde signaling via astrocytes as a mechanism for self repair. (2011) authored by J. A. Scott Kelso. Arpan Banerjee et al.: Spatiotemporal re-organization of large-scale neural assemblies underlies bimanual coordination. (2012) authored by J. A. Scott Kelso. Kelly J. Jantzen et al.: Functional MRI reveals the existence of modality and coordination-dependent timing networks. (2005) authored by J. A. Scott Kelso The insights of coordination dynamics have been applied to predict behavior in different kinds of systems at different levels of analysis. Coordination dynamics is an empirical and conceptual framework that tries to explain how patterns of coordination form, persist, adapt and change. This "HKB model" was able to derive basic forms of coordination observed in Kelso\'s experiments using a system of nonlinear relations between individual coordinating elements The HKB model explained and predicted experimental observations such as "critical slowing down", and "enhanced fluctuations" associated with instability and dramatic changes in coordination. At that time, the dominant understanding of animated movement was that behavior is determined by a "central program", a prearranged set of instructions that prescribe how a set of biomechanical components should behave. But coordination dynamics seeks to model specific properties of human cognition, neurophysiology, and social function – such as anticipation, intention, attention, decision-making and learning. The principal claim of coordination dynamics is that the coordination of neurons in the brain and the coordinated actions of people and animals are linked by virtue of sharing a common mathematical or dynamical structure. In contrast, Kelso showed experimentally that behavior can also emerge in a self-organizing way, as a result of highly nonlinear interactions among many interconnected elements. ) and statistical tools to gather information about the structure and function of the brain during real-time behavior. Further work at Haskins Labs using a combination of novel perturbation techniques, kinematic and intramuscular recordings discovered that the control and coordination of complex speech gestures was also based on functional synergies or coordination structures. Using large electrode arrays now available in the field of electroencephalography (EEG), he and his co-workers have been imaging the brains of pairs of humans, as they perform coordinated hand movements. They propose a comprehensive, empirically-based scientific theory of how contraries can be reconciled based on Kelso\'s theory of metastable coordination dynamics. Phase transitions are a basic mechanism of self-organization in nature and Kelso\'s experiments, which have been replicated many times, were the first to show them in the coordinated movements of human beings. \nHis experimental research in the late 1970s and early 1980s led to the HKB model (Haken–Kelso–Bunz), a mathematical formulation that quantitatively describes and predicts how elementary forms of coordinated behavior arise and change adaptively as a result of nonlinear interactions among components. He served as President of the South Florida chapter of Sigma Xi, the Scientific Research Society, from 1995 to 1999. This concept has seen a growing interest among theoretical and computational neuroscientists, since it provides a mathematical formalization for the idea that the individual parts of the brain can on the one hand be specialized and segregated yet on the other hand function as an integrated whole. Later extensions of HKB accommodated the effects of noise, broken symmetry, multiple interacting heterogeneous components, recruitment-annihilation processes, parametric stabilization, and the role of changing environments on coordination\nSubsequently, Kelso and his colleagues moved from the hand to the brain, using large arrays of SQUID magnetometers to record the neuromagnetic activity of the brain and Functional Magnetic Resonance Imaging to record BOLD (Blood Oxygen Level Dependent) activation in brain regions output format: answer
88
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the number of papers for the academic institution of the contributor of 'Tactical and Strategic Data Analysis Methods for Multispectral Imaging Data from Landed Mars Missions'? Context: A. A. Fraeman alternativeName Jim Bell. A. A. Fraeman alternativeName J. Bell. A. A. Fraeman alternativeName Abigail A. Fraeman. A. A. Fraeman alternativeName J. F. Bell. A. A. Fraeman alternativeName A. Fraeman\nBell earned his B. "}. S. S. He earned his M output format: answer
140637
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Which journal did the Italian computer scientist Michela Milano serve as the editor-in-chief in 2015? Context: Federico Caselli et al.: Swarm-Based Controller for Traffic Lights Management. (2015) authored by Michela Milano. Danuta Sorina Chisca et al.: A Sampling-Free Anticipatory Algorithm for the Kidney Exchange Problem. (2019) authored by Michela Milano. Filippo Focacci et al.: Embedding Relaxations in Global Constraints for Solving TSP and TSPTW. (2002) authored by Michela Milano. Riccardo Belletti et al.: Swarm-based traffic lights policy selection. (2014) authored by Michela Milano. Alessio Bonfietti et al.: Embedding Decision Trees and Random Forests in Constraint Programming. (2015) authored by Michela Milano. Marco Gavanelli et al.: Dealing with incomplete knowledge on CLP(FD) variable domains. (2005) authored by Michela Milano. Valerio Iachini et al.: Agent Based Simulation of Incentive Mechanisms on Photovoltaic Adoption. (2015) authored by Michela Milano. Michele Lombardi et al.: Deterministic Estimation of the Expected Makespan of a POS Under Duration Uncertainty. (2015) authored by Michela Milano. Marco Alberti et al.: Expressing Interaction in Combinatorial Auction through Social Integrity Constraints. (2005) authored by Michela Milano. Evelina Lamma et al.: An Algorithm for Learning Abductive Rules. (1997) authored by Michela Milano. Thomas Bridi et al.: DARDIS: Distributed And Randomized DIspatching and Scheduling. (2016) authored by Michela Milano. Thomas Bridi et al.: DARDIS: Distributed And Randomized DIspatching and Scheduling. (2016) authored by Michela Milano. Martino Ruggiero et al.: A Cooperative, Accurate Solving Framework for Optimal Allocation, Scheduling and Frequency Selection on Energy-Efficient MPSoCs. (2006) authored by Michela Milano. Eleonora Misino et al.: FAiRDAS: Fairness-Aware Ranking as Dynamic Abstract System. (2023) authored by Michela Milano. Andrea Borghesi et al.: Improving Deep Learning Models via Constraint-Based Domain Knowledge: a Brief Survey. (2020) authored by Michela Milano. Alessandro Maggio et al.: A geometric framework for fairness. (2023) authored by Michela Milano. Marco Gavanelli et al.: Greedy and Exact Algorithms for Invitation Planning in Cancer Screening. (2008) authored by Michela Milano. Andrea Borghesi et al.: Simulation Of Incentive Mechanisms For Renewable Energy Policies. (2013) authored by Michela Milano. Marco Gavanelli et al.: Domains as First Class Objects in CLP(FD). (1999) authored by Michela Milano. Marco Gavanelli et al.: Domains as First Class Objects in CLP(FD). (1999) authored by Michela Milano. Marco Alberti et al.: A CHR-based implementation of known arc-consistency. (2005) authored by Michela Milano. Andrea Borghesi et al.: Pricing Schemes for Energy-Efficient HPC Systems: Design and Exploration. (2018) authored by Michela Milano. Fabrizio Detassis et al.: Teaching the Old Dog New Tricks: Supervised Learning with Constraints. (2021) authored by Michela Milano. Cormac Gebruers et al.: Making Choices Using Structure at the Instance Level within a Case Based Reasoning Framework. (2004) authored by Michela Milano. Fabrizio Detassis et al.: Teaching the old dog new tricks: supervised learning with constraints. (2020) authored by Michela Milano"}. \nMilano is a Fellow of the European Association for Artificial Intelligence output format: answer
