Assertion list
algorithm (primary) → ReceivesAction

Results from Ascent++: 272
algorithmReceivesAction applied 0.76
algorithmReceivesAction implemented 0.74
algorithmReceivesAction developed 0.74
algorithmReceivesAction described in detail 0.70
algorithmReceivesAction based 0.70
algorithmReceivesAction described 0.69
algorithmReceivesAction tested 0.68
algorithmReceivesAction created 0.67
algorithmReceivesAction trained 0.66
algorithmReceivesAction defined 0.65
algorithmReceivesAction implemented in matlab 0.65
algorithmReceivesAction used by google 0.65
algorithmReceivesAction executed 0.65
algorithmReceivesAction proposed 0.64
algorithmReceivesAction implemented in software 0.63
algorithmReceivesAction deployed 0.63
algorithmReceivesAction designed 0.62
algorithmReceivesAction built 0.62
algorithmReceivesAction updated 0.62
algorithmReceivesAction described in section 0.60
algorithmReceivesAction studied 0.60
algorithmReceivesAction based on machine learning 0.60
algorithmReceivesAction limited 0.60
algorithmReceivesAction changed 0.60
algorithmReceivesAction run 0.60
algorithmReceivesAction implemented in c++ 0.59
algorithmReceivesAction written 0.59
algorithmReceivesAction parallelized 0.59
algorithmReceivesAction added 0.58
algorithmReceivesAction developed by researcher 0.57
algorithmReceivesAction implemented in hardware 0.57
algorithmReceivesAction modified 0.57
algorithmReceivesAction introduced 0.56
algorithmReceivesAction optimized 0.56
algorithmReceivesAction implemented in python 0.55
algorithmReceivesAction based on location 0.55
algorithmReceivesAction invoked 0.55
algorithmReceivesAction based on neural networks 0.55
algorithmReceivesAction shown in fig 0.54
algorithmReceivesAction improved 0.54
algorithmReceivesAction selected 0.54
algorithmReceivesAction performed 0.53
algorithmReceivesAction flawed 0.53
algorithmReceivesAction adopted 0.53
algorithmReceivesAction established 0.53
algorithmReceivesAction shown in figure 0.52
algorithmReceivesAction allowed 0.51
algorithmReceivesAction downloaded 0.51
algorithmReceivesAction presented in pseudo 0.51
algorithmReceivesAction retrained 0.51
algorithmReceivesAction designed by people 0.51
algorithmReceivesAction proposed in the literature 0.50
algorithmReceivesAction adjusted 0.50
algorithmReceivesAction based on equation 0.49
algorithmReceivesAction scaled 0.49
algorithmReceivesAction used by public sector 0.49
algorithmReceivesAction enhanced 0.49
algorithmReceivesAction tested in simulation 0.49
algorithmReceivesAction tweaked 0.49
algorithmReceivesAction patented 0.48
algorithmReceivesAction described in the paper 0.48
algorithmReceivesAction biased 0.48
algorithmReceivesAction used in computer vision 0.48
algorithmReceivesAction shown in table 0.48
algorithmReceivesAction based on wavelet transform 0.48
algorithmReceivesAction used to solve problem 0.48
algorithmReceivesAction divided into two categories 0.48
algorithmReceivesAction implemented in java 0.47
algorithmReceivesAction attempted 0.47
algorithmReceivesAction trained on datum 0.47
algorithmReceivesAction audited 0.47
algorithmReceivesAction locked 0.47
algorithmReceivesAction applied to datum 0.46
algorithmReceivesAction based on datum 0.46
algorithmReceivesAction suggested 0.46
algorithmReceivesAction devised 0.46
algorithmReceivesAction designed for pbkdf2 0.46
algorithmReceivesAction used by search engines 0.45
algorithmReceivesAction understood 0.45
algorithmReceivesAction used by facebook 0.45
algorithmReceivesAction based on model 0.45
algorithmReceivesAction based on age 0.45
algorithmReceivesAction used in application 0.45
algorithmReceivesAction utilized in cellphone 0.45
algorithmReceivesAction used in computer science 0.45
algorithmReceivesAction revised 0.45
algorithmReceivesAction supported 0.45
algorithmReceivesAction shown to be robust 0.45
algorithmReceivesAction used by yahoo 0.44
algorithmReceivesAction used in addition 0.44
algorithmReceivesAction repeated 0.44
algorithmReceivesAction used in image processing 0.44
algorithmReceivesAction stored in memory 0.44
algorithmReceivesAction affected 0.43
algorithmReceivesAction based on simulated annealing 0.43
algorithmReceivesAction utilized in hdtv units 0.43
