algorithm
→
ReceivesAction
→
applied
|
0.76
|
|
algorithm
→
ReceivesAction
→
implemented
|
0.74
|
|
algorithm
→
ReceivesAction
→
developed
|
0.74
|
|
algorithm
→
ReceivesAction
→
described in detail
|
0.70
|
|
algorithm
→
ReceivesAction
→
based
|
0.70
|
|
algorithm
→
ReceivesAction
→
described
|
0.69
|
|
algorithm
→
ReceivesAction
→
tested
|
0.68
|
|
algorithm
→
ReceivesAction
→
created
|
0.67
|
|
algorithm
→
ReceivesAction
→
trained
|
0.66
|
|
algorithm
→
ReceivesAction
→
defined
|
0.65
|
|
algorithm
→
ReceivesAction
→
implemented in matlab
|
0.65
|
|
algorithm
→
ReceivesAction
→
used by google
|
0.65
|
|
algorithm
→
ReceivesAction
→
executed
|
0.65
|
|
algorithm
→
ReceivesAction
→
proposed
|
0.64
|
|
algorithm
→
ReceivesAction
→
implemented in software
|
0.63
|
|
algorithm
→
ReceivesAction
→
deployed
|
0.63
|
|
algorithm
→
ReceivesAction
→
designed
|
0.62
|
|
algorithm
→
ReceivesAction
→
built
|
0.62
|
|
algorithm
→
ReceivesAction
→
updated
|
0.62
|
|
algorithm
→
ReceivesAction
→
described in section
|
0.60
|
|
algorithm
→
ReceivesAction
→
studied
|
0.60
|
|
algorithm
→
ReceivesAction
→
based on machine learning
|
0.60
|
|
algorithm
→
ReceivesAction
→
limited
|
0.60
|
|
algorithm
→
ReceivesAction
→
changed
|
0.60
|
|
algorithm
→
ReceivesAction
→
run
|
0.60
|
|
algorithm
→
ReceivesAction
→
implemented in c++
|
0.59
|
|
algorithm
→
ReceivesAction
→
written
|
0.59
|
|
algorithm
→
ReceivesAction
→
parallelized
|
0.59
|
|
algorithm
→
ReceivesAction
→
added
|
0.58
|
|
algorithm
→
ReceivesAction
→
developed by researcher
|
0.57
|
|
algorithm
→
ReceivesAction
→
implemented in hardware
|
0.57
|
|
algorithm
→
ReceivesAction
→
modified
|
0.57
|
|
algorithm
→
ReceivesAction
→
introduced
|
0.56
|
|
algorithm
→
ReceivesAction
→
optimized
|
0.56
|
|
algorithm
→
ReceivesAction
→
implemented in python
|
0.55
|
|
algorithm
→
ReceivesAction
→
based on location
|
0.55
|
|
algorithm
→
ReceivesAction
→
invoked
|
0.55
|
|
algorithm
→
ReceivesAction
→
based on neural networks
|
0.55
|
|
algorithm
→
ReceivesAction
→
shown in fig
|
0.54
|
|
algorithm
→
ReceivesAction
→
improved
|
0.54
|
|
algorithm
→
ReceivesAction
→
selected
|
0.54
|
|
algorithm
→
ReceivesAction
→
performed
|
0.53
|
|
algorithm
→
ReceivesAction
→
flawed
|
0.53
|
|
algorithm
→
ReceivesAction
→
adopted
|
0.53
|
|
algorithm
→
ReceivesAction
→
established
|
0.53
|
|
algorithm
→
ReceivesAction
→
shown in figure
|
0.52
|
|
algorithm
→
ReceivesAction
→
allowed
|
0.51
|
|
algorithm
→
ReceivesAction
→
downloaded
|
0.51
|
|
algorithm
→
ReceivesAction
→
presented in pseudo
|
0.51
|
|
algorithm
→
ReceivesAction
→
retrained
|
0.51
|
|
algorithm
→
ReceivesAction
→
designed by people
|
0.51
|
|
algorithm
→
ReceivesAction
→
proposed in the literature
|
0.50
|
|
algorithm
→
ReceivesAction
→
adjusted
|
0.50
|
|
algorithm
→
ReceivesAction
→
based on equation
|
0.49
|
|
algorithm
→
ReceivesAction
→
scaled
|
0.49
|
|
algorithm
→
ReceivesAction
→
used by public sector
|
0.49
|
|
algorithm
→
ReceivesAction
→
enhanced
|
0.49
|
|
algorithm
→
ReceivesAction
→
tested in simulation
|
0.49
|
|
algorithm
→
ReceivesAction
→
tweaked
|
0.49
|
|