Constraints
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: From which university did the writer of Image-Guided Streamline Placement receive his Ph.D.? Context: Greg Turk alternativeName Turk Greg. Greg Turk alternativeName Greg Turk. Greg Turk alternativeName G Türk. Greg Turk name Greg Turk. Greg Turk alternativeName G. Turk. Wenhao Yu et al.: Preparing for the Unknown: Learning a Universal Policy with Online System Identification. (2017) authored by Greg Turk. Wenhao Yu et al.: Preparing for the Unknown: Learning a Universal Policy with Online System Identification. (2017) authored by Greg Turk. Greg Turk alternativeName G.W. Turk. Zackory Erickson et al.: Deep Haptic Model Predictive Control for Robot-Assisted Dressing. (2018) authored by Greg Turk. Zackory Erickson et al.: Deep Haptic Model Predictive Control for Robot-Assisted Dressing. (2017) authored by Greg Turk. Greg Turk modified 2023-10-18. Wenhao Yu et al.: Protective Policy Transfer. (2020) authored by Greg Turk. Zackory Erickson et al.: Characterizing Multidimensional Capacitive Servoing for Physical Human-Robot Interaction. (2023) authored by Greg Turk. Jie Tan et al.: Stable Proportional-Derivative Controllers. (2011) authored by Greg Turk. Greg Turk i10Index 97. Wenhao Yu et al.: Protective Policy Transfer. (2021) authored by Greg Turk. Zackory Erickson et al.: Characterizing Multidimensional Capacitive Servoing for Physical Human-Robot Interaction. (2021) authored by Greg Turk I bought one of these bunnies. Even better, these bunnies were made of terra cotta (red clay), so they were red and diffuse. On one of the shelves of [a] store was a large collection of clay bunny rabbits, all identical. Easter . . . . output format: answer
University of North Carolina at Chapel Hill
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What academic title does the individual who received an Honorary Doctorate in Humane Letters from the American University of Beirut hold? Context: Hariharan Rahul et al.: JMB: scaling wireless capacity with user demands. (2014) authored by Dina Katabi. Shyamnath Gollakota et al.: Clearing the RF smog: making 802.11n robust to cross-technology interference. (2011) authored by Dina Katabi. Dina Katabi and Archan Misra: Proceedings of the 2nd workshop on Workshop on Physical Analytics, WPA@MobiSys 2015, Florence, Italy, May 22, 2015 (2015) edited by Dina Katabi. Hariharan Shankar Rahul et al.: JMB: scaling wireless capacity with user demands. (2012) authored by Dina Katabi. Lixin Shi et al.: Poster: Wireless Power Hotspot that Charges All of Your Devices. (2015) authored by Dina Katabi. Deepak Vasisht et al.: Perspective: eliminating channel feedback in next generation cellular networks. (2019) authored by Dina Katabi. Lixin Shi et al.: Wireless Power Hotspot that Charges All of Your Devices. (2015) authored by Dina Katabi. Haitham Hassanieh et al.: Agile Millimeter Wave Networks with Provable Guarantees. (2017) authored by Dina Katabi. Sachin Katti et al.: Symbol-level network coding for wireless mesh networks. (2008) authored by Dina Katabi. Swarun Kumar et al.: Bringing cross-layer MIMO to today's wireless LANs. (2013) authored by Dina Katabi. Deepak Vasisht et al.: Duet: Estimating User Position and Identity in Smart Homes Using Intermittent and Incomplete RF-Data. (2018) authored by Dina Katabi. Sachin Katti et al.: MultiQ: automated detection of multiple bottleneck capacities along a path. (2004) authored by Dina Katabi. Chen-Yu Hsu et al.: Self-Supervised Learning of Appliance Usage. (2020) authored by Dina Katabi. Omid Abari et al.: A millimeter wave software defined radio platform with phased arrays: poster. (2016) authored by Dina Katabi. Yuzhe Yang et al.: ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation. (2019) authored by Dina Katabi. Yuzhe Yang et al.: ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation. (2019) authored by Dina Katabi. Deepak Vasisht et al.: Eliminating Channel Feedback in Next-Generation Cellular Networks. (2017) authored by Dina Katabi. Deepak Vasisht et al.: Eliminating Channel Feedback in Next-Generation Cellular Networks. (2016) authored by Dina Katabi. Yuzhe Yang et al.: Delving into Deep Imbalanced Regression. (2021) authored by Dina Katabi. Yuzhe Yang et al.: Delving into Deep Imbalanced Regression. (2021) authored by Dina Katabi. Omid Abari et al.: Millimeter Wave Communications: From Point-to-Point Links to Agile Network Connections. (2016) authored by Dina Katabi. Lixin Shi et al.: Beyond Sensing: Multi-GHz Realtime Spectrum Analytics. (2015) authored by Dina Katabi. Grace R. Woo et al.: Beyond the bits: cooperative packet recovery using physical layer information. (2007) authored by Dina Katabi. Lixin Shi et al.: D-BigBand: sensing GHZ-wide non-sparse spectrum on commodity radios. (2014) authored by Dina Katabi. Shichao Yue et al.: CornerRadar: RF-Based Indoor Localization Around Corners. (2022) authored by Dina Katabi Her work started in networks (especially the congestion control challenge), where she found solutions for a better reliability of networks. Though her initial plan was to follow this same career path, she discovered a new passion in college: computer science. Based on how RF signals bounce off our bodies, the researchers could measure human breathing, heart rates, emotion and sleep stages, without having the "patient" wear any sensor. in Computer Systems Networking and Telecommunications from MIT in 1998 and 2003, respectively. Then, with her team, she used machine learning and signals to analyze the human body output format: answer
Professor
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Whose institute has more publications, the creator of Tactical and Strategic Data Analysis Methods for Multispectral Imaging Data from Landed Mars Missions or the author of Dining with GAs: Operator Lunch Theorems? Context: Rafal Kicinger et al.: Morphogenesis and structural design: cellular automata representations of steel structures in tall buildings. (2004) authored by Kenneth A. De Jong. Uday Kamath et al.: An evolutionary-based approach for feature generation: Eukaryotic promoter recognition. (2011) authored by Kenneth A. De Jong. Kexin Chen et al.: Differential Spatial Representations in Hippocampal CA1 and Subiculum Emerge in Evolved Spiking Neural Networks. (2021) authored by Kenneth A. De Jong. Emmanuel Sapin et al.: Evolving Conformation Paths to Model Protein Structural Transitions. (2017) authored by Kenneth A. De Jong. Uday Kamath et al.: A Two-Stage Evolutionary Approach for Effective Classification of hypersensitive DNA Sequences. (2011) authored by Kenneth A. De Jong. Jean-Michel Claverie et al.: Robust nonlinear control design using competitive coevolution. (2000) authored by Kenneth A. De Jong. Uday Kamath et al.: Selecting predictive features for recognition of hypersensitive sites of regulatory genomic sequences with an evolutionary algorithm. (2010) authored by Kenneth A. De Jong. Uday Kamath et al.: An Evolutionary Algorithm Approach for Feature Generation from Sequence Data and Its Application to DNA Splice Site Prediction. (2012) authored by Kenneth A. De Jong. Brian S. Olson et al.: Off-lattice protein structure prediction with homologous crossover. (2013) authored by Kenneth A. De Jong. Connie Loggia Ramsey et al.: Genome Length as an Evolutionary Self-adaptation. (1998) authored by Kenneth A. De Jong. Kenneth A. De Jong alternativeName Kenneth A. Jong. Kenneth A. De Jong name Kenneth A. De Jong. Jeffrey K. Bassett et al.: The relationship between evolvability and bloat. (2009) authored by Kenneth A. De Jong. Siva Venkadesh et al.: Evolving Simple Models of Diverse Intrinsic Dynamics in Hippocampal Neuron Types. (2018) authored by Kenneth A. De Jong. Kenneth A. De Jong alternativeName Kenneth A. De Jong. Emmanuel Sapin et al.: Modeling protein structural transitions as a multiobjective optimization problem. (2017) authored by Kenneth A. De Jong. Kenneth A. De Jong alternativeName Kenneth Jong. Kenneth A. De Jong alternativeName Kenneth De Jong. Kenneth A. De Jong alternativeName Kenneth Alan De Jong. Kenneth A. De Jong written paper amount in year2020: 0. Kenneth A. De Jong written paper amount in year2020: 0. Uday Kamath et al.: Feature and Kernel Evolution for Recognition of Hypersensitive Sites in DNA Sequences. (2010) authored by Kenneth A. De Jong'}. D output format: answer