algorithmReceivesAction based on the idea 0.43
algorithmReceivesAction inspired 0.42
algorithmReceivesAction based on oceanic water cycles 0.42
algorithmReceivesAction based on time table series 0.42
algorithmReceivesAction simplified 0.42
algorithmReceivesAction designed for use 0.41
algorithmReceivesAction designed in way 0.41
algorithmReceivesAction distributed 0.41
algorithmReceivesAction used in the system 0.41
algorithmReceivesAction described with reference 0.41
algorithmReceivesAction documented with an 84% verifica… 0.41
algorithmReceivesAction set 0.41
algorithmReceivesAction used in conjunction 0.41
algorithmReceivesAction developed by company 0.40
algorithmReceivesAction used to make decision 0.40
algorithmReceivesAction known in the art 0.40
algorithmReceivesAction used by computer 0.40
algorithmReceivesAction used in practice 0.40
algorithmReceivesAction developed by scientist 0.39
algorithmReceivesAction documented 0.39
algorithmReceivesAction used in case 0.39
algorithmReceivesAction followed 0.39
algorithmReceivesAction started 0.39
algorithmReceivesAction protected 0.38
algorithmReceivesAction used by the industry 0.38
algorithmReceivesAction described in previous section 0.38
algorithmReceivesAction evaluated with respect 0.38
algorithmReceivesAction used in real world 0.38
algorithmReceivesAction hard to understand 0.38
algorithmReceivesAction easy to implement 0.38
algorithmReceivesAction described herein 0.38
algorithmReceivesAction stored 0.38
algorithmReceivesAction taught 0.38
algorithmReceivesAction tested on datum 0.38
algorithmReceivesAction required 0.37
algorithmReceivesAction customized 0.37
algorithmReceivesAction used by government 0.37
algorithmReceivesAction achieved 0.36
algorithmReceivesAction based on gender 0.36
algorithmReceivesAction compiled 0.36
algorithmReceivesAction configured by the user 0.36
algorithmReceivesAction embodied in a software module 0.36
algorithmReceivesAction executed by the processor 0.36
algorithmReceivesAction expressed as finite list of wel… 0.36
algorithmReceivesAction transferred into dram 0.36
algorithmReceivesAction used in mathematic 0.36
algorithmReceivesAction trained on historical data 0.36
algorithmReceivesAction used in game 0.36
algorithmReceivesAction developed by author 0.36
algorithmReceivesAction developed by the team 0.36
algorithmReceivesAction fixed 0.36
algorithmReceivesAction inspired by human brain 0.36
algorithmReceivesAction presented in the book 0.36
algorithmReceivesAction specified by the context 0.36
algorithmReceivesAction used by bing 0.35
algorithmReceivesAction based on dynamic programming 0.35
algorithmReceivesAction combined 0.35
algorithmReceivesAction used by police 0.35
algorithmReceivesAction used in the criminal justice sy… 0.35
algorithmReceivesAction likely to succeed 0.35
algorithmReceivesAction based on complex mathematics 0.34
algorithmReceivesAction based on statistic 0.34
algorithmReceivesAction computed 0.34
algorithmReceivesAction controlled 0.34
algorithmReceivesAction designed to erase artifact 0.34
algorithmReceivesAction designed to erase feathering 0.34
algorithmReceivesAction designed to erase jaggie 0.34
algorithmReceivesAction developed by colleague 0.34
algorithmReceivesAction exploited 0.34
algorithmReceivesAction likely to identify false strate… 0.34
algorithmReceivesAction modulated to increase specifici… 0.34
algorithmReceivesAction run in mono 0.34
algorithmReceivesAction run in stereo 0.34
algorithmReceivesAction used by amazon 0.34
algorithmReceivesAction written in such a way 0.34
algorithmReceivesAction based on the principle 0.34
algorithmReceivesAction embedded in code 0.34
algorithmReceivesAction engineered 0.34
algorithmReceivesAction implemented in a computer progr… 0.34
algorithmReceivesAction initialized 0.34
algorithmReceivesAction inspired by function 0.34
algorithmReceivesAction shown to be effective 0.33
algorithmReceivesAction disclosed 0.33
algorithmReceivesAction described in the methods section 0.33
algorithmReceivesAction described in u.s. pat 0.33
algorithmReceivesAction embodied in hardware 0.33
algorithmReceivesAction encrypted 0.33
algorithmReceivesAction entered 0.33