algorithm
→
ReceivesAction
→
patented
|
0.48
|
|
algorithm
→
ReceivesAction
→
described in the paper
|
0.48
|
|
algorithm
→
ReceivesAction
→
biased
|
0.48
|
|
algorithm
→
ReceivesAction
→
used in computer vision
|
0.48
|
|
algorithm
→
ReceivesAction
→
shown in table
|
0.48
|
|
algorithm
→
ReceivesAction
→
based on wavelet transform
|
0.48
|
|
algorithm
→
ReceivesAction
→
used to solve problem
|
0.48
|
|
algorithm
→
ReceivesAction
→
divided into two categories
|
0.48
|
|
algorithm
→
ReceivesAction
→
implemented in java
|
0.47
|
|
algorithm
→
ReceivesAction
→
attempted
|
0.47
|
|
algorithm
→
ReceivesAction
→
trained on datum
|
0.47
|
|
algorithm
→
ReceivesAction
→
audited
|
0.47
|
|
algorithm
→
ReceivesAction
→
locked
|
0.47
|
|
algorithm
→
ReceivesAction
→
applied to datum
|
0.46
|
|
algorithm
→
ReceivesAction
→
based on datum
|
0.46
|
|
algorithm
→
ReceivesAction
→
suggested
|
0.46
|
|
algorithm
→
ReceivesAction
→
devised
|
0.46
|
|
algorithm
→
ReceivesAction
→
designed for pbkdf2
|
0.46
|
|
algorithm
→
ReceivesAction
→
used by search engines
|
0.45
|
|
algorithm
→
ReceivesAction
→
understood
|
0.45
|
|
algorithm
→
ReceivesAction
→
used by facebook
|
0.45
|
|
algorithm
→
ReceivesAction
→
based on model
|
0.45
|
|
algorithm
→
ReceivesAction
→
based on age
|
0.45
|
|
algorithm
→
ReceivesAction
→
used in application
|
0.45
|
|
algorithm
→
ReceivesAction
→
utilized in cellphone
|
0.45
|
|
algorithm
→
ReceivesAction
→
used in computer science
|
0.45
|
|
algorithm
→
ReceivesAction
→
revised
|
0.45
|
|
algorithm
→
ReceivesAction
→
supported
|
0.45
|
|
algorithm
→
ReceivesAction
→
shown to be robust
|
0.45
|
|
algorithm
→
ReceivesAction
→
used by yahoo
|
0.44
|
|
algorithm
→
ReceivesAction
→
used in addition
|
0.44
|
|
algorithm
→
ReceivesAction
→
repeated
|
0.44
|
|
algorithm
→
ReceivesAction
→
used in image processing
|
0.44
|
|
algorithm
→
ReceivesAction
→
stored in memory
|
0.44
|
|
algorithm
→
ReceivesAction
→
affected
|
0.43
|
|
algorithm
→
ReceivesAction
→
based on simulated annealing
|
0.43
|
|
algorithm
→
ReceivesAction
→
utilized in hdtv units
|
0.43
|
|
algorithm
→
ReceivesAction
→
based on the idea
|
0.43
|
|
algorithm
→
ReceivesAction
→
inspired
|
0.42
|
|
algorithm
→
ReceivesAction
→
based on oceanic water cycles
|
0.42
|
|
algorithm
→
ReceivesAction
→
based on time table series
|
0.42
|
|
algorithm
→
ReceivesAction
→
simplified
|
0.42
|
|
algorithm
→
ReceivesAction
→
designed for use
|
0.41
|
|
algorithm
→
ReceivesAction
→
designed in way
|
0.41
|
|
algorithm
→
ReceivesAction
→
distributed
|
0.41
|
|
algorithm
→
ReceivesAction
→
used in the system
|
0.41
|
|
algorithm
→
ReceivesAction
→
described with reference
|
0.41
|
|
algorithm
→
ReceivesAction
→
documented with an 84% verifica…
|
0.41
|
|
algorithm
→
ReceivesAction
→
set
|
0.41
|
|
algorithm
→
ReceivesAction
→
used in conjunction
|
0.41
|
|
algorithm
→
ReceivesAction
→
developed by company
|
0.40
|
|
algorithm
→
ReceivesAction
→
used to make decision
|
0.40
|
|
algorithm
→
ReceivesAction
→
known in the art
|
0.40
|
|
algorithm
→
ReceivesAction
→
used by computer
|
0.40
|
|
algorithm
→
ReceivesAction
