Computer Science - Open Access Policy Deposits
Parent: Department of Computer Science
eScholarship stats: History by Item for April through July, 2024
Item | Title | Total requests | 2024-07 | 2024-06 | 2024-05 | 2024-04 |
---|---|---|---|---|---|---|
4wp0c3th | Subsampled Rényi Differential Privacy and Analytical Moments Accountant | 75 | 31 | 18 | 8 | 18 |
9r59r676 | Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates | 73 | 20 | 15 | 15 | 23 |
2n55r713 | Functional neuronal circuitry and oscillatory dynamics in human brain organoids | 58 | 24 | 23 | 7 | 4 |
29t94525 | Something From Nothing (There): Collecting Global IPv6 Datasets From DNS | 56 | 27 | 6 | 8 | 15 |
2v16x5pm | Challenges and Opportunities for Beyond-5G Wireless Security | 43 | 18 | 25 | ||
26s3b5jk | Towards aSmart Bionic Eye: AI-powered artificial vision for the treatment of incurable blindness. | 41 | 12 | 12 | 7 | 10 |
31p930j5 | Opinion Dynamics and Social Power Evolution over Reducible Influence Networks | 40 | 13 | 7 | 7 | 13 |
4w75b3gd | Integrating machine learning and multiscale modeling-perspectives, challenges, and opportunities in the biological, biomedical, and behavioral sciences. | 38 | 18 | 6 | 5 | 9 |
5kg2s3wz | Efficient spiking neural network model of pattern motion selectivity in visual cortex | 38 | 11 | 5 | 7 | 15 |
1k9033cx | Non-Abelian braiding of graph vertices in a superconducting processor. | 35 | 8 | 5 | 3 | 19 |
69r799hr | Understanding latent interactions in online social networks | 34 | 17 | 5 | 8 | 4 |
8t7121bg | Towards Immersive Virtual Reality Simulations of Bionic Vision | 34 | 20 | 2 | 2 | 10 |
9741c0pc | Practical Conflict Graphs in the Wild | 32 | 17 | 4 | 5 | 6 |
69z996zm | A neuropeptide speeds circadian entrainment by reducing intercellular synchrony | 30 | 19 | 8 | 2 | 1 |
7327s0dm | Immersive Virtual Reality Simulations of Bionic Vision. | 30 | 18 | 3 | 3 | 6 |
8vv0v48r | An arbitrary Lagrangian Eulerian smoothed particle hydrodynamics (ALE-SPH) method with a boundary volume fraction formulation for fluid-structure interaction | 30 | 14 | 3 | 7 | 6 |
0vf137bs | High-Productivity and High-Performance Analysis of Filtered Semantic Graphs | 28 | 16 | 4 | 3 | 5 |
0wv3578f | Experimentally Validated Reconstruction and Analysis of a Genome-Scale Metabolic Model of an Anaerobic Neocallimastigomycota Fungus | 28 | 17 | 3 | 7 | 1 |
2v25637h | Multiscale modeling meets machine learning: What can we learn? | 28 | 18 | 2 | 2 | 6 |
2zz8m965 | Comparison of Rapid-, Kaolin-, and Native-TEG Parameters in Burn Patient Cohorts With Acute Burn-induced Coagulopathy and Abnormal Fibrinolytic Function. | 28 | 16 | 12 | ||
6822t9g9 | In rDNS We Trust: Revisiting a Common Data-Source's Reliability | 28 | 15 | 3 | 4 | 6 |
9xd62548 | Assessing Factor V Antigen and Degradation Products in Burn and Trauma Patients. | 28 | 15 | 5 | 5 | 3 |
063153hd | Interpretable polynomial neural ordinary differential equations | 26 | 9 | 2 | 7 | 8 |
0fn1k4g2 | Regulation of cell-type-specific transcriptomes by microRNA networks during human brain development. | 26 | 17 | 4 | 5 | |
177918cz | Zoomie: A Software-like Debugging Tool for FPGAs | 26 | 10 | 4 | 12 | |