Arizona State University
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What award did the author of 'Gallium nitride-based gas, chemical and biomedical sensors' receive from the Institute of Electrical and Electronics Engineers? Context: S. J. Pearton alternativeName Pearton Sj. S. J. Pearton alternativeName S. J. Peartona. S. J. Pearton name S. J. Pearton. S. J. Pearton alternativeName S. Pearton. S. J. Pearton alternativeName S J. Pearton. S. J. Pearton alternativeName Steve J. Pearton"}. J output format: answer
J.J. Ebers Award
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the birth date of the author of the paper 'Trust in emergency evacuation robots'? Context: Daniela Marghitu et al.: Developing Coding Instruction Videos for K12 Hearing Impaired Students Using American Sign Language. (2023) authored by Ayanna M. Howard. Sergio García-Vergara et al.: Increasing Super Pop VR^TM V R T M Users' Intrinsic Motivation by Improving the Game's Aesthetics. (2015) authored by Ayanna M. Howard. Stephen Williams and Ayanna M. Howard: Horizon line estimation in glacial environments using multiple visual cues. (2011) authored by Ayanna M. Howard. Katelyn E. Fry et al.: Method for the Determination of Relative Joint Axes for Wearable Inertial Sensor Applications. (2021) authored by Ayanna M. Howard. Antidio Viguria and Ayanna M. Howard: Upper-bound cost analysis of a market-based algorithm applied to the initial formation problem. (2007) authored by Ayanna M. Howard. Camille Harris et al.: Exploring the Role of Grammar and Word Choice in Bias Toward African American English (AAE) in Hate Speech Classification. (2022) authored by Ayanna M. Howard. Sergio García-Vergara et al.: Super Pop VRTM: An Adaptable Virtual Reality Game for Upper-Body Rehabilitation. (2013) authored by Ayanna M. Howard. Sohrab Mobasser et al.: Fuzzy Image Processing in Sun Sensor. (2001) authored by Ayanna M. Howard. Matan Halevy et al.: Mitigating Racial Biases in Toxic Language Detection with an Equity-Based Ensemble Framework. (2021) authored by Ayanna M. Howard. Matan Halevy et al.: Mitigating Racial Biases in Toxic Language Detection with an Equity-Based Ensemble Framework. (2021) authored by Ayanna M. Howard. Brittney A. English and Ayanna M. Howard: The effects of adjusting task difficulty on learning motor and cognitive aspects of a multitasking task. (2017) authored by Ayanna M. Howard. Chung Hyuk Park et al.: Examining the learning effects of a low-cost haptic-based virtual reality simulator on laparoscopic cholecystectomy. (2013) authored by Ayanna M. Howard. Brittney A. English and Ayanna M. Howard: The effects of musical cues on motor learning using a robotic wrist rehabilitation system - A healthy pilot study. (2017) authored by Ayanna M. Howard. Chung Hyuk Park et al.: Pilot Study: Supplementing Surgical Training for Medical Students Using a Low-Cost Virtual Reality Simulator. (2014) authored by Ayanna M. Howard. Ayanna M. Howard et al.: Non-contact versus contact-based sensing methodologies for in-home upper arm robotic rehabilitation. (2013) authored by Ayanna M. Howard. Brittney A. English and Ayanna M. Howard: An Adaptive Robotic Tablet Gaming System for Post-Stroke Hand Function Rehabilitation. (2015) authored by Ayanna M. Howard. Ayanna M. Howard and J. MacCalla: Pilot study to evaluate the effectiveness of a mobile-based therapy and educational app for children. (2014) authored by Ayanna M. Howard. Chung Hyuk Park and Ayanna M. Howard: Haptic Visualization of Real-World Environmental Data for Individuals with Visual Impairments. (2014) authored by Ayanna M. Howard. Antidio Viguria and Ayanna M. Howard: A probabilistic model for the performance analysis of a distributed task allocation algorithm. (2009) authored by Ayanna M. Howard. Stephen Williams et al.: Calibration and Validation of Earth-Observing Sensors Using Deployable Surface-Based Sensor Networks. (2010) authored by Ayanna M. Howard. Meenakshi Das et al.: Accessible Block-Based Programming for K-12 Students Who Are Blind or Low Vision. (2021) authored by Ayanna M. Howard. Brian Stephen Smith et al.: Automatic deployment and formation control of decentralized multi-agent networks. (2008) authored by Ayanna M. Howard. Scott Koziol et al.: Using floating-gate based programmable analog arrays for real-time control of a game-playing robot. (2011) authored by Ayanna M. Howard. Ayanna M. Howard and Curtis Padgett: A generalized approach to real-time pattern recognition in sensed data. (1999) authored by Ayanna M. Howard. Sekou L. Remy et al.: Improving the performance of ANN training with an unsupervised filtering method. (2009) authored by Ayanna M. Howard and Ph. S. S. D. D. and Mark C. In 2013, she founded Zyrobotics, which has released their first suite of therapy and educational products for children with special needs. program at Georgia Tech. Bekey output format: answer
January 24, 1972
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What is the hIndex of the author who worked with Michael Pfeiffer at University of Linz, Institute of Practical Computer Science, Austria and published Linear Scan Register Allocation in the Context of SSA Form and Register Constraints in CC in 2002? Context: Andreas Schörgenhumer et al.: On the Difficulties of Supervised Event Prediction based on Unbalanced Real-World Data in Multi-System Monitoring. (2019) authored by Hanspeter Mössenböck. Hanspeter Mössenböck 2YrMeanCitedness 0.94736844301223754883. Verena Bitto et al.: Efficient Rebuilding of Large Java Heaps from Event Traces. (2015) authored by Hanspeter Mössenböck. Markus Jahn et al.: Supporting Model Maintenance in Component-based Product Lines. (2012) authored by Hanspeter Mössenböck. Markus Jahn et al.: Plux.Net - A dynamic Plug-in Platform for Desktop and Web Applications in .Net. (2012) authored by Hanspeter Mössenböck. Markus Weninger et al.: Memory Cities: Visualizing Heap Memory Evolution Using the Software City Metaphor. (2020) authored by Hanspeter Mössenböck. Andreas Schörgenhumer et al.: Can we Predict Performance Events with Time Series Data from Monitoring Multiple Systems? (2019) authored by Hanspeter Mössenböck. Markus Jahn et al.: Composing user-specific web applications from distributed plug-ins. (2013) authored by Hanspeter Mössenböck. Hanspeter Mössenböck name Hanspeter Mössenböck. Andreas Schörgenhumer et al.: An Approach for Ranking Feature-based Clustering Methods and its Application in Multi-System Infrastructure Monitoring. (2021) authored by Hanspeter Mössenböck. Markus Weninger et al.: Memory Leak Analysis using Time-Travel-based and Timeline-based Tree Evolution Visualizations. (2020) authored by Hanspeter Mössenböck. Markus Jahn et al.: Rule-Based Composition Behaviors in Dynamic Plug-In Systems. (2010) authored by Hanspeter Mössenböck. Markus Jahn et al.: Extending Web Applications with Client and Server Plug-ins. (2010) authored by Hanspeter Mössenböck. Manuel Rigger et al.: Sulong, and thanks for all the fish. (2018) authored by Hanspeter Mössenböck. Kai Koskimies and Hanspeter Mössenböck: Scene: Using Scenario Diagrams and Active Text for Illustrating Object-Oriented Programs. (1996) authored by Hanspeter Mössenböck. Hanspeter Mössenböck alternativeName Hanspeter Mossenbock. Hanspeter Mössenböck alternativeName Hanspeter Mössenböck. Stefan Marr et al.: A concurrency-agnostic protocol for multi-paradigm concurrent debugging tools. (2017) authored by Hanspeter Mössenböck. Stefan Marr et al.: A Concurrency-Agnostic Protocol for Multi-Paradigm Concurrent Debugging Tools. (2017) authored by Hanspeter Mössenböck. Dominik Aumayr et al.: Asynchronous snapshots of actor systems for latency-sensitive applications. (2019) authored by Hanspeter Mössenböck. Dominik Aumayr et al.: Asynchronous Snapshots of Actor Systems for Latency-Sensitive Applications. (2019) authored by Hanspeter Mössenböck. Andreas Schörgenhumer et al.: A Framework for Preprocessing Multivariate, Topology-Aware Time Series and Event Data in a Multi-System Environment. (2019) authored by Hanspeter Mössenböck. Andreas Schörgenhumer et al.: Using Multi-System Monitoring Time Series to Predict Performance Events. (2019) authored by Hanspeter Mössenböck. Hanspeter Mössenböck is Creatorg. '}. \n2006 he became honorary doctor of the Eötvös Loránd Universität Budapest. Research results of the research group, e output format: answer