→
used in practice
|
0.40
|
|
algorithm
→
ReceivesAction
→
developed by scientist
|
0.39
|
|
algorithm
→
ReceivesAction
→
documented
|
0.39
|
|
algorithm
→
ReceivesAction
→
used in case
|
0.39
|
|
algorithm
→
ReceivesAction
→
followed
|
0.39
|
|
algorithm
→
ReceivesAction
→
started
|
0.39
|
|
algorithm
→
ReceivesAction
→
protected
|
0.38
|
|
algorithm
→
ReceivesAction
→
used by the industry
|
0.38
|
|
algorithm
→
ReceivesAction
→
described in previous section
|
0.38
|
|
algorithm
→
ReceivesAction
→
evaluated with respect
|
0.38
|
|
algorithm
→
ReceivesAction
→
used in real world
|
0.38
|
|
algorithm
→
ReceivesAction
→
hard to understand
|
0.38
|
|
algorithm
→
ReceivesAction
→
easy to implement
|
0.38
|
|
algorithm
→
ReceivesAction
→
described herein
|
0.38
|
|
algorithm
→
ReceivesAction
→
stored
|
0.38
|
|
algorithm
→
ReceivesAction
→
taught
|
0.38
|
|
algorithm
→
ReceivesAction
→
tested on datum
|
0.38
|
|
algorithm
→
ReceivesAction
→
required
|
0.37
|
|
algorithm
→
ReceivesAction
→
customized
|
0.37
|
|
algorithm
→
ReceivesAction
→
used by government
|
0.37
|
|
algorithm
→
ReceivesAction
→
achieved
|
0.36
|
|
algorithm
→
ReceivesAction
→
based on gender
|
0.36
|
|
algorithm
→
ReceivesAction
→
compiled
|
0.36
|
|
algorithm
→
ReceivesAction
→
configured by the user
|
0.36
|
|
algorithm
→
ReceivesAction
→
embodied in a software module
|
0.36
|
|
algorithm
→
ReceivesAction
→
executed by the processor
|
0.36
|
|
algorithm
→
ReceivesAction
→
expressed as finite list of wel…
|
0.36
|
|
algorithm
→
ReceivesAction
→
transferred into dram
|
0.36
|
|
algorithm
→
ReceivesAction
→
used in mathematic
|
0.36
|
|
algorithm
→
ReceivesAction
→
trained on historical data
|
0.36
|
|
algorithm
→
ReceivesAction
→
used in game
|
0.36
|
|
algorithm
→
ReceivesAction
→
developed by author
|
0.36
|
|
algorithm
→
ReceivesAction
→
developed by the team
|
0.36
|
|
algorithm
→
ReceivesAction
→
fixed
|
0.36
|
|
algorithm
→
ReceivesAction
→
inspired by human brain
|
0.36
|
|
algorithm
→
ReceivesAction
→
presented in the book
|
0.36
|
|
algorithm
→
ReceivesAction
→
specified by the context
|
0.36
|
|
algorithm
→
ReceivesAction
→
used by bing
|
0.35
|
|
algorithm
→
ReceivesAction
→
based on dynamic programming
|
0.35
|
|
algorithm
→
ReceivesAction
→
combined
|
0.35
|
|
algorithm
→
ReceivesAction
→
used by police
|
0.35
|
|
algorithm
→
ReceivesAction
→
used in the criminal justice sy…
|
0.35
|
|
algorithm
→
ReceivesAction
→
likely to succeed
|
0.35
|
|
algorithm
→
ReceivesAction
→
based on complex mathematics
|
0.34
|
|
algorithm
→
ReceivesAction
→
based on statistic
|
0.34
|
|
algorithm
→
ReceivesAction
→
computed
|
0.34
|
|
algorithm
→
ReceivesAction
→
controlled
|
0.34
|
|
algorithm
→
ReceivesAction
→
designed to erase artifact
|
0.34
|
|
algorithm
→
ReceivesAction
→
designed to erase feathering
|
0.34
|
|
algorithm
→
ReceivesAction
→
designed to erase jaggie
|
0.34
|
|
algorithm
→
ReceivesAction
→
developed by colleague
|
0.34
|
|
algorithm
→
ReceivesAction
→
exploited
|
0.34
|
|
algorithm
→
ReceivesAction
→
likely to identify false strate…
|
0.34
|
|
algorithm
→
ReceivesAction
→
