Network intelligence

Results: 2949



#Item
191Computational neuroscience / Artificial neural networks / Artificial intelligence / Computer vision / Convolutional neural network / Deep learning / Feature detection / Outline of object recognition / Image segmentation / ImageNet / Object detection / Feature

Deep Learning for Fast and Accurate Fashion Item Detection Evgeny Smirnov Anton Kulinkin

Add to Reading List

Source URL: kddfashion2016.mybluemix.net

Language: English - Date: 2016-08-14 10:56:48
192Artificial intelligence / Computational intelligence / Systems engineering / Engineering / Artificial neural network / Soft computing / Mechanical engineering / Computational informatics / Computational science

CIES 2016, IEEE Symposium on Computational Intelligence for Engineering Solutions Developments in Engineering are characterized by a growing complexity, which is balanced by an extensive utilization of computational reso

Add to Reading List

Source URL: www.cs.utep.edu

Language: English - Date: 2015-12-22 14:44:16
193Computational neuroscience / Artificial neural networks / Computer vision / Convolutional neural network / Go software / Computational statistics / Deep learning / Computer Go / Artificial intelligence / KGS Go Server / Darkforest

arXiv:1412.3409v2 [cs.AI] 27 JanTeaching Deep Convolutional Neural Networks to Play Go Christopher Clark University of Edinburgh

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-01-27 21:38:20
194Networks / Network theory / Artificial intelligence / Semantics / Knowledge representation / Social network analysis / Recommender system / Semantic network / Spreading activation / Fuzzy set / Link analysis / Multidimensional network

ABOUT MANUSCRIPTS FOR IJ ITA

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-02-02 08:47:08
195Artificial neural networks / Long short-term memory / Artificial intelligence / Recurrent neural network / Word embedding / Word2vec / Automatic summarization / Textual entailment / Deep learning

Learning Natural Language Inference with LSTM Shuohang Wang School of Information Systems Singapore Management University

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-12-30 20:26:50
196Computational neuroscience / Artificial neural networks / Computer vision / Deep learning / Formal sciences / Convolutional neural network / Conference on Computer Vision and Pattern Recognition / Image segmentation / Urban design / Artificial intelligence / Spatial analysis

Sensing Urban Space: from Street View Recognition, Event Inference to Understand Urban Behavior Fan Zhang1, Hui Lin12*, 1The Chinese University of Hong Kong, Shatin, New Territories, Hong Kong 2The Chinese University of

Add to Reading List

Source URL: ncgia.buffalo.edu

Language: English - Date: 2016-05-18 12:38:26
197Artificial intelligence / International Conference on Autonomous Agents and Multiagent Systems / David Wolpert / Multi-agent system / Agent-based model / Artificial neural network

Kagan Tumer Professor Oregon State University School of Mechanical, Industrial and Manufacturing Engineering 204 Rogers Hall, Corvallis, ORPhone: (

Add to Reading List

Source URL: web.engr.oregonstate.edu

Language: English - Date: 2012-02-21 16:03:14
198Network theory / Graph theory / Networks / Algebraic graph theory / Graph drawing software / Centrality / Graph drawing / Igraph / Betweenness centrality / Force-directed graph drawing / Graph Modelling Language / Bipartite graph

1 International Workshop on Web Intelligence and Virtual EnterprisesA comparative study of social network analysis tools

Add to Reading List

Source URL: wic.litislab.fr

Language: English - Date: 2013-12-09 08:25:56
199Computer security / Computer network security / E-commerce / Cybercrime / EMC Corporation / RSA Security / Information security operations center / Security information and event management / Threat / RSA / Phishing / Draft:Threat Intelligence Analyst

RSA ADVANCED SECURITY OPERATIONS CENTER SOLUTION Pervasive Visibility, Rapid Detection, Effective Response OVERVIEW and behavior analysis models to detect and

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-06-29 17:01:32
200United States intelligence agencies / National security / Computer network security / Counter-terrorism / Cyberwarfare / Islamic State of Iraq and the Levant / Federal Bureau of Investigation / Threat / National Counterterrorism Center / Computer security / Joint Terrorism Task Force / United States Department of Homeland Security

Microsoft Word - terror211.doc

Add to Reading List

Source URL: docs.house.gov

Language: English
UPDATE