abstract_id
stringlengths
10
10
sentences
list
labels
list
confs
list
train_1100
[ "This tutorial brings together perspectives on ER from a variety of fields, including databases, machine learning, natural language processing and information retrieval, to provide, in one setting, a survey of a large body of work.", "We discuss both the practical aspects and theoretical underpinnings of ER.", "We describe existing solutions, current challenges, and open research problems." ]
[ 0, 0, 4 ]
[ 0.583299994468689, 0.583299994468689, 0.41670000553131104 ]
train_1101
[ "We describe a new physics engine tailored to model-based control.", "Multi-joint dynamics are represented in generalized coordinates and computed via recursive algorithms.", "Contact responses are computed via efficient new algorithms we have developed, based on the modern velocity-stepping approach which avoids the difficulties with spring-dampers.", "Models are specified using either a high-level C++ API or an intuitive XML file format.", "A built-in compiler transforms the user model into an optimized data structure used for runtime computation.", "The engine can compute both forward and inverse dynamics.", "The latter are well-defined even in the presence of contacts and equality constraints.", "The model can include tendon wrapping as well as actuator activation states (e.g. pneumatic cylinders or muscles).", "To facilitate optimal control applications and in particular sampling and finite differencing, the dynamics can be evaluated for different states and controls in parallel.", "Around 400,000 dynamics evaluations per second are possible on a 12-core machine, for a 3D homanoid with 18 dofs and 6 active contacts." ]
[ 0, 0, 0, 1, 1, 1, 4, 1, 4, 4 ]
[ 1, 0.5881999731063843, 0.5587999820709229, 0.6470999717712402, 0.8529000282287598, 0.7940999865531921, 0.44119998812675476, 0.41179999709129333, 0.6470999717712402, 0.8529000282287598 ]
train_1102
[ "The notion of a shared mental model is well known in the literature regarding team work among humans.", "It has been used to explain team functioning.", "The idea is that team performance improves if team members have a shared understanding of the task that is to be performed and of the involved team work.", "We maintain that the notion of shared mental model is not only highly relevant in the context of human teams, but also for teams of agents and for human-agent teams.", "However, before we can start investigating how to engineer agents on the basis of the notion of shared mental model, we first have to get a better understanding of the notion, which is the aim of this paper.", "We do this by investigating which concepts are relevant for shared mental models, and modeling how they are related by means of UML.", "Through this, we obtain a mental model ontology.", "Then, we formally define the notion of shared mental model and related notions.", "We illustrate our definitions by means of an example." ]
[ 0, 1, 1, 1, 1, 4, 4, 4, 4 ]
[ 1, 0.6215999722480774, 0.40540000796318054, 0.4323999881744385, 0.3783999979496002, 0.4323999881744385, 0.6485999822616577, 1, 0.6215999722480774 ]
train_1103
[ "Modern mobile devices have access to a wealth of data suitable for learning models, which in turn can greatly improve the user experience on the device.", "For example, language models can improve speech recognition and text entry, and image models can automatically select good photos.", "However, this rich data is often privacy sensitive, large in quantity, or both, which may preclude logging to the data-center and training there using conventional approaches.", "We advocate an alternative that leaves the training data distributed on the mobile devices, and learns a shared model by aggregating locally-computed updates.", "We term this decentralized approach Federated Learning.", "We present a practical method for the federated learning of deep networks that proves robust to the unbalanced and non-IID data distributions that naturally arise.", "This method allows high-quality models to be trained in relatively few rounds of communication, the principal constraint for federated learning.", "The key insight is that despite the non-convex loss functions we optimize, parameter averaging over updates from multiple clients produces surprisingly good results, for example decreasing the communication needed to train an LSTM language model by two orders of magnitude." ]
[ 0, 0, 0, 1, 1, 1, 1, 4 ]
[ 1, 1, 0.5782999992370605, 0.6043000221252441, 0.6043000221252441, 0.5782999992370605, 0.5782999992370605, 0.8173999786376953 ]
train_1104
[ "Purpose – Aims to review the key concepts of competency management (CM) and to propose method for developing competency method.", "Design/methodology/approach – Examines the CM features of 22 CM systems and 18 learning management systems.", "Findings – Finds that the areas of open standard (XML, web services, RDF), semantic technologies (ontologies and the semantic web) and portals with self-service technologies are going to play a significant part in the evolution of CM systems.", "Originality/value – Emphasizes the beneficial attributes of CM for private and public organizations." ]
[ 2, 1, 1, 4 ]
[ 0.7735999822616577, 0.6226000189781189, 0.4244999885559082, 0.4244999885559082 ]
train_1105
[ "In this work, we cast text summarization as a sequence-to-sequence problem and apply the attentional encoder-decoder RNN that has been shown to be successful for Machine Translation (Bahdanau et al. (2014)).", "Our experiments show that the proposed architecture significantly outperforms the state-of-the art model of Rush et al. (2015) on the Gigaword dataset without any additional tuning.", "We also propose additional extensions to the standard architecture, which we show contribute to further improvement in performance." ]
[ 0, 0, 2 ]
[ 0.8158000111579895, 0.421099990606308, 0.421099990606308 ]
train_1106
[ "This paper presents an approach to the description and analysis of complex Man-Machine Systems (MMSs) called Cognitive Systems Engineering (CSE).", "In contrast to traditional approaches to the study of man-machine systems which mainly operate on the physical and physiological level, CSE operates on the level of cognitive functions.", "Instead of viewing an MMS as decomposable by mechanistic principles, CSE introduces the concept of a cognitive system: an adaptive system which functions using knowledge about itself and the environment in the planning and modification of actions.", "Operators are generally acknowledged to use a model of the system (machine) with which they work.", "Similarly, the machine has an image of the operator.", "The designer of an MMS must recognize this, and strive to obtain a match between the machine's image and the user characteristics on a cognitive level, rather than just on the level of physical functions.", "This article gives a presentation of what cognitive systems are, and of how CSE can contribute to the design of an MMS, from cognitive task analysis to final evaluation." ]
[ 2, 1, 1, 1, 1, 1, 4 ]
[ 0.6215999722480774, 0.40540000796318054, 0.6215999722480774, 0.6215999722480774, 0.6215999722480774, 0.5946000218391418, 0.6215999722480774 ]
train_1107
[ "We present the MULTOVL application suite that detects and statistically analyses multiple overlaps of genomic regions in a fast and efficient manner.", "The package supports the detection of multiple region intersections, unions and 'solitary' genomic regions.", "The significance of actually observed overlaps is estimated by comparing them with empirical null distributions generated by random shuffling of the input regions." ]
[ 0, 0, 0 ]
[ 0.6000000238418579, 0.771399974822998, 0.6000000238418579 ]
train_1108
[ "An access control model describes at a high level of abstraction a mechanism for governing access to shared resources.", "In this paper, we view an access control model as a design pattern providing a general solution for ensuring confidentiality, integrity and availability of information resources.", "We present three widely used access control models, DAC, MAC and RBAC as design patterns using the POSA template.", "We use an extension of the UML to represent the structure and behavior of the patterns.", "The extension enables capturing variations of pattern instances.", "We also attempt to give more details on the problem domain of the patterns to help pattern selection." ]
