UofT Libraries is getting a new library services platform in January 2021.
Learn more about the change.
Search Articles
Science (American Association for the Advancement of Science), ISSN 0036-8075, 02/2017, Volume 355, Issue 6324, pp. 489 - 489
Journal Article
1970, 1. patippu, viii, 266
Book
Current science (Bangalore), ISSN 0011-3891, 10/2017, Volume 113, Issue 8, pp. 1503 - 1504
Journal Article
ACM transactions on database systems, ISSN 0362-5915, 06/2001, Volume 26, Issue 2, pp. 214 - 260
authorization | logic programming | access control policy | Authorization | Access control policy | Logic programming | Management | H.2.7 [Database Management]: Database Administration-security, integrity, and protection | Security | K.6.5 [Management of Computing and Information Systems]: Security and Protection | Computer Science, Information Systems | Computer Science, Software Engineering | Technology | Computer Science | Science & Technology | Database administration | Evaluation | Information management | Methods | Access control (Computers) | Access control | Data base management systems | Computer security
Journal Article
IEEE intelligent systems, ISSN 1541-1672, 07/2008, Volume 23, Issue 4, pp. 43 - 50
Government | Blogs | sentiment analysis | computational cultural dynamics | Speech | Intelligent systems | opinion analysis | Engineering, Electrical & Electronic | Engineering | Computer Science, Artificial Intelligence | Technology | Computer Science | Science & Technology | Measurement | Adverb | Grammar, Comparative and general | Adjective | Verb | Research | Public opinion | Opinions | Analysis | Sentences | Strength
Journal Article
IEEE transactions on circuits and systems for video technology, ISSN 1051-8215, 11/2008, Volume 18, Issue 11, pp. 1473 - 1488
Computer vision | Image recognition | Content based retrieval | Surveillance | Biological system modeling | Humans | Image sequence analysis | Cameras | Explosions | Pattern recognition | Human activity analysis | machine vision | Machine vision | Engineering, Electrical & Electronic | Engineering | Technology | Science & Technology | Technology application | Electronic surveillance | Research | Image processing | Studies
Journal Article
IEEE intelligent systems, ISSN 1541-1672, 01/2017, Volume 32, Issue 1, pp. 3 - 4
Journal Article
Artificial intelligence, ISSN 0004-3702, 10/2016, Volume 239, pp. 70 - 96
Quantitative logic | Social networks | Logic programming | Diffusion model | Computer Science, Artificial Intelligence | Technology | Computer Science | Science & Technology | Computer science | Algorithms | Analysis | Run time (computers) | Semantics | Mathematical models | Graph theory | Diffusion | Expert systems | Coarsening
Journal Article
IEEE intelligent systems, ISSN 1541-1672, 01/2015, Volume 30, Issue 1, pp. 2 - 5
Sentiment analysis | Computational modeling | Predictive models | Twitter | Forecasting | Voting | social network analysis | campaign | Data models | diffusion estimation model | Electronic voting | social media | election forecasting | sentiment analysis | Engineering, Electrical & Electronic | Engineering | Computer Science, Artificial Intelligence | Technology | Computer Science | Science & Technology | Technology application | Electronic democracy | Election forecasting | Public opinion | Analysis | Methods | Winners | Social network analysis | Estimating techniques | Election results | Predictions | Prime ministers
Journal Article
ACM transactions on intelligent systems and technology, ISSN 2157-6904, 07/2017, Volume 8, Issue 4, pp. 1 - 25
Journal Article
Quantitative finance, ISSN 1469-7688, 04/2015, Volume 15, Issue 4, pp. 607 - 624
Systemic risk | Financial networks | Early warning systems | Banking crises | Economics | Mathematics, Interdisciplinary Applications | Physical Sciences | Social Sciences | Social Sciences, Mathematical Methods | Business, Finance | Business & Economics | Mathematics | Mathematical Methods In Social Sciences | Science & Technology | Studies | Banking industry | Social networks | Macroeconomics | Global economy | International finance | Economic crisis
Journal Article
2013, 1. Aufl., ISBN 1461453100, 580
Prevention | Data processing | Terrorism | Handbooks, manuals, etc | Criminology and Criminal Justice, general | Computer Appl. in Social and Behavioral Sciences | Artificial Intelligence | Computer Science | Data Mining and Knowledge Discovery | Probability and Statistics in Computer Science | Criminal behavior | Crime forecasting | Data mining
eBook
ACM transactions on computational logic, ISSN 1529-3785, 01/2010, Volume 11, Issue 2, pp. 1 - 41
query processing | annotated RDF | view maintenance | Annotated RDF | Query processing | View maintenance | Computer Science, Theory & Methods | Science & Technology - Other Topics | Logic | Technology | Computer Science | Science & Technology | Queries | Algorithms | Databases | Semantics | Data sets | Consistency | Metadata | Temporal logic
Journal Article
ACM transactions on intelligent systems and technology, ISSN 2157-6904, 09/2020, Volume 11, Issue 5, pp. 1 - 25
Journal Article
ACM transactions on database systems, ISSN 0362-5915, 09/1997, Volume 22, Issue 3, pp. 419 - 469
probabilistic databases | view maintenance | Performance evaluation | Data complexity | Algebra | View maintenance | Probabilistic databases | H.2.1 [Database Management]: Logical Design-data models | H.2.3 [Database Management]: Languages-query languages | H.2.4 [Database Management]: Systems | Computer Science, Information Systems | Computer Science, Software Engineering | Technology | Computer Science | Science & Technology | Simulated annealing (Mathematics) | Databases | Research | Computer science | Probability | Algorithms
Journal Article
ACM transactions on the web, ISSN 1559-1131, 11/2018, Volume 12, Issue 4, pp. 1 - 35
Journal Article
Computer (Long Beach, Calif.), ISSN 0018-9162, 06/2016, Volume 49, Issue 6, pp. 38 - 46
Uniform resource locators | security | Social network services | malware mitigation | social networks | Media | Tagging | Twitter | intrusion detection | anomaly detection | Computer security | Computer Science, Hardware & Architecture | Computer Science, Software Engineering | Technology | Computer Science | Science & Technology | Social networks | Usage | Politicians | Terrorism | Risk assessment | Freedom of speech | Digital media | Risk | Automation | Nations | Organizations
Journal Article
2002, ISBN 8170174112, 121
Book