modulated to increase specifici…
|
0.34
|
|
algorithm
→
ReceivesAction
→
run in mono
|
0.34
|
|
algorithm
→
ReceivesAction
→
run in stereo
|
0.34
|
|
algorithm
→
ReceivesAction
→
used by amazon
|
0.34
|
|
algorithm
→
ReceivesAction
→
written in such a way
|
0.34
|
|
algorithm
→
ReceivesAction
→
based on the principle
|
0.34
|
|
algorithm
→
ReceivesAction
→
embedded in code
|
0.34
|
|
algorithm
→
ReceivesAction
→
engineered
|
0.34
|
|
algorithm
→
ReceivesAction
→
implemented in a computer progr…
|
0.34
|
|
algorithm
→
ReceivesAction
→
initialized
|
0.34
|
|
algorithm
→
ReceivesAction
→
inspired by function
|
0.34
|
|
algorithm
→
ReceivesAction
→
shown to be effective
|
0.33
|
|
algorithm
→
ReceivesAction
→
disclosed
|
0.33
|
|
algorithm
→
ReceivesAction
→
described in the methods section
|
0.33
|
|
algorithm
→
ReceivesAction
→
described in u.s. pat
|
0.33
|
|
algorithm
→
ReceivesAction
→
embodied in hardware
|
0.33
|
|
algorithm
→
ReceivesAction
→
encrypted
|
0.33
|
|
algorithm
→
ReceivesAction
→
entered
|
0.33
|
|
algorithm
→
ReceivesAction
→
expanded
|
0.33
|
|
algorithm
→
ReceivesAction
→
installed
|
0.33
|
|
algorithm
→
ReceivesAction
→
met
|
0.33
|
|
algorithm
→
ReceivesAction
→
proposed in recent years
|
0.33
|
|
algorithm
→
ReceivesAction
→
related
|
0.33
|
|
algorithm
→
ReceivesAction
→
solved
|
0.33
|
|
algorithm
→
ReceivesAction
→
used to manage their trading
|
0.33
|
|
algorithm
→
ReceivesAction
→
weighted
|
0.33
|
|
algorithm
→
ReceivesAction
→
applied to problem
|
0.32
|
|
algorithm
→
ReceivesAction
→
based on the time of day
|
0.32
|
|
algorithm
→
ReceivesAction
→
based on volume
|
0.32
|
|
algorithm
→
ReceivesAction
→
configured
|
0.32
|
|
algorithm
→
ReceivesAction
→
corrected
|
0.32
|
|
algorithm
→
ReceivesAction
→
developed by engineer
|
0.32
|
|
algorithm
→
ReceivesAction
→
enabled
|
0.32
|
|
algorithm
→
ReceivesAction
→
encoded
|
0.32
|
|
algorithm
→
ReceivesAction
→
expressed in any language
|
0.32
|
|
algorithm
→
ReceivesAction
→
followed in other problem-solvi…
|
0.32
|
|
algorithm
→
ReceivesAction
→
implemented in firmware
|
0.32
|
|
algorithm
→
ReceivesAction
→
implemented on fpga
|
0.32
|
|
algorithm
→
ReceivesAction
→
iterated
|
0.32
|
|
algorithm
→
ReceivesAction
→
parameterized
|
0.32
|
|
algorithm
→
ReceivesAction
→
presented in specific programmi…
|
0.32
|
|
algorithm
→
ReceivesAction
→
run in a combination of the two
|
0.32
|
|
algorithm
→
ReceivesAction
→
set in advance
|
0.32
|
|
algorithm
→
ReceivesAction
→
specified in fips
|
0.32
|
|
algorithm
→
ReceivesAction
→
tested for over 30 years
|
0.32
|
|
algorithm
→
ReceivesAction
→
tested on simulated data
|
0.32
|
|
algorithm
→
ReceivesAction
→
used by asset managers
|
0.32
|
|
algorithm
→
ReceivesAction
→
used by the network
|
0.32
|
|
algorithm
→
ReceivesAction
→
used in signal processing
|
0.32
|
|
algorithm
→
ReceivesAction
→
upgraded
|
0.31
|
|
algorithm
→
ReceivesAction
→
applied to situation
|
0.30
|
|
algorithm
→
ReceivesAction
→
based on data mining
|
0.30
|
|
algorithm
→
ReceivesAction
→
based on graph theory
|
0.30
|
|
algorithm
→
ReceivesAction
→
based on multilevel recursive-b…