25
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: When comparing the i10Index, is the researcher behind 'Trust- and Location-Based Recommendations for Tourism' ahead of the author of 'The internet of ideas'? Context: Annika Hinze modified 2023-10-18. Annika Hinze et al.: HDLalert - a healthcare DL alerting system: from user needs to implementation. (2006) authored by Annika Hinze. Annika Hinze written paper amount in year2021: 6. Annika Hinze written paper amount in year2021: 6. Annika Hinze alternativeName A. Hinze. Annika Hinze et al.: Model-driven GUI & interaction design using emulation. (2010) authored by Annika Hinze. Annika Hinze alternativeName Annika Marie Hinze. Annika Hinze alternativeName Annika Hinze. Annika Hinze name Annika Hinze. Annika Hinze written paper amount in year2012: 15. Annika Hinze written paper amount in year2012: 15. Heinz Schweppe et al.: Database Systems as Middleware-Events, Notification, Messages. (2000) authored by Annika Hinze. Annika Hinze written paper amount in year2020: 5. Annika Hinze written paper amount in year2020: 5. Annika Hinze written paper amount in year2015: 14. Annika Hinze written paper amount in year2015: 14. Annika Hinze written paper amount in year2023: 3. Annika Hinze written paper amount in year2023: 3. Annika Hinze 2YrMeanCitedness 0.27272728085517883301. Alexa Schlegel et al.: Visualisation of Semantic Enrichment. (2012) authored by Annika Hinze'}. Hinze co-led, with Judy Bowen and Rangi Mātāmua, a research project to develop a hi-tech vest for forestry workers, aimed at detecting signs of fatigue and thus reducing injury output format: answer
Annika Hinze
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: When was the author of 'Matching Logic' born? Context: Dongyun Jin et al.: Garbage collection for monitoring parametric properties. (2011) authored by Grigore Rosu. Vilas Jagannath et al.: Improved multithreaded unit testing. (2011) authored by Grigore Rosu. Koushik Sen et al.: Online efficient predictive safety analysis of multithreaded programs. (2006) authored by Grigore Rosu. Vilas Jagannath et al.: IMUnit: improved multithreaded unit testing. (2010) authored by Grigore Rosu. Koushik Sen et al.: Online Efficient Predictive Safety Analysis of Multithreaded Programs. (2004) authored by Grigore Rosu. Koushik Sen et al.: Decentralized runtime analysis of multithreaded applications. (2006) authored by Grigore Rosu. Grigore Rosu and Koushik Sen: An instrumentation technique for online analysis of multithreaded programs. (2007) authored by Grigore Rosu. Grigore Rosu and Koushik Sen: An Instrumentation Technique for Online Analysis of Multithreaded Programs. (2004) authored by Grigore Rosu. Sumant Kowshik et al.: Static Analysis to Enforce Safe Value Flow in Embedded Control Systems. (2006) authored by Grigore Rosu. Rodolfo Pellizzoni et al.: Hardware Runtime Monitoring for Dependable COTS-Based Real-Time Embedded Systems. (2008) authored by Grigore Rosu. Grigore Rosu et al.: Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, ASE 2017, Urbana, IL, USA, October 30 - November 03, 2017 (2017) edited by Grigore Rosu. Koushik Sen et al.: Detecting Errors in Multithreaded Programs by Generalized Predictive Analysis of Executions. (2005) authored by Grigore Rosu. José Meseguer and Grigore Rosu: Algebraic Methodology and Software Technology, 12th International Conference, AMAST 2008, Urbana, IL, USA, July 28-31, 2008, Proceedings (2008) edited by Grigore Rosu. Grigore Rosu link https://github.com/grosu. Owolabi Legunsen et al.: How good are the specs? a study of the bug-finding effectiveness of existing Java API specifications. (2016) authored by Grigore Rosu. Philip Daian et al.: RV-Android: Efficient Parametric Android Runtime Verification, a Brief Tutorial. (2015) authored by Grigore Rosu. Feng Chen et al.: jPredictor: a predictive runtime analysis tool for java. (2008) authored by Grigore Rosu. Koushik Sen et al.: Runtime safety analysis of multithreaded programs. (2003) authored by Grigore Rosu. Grigore Roşu i10Index 128. Koushik Sen et al.: Efficient Decentralized Monitoring of Safety in Distributed Systems. (2004) authored by Grigore Rosu. Feng Chen and Grigore Rosu: Parametric Trace Slicing and Monitoring. (2009) authored by Grigore Rosu. Qingzhou Luo and Grigore Rosu: EnforceMOP: a runtime property enforcement system for multithreaded programs. (2013) authored by Grigore Rosu. Feng Chen and Grigore Rosu: Parametric and Termination-Sensitive Control Dependence. (2006) authored by Grigore Rosu. Grigore Rosu: On Safety Properties and Their Monitoring. (2012) authored by Grigore Rosu. Jeff Huang et al.: Maximal sound predictive race detection with control flow abstraction. (2014) authored by Grigore Rosu. Jeff Huang et al.: GPredict: Generic Predictive Concurrency Analysis. (2015) authored by Grigore Rosu. Dongyun Jin et al.: JavaMOP: Efficient parametric runtime monitoring framework. (2012) authored by Grigore Rosu. Grigore Rosu et al.: Synthesizing Monitors for Safety Properties: This Time with Calls and Returns. (2008) authored by Grigore RosuD. D. S. \nRoșu\'s Ph. '} output format: answer
December 12, 1971
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Who has a higher i10Index, the author of Gallium nitride-based gas, chemical and biomedical sensors or the creator of Multimedia Information Systems Applications - A Taxonomy and Three Case Studies? Context: Lam-Son Lê et al.: On Elasticity and Constrainedness of Business Services Provisioning. (2012) authored by Schahram Dustdar. Dragan Ivanovic et al.: Building Dynamic Models of Service Compositions with Simulation of Provision Resources. (2010) authored by Schahram Dustdar. Philipp Leitner et al.: Cost-Efficient and Application SLA-Aware Client Side Request Scheduling in an Infrastructure-as-a-Service Cloud. (2012) authored by Schahram Dustdar. Amirali Amiri et al.: Cost-Aware Multidimensional Auto-Scaling of Service- and Cloud-Based Dynamic Routing to Prevent System Overload. (2022) authored by Schahram Dustdar. Alessio Gambi et al.: Automated testing of cloud-based elastic systems with AUToCLES. (2013) authored by Schahram Dustdar. Rostyslav Zabolotnyi et al.: Dynamic program code distribution in Infrastructure-as-a-Service clouds. (2013) authored by Schahram Dustdar. Philipp Leitner et al.: Runtime Prediction of Service Level Agreement Violations for Composite Services. (2009) authored by Schahram Dustdar. Roman Khazankin et al.: Adaptive Request Prioritization in Dynamic Service-Oriented Systems. (2011) authored by Schahram Dustdar. Philipp Leitner et al.: Data-driven and automated prediction of service level agreement violations in service compositions. (2013) authored by Schahram Dustdar. Vitaliy Liptchinsky et al.: Expressive languages for selecting groups from graph-structured data. (2013) authored by Schahram Dustdar. Zhengzhe Xiang et al.: Cost-Effective Traffic Scheduling and