algorithmReceivesAction expanded 0.33
algorithmReceivesAction installed 0.33
algorithmReceivesAction met 0.33
algorithmReceivesAction proposed in recent years 0.33
algorithmReceivesAction related 0.33
algorithmReceivesAction solved 0.33
algorithmReceivesAction used to manage their trading 0.33
algorithmReceivesAction weighted 0.33
algorithmReceivesAction applied to problem 0.32
algorithmReceivesAction based on the time of day 0.32
algorithmReceivesAction based on volume 0.32
algorithmReceivesAction configured 0.32
algorithmReceivesAction corrected 0.32
algorithmReceivesAction developed by engineer 0.32
algorithmReceivesAction enabled 0.32
algorithmReceivesAction encoded 0.32
algorithmReceivesAction expressed in any language 0.32
algorithmReceivesAction followed in other problem-solvi… 0.32
algorithmReceivesAction implemented in firmware 0.32
algorithmReceivesAction implemented on fpga 0.32
algorithmReceivesAction iterated 0.32
algorithmReceivesAction parameterized 0.32
algorithmReceivesAction presented in specific programmi… 0.32
algorithmReceivesAction run in a combination of the two 0.32
algorithmReceivesAction set in advance 0.32
algorithmReceivesAction specified in fips 0.32
algorithmReceivesAction tested for over 30 years 0.32
algorithmReceivesAction tested on simulated data 0.32
algorithmReceivesAction used by asset managers 0.32
algorithmReceivesAction used by the network 0.32
algorithmReceivesAction used in signal processing 0.32
algorithmReceivesAction upgraded 0.31
algorithmReceivesAction applied to situation 0.30
algorithmReceivesAction based on data mining 0.30
algorithmReceivesAction based on graph theory 0.30
algorithmReceivesAction based on multilevel recursive-b… 0.30
algorithmReceivesAction based on particle swarm optimiz… 0.30
algorithmReceivesAction based on place-value decomposit… 0.30
algorithmReceivesAction based on research 0.30
algorithmReceivesAction described in 3.2 0.30
algorithmReceivesAction designed for implementation 0.30
algorithmReceivesAction developed in house 0.30
algorithmReceivesAction devised by the artist 0.30
algorithmReceivesAction expected 0.30
algorithmReceivesAction fed with datum 0.30
algorithmReceivesAction generalized 0.30
algorithmReceivesAction implemented on digital processor 0.30
algorithmReceivesAction instantiated 0.30
algorithmReceivesAction justified by the speed improvem… 0.30
algorithmReceivesAction published in the journal 0.30
algorithmReceivesAction repeated for method 0.30
algorithmReceivesAction replicated 0.30
algorithmReceivesAction stored in rom 0.30
algorithmReceivesAction understood by human 0.30
algorithmReceivesAction used as tool 0.30
algorithmReceivesAction used by city agencies 0.30
algorithmReceivesAction used by large brokerages 0.30
algorithmReceivesAction used by netflix 0.30
algorithmReceivesAction used by robot 0.30
algorithmReceivesAction used in medicine 0.30
algorithmReceivesAction used in neural net training 0.30
algorithmReceivesAction vectorized 0.30
algorithmReceivesAction considered efficient 0.30
algorithmReceivesAction based on past reviews 0.29
algorithmReceivesAction based on search trends 0.29
algorithmReceivesAction based on social following 0.29
algorithmReceivesAction hidden 0.29
algorithmReceivesAction based on analysis 0.28
algorithmReceivesAction based on deep neural networks 0.27
algorithmReceivesAction used by twitter 0.27
algorithmReceivesAction implemented by psychologist 0.26
algorithmReceivesAction implemented by statistician 0.26
algorithmReceivesAction proven correct 0.26
algorithmReceivesAction compromised 0.25
algorithmReceivesAction proven 0.25
algorithmReceivesAction compared to other algorithms 0.24
algorithmReceivesAction ignored 0.24
algorithmReceivesAction used by endorphina 0.24
algorithmReceivesAction powered by artificial intellige… 0.23
algorithmReceivesAction turned loose 0.23
algorithmReceivesAction applied to the world of quantum… 0.22
algorithmReceivesAction gamed 0.22
algorithmReceivesAction likely to misidentify black peo… 0.22
algorithmReceivesAction used by specialist 0.22
algorithmReceivesAction used in recruitment 0.22
algorithmReceivesAction vetted 0.22
algorithmReceivesAction shared 0.21
algorithmReceivesAction inspected 0.20