[ 0, 2, 1, 1, 1, 1 ]
[ 1, 1, 0.5896999835968018, 0.7949000000953674, 0.7949000000953674, 0.5896999835968018 ]
train_1109
[ "On-line learning in domains where the target concept depends on some hidden context poses serious problems.", "A changing context can induce changes in the target concepts, producing what is known as concept drift.", "We describe a family of learning algorithms that flexibly react to concept drift and can take advantage of situations where contexts reappear.", "The general approach underlying all these algorithms consists of (1) keeping only a window of currently trusted examples and hypotheses; (2) storing concept descriptions and reusing them when a previous context re-appears; and (3) controlling both of these functions by a heuristic that constantly monitors the system's behavior.", "The paper reports on experiments that test the systems' perfomance under various conditions such as different levels of noise and different extent and rate of concept drift." ]
[ 0, 0, 2, 1, 4 ]
[ 1, 0.771399974822998, 0.571399986743927, 0.4000000059604645, 0.4571000039577484 ]
train_1110
[ "Face recognition presents a challenging problem in the field of image analysis and computer vision, and as such has received a great deal of attention over the last few years because of its many applications in various domains.", "Face recognition techniques can be broadly divided into three categories based on the face data acquisition methodology: methods that operate on intensity images; those that deal with video sequences; and those that require other sensory data such as 3D information or infra-red imagery.", "In this paper, an overview of some of the well-known methods in each of these categories is provided and some of the benefits and drawbacks of the schemes mentioned therein are examined.", "Furthermore, a discussion outlining the incentive for using face recognition, the applications of this technology, and some of the difficulties plaguing current systems with regard to this task has also been provided.", "This paper also mentions some of the most recent algorithms developed for this purpose and attempts to give an idea of the state of the art of face recognition technology." ]
[ 0, 0, 2, 0, 2 ]
[ 1, 1, 0.428600013256073, 0.34290000796318054, 0.4000000059604645 ]
train_1111
[ "The tremendous success of machine learning algorithms at image recognition tasks in recent years intersects with a time of dramatically increased use of electronic medical records and diagnostic imaging.", "This review introduces the machine learning algorithms as applied to medical image analysis, focusing on convolutional neural networks, and emphasizing clinical aspects of the field.", "The advantage of machine learning in an era of medical big data is that significant hierarchal relationships within the data can be discovered algorithmically without laborious hand-crafting of features.", "We cover key research areas and applications of medical image classification, localization, detection, segmentation, and registration.", "We conclude by discussing research obstacles, emerging trends, and possible future directions." ]
[ 0, 0, 1, 1, 4 ]
[ 0.8151000142097473, 0.6037999987602234, 0.3962000012397766, 0.6037999987602234, 1 ]
train_1112
[ "We study, for the first time, automated inference on criminality based solely on still face images.", "Via supervised machine learning, we build four classifiers (logistic regression, KNN, SVM, CNN) using facial images of 1856 real persons controlled for race, gender, age and facial expressions, nearly half of whom were convicted criminals, for discriminating between criminals and non-criminals.", "All four classifiers perform consistently well and produce evidence for the validity of automated face-induced inference on criminality, despite the historical controversy surrounding the topic.", "Also, we find some discriminating structural features for predicting criminality, such as lip curvature, eye inner corner distance, and the so-called nose-mouth angle.", "Above all, the most important discovery of this research is that criminal and non-criminal face images populate two quite distinctive manifolds.", "The variation among criminal faces is significantly greater than that of the non-criminal faces.", "The two manifolds consisting of criminal and non-criminal faces appear to be concentric, with the non-criminal manifold lying in the kernel with a smaller span, exhibiting a law of normality for faces of non-criminals.", "In other words, the faces of general law-biding public have a greater degree of resemblance compared with the faces of criminals, or criminals have a higher degree of dissimilarity in facial appearance than normal people." ]
[ 0, 1, 0, 4, 4, 1, 4, 4 ]
[ 1, 0.4571000039577484, 0.542900025844574, 0.22859999537467957, 0.2962999939918518, 0.4571000039577484, 0.4571000039577484, 0.685699999332428 ]
train_1113
[ "This paper presents the design of a lightweight robot arm intended for safe physical human-robot interaction.", "The robot arm design combines tendon actuation with elasticity in the tendons to achieve a significant reduction in mass and passive compliant behavior.", "The use of elastic tendons in all joints in order to gain maximum safety and performance properties, however, results in a significant increase of the model complexity with oscillatory behavior and kinematic coupling of the joint equilibrium positions.", "Therefore, special effort needs to be made to model the robot arm dynamics, which is an essential basis for model-based algorithms utilizing and fully exploiting the particular properties of the robot arm.", "This paper therefore derives the full dynamics model of the robot arm with focus on the nonlinear elastic tendon actuators, the kinematic tendon coupling, and modeling complexity reduction by reflecting all model parameters to the joint space.", "The resulting model is validated by comparing the identified simulation model with experimental data of an application-related pick-and-place trajectory and a trajectory with undamped oscillating motions of the robot arm." ]
[ 0, 0, 1, 1, 1, 4 ]
[ 0.6388999819755554, 0.7857000231742859, 0.6111000180244446, 0.41670000553131104, 0.6111000180244446, 0.7778000235557556 ]
train_1114
[ "Linear algebra algorithms are fundamental to many computing applications.", "Modern GPUs are suited for many general purpose processing tasks and have emerged as inexpensive high performance co-processors due to their tremendous computing power.", "In this paper, we present the implementation of singular value decomposition (SVD) of a dense matrix on GPU using the CUDA programming model.", "SVD is implemented using the twin steps of bidiagonalization followed by diagonalization.", "It has not been implemented on the GPU before.", "Bidiagonalization is implemented using a series of Householder transformations which map well to BLAS operations.", "Diagonalization is performed by applying the implicitly shifted QR algorithm.", "Our complete SVD implementation outperforms the MATLAB and Intel ®Math Kernel Library (MKL) LAPACK implementation significantly on the CPU.", "We show a speedup of upto 60 over the MATLAB implementation and upto 8 over the Intel MKL implementation on a Intel Dual Core 2.66GHz PC on NVIDIA GTX 280 for large matrices.", "We also give results for very large matrices on NVIDIA Tesla S1070." ]
[ 0, 0, 1, 1, 1, 1, 1, 1, 4, 4 ]
[ 0.5758000016212463, 0.5758000016212463, 0.6363999843597412, 0.8181999921798706, 0.5454999804496765, 1, 0.6363999843597412, 0.3635999858379364, 0.8181999921798706, 0.7778000235557556 ]
train_1115
[ "The presence of gender stereotypes in many aspects of society is a well-known phenomenon.", "In this paper, we focus on studying such stereotypes and bias in Hindi movie industry (Bollywood).", "We analyze movie plots and posters for all movies released since 1970.", "The gender bias is detected by semantic modeling of plots at inter-sentence and intrasentence level.", "Different features like occupation, introduction of cast in text, associated actions and descriptions are captured to show the pervasiveness of gender bias and stereotype in movies.", "We derive a semantic graph and compute centrality of each character and observe similar bias there.", "We also show that such bias is not applicable for movie posters where females get equal importance even though their character has little or no impact on the movie plot.", "Furthermore, we explore the movie trailers to estimate on-screen time for males and females and also study the portrayal of emotions by gender in them.", "The silver lining is that our system was able to identify 30 movies over last 3 years where such stereotypes were broken." ]