Resource Allocation for Edge Service Provisioning. (2023) authored by Schahram Dustdar. Philipp Hoenisch et al.: Cost-Efficient Scheduling of Elastic Processes in Hybrid Clouds. (2015) authored by Schahram Dustdar. Philipp Leitner et al.: Cost-Based Optimization of Service Compositions. (2013) authored by Schahram Dustdar. Soheil Qanbari et al.: An Economic Model for Utilizing Cloud Computing Resources via Pricing Elasticity of Demand and Supply. (2014) authored by Schahram Dustdar. Ognjen Scekic et al.: Modeling Rewards and Incentive Mechanisms for Social BPM. (2012) authored by Schahram Dustdar. Ilir Murturi et al.: A Decentralized Approach for Determining Configurator Placement in Dynamic Edge Networks. (2020) authored by Schahram Dustdar. Michael Borkowski et al.: Prediction-Based Prefetch Scheduling in Mobile Service Applications. (2016) authored by Schahram Dustdar. Jing Feng et al.: Rotating machinery fault diagnosis based on feature extraction via an unsupervised graph neural network. (2023) authored by Schahram Dustdar. Alireza Furutanpey et al.: FrankenSplit: Saliency Guided Neural Feature Compression with Shallow Variational Bottleneck Injection. (2023) authored by Schahram Dustdar. Georgiana Copil et al.: rSYBL: A Framework for Specifying and Controlling Cloud Services Elasticity. (2016) authored by Schahram Dustdar. Schahram Dustdar et al.: A Pattern-Based Formalization of Cloud-Based Elastic Systems. (2015) authored by Schahram Dustdar. Christian Inzinger et al.: Non-intrusive policy optimization for dependable and adaptive service-oriented systems. (2012) authored by Schahram Dustdar. Adrian Jandl et al.: Edge-Based Autonomous Management of Vertical Farms. (2022) authored by Schahram Dustdar. Georgiana Copil et al.: Continuous elasticity: Design and operation of elastic systems. (2016) authored by Schahram Dustdar. Ernst Oberortner et al.: Tailoring a model-driven Quality-of-Service DSL for various stakeholders. (2009) authored by Schahram Dustdar. Rainer Anzböck and Schahram Dustdar: Semi-automatic Generation of Web Services and BPEL Processes - A Model-Driven Approach. (2005) authored by Schahram Dustdar. Momiao Zhou et al.: On Vehicular Ad-Hoc Networks With Full-Duplex Radios: An End-to-End Delay Perspective. (2023) authored by Schahram Dustdar. Ta'id Holmes et al.: Automating the Management and Versioning of Service Models at Runtime to Support Service Monitoring. (2012) authored by Schahram Dustdar. Muhammad Z. C. Candra et al.: Modeling Elasticity Trade-Offs in Adaptive Mixed Systems. (2013) authored by Schahram Dustdar. Shengtao Sun et al.: Remote Sensing Image Interpretation With Semantic Graph-Based Methods: A Survey. (2022) authored by Schahram Dustdar. Georgiana Copil et al.: Evaluating Cloud Service Elasticity Behavior. (2015) authored by Schahram Dustdar. Waldemar Hummer et al.: Towards efficient measuring of web services API coverage. (2011) authored by Schahram Dustdar. Philipp Hoenisch et al.: Workflow Scheduling and Resource Allocation for Cloud-Based Execution of Elastic Processes. (2013) authored by Schahram Dustdar. Marcello M. Bersani et al.: Towards the formalization of properties of cloud-based elastic systems. (2014) authored by Schahram Dustdar. Zhenjie Zhang et al.: Intelligent identification for vertical track irregularity based on multi-level evidential reasoning rule model. (2022) authored by Schahram Dustdar. Georgiana Copil et al.: Supporting Cloud Service Operation Management for Elasticity. (2015) authored by Schahram Dustdar. Uwe Zdun et al.: Modeling process-driven and service-oriented architectures using patterns and pattern primitives. (2007) authored by Schahram Dustdar. Schahram Dustdar and Lukasz Juszczyk: Dynamic replication and synchronization of web services for high availability in mobile ad-hoc networks. (2007) authored by Schahram Dustdar. Philipp Leitner et al.: Stepwise and Asynchronous Runtime Optimization of Web Service Compositions. (2011) authored by Schahram Dustdar. Ilir Murturi et al.: On Provisioning Procedural Geometry Workloads on Edge Architectures. (2021) authored by Schahram Dustdar. Alessio Gambi et al.: Testing elastic systems with surrogate models. (2013) authored by Schahram Dustdar. Georgiana Copil et al.: Multi-level Elasticity Control of Cloud Services. (2013) authored by Schahram Dustdar. Schahram Dustdar: Design by Units - A Novel Approach for Building Elastic Systems. (2012) authored by Schahram Dustdar. Duc-Hung Le et al.: SALSA: A Framework for Dynamic Configuration of Cloud Services. (2014) authored by Schahram Dustdar. Lukasz Juszczyk et al.: Web Service Discovery, Replication, and Synchronization in Ad-Hoc Networks. (2006) authored by Schahram Dustdar. Rostyslav Zabolotnyi et al.: Profiling-Based Task Scheduling for Factory-Worker Applications in Infrastructure-as-a-Service Clouds. (2014) authored by Schahram Dustdar. Lukasz Juszczyk and Schahram Dustdar: Automating the Generation of Web Service Testbeds Using AOP. (2011) authored by Schahram Dustdar. Marco Mori et al.: Leveraging State-Based User Preferences in Context-Aware Reconfigurations for Self-Adaptive Systems. (2011) authored by Schahram Dustdar. Shuiguang Deng et al.: Burst Load Evacuation Based on Dispatching and Scheduling In Distributed Edge Networks. (2021) authored by Schahram Dustdar. Florian Skopik et al.: Modeling and Mining of Dynamic Trust in Complex Service-Oriented Systems. (2011) authored by Schahram Dustdar'}. You can help Wikipedia by expanding it output format: answer
Stephen J. Pearton
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: In which year did the writer of 'Imaging of Single Transducer-Harmonic Motion Imaging-Derived Displacements at Several Oscillation Frequencies Simultaneously' receive a Fulbright U.S. Inter-country Award? Context: Elisa E. Konofagou alternativeName Elisa Evgenia Konofagou. Elisa E. Konofagou alternativeName Elisa Konofagou. Elisa E. Konofagou alternativeName Konofagou Elisa. Elisa E. Konofagou is Creator. Elisa E. Konofagou alternativeName E.E Konofagou. Elisa E. Konofagou alternativeName Elisa E. Konofagou. Elisa E. Konofagou name Elisa E. Konofagou. Elisa E. Konofagou alternativeName E. Konofagou. Elisa E. Konofagou is PersonS. \nAwards received by Konofagou include:"}. Konofagou maintains several clinical collaborations with the Columbia Presbyterian Medical Center output format: answer
2019
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Who has a higher hIndex, the author of Select Z Bibliography or the author of A data mining approach to the prediction of corporate failure? Context: Chunbo Luo et al.: Hybrid Demodulate-Forward Relay Protocol for Two-Way Relay Channels. (2015) authored by Sally I. McClean. Chunbo Luo et al.: Hybrid Demodulate-Forward Relay Protocol for Two-Way Relay Channels. (2015) authored by Sally I. McClean. Hanif Ullah et al.: Connecting Disjoint Nodes Through a UAV-Based Wireless Network for Bridging Communication Using IEEE 802.11 Protocols. (2020) authored by Sally I. McClean. Md Israfil Biswas et al.: A SDN-based On-Demand Path Provisioning Approach across Multi-domain Optical Networks. (2018) authored by Sally I. McClean. Huseyin Abaci et al.: Dynamic bit-rate adjustment based on traffic characteristics for metro and core networks. (2011) authored by Sally I. McClean. Hanif Ullah et al.: An optimal UAV deployment algorithm for bridging communication. (2017) authored by Sally I. McClean. Sally I. McClean et al.: Costing Mixed Coxian Phase-type Systems in a given time interval. (2013) authored by Sally I. McClean. Hanif Ullah et al.: An Unmanned Aerial Vehicle Based Wireless Network for Bridging Communication. (2017) authored by Sally I. McClean. Suleiman Y. Yerima et al.: A Framework for Context-Driven End-to-End QoS Control in Converged Networks. (2016) authored by Sally I. McClean. Brahim Allan et al.: Towards automatic placement of media objects in a personalised TV