|
0.30
|
|
algorithm
→
ReceivesAction
→
based on particle swarm optimiz…
|
0.30
|
|
algorithm
→
ReceivesAction
→
based on place-value decomposit…
|
0.30
|
|
algorithm
→
ReceivesAction
→
based on research
|
0.30
|
|
algorithm
→
ReceivesAction
→
described in 3.2
|
0.30
|
|
algorithm
→
ReceivesAction
→
designed for implementation
|
0.30
|
|
algorithm
→
ReceivesAction
→
developed in house
|
0.30
|
|
algorithm
→
ReceivesAction
→
devised by the artist
|
0.30
|
|
algorithm
→
ReceivesAction
→
expected
|
0.30
|
|
algorithm
→
ReceivesAction
→
fed with datum
|
0.30
|
|
algorithm
→
ReceivesAction
→
generalized
|
0.30
|
|
algorithm
→
ReceivesAction
→
implemented on digital processor
|
0.30
|
|
algorithm
→
ReceivesAction
→
instantiated
|
0.30
|
|
algorithm
→
ReceivesAction
→
justified by the speed improvem…
|
0.30
|
|
algorithm
→
ReceivesAction
→
published in the journal
|
0.30
|
|
algorithm
→
ReceivesAction
→
repeated for method
|
0.30
|
|
algorithm
→
ReceivesAction
→
replicated
|
0.30
|
|
algorithm
→
ReceivesAction
→
stored in rom
|
0.30
|
|
algorithm
→
ReceivesAction
→
understood by human
|
0.30
|
|
algorithm
→
ReceivesAction
→
used as tool
|
0.30
|
|
algorithm
→
ReceivesAction
→
used by city agencies
|
0.30
|
|
algorithm
→
ReceivesAction
→
used by large brokerages
|
0.30
|
|
algorithm
→
ReceivesAction
→
used by netflix
|
0.30
|
|
algorithm
→
ReceivesAction
→
used by robot
|
0.30
|
|
algorithm
→
ReceivesAction
→
used in medicine
|
0.30
|
|
algorithm
→
ReceivesAction
→
used in neural net training
|
0.30
|
|
algorithm
→
ReceivesAction
→
vectorized
|
0.30
|
|
algorithm
→
ReceivesAction
→
considered efficient
|
0.30
|
|
algorithm
→
ReceivesAction
→
based on past reviews
|
0.29
|
|
algorithm
→
ReceivesAction
→
based on search trends
|
0.29
|
|
algorithm
→
ReceivesAction
→
based on social following
|
0.29
|
|
algorithm
→
ReceivesAction
→
hidden
|
0.29
|
|
algorithm
→
ReceivesAction
→
based on analysis
|
0.28
|
|
algorithm
→
ReceivesAction
→
based on deep neural networks
|
0.27
|
|
algorithm
→
ReceivesAction
→
used by twitter
|
0.27
|
|
algorithm
→
ReceivesAction
→
implemented by psychologist
|
0.26
|
|
algorithm
→
ReceivesAction
→
implemented by statistician
|
0.26
|
|
algorithm
→
ReceivesAction
→
proven correct
|
0.26
|
|
algorithm
→
ReceivesAction
→
compromised
|
0.25
|
|
algorithm
→
ReceivesAction
→
proven
|
0.25
|
|
algorithm
→
ReceivesAction
→
compared to other algorithms
|
0.24
|
|
algorithm
→
ReceivesAction
→
ignored
|
0.24
|
|
algorithm
→
ReceivesAction
→
used by endorphina
|
0.24
|
|
algorithm
→
ReceivesAction
→
powered by artificial intellige…
|
0.23
|
|
algorithm
→
ReceivesAction
→
turned loose
|
0.23
|
|
algorithm
→
ReceivesAction
→
applied to the world of quantum…
|
0.22
|
|
algorithm
→
ReceivesAction
→
gamed
|
0.22
|
|
algorithm
→
ReceivesAction
→
likely to misidentify black peo…
|
0.22
|
|
algorithm
→
ReceivesAction
→
used by specialist
|
0.22
|
|
algorithm
→
ReceivesAction
→
used in recruitment
|
0.22
|
|
algorithm
→
ReceivesAction
→
vetted
|
0.22
|
|
algorithm
→
ReceivesAction
→
shared
|
0.21
|
|
algorithm
→
ReceivesAction
→
inspected
|
0.20
|
|