[ 0, 2, 1, 1, 1, 1, 1, 1, 4 ]
[ 0.7894999980926514, 0.6053000092506409, 0.39469999074935913, 0.39469999074935913, 0.39469999074935913, 0.6053000092506409, 0.5, 0.39469999074935913, 0.6053000092506409 ]
train_1116
[ "Herewe propose a real-timemethod for low-drift odometry andmapping using rangemeasurements from a 3D laser scanner moving in 6-DOF.", "The problem is hard because the range measurements are received at different times, and errors in motion estimation (especially without an external reference such asGPS) causemis-registration of the resulting point cloud.", "To date, coherent 3D maps have been built by off-line batch methods, often using loop closure to correct for drift over time.", "Our method achieves both low-drift in motion estimation and low-computational complexity.", "The key idea that makes this level of performance possible is the division of the complex problem of Simultaneous Localization andMapping, which seeks to optimize a large number of variables simultaneously, into two algorithms.", "One algorithm performs odometry at a high-frequency but at low fidelity to estimate velocity of the laser scanner.", "Although not necessary, if an IMU is available, it can provide a motion prior and mitigate for gross, high-frequency motion.", "A second algorithm runs at an order of magnitude lower frequency for fine matching and registration of the point cloud.", "Combination of the two algorithms allows map creation in real-time.", "Our method has been evaluated by indoor and outdoor experiments as well as the KITTI odometry benchmark." ]
[ 0, 0, 0, 1, 1, 4, 1, 4, 4, 4 ]
[ 0.8285999894142151, 1, 0.428600013256073, 0.800000011920929, 0.771399974822998, 0.6000000238418579, 0.628600001335144, 0.4000000059604645, 0.2856999933719635, 0.628600001335144 ]
train_1117
[ "Streaming music services represent the music industry’s greatest prospective source of revenue and are well established among consumers.", "This paper presents a theory of a streaming music business model consisting of two types of services provided by a monopolist.", "The first service, which offers access free of charge, is of low quality and financed by advertising.", "The second service charges its users and is of high quality.", "The analysis demonstrates that if users are highly tolerant of commercials, the monopolist benefits from advertising funding and hence charges a high price to users of the fee-based service to boost demand for the advertising supported service.", "The analysis addresses the welfare consequences of such a business model and shows it is an effective policy for combating digital piracy.", "2013 Elsevier B.V. All rights reserved." ]
[ 0, 0, 1, 1, 4, 4, 3 ]
[ 1, 0.5896999835968018, 0.6154000163078308, 1, 0.6154000163078308, 0.41029998660087585, 0.7949000000953674 ]
train_1118
[ "In this paper, we present an algorithm to estimate a signal from its modified short-time Fourier transform (STFT).", "This algorithm is computationally simple and is obtained by minimizing the mean squared error between the STFT of the estimated signal and the modified STFT.", "Using this algorithm, we also develop an iterative algorithm to estimate a signal from its modified STFT magnitude.", "The iterative algorithm is shown to decrease, in each iteration, the mean squared error between the STFT magnitude of the estimated signal and the modified STFT magnitude.", "The major computation involved in the iterative algorithm is the discrete Fourier transform (DFT) computation, and the algorithm appears to be real-time implementable with current hardware technology.", "The algorithm developed in this paper has been applied to the time-scale modification of speech.", "The resulting system generates very high-quality speech, and appears to be better in performancc than any existing method." ]
[ 1, 1, 1, 4, 0, 0, 4 ]
[ 0.44119998812675476, 0.5881999731063843, 0.5587999820709229, 0.3824000060558319, 0.41179999709129333, 0.5587999820709229, 0.5881999731063843 ]
train_1119
[ "Behavioral economics tells us that emotions can profoundly affect individual behavior and decision-making.", "Does this also apply to societies at large, i.e. can societies experience mood states that affect their collective decision making?", "By extension is the public mood correlated or even predictive of economic indicators?", "Here we investigate whether measurements of collective mood states derived from large-scale Twitter feeds are correlated to the value of the Dow Jones Industrial Average (DJIA) over time.", "We analyze the text content of daily Twitter feeds by two mood tracking tools, namely OpinionFinder that measures positive vs. negative mood and Google-Profile of Mood States (GPOMS) that measures mood in terms of 6 dimensions (Calm, Alert, Sure, Vital, Kind, and Happy).", "We cross-validate the resulting mood time series by comparing their ability to detect the public’s response to the presidential election and Thanksgiving day in 2008.", "A Granger causality analysis and a Self-Organizing Fuzzy Neural Network are then used to investigate the hypothesis that public mood states, as measured by the OpinionFinder and GPOMS mood time series, are predictive of changes in DJIA closing values.", "Our results indicate that the accuracy of DJIA predictions can be significantly improved by the inclusion of specific public mood dimensions but not others.", "We find an accuracy of 87.6% in predicting the daily up and down changes in the closing values of the DJIA and a reduction of the Mean Average Percentage Error by more than 6%." ]
[ 0, 0, 0, 2, 1, 1, 1, 4, 4 ]
[ 0.800000011920929, 0.8285999894142151, 0.628600001335144, 0.628600001335144, 0.8285999894142151, 0.6571000218391418, 0.6000000238418579, 0.4000000059604645, 0.628600001335144 ]
train_1120
[ "Graphical interface use involves schemata operations that range from transfer to induction.", "The former apply existing knowledge, such as prior schemata, and are effortless, preconscious and intuitive.", "The latter, which consist in constructing new schemata, are resource-consuming and thus detrimental to intuitive use (IV).", "A quantitative method is proposed to manipulate and screen schemata operations at the level of an interface's states and features.", "Relevance for the design cycle of innovative interfaces is critically reviewed, and integration with existing intuitive-use design frameworks is proposed.", "These considerations are built upon instructional design studies suggesting that assessment should precede and inform the application of design techniques geared toward IV." ]
[ 0, 0, 2, 1, 1, 4 ]
[ 0.833299994468689, 0.6000000238418579, 0.6000000238418579, 1, 0.6000000238418579, 0.766700029373169 ]
train_1121
[ "We present a new state-of-the-art approach for face detection.", "The key idea is to combine face alignment with detection, observing that aligned face shapes provide better features for face classification.", "To make this combination more effective, our approach learns the two tasks jointly in the same cascade framework, by exploiting recent advances in face alignment.", "Such joint learning greatly enhances the capability of cascade detection and still retains its realtime performance.", "Extensive experiments show that our approach achieves the best accuracy on challenging datasets, where all existing solutions are either inaccurate or too slow." ]
[ 0, 2, 1, 1, 4 ]
[ 0.421099990606308, 0.8158000111579895, 0.7894999980926514, 0.6053000092506409, 0.6053000092506409 ]
train_1122
[ "Image forensics has now raised the anxiety of justice as increasing cases of abusing tampered images in newspapers and court for evidence are reported recently.", "With the goal of verifying image content authenticity, passive-blind image tampering detection is called for.", "More realistic open benchmark databases are also needed to assist the techniques.", "Recently, we collect a natural color image database with realistic tampering operations.", "The database is made publicly available for researchers to compare and evaluate their proposed tampering detection techniques.", "We call this database CASI-A Image Tampering Detection Evaluation Database.", "We describe the purpose, the design criterion, the organization and self-evaluation of this database in this paper." ]