experience. (2022) authored by Sally I. McClean. Md Israfil Biswas et al.: An Efficient Rerouting Approach in Software Defined Networks. (2018) authored by Sally I. McClean. Suleiman Y. Yerima et al.: A framework for context-driven end-to-end QoS control in Converged Networks. (2010) authored by Sally I. McClean. Chunbo Luo et al.: Communication provision for a team of remotely searching UAVs: A mobile relay approach. (2012) authored by Sally I. McClean. Mark P. Donnelly et al.: A Mobile Multimedia Technology to Aid Those with Alzheimer's Disease. (2010) authored by Sally I. McClean. Md Israfil Biswas et al.: A Practical Evaluation in Openstack Live Migration of VMs Using 10Gb/s Interfaces. (2016) authored by Sally I. McClean. Petre Kulkarni et al.: Building a controlled delay assured forwarding class in differentiated services networks. (2006) authored by Sally I. McClean. Chunbo Luo et al.: Relaying for 5G: A novel low-error relaying protocol. (2015) authored by Sally I. McClean. Lalit Garg et al.: Clustering patient length of stay using mixtures of Gaussian models and phase type distributions. (2009) authored by Sally I. McClean. Md Israfil Biswas et al.: SLA-based scheduling of applications for geographically secluded clouds. (2014) authored by Sally I. McClean. Phillip J. Hartin et al.: Encouraging Behavioral Change via Everyday Technologies to Reduce Risk of Developing Alzheimer's Disease. (2014) authored by Sally I. McClean. Md Israfil Biswas et al.: A Policy Based Framework for Software Defined Optical Networks. (2017) authored by Sally I. McClean. Shuai Zhang et al.: Model-based Clustering on Semantically Heterogeneous Distributed Databases on the Internet. (2006) authored by Sally I. McClean. Chunbo Luo et al.: Multiple-source multiple-destinations relay channels with network coding. (2013) authored by Sally I. McClean. Xin Hong et al.: Model-Based Segmentation of Multimodal Images. (2007) authored by Sally I. McClean. Phillip J. Hartin et al.: Facilitating Delivery and Remote Monitoring of Behaviour Change Interventions to Reduce Risk of Developing Alzheimer's Disease: The Gray Matters Study. (2015) authored by Sally I. McClean. Matthew Burns et al.: Using Convolutional Neural Networks with Multiple Thermal Sensors for Unobtrusive Pose Recognition. (2020) authored by Sally I. McClean. Lalit Garg et al.: Using phase type distributions for modelling HIV disease progression. (2012) authored by Sally I. McClean. Jing Ning et al.: 3D Reconstruction from Two Orthogonal Views Using Simulated Annealing Approach. (2001) authored by Sally I. McClean. Cathryn Peoples et al.: Energy aware scheduling across 'green' cloud data centres. (2013) authored by Sally I. McClean. Philip Perry et al.: All-Optical Network Capacity for 5G Cellular Fronthaul. (2019) authored by Sally I. McClean. Petre Kulkarni et al.: Deploying Lightweight Queue Management for improving performance of Mobile Ad-hoc Networks (MANETs). (2006) authored by Sally I. McClean. Huseyin Abaci et al.: Simulating power saver network links in MATLAB. (2015) authored by Sally I. McClean. Cathryn Peoples et al.: A Review of IoT Service Provision to Assess the Potential for System Interoperability in an Uncertain Ecosystem. (2019) authored by Sally I. McClean. Parag G. Kulkarni et al.: A Lightweight, Scalable and Distributed Admission Control Algorithm for Voice Traffic. (2007) authored by Sally I. McClean She was the second president of the Irish Statistical Association, serving as president from 1998 to 2000. "} output format: answer
Sally I. McClean
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Who has more works, the author of 'FUS-Net: U-Net-Based FUS Interference Filtering' or the creator of 'High Performance R-trees'? Context: Christos Faloutsos name Christos Faloutsos. Lei Li et al.: BoLeRO: A Principled Technique for Including Bone Length Constraints in Motion Capture Occlusion Filling. (2010) authored by Christos Faloutsos. Jernej Barbic et al.: Segmenting Motion Capture Data into Distinct Behaviors. (2004) authored by Christos Faloutsos. Zhen Guo et al.: Semi-Supervised Learning Based on Semiparametric Regularization. (2008) authored by Christos Faloutsos. Christos Faloutsos 2YrMeanCitedness 0.0. Tianyang Zhang et al.: Come-and-Go Patterns of Group Evolution: A Dynamic Model. (2016) authored by Christos Faloutsos. Christos Faloutsos alternativeName A. Faloutsos. Vikrant Kobla et al.: Compressed-Domain Video Indexing Techniques Using DCT and Motion Vector Information in MPEG Video. (1997) authored by Christos Faloutsos. Dacheng Tao et al.: Bayesian Tensor Approach for 3-D Face Modeling. (2008) authored by Christos Faloutsos. Gunhee Kim et al.: Unsupervised modeling and recognition of object categories with combination of visual contents and geometric similarity links. (2008) authored by Christos Faloutsos. Christos Faloutsos alternativeName Christos Faloutsos. Christos Faloutsos alternativeName Faloutsos Christos. Tianyang Zhang et al.: comeNgo: A Dynamic Model for Social Group Evolution. (2017) authored by Christos Faloutsos. Stephan Günnemann et al.: Detecting anomalies in dynamic rating data: a robust probabilistic model for rating evolution. (2014) authored by Christos Faloutsos. Yihong Gong et al.: Image Indexing and Retrieval Based on Human Perceptual Color Clustering. (1998) authored by Christos Faloutsos. Zhen Guo et al.: A Max Margin Framework on Image Annotation and Multimodal Image Retrieval. (2007) authored by Christos Faloutsos. Dhivya Eswaran et al.: Intervention-Aware Early Warning. (2019) authored by Christos Faloutsos. Cui Zhu et al.: Example-Based Robust Outlier Detection in High Dimensional Datasets. (2005) authored by Christos Faloutsos. Christos Faloutsos alternativeName Faloutsos. Elvin Johnson et al.: HeartSpot: Privatized and Explainable Data Compression for Cardiomegaly Detection. (2022) authored by Christos Faloutsos. Elvin Johnson et al.: HeartSpot: Privatized and Explainable Data Compression for Cardiomegaly Detection. (2022) authored by Christos Faloutsos. Christos Faloutsos alternativeName C. Faloutsos. Christian Böhm et al.: Outlier-robust clustering using independent components. (2008) authored by Christos Faloutsos. Zhen Guo et al.: Multimodal Data Mining in a Multimedia Database Based on Structured Max Margin Learning. (2016) authored by Christos Faloutsos. Yufei Tao et al.: Prediction and Indexing of Moving Objects with Unknown Motion Patterns. (2004) authored by Christos Faloutsos. Yanjun Qi et al.: Protein complex identification by supervised graph local clustering. (2008) authored by Christos Faloutsos. Christos Faloutsos alternativeName Cristos Faloutsos. Arnab Bhattacharya et al.: ViVo: Visual Vocabulary Construction for Mining Biomedical Images. (2005) authored by Christos Faloutsos. Christos Faloutsos is Person. Christos Faloutsos orcidId https://orcid.org/0000-0003-2996-9790. Christos Faloutsos i10Index 274. Meng Jiang et al.: CatchTartan: Representing and Summarizing Dynamic Multicontextual Behaviors. (2016) authored by Christos Faloutsos. Christos Faloutsos written paper amount in year2013: 23. Christos Faloutsos written paper amount in year2013: 23. Meng Jiang et al.: Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms. (2016) authored by Christos Faloutsos. Alex Beutel et al.: CopyCatch: stopping group attacks by spotting lockstep behavior in social networks. (2013) authored by Christos Faloutsos. Mengzhi Wang et al.: Storage Device Performance Prediction with CART Models. (2004) authored by Christos Faloutsos. Mengzhi Wang et al.: Storage device performance prediction with CART models. (2004) authored by Christos Faloutsos. Ilias Dimitriadis et al.: TG-OUT: temporal outlier patterns detection in Twitter attribute induced graphs. (2022) authored by Christos Faloutsos. Evangelos E. Papalexakis et al.: Spotting misbehaviors in location-based social networks using tensors. (2014) authored by Christos Faloutsos. Zhen Guo et al.: Enhanced max margin learning on multimodal data mining in a multimedia database. (2007) authored by Christos Faloutsos. Wenjie Feng et al.: EagleMine: Vision-guided Micro-clusters recognition and collective anomaly detection. (2021) authored by Christos Faloutsos. Catalina Vajiac et al.: TrafficVis: Visualizing Organized Activity and Spatio-Temporal Patterns for Detecting and Labeling Human Trafficking. (2023) authored by Christos Faloutsos. Jia-Yu Pan et al.: MMSS: Multi-Modal Story-Oriented Video Summarization. (2004) authored by Christos Faloutsos. Meng-Chieh Lee et al.: INFOSHIELD: Generalizable Information-Theoretic Human-Trafficking Detection. (2021) authored by Christos Faloutsos. Alex Gaudio et al.: DeepFixCX: Explainable privacy-preserving image compression for medical image analysis. (2023) authored by Christos Faloutsos. Christos Faloutsos written paper amount in year2018: 0. Christos Faloutsos written paper amount in year2018: 0. Christos Faloutsos written paper amount in year2021: 0. Christos Faloutsos written paper amount in year2021: 0'}. You can help Wikipedia by expanding it output format: answer
