Below you will find pages that utilize the taxonomy term “Summary”
Blog
A summary of Which Virtualization Technology is Right for My Online IT Educational Labs? by Wazan et al.
Posted in the 2021 IEEE Global Engineering Education Conference (EDUCON), 2021
read moreBlog
A summary of Design and validation of precooked developer dashboards by Ivanov et al.
Posted in the ESEC/FSE 2018: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
read moreBlog
A summary of FLOrIDA: Feature LOcatIon DAshboard for Extracting and Visualizing Feature Traces by Andam et al.
Posted in the VaMoS 17: Proceedings of the 11th International Workshop on Variability Modelling of Software-Intensive Systems, 2017
read moreBlog
A summary of Embracing Multimodal Data in Multimedia Data Analysis by Shu-Ching Chen et al.
Posted in the IEEE Computing Edge, February 2023
read moreBlog
A summary of Where Are They Going? Clustering Event Camera Data to Detect and Track Moving Objects by Craig Laboni et al.
Posted in the IEEE Computing Edge, February 2023
read moreBlog
A summary of Sustainable and Trustworthy Edge Machine Learning by Ivona Brandic
Posted in the IEEE Computing Edge, January 2023
read moreBlog
A summary of Trustworthy Machine Learning by Bhavani Thuraisingham et al.
Posted in the IEEE Computing Edge, January 2023
read moreBlog
A summary of The Ten Commandments of Ethical Medical AI by Heimo Muller et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Hidden Potential Within Video Game Consoles by Michael Mattioli et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Whack-a-Meltdown by Daniel Genkin and Yuval Yarom
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of COM-PACE: Compliance Aware Cloud Application Engineering Using Blockchain by Gagangeet Singh Aujla et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Smart Contracts In The Global South by Nir Kshetri et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Supercomputing In Python With Legate by Michael Bauer et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Interactive Supercomputing With Jupyter by Rollin Thomas et al.
Posted in the IEEE Computing Edge, October 2022
read moreBlog
A summary of Automated Payment Terminal Testing: How to Achieve Continuous Integration for Systems that are Almost Impossible to Virtualize by Martin Gloor et al.
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Toward Fail Safety for Security Decisions by Trent Jaeger
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Pervasive Security and Privacy by - A Brief Reflection on Challenges and Opportunities by Florian Alt
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Economics of Artificial Intelligence in Cybersecurity by Nir Kshetri
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Sentiment Analysis and Topic Recognition in Video Transcripts by Lukas Stappen et al.
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Advances in Human Activity Recognition by Gulustan Dogan
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Challenges and Opportunities for Autonomous Micro-UAVs in Precision Agriculture by Xu Liu et al.
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of Efficient Computer Vision for Embedded Systems by George K. Thiruvathukal and Yung-Hsiang Lu
Posted in IEEE Computing Edge, December 2022
read moreBlog
A summary of On Being a Scientist: A Guide To Responsible Conduct In Research by the National Academy of Science, National Academy of Engineering and Institute of Medicine of the National Academies
Authored by the National Academy of Science, National Academy of Engineering and Institute of Medicine of the National Academies
read moreBlog
A summary of A Convolutional Neural Network Cascade for Face Detection by Haoxiang Li et al.
Posted in in CVPR, 2015
read moreBlog
A summary of by SegNet: A Deep Convolutional Encoder-Decoder Architecture for Image Segmentation by Vijay Badrinarayanan et al.
Posted in the IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2017
read moreBlog
A summary of Fully Convolutional Networks for Semantic Segmentation by Jonathan Long et al.
Posted in arXiv, 2015
read moreBlog
A summary of Focal Loss for Dense Object Detection by Tsung-Yi Lin et al.
Posted in arXiv, 2018
read moreBlog
A summary of Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks by Shaoqing Ren et al.
Posted in the IEEE Transactions on Patterns Analysis and Machine Intelligence, 2017
read moreBlog
A summary of Deep Residual Learning for Image Recognition by Kaiming He et al.
Posted in arXiv, 2015
read moreBlog
A summary of Distinctive Image Features from Scale-Invariant Keypoints by David G. Lowe
Posted in the International Journal of Computer Vision, 2004
read moreBlog
A summary of Hidden Technical Debt in Machine Learning Systems by D. Sculley et al.
Posted in the Proceedings of NeurIPS, 2015
read moreBlog
A summary of Fast R-CNN by Ross Girshick
Posted in the Proceedings of the IEEE International Conference on Computer Vision, 2015
read moreBlog
A summary of Rich feature hierarchies for accurate object detection and semantic segmentation by Ross Girshick et al.
Posted in the Proceedings of CVPR, 2014
read moreBlog
A summary of The Random Subspace Method for Constructing Decision Forests by Tin Kam Ho
Posted in the IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1998
read moreBlog
A summary of Small World with High Risks: A Study of Security Threats in the npm Ecosystem by Markus Zimmermann et al.
Posted in the Proceedings of the 28th USENIX Security Symposium; 2019
read moreBlog
A summary of "What are Weak Links in the npm Supply Chain?", by Nusrat Zahan et al.
Posted in the Proceedings of ICSE-SEIP 2022
read moreBlog
A summary of How Developers and Managers Define and Trade Productivity for Quality by Margaret-Anne Storey et al.
Published in the proceeding of the 2022 CHASE confrence
read moreBlog
A summary of Robust Real Time-Face Detection by P. Viola and M.J. Jones
Published in the 2004 International Journal of Computer Vision
read moreBlog
A summary of Learning Deep Features for Discriminative Localization by Bolei Zhou et al.
Published in arXiv in 2015
read moreBlog
A summary of How to implement SVMs by John Platt
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of Applying SVMs to Face Detection by Edgar Osuna
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of Using SVMs For Text Categorization by Susan Dumais et al
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of SVMs - A Practical Consequence of Learning Theory by Bernhard Scholkopf
Published as an article in the 1998 July/August publication of the IEEE Intelligent Systems magazine’s Support Vector Machines section
read moreBlog
A summary of Runnemede: An Architecture for Ubiquitous High-Performance Computing by Nicholas P. Carter et al.
Published in the procceedings of the 2013 IEEE Symposium on High-Performance Computer Architecture (HPCA)
read moreBlog
A summary of ImageNet Classification with Deep Convolutional Neural Networks by Krizhevsky et al.
Published in the 60th volume, number 6 Communications of the ACM in 2017
read moreBlog
A summary of Very Deep Convolutional Networks for Large-Scale Image Recognition by Karen Simonyan and Andrew Zisserman
Published as a conference paper at ICLR 2015
read moreBlog
A summary of Going deeper with convolutions by Christian Szegedy et al.
Published on arXive in 2014
read moreBlog
A summary of How to Read a Paper by S. Keshav
Published in the 37th volume, issue 3 of the ACM SIGCOMM Computer Communication Review in 2007
read more