[ 0, 0, 0, 1, 1, 4, 4 ]
[ 1, 0.631600022315979, 0.421099990606308, 0.8158000111579895, 0.6053000092506409, 0.6053000092506409, 1 ]
train_1123
[ "This edition is a translation of the book formerly published in French in 1995 (Les systèmes multi-agents:", "Vers une intelligence collective, Inter Editions, Paris.)", "Even now, it is still the main reference for the French research community in multi-agent systems (MAS).", "The book is intended to be both a state of the art text and an introduction for people who are interested in capturing the main ideas of MAS.", "It deals mainly with the theoretical background, antecedents and applications.", "I will present a summary of the main ideas and the points that the author highlights as novel features arising from the multi-agent approach to computer science.", "When some details are very well developed in the book, I will just refer to them, since they are mainly useful for people who actually want to apply the techniques." ]
[ 0, 0, 0, 0, 1, 2, 1 ]
[ 1, 0.7940999865531921, 0.7940999865531921, 0.7940999865531921, 0.5881999731063843, 0.4706000089645386, 0.5587999820709229 ]
train_1124
[ "Fog Computing extends the Cloud Computing paradigm to the edge of the network, thus enabling a new breed of applications and services.", "Defining characteristics of the Fog are: a) Low latency and location awareness; b) Wide-spread geographical distribution; c) Mobility; d) Very large number of nodes, e) Predominant role of wireless access, f) Strong presence of streaming and real time applications, g) Heterogeneity.", "In this paper we argue that the above characteristics make the Fog the appropriate platform for a number of critical Internet of Things (IoT) services and applications, namely, Connected Vehicle, Smart Grid, Smart Cities, and, in general, Wireless Sensors and Actuators Networks (WSANs)." ]
[ 0, 4, 4 ]
[ 0.7742000222206116, 0.4839000105857849, 0.6773999929428101 ]
train_1125
[ "We study the phenomenon of business ecosystems in which a platform firm orchestrates the functioning of the ecosystem by providing a platform and setting the rules for other complementor firms to participate in it.", "We develop a theoretical framework to explain how the structural and evolutionary features of the ecosystem may shape the extent to which participating complementor firms can sustain their superior performance.", "The structural feature, which we refer to as ecosystem complexity, is a function of the number of unique components or subsystems that interact with the complementor’s product.", "We incorporate the evolutionary features by considering the role of generational transitions initiated by platform firms over time as well as the role of complementors’ ecosystem-specific experience.", "Evidence from Apple’s iOS and Google’s Android smartphone ecosystems supports our arguments that higher ecosystem complexity helps app developers sustain their superior performance, and that this effect is stronger for more experienced firms.", "In contrast, platform transitions initiated by Apple and Google make it more difficult for app developers to sustain their performance superiority, and that this effect is exacerbated by the extent of ecosystem complexity.", "The study offers a novel perspective on how the performance of complementor firms in business ecosystems may be shaped by the rules and actions of the central platform firms." ]
[ 0, 1, 0, 1, 2, 4, 4 ]
[ 0.6215999722480774, 0.5676000118255615, 0.3783999979496002, 0.7838000059127808, 0.3783999979496002, 0.40540000796318054, 0.4323999881744385 ]
train_1126
[ "Since emotions play an important role in the daily life of human beings, the need and importance of automatic emotion recognition has grown with increasing role of human computer interface applications.", "Emotion recognition could be done from the text, speech, facial expression or gesture.", "In this paper, we concentrate on recognition of “inner” emotions from electroencephalogram (EEG) signals.", "We propose real-time fractal dimension based algorithm of quantification of basic emotions using Arousal-Valence emotion model.", "Two emotion induction experiments with music stimuli and sound stimuli from International Affective Digitized Sounds (IADS) database were proposed and implemented.", "Finally, the real-time algorithm was proposed, implemented and tested to recognize six emotions such as fear, frustrated, sad, happy, pleasant and satisfied.", "Real-time applications were proposed and implemented in 3D virtual environments.", "The user emotions are recognized and visualized in real time on his/her avatar adding one more so-called “emotion dimension” to human computer interfaces.", "An EEGenabled music therapy site was proposed and implemented.", "The music played to the patients helps them deal with problems such as pain and depression." ]
[ 0, 0, 2, 1, 1, 1, 1, 4, 1, 1 ]
[ 1, 1, 1, 0.8205000162124634, 0.6154000163078308, 0.5896999835968018, 0.5896999835968018, 0.6154000163078308, 0.5896999835968018, 0.5896999835968018 ]
train_1127
[ "Question classification is very important for question answering.", "This paper presents our research work on automatic question classification through machine learning approaches.", "We have experimented with five machine learning algorithms: Nearest Neighbors (NN), Naive Bayes (NB), Decision Tree (DT), Sparse Network of Winnows (SNoW), and Support Vector Machines (SVM) using two kinds of features: bag-of-words and bag-of-ngrams.", "The experiment results show that with only surface text features the SVM outperforms the other four methods for this task.", "Further, we propose to use a special kernel function called the tree kernel to enable the SVM to take advantage of the syntactic structures of questions.", "We describe how the tree kernel can be computed efficiently by dynamic programming.", "The performance of our approach is promising, when tested on the questions from the TREC QA track." ]
[ 0, 0, 0, 2, 2, 1, 4 ]
[ 1, 0.6215999722480774, 0.40540000796318054, 0.40540000796318054, 0.5, 0.5171999931335449, 0.5946000218391418 ]
train_1128
[ "In real-world face detection, large visual variations, such as those due to pose, expression, and lighting, demand an advanced discriminative model to accurately differentiate faces from the backgrounds.", "Consequently, effective models for the problem tend to be computationally prohibitive.", "To address these two conflicting challenges, we propose a cascade architecture built on convolutional neural networks (CNNs) with very powerful discriminative capability, while maintaining high performance.", "The proposed CNN cascade operates at multiple resolutions, quickly rejects the background regions in the fast low resolution stages, and carefully evaluates a small number of challenging candidates in the last high resolution stage.", "To improve localization effectiveness, and reduce the number of candidates at later stages, we introduce a CNN-based calibration stage after each of the detection stages in the cascade.", "The output of each calibration stage is used to adjust the detection window position for input to the subsequent stage.", "The proposed method runs at 14 FPS on a single CPU core for VGA-resolution images and 100 FPS using a GPU, and achieves state-of-the-art detection performance on two public face detection benchmarks." ]
[ 0, 0, 0, 1, 1, 1, 4 ]
[ 0.7949000000953674, 1, 0.41029998660087585, 0.7949000000953674, 0.7949000000953674, 0.5896999835968018, 0.3846000134944916 ]
train_1129
[ "Gender classification is a fundamental and important application in computer vision, and it has become a research hotspot.", "Real-world applications require gender classification in unconstrained conditions where traditional methods are not appropriate.", "This paper proposes a Deep Convolutional Neural Network for feature extraction together with fully-connected layers for metric learning.", "A Siamese network is built for similarity measuring to promote the performance of classification.", "Extensive experiments on several databases demonstrate that a significant improvement can be obtained for gender classification tasks in both constrained and unconstrained conditions." ]
[ 0, 0, 2, 2, 4 ]