Elisa E. Konofagou
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Where was the creator of A Fast Bit-Vector Algorithm for Approximate String Matching Based on Dynamic Programming recognized with the ISCB Accomplishment by a Senior Scientist Award for outstanding contribution to bioinformatics? Context: Min Liu et al.: 3D Neuron Tip Detection in Volumetric Microscopy Images. (2011) authored by Eugene W. Myers. Kira Vinogradova and Gene Myers: Local Interpretable Model-Agnostic Explanations for Multitarget Image Regression. (2023) authored by Eugene W. Myers. Martin Weigert et al.: Isotropic reconstruction of 3D fluorescence microscopy images using convolutional neural networks. (2017) authored by Eugene W. Myers. Martin Weigert et al.: Isotropic Reconstruction of 3D Fluorescence Microscopy Images Using Convolutional Neural Networks. (2017) authored by Eugene W. Myers. Eugene W. Myers 2YrMeanCitedness 3.5. Saket Navlakha et al.: Unsupervised segmentation of noisy electron microscopy images using salient watersheds and region merging. (2013) authored by Eugene W. Myers. Corinna Blasse et al.: PreMosa: extracting 2D surfaces from 3D microscopy mosaics. (2017) authored by Eugene W. Myers. Kira Vinogradova et al.: Towards Interpretable Semantic Segmentation via Gradient-weighted Class Activation Mapping. (2020) authored by Eugene W. Myers. Kira Vinogradova et al.: Towards Interpretable Semantic Segmentation via Gradient-Weighted Class Activation Mapping (Student Abstract). (2020) authored by Eugene W. Myers. David L. Richmond et al.: Mapping Auto-context Decision Forests to Deep ConvNets for Semantic Segmentation. (2016) authored by Eugene W. Myers. Fernando Amat et al.: Fast and robust optical flow for time-lapse microscopy using super-voxels. (2013) authored by Eugene W. Myers. Martin Weigert et al.: Biobeam - Multiplexed wave-optical simulations of light-sheet microscopy. (2018) authored by Eugene W. Myers. David L. Richmond et al.: Relating Cascaded Random Forests to Deep Convolutional Neural Networks for Semantic Segmentation. (2015) authored by Eugene W. Myers. Kira Vinogradova and Eugene W. Myers: Estimation of Optical Aberrations in 3D Microscopic Bioimages. (2022) authored by Eugene W. Myers. Kira Vinogradova and Eugene W. Myers: Estimation of Optical Aberrations in 3D Microscopic Bioimages. (2022) authored by Eugene W. Myers. Nathan G. Clack et al.: Automated Tracking of Whiskers in Videos of Head Fixed Rodents. (2012) authored by Eugene W. Myers. Hanchuan Peng et al.: Straightening Caenorhabditis elegans images. (2008) authored by Eugene W. Myers. Eugene W. Myers affiliation Howard Hughes Medical Institute, Janelia Farm Research Campus. David L. Richmond et al.: Uncertainty-Driven Forest Predictors for Vertebra Localization and Segmentation. (2015) authored by Eugene W. Myers'}. In 2012, Myers moved to Dresden to become one of the directors of the Max Planck Institute of Molecular Cell Biology and Genetics. \nLater, he became group leader at the Janelia Farm Research Campus (JFRC) of the Howard Hughes Medical Institute output format: answer
National Academy of Engineering
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: Who is the spouse of the author who published On the parametric complexity of schedules to minimize tardy tasks? Context: Frank K. H. A. Dehne et al.: Greedy Localization, Iterative Compression, Modeled Crown Reductions: New FPT Techniques, an Improved Algorithm for Set Splitting, and a Novel 2k Kernelization for Vertex Cover. (2004) authored by Michael R. Fellows. Faisal N. Abu-Khzam et al.: Crown Structures for Vertex Cover Kernelization. (2007) authored by Michael R. Fellows. Hans L. Bodlaender et al.: Quadratic Kernelization for Convex Recoloring of Trees. (2011) authored by Michael R. Fellows. Michael R. Fellows et al.: Coordinatized Kernels and Catalytic Reductions: An Improved FPT Algorithm for Max Leaf Spanning Tree and Other Problems. (2000) authored by Michael R. Fellows. Hans L. Bodlaender et al.: Quadratic Kernelization for Convex Recoloring of Trees. (2007) authored by Michael R. Fellows. Hans L. Bodlaender et al.: Kernelization for Convex Recoloring. (2006) authored by Michael R. Fellows. Michael R. Fellows et al.: Graph-based data clustering with overlaps. (2011) authored by Michael R. Fellows. Michael R. Fellows et al.: Graph-Based Data Clustering with Overlaps. (2009) authored by Michael R. Fellows. Michael R. Fellows et al.: Haplotype Inference Constrained by Plausible Haplotype Data. (2011) authored by Michael R. Fellows. Vida Dujmovic et al.: A Fixed-Parameter Approach to Two-Layer Planarization. (2001) authored by Michael R. Fellows. Vida Dujmovic et al.: A Fixed-Parameter Approach to 2-Layer Planarization. (2006) authored by Michael R. Fellows. Michael R. Fellows et al.: Haplotype Inference Constrained by Plausible Haplotype Data. (2009) authored by Michael R. Fellows. Michael R. Fellows et al.: Parameterized Low-distortion Embeddings - Graph metrics into lines and trees (2008) authored by Michael R. Fellows. Michael R. Fellows et al.: Parameterized approximation via fidelity preserving transformations. (2018) authored by Michael R. Fellows. Michael R. Fellows et al.: Parameterized Approximation via Fidelity Preserving Transformations. (2012) authored by Michael R. Fellows. Frank K. H. A. Dehne et al.: An O(2O(k)n3) FPT Algorithm for the Undirected Feedback Vertex Set Problem. (2007) authored by Michael R. Fellows. Frank K. H. A. Dehne et al.: An O(2O(k)n3) FPT Algorithm for the Undirected Feedback Vertex Set Problem. (2005) authored by Michael R. Fellows. Frank K. H. A. Dehne et al.: An FPT Algorithm for Set Splitting. (2003) authored by Michael R. Fellows. Faisal N. Abu-Khzam et al.: Kernelization Algorithms for the Vertex Cover Problem: Theory and Experiments. (2004) authored by Michael R. Fellows. John A. Ellis et al.: The dominating set problem is fixed parameter tractable for graphs of bounded genus. (2004) authored by Michael R. Fellows. John A. Ellis et al.: The Dominating Set Problem Is Fixed Parameter Tractable for Graphs of Bounded Genus. (2002) authored by Michael R. Fellows. Jochen Alber et al.: Efficient Data Reduction for DOMINATING SET: A Linear Problem Kernel for the Planar Case. (2002) authored by Michael R. Fellows. Michael R. Fellows et al.: Data Reduction and Problem Kernels (Dagstuhl Seminar 12241). (2012) authored by Michael R. Fellows. Stephan Diehl et al.: Perspectives Workshop: Preventing the Brainware Crisis, 31.03. - 03.04.2009 (2009) edited by Michael R. Fellows. Kevin Burrage et al.: The Undirected Feedback Vertex Set Problem Has a Poly(k) Kernel. (2006) authored by Michael R. Fellows. George Karypis et al.: Recent Trends in Graph Decomposition (Dagstuhl Seminar 23331). (2023) authored by