Your selections:
Understanding personal use of the Internet at work: An integrated model of neutralization techniques and general deterrence theory
- Cheng, Lijiao, Li, Wenli, Zhai, Qingguo, Smyth, Russell
Density-ratio based clustering for discovering clusters with varying densities
- Zhu, Ye, Ting, Kaiming, Carman, Mark
Clustering in large data sets with the limited memory bundle method
- Karmitsa, Napsu, Bagirov, Adil, Taheri, Sona
Flow and Telepresence contributing to Internet Abuse : Differences according to gender and age
- Stavropoulos, Vasileios, Alexandraki, Kyriaki, Motti-Stefanidi, Frosso
Grouping points by shared subspaces for effective subspace clustering
- Zhu, Ye, Ting, Kaiming, Carman, Mark
Eye tracking to investigate cue processing in medical decision making : A scoping review
- Al-Moteri, Modi, Symmons, Mark, Plummer, Virginia, Cooper, Simon J.
- Branson, Molly, March, Evita
Integrated generalized zero-shot learning for fine-grained classification
- Shermin, Tasfia, Teng, Shyh, Sohel, Ferdous, Murshed, Manzur, Lu, Guojun
Siamese network for object tracking with multi-granularity appearance representations
- Zhang, Zhuoyi, Zhang, Yifeng, Cheng, Xu, Lu, Guojun
Intelligent energy prediction techniques for fog computing networks
- Farooq, Umar, Shabir, Muhammad, Javed, Muhammad, Imran, Muhammad
Community-diversified influence maximization in social networks
- Li, Jianxin, Cai, Taotao, Deng, Ke, Wang, Xinjue, Sellis, Timos, Xia, Feng
Insta-identity: dark personality traits as predictors of authentic self-presentation on Instagram
- Geary, Christina, March, Evita, Grieve, Rachel
Malware detection in edge devices with fuzzy oversampling and dynamic class weighting
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq, Rahman, Ashfaqur
Are you sure you would like to clear your session, including search history and login status?