[ 0.8158000111579895, 0.8158000111579895, 0.7894999980926514, 0.5788999795913696, 0.6053000092506409 ]
train_1130
[ "Children and adolescents now communicate online to form and/or maintain relationships with friends, family, and strangers.", "Relationships in \"real life\" are important for children's and adolescents' psychosocial development; however, they can be difficult for those who experience feelings of loneliness and/or social anxiety.", "The aim of this study was to investigate differences in usage of online communication patterns between children and adolescents with and without self-reported loneliness and social anxiety.", "Six hundred twenty-six students ages 10 to 16 years completed a survey on the amount of time they spent communicating online, the topics they discussed, the partners they engaged with, and their purposes for communicating over the Internet.", "Participants were administered a shortened version of the UCLA Loneliness Scale and an abbreviated subscale of the Social Anxiety Scale for Adolescents (SAS-A).", "Additionally, age and gender differences in usage of the online communication patterns were examined across the entire sample.", "Findings revealed that children and adolescents who self-reported being lonely communicated online significantly more frequently about personal and intimate topics than did those who did not self-report being lonely.", "The former were motivated to use online communication significantly more frequently to compensate for their weaker social skills to meet new people.", "Results suggest that Internet usage allows them to fulfill critical needs of social interactions, self-disclosure, and identity exploration.", "Future research, however, should explore whether or not the benefits derived from online communication may also facilitate lonely children's and adolescents' offline social relationships." ]
[ 0, 0, 2, 1, 1, 1, 4, 4, 4, 4 ]
[ 1, 1, 0.833299994468689, 0.6388999819755554, 0.833299994468689, 0.5357000231742859, 0.7778000235557556, 1, 0.833299994468689, 0.3610999882221222 ]
train_1131
[ "Qualitative research is often associated with interpretivism, but alternatives do exist.", "Besides critical research and sometimes positivism, qualitative research in information systems can be performed following a paradigm of pragmatism.", "This paradigm is associated with action, intervention and constructive knowledge.", "This paper has picked out interpretivism and pragmatism as two possible and important research paradigms for qualitative research in information systems.", "It clarifies each paradigm in an ideal-typical fashion and then conducts a comparison revealing commonalities and differences.", "The possibilities of combining pragmatism and interpretivism in qualitative research in information systems are analysed.", "A research case that combines interpretivism and pragmatism is used for illustration.", "The paper thus contributes to a discussion about different paradigms and methods for qualitative research in information systems." ]
[ 0, 0, 0, 2, 1, 1, 1, 4 ]
[ 1, 0.800000011920929, 0.6000000238418579, 0.4000000059604645, 0.800000011920929, 0.800000011920929, 0.4000000059604645, 0.4000000059604645 ]
train_1132
[ "Within the past three years, several new AI textbooks have been published, all written by well-known researchers (Dean, Allen, and Aloiminos 1995; Russell and Norvig 1995; Shoham 1994; Ginsberg 1993).", "Thus, it is not surprising that the authors of each of these textbooks have sought a way to distinguish their own book from the rest.", "The hook for Stuart Russell and Peter Norvig's new textbook, Artificial Intelligence: A Modern Approach, is indicated on the book's jacket, which proclaims it to be 'the intelligent agent book.'", "Throughout the book, attention is given to the question of how individual AI algorithms might be incorporated into a larger agent that interacts with its environment.", "I've been teaching from the Russell and Norvig textbook for the past two years, and I think it's a terrific book; however, I think its merit is more or less independent of its identity as the intelligent-agent book." ]
[ 0, 1, 1, 1, 4 ]
[ 0.7894999980926514, 0.39469999074935913, 0.421099990606308, 0.631600022315979, 0.6053000092506409 ]
train_1133
[ "In this work we describe a Convolutional Neural Network (CNN) to accurately predict image quality without a reference image.", "Taking image patches as input, the CNN works in the spatial domain without using hand-crafted features that are employed by most previous methods.", "The network consists of one convolutional layer with max and min pooling, two fully connected layers and an output node.", "Within the network structure, feature learning and regression are integrated into one optimization process, which leads to a more effective model for estimating image quality.", "This approach achieves state of the art performance on the LIVE dataset and shows excellent generalization ability in cross dataset experiments.", "Further experiments on images with local distortions demonstrate the local quality estimation ability of our CNN, which is rarely reported in previous literature." ]
[ 0, 0, 2, 2, 1, 4 ]
[ 0.8158000111579895, 1, 0.39469999074935913, 0.39469999074935913, 0.5788999795913696, 0.7894999980926514 ]
train_1134
[ "In this paper we explore the topic of using metaphors and analogies in teaching algorithms.", "We argue their importance in the teaching process.", "We present a selection of metaphors we successfully used when teaching algorithms to secondary school students.", "We also discuss the suitability of several commonly used metaphors, and in several cases we show significant weaknesses of these metaphors." ]
[ 0, 0, 1, 1 ]
[ 0.7949000000953674, 0.5896999835968018, 0.5160999894142151, 0.41029998660087585 ]
train_1135
[ "Mobile communication technologies such as Bluetooth are becoming ubiquitous, but they must provide satisfactory levels of security and privacy.", "Concerns about Bluetooth device security have led the specification of the “non-discoverable” mode, which prevents devices from being listed during a Bluetooth device search process.", "However, a nondiscoverable Bluetooth device is visible to devices that know its address or can discover its address.", "This paper discusses the detection of non-discoverable Bluetooth devices using an enhanced brute force search attack.", "Our results indicate that the average time to attack a non-discoverable Bluetooth device using multiple search devices and condensed packet timing can be reduced to well under 24 hours." ]
[ 0, 0, 0, 2, 4 ]
[ 0.7838000059127808, 0.5676000118255615, 0.7838000059127808, 0.7838000059127808, 1 ]
train_1136
[ "The design of software has been a focus of software engineering research since the field's beginning.", "This paper explores key aspects of this research focus and shows why design will remain a principal focus.", "The intrinsic elements of software design, both process and product, are discussed: concept formation, use of experience, and means for representation, reasoning, and directing the design activity.", "Design is presented as being an activity engaged by a wide range of stakeholders, acting throughout most of a system's lifecycle, making a set of key choices which constitute the application's architecture.", "Directions for design research are outlined, including: (a) drawing lessons, inspiration, and techniques from design fields outside of computer science, (b) emphasizing the design of application \"character\" (functionality and style) as well as the application's structure, and (c) expanding the notion of software to encompass the design of additional kinds of intangible complex artifacts." ]
[ 0, 2, 2, 1, 1 ]
[ 1, 0.800000011920929, 0.428600013256073, 0.6000000238418579, 0.571399986743927 ]
train_1137
[ "Automatic access control systems (ACS) based on the human biometrics or physical tokens are widely employed in public and private areas.", "Yet these systems, in their conventional forms, are restricted to active interaction from the users.", "In scenarios where users are not cooperating with the system, these systems are challenged.", "Failure in cooperation with the biometric systems might be intentional or because the users are incapable of handling the interaction procedure with the biometric system or simply forget to cooperate with it, due to for example, illness like dementia.", "This work introduces a challenging bimodal database, including face and hand information of the users when they approach a door to open it by its handle in a noncooperative context.", "We have defined two (an easy and a challenging) protocols on how to use the database.", "We have reported results on many baseline methods, including deep learning techniques as well as conventional methods on the database.", "The obtained results show the merit of the proposed database and the challenging nature of access control with non-cooperative users." ]