Michael R. Fellows. Rodney G. Downey et al.: Parameterized and Exact Computation, First International Workshop, IWPEC 2004, Bergen, Norway, September 14-17, 2004, Proceedings (2004) edited by Michael R. Fellows. Jochen Alber et al.: Polynomial-time data reduction for dominating set. (2004) authored by Michael R. Fellows. Michael R. Fellows et al.: What Is Known About Vertex Cover Kernelization? (2018) authored by Michael R. Fellows This is Australia\'s highest civilian honour, similar to UK knighthood. In 2016, he received Australia\'s highest civilian honour, the Order of Australia, Companion to the Queen. They have won several science popularization awards, and been translated into languages including Japanese, Korean, Arabic, Hebrew, Chinese, Spanish, Swedish, and German, with more translations underway. csunplugged. csunplugged. au and in curriculum in UK. The funding scheme supports scientific quality at the forefront of international research; boldness in scientific thinking and innovation. . . \n4) EATCS Fellow 2014. In 2007, Mike received an Alexander von Humboldt Research Award. On the initiative of Royal Society and other National Academies in Europe, the Academia was founded in 1988 as the functioning Europe-wide Academy that encompasses all fields of scholarly inquiry. Also in 2014, he was named an Honorary Fellow of the Royal Society of New Zealand (the first computer scientist to receive this honor). A. D. The Academia Europaea is an independent learned society and European Union\'s Academy of Humanities and Sciences. This award through ETH-Zurich is for Mike\'s outreach to kids and the community output format: answer
Frances Novak Rosamond
Utilize the provided context information, structured by to generate answers to the following question: - Generate the answer to the question based on the provided context. - Avoid including any explanations or apologies in your responses. - Only respond to questions that ask for the answer to the target question without any additional information. - Strictly provide the answer without any additional text. Question: What recommendation did the author make to improve the organization of information at Social Services offices? Context: T. D. Wilson: Review of: Disk Drill PRO. Atlanta, GA: 508 Software LLC. (2016) authored by Thomas D. Wilson 0001. Michael Bolin et al.: Automation and customization of rendered web pages. (2005) authored by Thomas D. Wilson 0001. Tom Wilson modified 2023-10-18. Tom Wilson name Tom Wilson. Tom Wilson i10Index 60. Tom Wilson: Sixth IEEE International Conference on Consumer Electronics-Berlin [Conference Reports]. (2017) authored by Thomas D. Wilson 0001. Tom Wilson alternativeName Tom Wilson. Pieta Eklund et al.: EURIDICE project: The evaluation of image database use in online learning. (2006) authored by Thomas D. Wilson 0001. Tom Wilson alternativeName Tom D. Wilson. T. D. Wilson: Review of: Jones, R. Internet forensics. Sebastopol, CA: O'Reilly, 2005. (2006) authored by Thomas D. Wilson 0001. Tom Wilson 2YrMeanCitedness 2.3333332538604736328. T. D. Wilson: Review of: Innocenti, Perla Cultural networks in migrating heritage: intersencting theories and practices across Europe. Farnham, UK: Ashgate, 2015. (2015) authored by Thomas D. Wilson 0001. Tom Wilson alternativeName Taryn Wilson. Tom Wilson alternativeName Thomas D. Wilson. T. D. Wilson: Review of: Galla, Preston. Windows XP Hacks: 100 industrial strength tips and tools. Sebastopol, CA: O'Reilly, 2003. (2005) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Geert Lovink. Uncanny networks: dialogues with the virtual intelligentsia. Cambridge, MA: MIT Press, 2004. xv, [1] 374pp. ISBN 0-262-62187-8 (2004) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Galla, Preston. Windows XP Hacks: tips and tools for optimizing your OS. (2nd ed.) Sebastopol, CA: O'Reilly, 2005. (2005) authored by Thomas D. Wilson 0001. Tom Wilson alternativeName T.D Wilson. Tom Wilson member of Glasgow Caledonian University. Tom Wilson alternativeName T D. Wilson. Tom Wilson alternativeName T. Wilson. T. D. Wilson: Review of: Sejnowski, Terrence J. The deep learning revolution Cambridge, MA: MIT Press, 2018. (2018) authored by Thomas D. Wilson 0001. Tom Wilson alternativeName T. D. Wilson. Tom Wilson worksCount 360. T. D. Wilson: Review of: Cronin, Blaise. Cathedrals of learning: great and ancient universities of Western Europe Cambridge, MA: Chandos Publishing, 2016. (2017) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Gazzard, Alison. Now the chips are down. The BBC micro. Cambridge, MA: MIT Press, 2016. (2016) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Sunstein, C.R. Republic.com 2.0. Princeton, PA: Princeton University Press, 2007. (2008) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Software review Onfolio. Academic and scientific. Version 2.02 Cambridge, MA: Onfolio, Inc., 2005. (2006) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Baldwin, Peter. The copyright wars: three centuries of trans-Atlantic battle. Princeton, NJ: Princeton University Press, 2014. (2014) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Tidwell, Jenifer. Designing interfaces. Sebastopol, CA: O'Reilly, 2006. (2006) authored by Thomas D. Wilson 0001. Thomas D. Wilson: Review of: Suarez, Michael E. & Woudhuysen, H.R. The book: a global history. Oxford: Oxford University Press, 2013. (2013) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Ray, Erik T. Learning XML (2nd ed.) Sebastopol, CA: O'Reilly, 2003. xiv, 400, [1] p. ISBN 0-596-00420-6. (2003) authored by Thomas D. Wilson 0001. Tom Wilson written paper amount in year2013: 13. Tom Wilson written paper amount in year2013: 13. Tom Wilson orcidId https://orcid.org/0000-0003-4941-8443. T. D. Wilson: Review of: Griffiths, Dawn Head first statistics Sebastopol, CA: O'Reilly, 2008. (2008) authored by Thomas D. Wilson 0001. Thomas D. Wilson 0001 is Creator. T. D. Wilson: Review of: Pogue, D., Zacker, C. & Zacker, L.J. Windows XP Pro: the missing manual. 2nd. ed. Sebastopol, CA: O'Reilly, 2004. (2005) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Healy, Kieran. Data visualization: a practical introduction. Princeton, NJ: Princeton University Press, 2019. (2019) authored by Thomas D. Wilson 0001. Thomas D. Wilson 0001 affiliation University of Borås, Sweden. T. D. Wilson: Hacking the systems. Review of: Tara Calishain and Rael Dornfest, Google hacks; Paul Bausch, Amazon hacks. Preston Grall, Windows XP hacks. Sebastopol, CA: O'Reilly, 2003 (2003) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Morville, Peter. Ambient findability. Sebastopol, CA: O'Reilly, 2005. (2006) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Brundage, Barbara. Photshop Elements 6. The missing manual. Sebastopol, CA: Pogue Press/O'Reilly, 2007. (2008) authored by Thomas D. Wilson 0001. T. D. Wilson: Review of: Heinström, Jannica. From fear to flow. Oxford: Chandos Publishing, 2010. (2011) authored by Thomas D. Wilson 0001. Tom Wilson is Author. T. D. Wilson: Review of: Derrick Story. Digital photography hacks: 100 industrial-strength tips and tools. Sebastopol, CA: O'Reilly. 2004. xx, 309pp. ISBN 0-596-00666-7 (2004) authored by Thomas D. Wilson 0001. Tom Wilson citedByCount 4914. T. D. Wilson: Review of: Poibeau, Thierry. Machine translation Cambridge, MA: MIT Press, 2017. (2017) authored by Thomas D. Wilson 00018 million Swedish kronor ($1. '}. \nThomas Daniel Wilson was born in 1935 at Shincliffe Station in County Durham, England. A. There are four steps in the process, problem identification, problem definition, problem resolution, and solution statement. \nRecently, Dr. Thomas D. \nMore recently, Dr. He is a member of the group at the Swedish School which is participating in the SHAMAN project on long-term digital preservation, funded by the European Union output format: answer
establishment of a central library for Social Services information and training staff