71b996q9 | Enhanced Charging Kinetics of Porous Electrodes: Surface Conduction as a Short-Circuit Mechanism | 26 | 13 | 5 | 5 | 3 |
2311g11p | Opinion Dynamics and Social Power Evolution: A SingleTimescale Model | 25 | 13 | 3 | 2 | 7 |
00j1z444 | Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones | 24 | 10 | 4 | 5 | 5 |
1d92r05z | Drops for Stuff: An Analysis of Reshipping Mule Scams | 24 | 6 | 6 | 7 | 5 |
55d6c8x2 | Preserving Location Privacy in Geosocial Applications | 24 | 13 | 5 | 3 | 3 |
3829d2nq | Stochastic Simulation Service: Bridging the Gap between the Computational Expert and the Biologist | 23 | 16 | 2 | 1 | 4 |
4bg658n9 | Protecting Web-based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel | 23 | 10 | 3 | 3 | 7 |
9qp2k3s9 | Retinal ganglion cells undergo cell type—specific functional changes in a computational model of cone-mediated retinal degeneration | 23 | 17 | 3 | 1 | 2 |
0rx7d9qm | Graph-based semi-supervised learning with genomic data integration using condition-responsive genes applied to phenotype classification | 22 | 18 | 1 | 1 | 2 |
17g115xs | High-performance analysis of filtered semantic graphs | 22 | 8 | 2 | 3 | 9 |
3kq8p52r | A systematic review of extended reality (XR) for understanding and augmenting vision loss | 22 | 16 | 4 | 1 | 1 |
68x9c1sd | Meerkat: Detecting Website Defacements through Image-based Object Recognition | 22 | 14 | 2 | 4 | 2 |
8rw6v5pm | Decision heuristics in contexts integrating action selection and execution. | 22 | 18 | 2 | 1 | 1 |
1rf4r3n0 | Extracellular detection of neuronal coupling | 21 | 15 | 3 | 2 | 1 |
3931s2d5 | A Computational Model of Phosphene Appearance for Epiretinal Prostheses | 21 | 15 | 2 | 2 | 2 |
5kp7822p | Learning to see again: biological constraints on cortical plasticity and the implications for sight restoration technologies | 21 | 16 | 2 | 2 | 1 |
7xs730h9 | Preliminary study: quantification of chronic pain from physiological data | 21 | 14 | 3 | 2 | 2 |
0dg54766 | Relevant Change Detection: Framework for the Precise Extraction of Modified and Novel Web-based Content as a Filtering Technique for Analysis Engines | 20 | 11 | 2 | 2 | 5 |
2qn66960 | Inhalation Injury is Associated with Endotheliopathy and Abnormal Fibrinolytic Phenotypes in Burn Patients: A Cohort Study | 20 | 18 | 2 | ||
3j15k564 | Cohort: Software-Oriented Acceleration for Heterogeneous SoCs | 20 | 5 | 5 | 10 | |
4vn723rs | Delta: Automatic Identification of Unknown Web-based Infection Campaigns | 20 | 9 | 3 | 5 | 3 |
5cg1r13m | Detecting Performance Anomalies in Cloud Platform Applications. | 20 | 8 | 4 | 8 | |
7tk6t18j | The Role of Chromatin Density in Cell Population Heterogeneity during Stem Cell Differentiation | 20 | 13 | 2 | 4 | 1 |
8c12d0wc | Deep Learning--Based Scene Simplification for Bionic Vision | 20 | 15 | 2 | 3 | |
9vb5d5w0 | What You Submit is Who You Are: A Multi-Modal Approach for Deanonymizing Scientific Publications | 20 | 9 | 2 | 1 | 8 |
Disclaimer: due to the evolving nature of the web traffic we receive and the methods we use to collate it, the data presented here should be considered approximate and subject to revision.