[ 0, 0, 0, 0, 2, 1, 4, 4 ]
[ 0.5968999862670898, 0.7828999757766724, 0.7828999757766724, 0.5968999862670898, 0.3797999918460846, 0.5968999862670898, 0.40310001373291016, 0.5659000277519226 ]
train_1138
[ "Organizations today face shortages of IT personnel.", "We investigated workplace factors in one state government in hope of identifying factors that influence perceived organizational support (POS) within an IT work environment.", "A combination of job characteristics (challenging job and perceived workload), job stressors (work exhaustion, role conflict, and role ambiguity), and the organization’s discretionary actions (pay-for-performance and mentoring opportunities) were measured and hierarchical regression was used to determine the relationships.", "Four control variables were also included (age, gender, organizational tenure, and professional versus administrator status).", "Role ambiguity, role conflict, work exhaustion, career mentoring, and pay-for-performance together explained 62% of the variance in the IT employees’ POS.", "Career mentoring and role ambiguity explained most of the variance.", "2008 Elsevier B.V. All rights reserved." ]
[ 0, 2, 1, 1, 4, 4, 3 ]
[ 1, 0.421099990606308, 1, 1, 0.6053000092506409, 0.7894999980926514, 1 ]
train_1139
[ "We introduce new online and batch algorithms that are robust to data with missing features, a situation that arises in many practical applications.", "In the online setup, we allow for the comparison hypothesis to change as a function of the subset of features that is observed on any given round, extending the standard setting where the comparison hypothesis is fixed throughout.", "In the batch setup, we present a convex relaxation of a non-convex problem to jointly estimate an imputation function, used to fill in the values of missing features, along with the classification hypothesis.", "We prove regret bounds in the online setting and Rademacher complexity bounds for the batch i.i.d.", "setting.", "The algorithms are tested on several UCI datasets, showing superior performance over baseline imputation methods." ]
[ 1, 2, 1, 1, 3, 1 ]
[ 0.39410001039505005, 0.5496000051498413, 0.7748000025749207, 0.41819998621940613, 0.6193000078201294, 0.5544999837875366 ]
train_1140
[ "Automatic citation recommendation can be very useful for authoring a paper and is an AI-complete problem due to the challenge of bridging the semantic gap between citation context and the cited paper.", "It is not always easy for knowledgeable researchers to give an accurate citation context for a cited paper or to find the right paper to cite given context.", "To help with this problem, we propose a novel neural probabilistic model that jointly learns the semantic representations of citation contexts and cited papers.", "The probability of citing a paper given a citation context is estimated by training a multi-layer neural network.", "We implement and evaluate our model on the entire CiteSeer dataset, which at the time of this work consists of 10,760,318 citation contexts from 1,017,457 papers.", "We show that the proposed model significantly outperforms other stateof-the-art models in recall, MAP, MRR, and nDCG." ]
[ 0, 0, 2, 2, 1, 4 ]
[ 0.7894999980926514, 0.7894999980926514, 0.7894999980926514, 0.421099990606308, 0.5788999795913696, 0.5788999795913696 ]
train_1141
[ "Recent results in monocular visual-inertial navigation (VIN) have shown that optimization-based approaches outperform filtering methods in terms of accuracy due to their capability to relinearize past states.", "However, the improvement comes at the cost of increased computational complexity.", "In this paper, we address this issue by preintegrating inertial measurements between selected keyframes.", "The preintegration allows us to accurately summarize hundreds of inertial measurements into a single relative motion constraint.", "Our first contribution is a preintegration theory that properly addresses the manifold structure of the rotation group and carefully deals with uncertainty propagation.", "The measurements are integrated in a local frame, which eliminates the need to repeat the integration when the linearization point changes while leaving the opportunity for belated bias corrections.", "The second contribution is to show that the preintegrated IMU model can be seamlessly integrated in a visual-inertial pipeline under the unifying framework of factor graphs.", "This enables the use of a structureless model for visual measurements, further accelerating the computation.", "The third contribution is an extensive evaluation of our monocular VIN pipeline: experimental results confirm that our system is very fast and demonstrates superior accuracy with respect to competitive state-of-the-art filtering and optimization algorithms, including off-the-shelf systems such as Google Tango [1]." ]
[ 0, 0, 1, 1, 1, 1, 1, 1, 4 ]
[ 0.5641999840736389, 0.6265000104904175, 0.5641999840736389, 0.5641999840736389, 0.6265000104904175, 0.6265000104904175, 0.6265000104904175, 0.6265000104904175, 0.7821000218391418 ]
train_1142
[ "How could the body influence our thinking when it seems obvious that the brain controls the body?", "In How the Body Shapes the Way We Think, Rolf Pfeifer and Josh Bongard demonstrate that thought is not independent of the body but is tightly constrained, and at the same time enabled, by it.", "They argue that the kinds of thoughts we are capable of have their foundation in our embodiment—in our morphology and the material properties of our bodies.", "This crucial notion of embodiment underlies fundamental changes in the field of artificial intelligence over the past two decades, and Pfeifer and Bongard use the basic methodology of artificial intelligence—“understanding by building”—to describe their insights.", "If we understand how to design and build intelligent systems, they reason, we will better understand intelligence in general.", "In accessible, nontechnical language, and using many examples, they introduce the basic concepts by building on recent developments in robotics, biology, neuroscience, and psychology to outline a possible theory of intelligence.", "They illustrate applications of such a theory in ubiquitous computing, business and management, and the psychology of human memory.", "Embodied intelligence, as described by Pfeifer and Bongard, has important implications for our understanding of both natural and artificial intelligence.", "Rolf Pfeifer is Professor of Computer Science and Director of the Artificial Intelligence Laboratory in the Department of Informatics at the University of Zurich.", "He is the author of Understanding Intelligence (MIT Press, 1999)." ]
[ 0, 0, 0, 1, 2, 2, 1, 1, 4, 4 ]
[ 1, 0.800000011920929, 0.6000000238418579, 0.4000000059604645, 0.4000000059604645, 0.4000000059604645, 0.5, 0.4000000059604645, 0.20000000298023224, 0.4000000059604645 ]
train_1143
[ "This paper integrates and extends research on e-commerce in the developing world.", "We use three categories of feedback systems–economic, sociopolitical and cognitive—to offer a simple model of e-commerce barriers in the developing world.", "We also examine characteristics of e-business models that can be successfully employed in developing countries.", "Then, we provide the case of an e-business model followed by a Nepal-based multiple international award winning online provider.", "This paper‘s theoretical contribution is to explain the ̳hows‘ and ̳whys‘ of e-commerce in developing countries and to identify clear contexts and attendant mechanism." ]
[ 2, 1, 1, 1, 4 ]
[ 0.6053000092506409, 0.5788999795913696, 0.5788999795913696, 0.5788999795913696, 0.39469999074935913 ]
train_1144
