Zobrazeno 91 - 100
of 10 562
pro vyhledávání: '"A. Raff"'
Publikováno v:
Aug. 2020, epiDAMIK 3.0: The 3rd International Workshop on Epidemiology meets Data Mining and Knowledge Discovery. In Proceedings of the 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining
This paper illustrates five different techniques to assess the distinctiveness of topics, key terms and features, speed of information dissemination, and network behaviors for Covid19 tweets. First, we use pattern matching and second, topic modeling
Externí odkaz:
http://arxiv.org/abs/2005.03082
Publikováno v:
PLoS Biology, Vol 21, Iss 11 (2023)
Externí odkaz:
https://doaj.org/article/af0f3de08c594299be908800f70c3b63
Publikováno v:
Health Behavior Research, Vol 6, Iss 3 (2023)
The male condom is Italy’s and Southern Europe's most widely used family planning method. Most family planning research is focused on women and, therefore, could be missing significant gender differences in behavior, as male partners play a critica
Externí odkaz:
https://doaj.org/article/3192394fca21470d85546e7ecb907bc9
Autor:
Christian Raff, Colette Dörr-Harim, Stephanie Otto, Johanna Thiele, Andre Mihaljevic, Klaus Kramer
Publikováno v:
JMIR Research Protocols, Vol 12, p e46765 (2023)
BackgroundPatients with cancer receiving neoadjuvant treatment prior to surgery are in a very stressful situation. Chemotherapy and radiation therapy put a strain on the quality of life and the pending surgery poses a relevant burden for many patient
Externí odkaz:
https://doaj.org/article/abfe922908444ac1958392d67f48cde8
Prior work inspired by compression algorithms has described how the Burrows Wheeler Transform can be used to create a distance measure for bioinformatics problems. We describe issues with this approach that were not widely known, and introduce our ne
Externí odkaz:
http://arxiv.org/abs/1912.13046
Deep neural networks (DNNs) are vulnerable to subtle adversarial perturbations applied to the input. These adversarial perturbations, though imperceptible, can easily mislead the DNN. In this work, we take a control theoretic approach to the problem
Externí odkaz:
http://arxiv.org/abs/1911.04636
Successful malware attacks on information technology systems can cause millions of dollars in damage, the exposure of sensitive and private information, and the irreversible destruction of data. Anti-virus systems that analyze a file's contents use a
Externí odkaz:
http://arxiv.org/abs/1910.04753
Autor:
Raff, Edward
What makes a paper independently reproducible? Debates on reproducibility center around intuition or assumptions but lack empirical results. Our field focuses on releasing code, which is important, but is not sufficient for determining reproducibilit
Externí odkaz:
http://arxiv.org/abs/1909.06674
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.