[ "This paper proposes a novel nature-inspired meta-heuristic optimization algorithm, called Whale Optimization Algorithm (WOA), which mimics the social behavior of humpback whales.", "The algorithm is inspired by the bubble-net hunting strategy.", "WOA is tested with 29 mathematical optimization problems and 6 structural design problems.", "Optimization results prove that the WOA algorithm is very competitive compared to the state-of-art meta-heuristic algorithms as well as conventional methods.", "The source codes of the WOA algorithm are publicly available at http://www.alimirjalili.com/WOA.html © 2016 Elsevier Ltd.", "All rights reserved." ]
[ 2, 1, 1, 4, 4, 3 ]
[ 0.6176000237464905, 0.44119998812675476, 0.6176000237464905, 1, 0.4706000089645386, 0.7646999955177307 ]
train_1145
[ "A new coded modulation scheme is proposed.", "At the transmitter, the concatenation of a distribution matcher and a systematic binary encoder performs probabilistic signal shaping and channel coding.", "At the receiver, the output of a bitwise demapper is fed to a binary decoder.", "No iterative demapping is performed.", "Rate adaption is achieved by adjusting the input distribution and the transmission power.", "The scheme is applied to bipolar amplitudeshift keying (ASK) constellations with equidistant signal points and it is directly applicable to two-dimensional quadrature amplitude modulation (QAM).", "The scheme is implemented by using the DVB-S2 low-density parity-check (LDPC) codes.", "At a frame error rate of 10-3, the new scheme operates within less than 1.1 dB of the AWGN capacity 1/2 log2(1 + SNR) at any spectral efficiency between 1 and 5 bits/s/Hz by using only 5 modes, i.e., 4-ASK with code rate 2/3, 8-ASK with 3/4, 16-ASK and 32-ASK with 5/6, and 64-ASK with 9/10." ]
[ 2, 1, 1, 1, 1, 1, 1, 4 ]
[ 0.7940999865531921, 0.7940999865531921, 0.7940999865531921, 0.7940999865531921, 0.7940999865531921, 1, 0.6176000237464905, 0.5881999731063843 ]
train_1146
[ "Since the effective and efficient system of water quality monitoring (WQM) are critical implementation for the issue of polluted water globally, with increasing in the development of Wireless Sensor Network (WSN) technology in the Internet of Things (IoT) environment, real time water quality monitoring is remotely monitored by means of real-time data acquisition, transmission and processing.", "This paper presents a reconfigurable smart sensor interface device for water quality monitoring system in an IoT environment.", "The smart WQM system consists of Field Programmable Gate Array (FPGA) design board, sensors, Zigbee based wireless communication module and personal computer (PC).", "The FPGA board is the core component of the proposed system and it is programmed in very high speed integrated circuit hardware description language (VHDL) and C programming language using Quartus II software and Qsys tool.", "The proposed WQM system collects the five parameters of water data such as water pH, water level, turbidity, carbon dioxide (CO2) on the surface of water and water temperature in parallel and in real time basis with high speed from multiple different sensor nodes." ]
[ 0, 2, 1, 1, 1 ]
[ 1, 0.39469999074935913, 1, 0.6053000092506409, 0.39469999074935913 ]
train_1147
[ "The usual recursive summation technique is just one of several ways of computing the sum of n floating point numbers.", "Five summation methods and their variations are analyzed here.", "The accuracy of the methods is compared using rounding error analysis and numerical experiments.", "Four of the methods are shown to be special cases of a general class of methods, and an error analysis is given for this class.", "No one method is uniformly more accurate than the others, but some guidelines are given on the choice of method in particular cases." ]
[ 0, 0, 1, 1, 4 ]
[ 0.6176000237464905, 0.41179999709129333, 0.3824000060558319, 0.3824000060558319, 0.6176000237464905 ]
train_1148
[ "Recently, convolutional neural networks (CNNs) have been shown to outperform the standard fully connected deep neural networks within the hybrid deep neural network / hidden Markov model (DNN/HMM) framework on the phone recognition task.", "In this paper, we extend the earlier basic form of the CNN and explore it in multiple ways.", "We first investigate several CNN architectures, including full and limited weight sharing, convolution along frequency and time axes, and stacking of several convolution layers.", "We then develop a novel weighted softmax pooling layer so that the size in the pooling layer can be automatically learned.", "Further, we evaluate the effect of CNN pretraining, which is achieved by using a convolutional version of the RBM.", "We show that all CNN architectures we have investigated outperform the earlier basic form of the DNN on both the phone recognition and large vocabulary speech recognition tasks.", "The architecture with limited weight sharing provides additional gains over the full weight sharing architecture.", "The softmax pooling layer performs as well as the best CNN with the manually tuned fixed-pooling size, and has a potential for further improvement.", "Finally, we show that CNN pretraining produces significantly better results on a large vocabulary speech recognition task." ]
[ 0, 0, 1, 1, 4, 2, 4, 4, 4 ]
[ 0.833299994468689, 0.7778000235557556, 0.6111000180244446, 0.7778000235557556, 0.33329999446868896, 0.44440001249313354, 0.22220000624656677, 0.733299970626831, 0.44440001249313354 ]
train_1149
[ "We propose a normative model of transactional negotiation in which cooperative and competitive behaviors wax and wane across four stages: relational positioning, identifying the problem, generating solutions, and reaching agreement.", "Based on a classic proposition of communicative flexibility in high-context cultures, we propose culture-specific dyadic movements within and across these stages.", "Our sample included 102 high-context dyads from Russia, Japan, Hong Kong, and Thailand; 89 low-context dyads from Germany, Israel, Sweden, and the United States; and 45 United States–Hong Kong and United States–Japan mixed-context dyads.", "Dyads negotiated a complex, 90-minute transaction with integrative potential.", "We audiotaped, transcribed, and coded their negotiations for sequences of information and influence behaviors.", "The unit of analysis was the action-response sequence.", "Results confirmed that the pattern of sequences varied across the four stages and the frequency of particular sequences varied with culture.", "We suggest that negotiators can use this model to manage the evolution and strategic focus of their negotiation, especially during the first two stages, when the use of influence-information sequences and reciprocal-information sequences generate the groundwork for joint gains." ]
[ 0, 0, 1, 1, 0, 1, 4, 4 ]
[ 0.40540000796318054, 0.40540000796318054, 0.5946000218391418, 0.4323999881744385, 0.40540000796318054, 0.40540000796318054, 0.7838000059127808, 0.7838000059127808 ]
train_1150
[ "In the last years, the spread of computers and the Internet caused a significant amount of documents to be available in digital format.", "Collecting them in digital repositories raised problems that go beyond simple acquisition issues, and cause the need to organize and classify them in order to improve the effectiveness and efficiency of the retrieval procedure.", "The success of such a process is tightly related to the ability of understanding the semantics of the document components and content.", "Since the obvious solution of manually creating and maintaining an updated index is clearly infeasible, due to the huge amount of data under consideration, there is a strong interest in methods that can provide solutions for automatically acquiring such a knowledge.", "This work presents a framework that intensively exploits intelligent techniques to support different tasks of automatic document processing from acquisition to indexing, from categorization to storing and retrieval.", "The prototypical version of the system DOMINUS is presented, whose main characteristic is the use of a Machine Learning Server, a suite of different inductive learning methods and systems, among which the more suitable for each specific document processing phase is chosen and applied.", "The core system is the incremental first-order logic learner INTHELEX.", "Thanks to incrementality, it can continuously update and refine the learned theories, dynamically extending its knowledge to handle even completely new classes of documents.", "Since DOMINUS is general and flexible, it can be embedded as a document management engine into many different Digital Library systems.", "Experiments in a real-world domain scenario, scientific conference management, confirmed the good performance of the proposed prototype." ]
[ 0, 0, 0, 0, 1, 1, 1, 1, 1, 4 ]
[ 1, 0.6388999819755554, 0.833299994468689, 0.6388999819755554, 0.583299994468689, 1, 0.583299994468689, 0.41670000553131104, 0.583299994468689, 0.833299994468689 ]
train_1151
[ "Purpose –", "This article seeks to provide a conceptual model that explains the complexity of an enterprise resource planning (ERP) system to general and project managers in a non-technical manner that is easily understood.", "Design/methodology/approach – The 4Ps business model serves as a starting-point to derive the ERP model because most managers are familiar with it and can therefore relate to it with ease.", "An ERP system is divided into four major components, namely, the software, the customer mindset, change management, and the flow of processes within it.", "A fifth component, methodology, encircles these four components to ensure that they are integrated and implemented in an organised manner.", "Findings – ERP is more than just software.", "Unless a clear understanding exists of the different components and their integration, ERP projects will continue to be plagued by failure.", "This model is applicable to any ERP system as it is generic and vendor-independent and helps in determining the scope of an ERP project.", "Research limitations/implications – The suggested model is conceptual in nature and provides a holistic view of ERP.", "It does not attempt to provide a detailed, step-by-step approach for implementing an ERP system." ]
[ 3, 2, 1, 1, 1, 4, 4, 4, 4, 4 ]
[ 0.5788999795913696, 0.7894999980926514, 0.7894999980926514, 0.5788999795913696, 0.5788999795913696, 0.6053000092506409, 0.7894999980926514, 0.5788999795913696, 0.5788999795913696, 0.3684000074863434 ]
train_1152
[ "While commoditization is creating opportunities for customers of information technology services, it is creating new challenges for the service providers.", "Pricing strategies are one of the most important challenges and decisions for today's IT service providers.", "Pricing strategies for IT services have traditionally focused on covering costs, achieving desired margins and meeting the competition.", "These pricing schemes range from simple approaches, easily copied by competitors, to complex models with high management costs.", "In order to be successful in today's competitive business world, the service providers need to define their pricing strategies by considering the customer's perceived value from the service they receive rather than using traditional cost-based pricing strategies.", "This paper surveys literature on IT services pricing and presents a value-based approach to effectively price IT services." ]
[ 0, 0, 0, 0, 0, 4 ]
[ 1, 1, 0.6111000180244446, 0.6111000180244446, 0.6111000180244446, 0.3889000117778778 ]
train_1153
[ "We consider the problem of finding the best arm in a stochastic multi-armed bandit game.", "The regret of a forecaster is here defined by the gap between the mean reward of the optimal arm and the mean reward of the ultimately chosen arm.", "We propose a highly exploring UCB policy and a new algorithm based on successive rejects.", "We show that these algorithms are essentially optimal since their regret decreases exponentially at a rate which is, up to a logarithmic factor, the best possible.", "However, while the UCB policy needs the tuning of a parameter depending on the unobservable hardness of the task, the successive rejects policy benefits from being parameter-free, and also independent of the scaling of the rewards.", "As a by-product of our analysis, we show that identifying the best arm (when it is unique) requires a number of samples of order (up to a log(K) factor) ∑ i 1/∆ 2 i , where the sum is on the suboptimal arms and ∆i represents the difference between the mean reward of the best arm and the one of arm i. This generalizes the well-known fact that one needs of order of 1/∆ samples to differentiate the means of two distributions with gap ∆." ]
[ 0, 0, 2, 1, 4, 4 ]
[ 1, 1, 0.6388999819755554, 0.7778000235557556, 0.41670000553131104, 1 ]
train_1154
[ "Natural language sentence matching is a fundamental technology for a variety of tasks.", "Previous approaches either match sentences from a single direction or only apply single granular (wordby-word or sentence-by-sentence) matching.", "In this work, we propose a bilateral multi-perspective matching (BiMPM) model.", "Given two sentences P and Q, our model first encodes them with a BiLSTM encoder.", "Next, we match the two encoded sentences in two directions P against Q and Q against P .", "In each matching direction, each time step of one sentence is matched against all timesteps of the other sentence from multiple perspectives.", "Then, another BiLSTM layer is utilized to aggregate the matching results into a fixed-length matching vector.", "Finally, based on the matching vector, a decision is made through a fully connected layer.", "We evaluate our model on three tasks: paraphrase identification, natural language inference and answer sentence selection.", "Experimental results on standard benchmark datasets show that our model achieves the state-of-the-art performance on all tasks." ]
[ 0, 0, 2, 1, 1, 1, 1, 1, 4, 4 ]
[ 0.7894999980926514, 0.7894999980926514, 0.7894999980926514, 0.8158000111579895, 0.6053000092506409, 0.6053000092506409, 0.7894999980926514, 0.6053000092506409, 0.5788999795913696, 0.5788999795913696 ]
train_1155
[ "Learning Convolutional Neural Networks (CNN) is commonly carried out by plain supervised gradient descent.", "With sufficient training data, this leads to very competitive results for visual recognition tasks when starting from a random initialization.", "When the amount of labeled data is limited, CNNs reveal their strong dependence on large amounts of training data.", "However, recent results have shown that a well chosen optimization starting point can be beneficial for convergence to a good generalizing minimum.", "This starting point was mostly found using unsupervised feature learning techniques such as sparse coding or transfer learning from related recognition tasks.", "In this work, we compare these two approaches against a simple patch based initialization scheme and a random initialization of the weights.", "We show that pre-training helps to train CNNs from few samples and that the correct choice of the initialization scheme can push the network's performance by up to 41% compared to random initialization." ]
[ 0, 0, 0, 4, 1, 1, 4 ]
[ 1, 0.6053000092506409, 0.6053000092506409, 0.39469999074935913, 0.6053000092506409, 0.6053000092506409, 0.7894999980926514 ]
train_1156
[ "Novel data-driven and demand-driven computer architectures are under development in a large number of laboratories in the United States, Japan, and Europe.", "These computers are not based on the tradlUonal von Neumann organization; instead, they are attempts to identify the next generation of computer.", "Basmally, m data-driven (e.g., data-flow) computers the availability of operands triggers the execution of the operation to be performed on them, whereas in demand-driven (e.g, reduction) computers the reqmrement for a result triggers the operation that will generate it.", "Although there are these two distinct areas of research, each laboratory has developed its own mdlvxdual model of computation, stored program representation, and machine organization.", "Across this spectrum of designs there m, however, a significant sharing of concepts.", "The aim of this palaer m to identify the concepts and relationships that exist both within and between the two areas of research.", "It does thin by examlmng data-driven and demand-driven architecture at three levels, computation organizatmn, (stored) program organization, and machine organLzation.", "Finally, a survey of various novel computer architectures under development is given." ]
[ 0, 2, 1, 1, 1, 2, 4, 4 ]
[ 1, 0.428600013256073, 0.4000000059604645, 1, 0.8285999894142151, 0.6571000218391418, 0.37139999866485596, 0.6000000238418579 ]
train_1157
[ "Metric learning algorithms produce distance metrics that capture the important relationships among data.", "In this work we study the connection between metric learning and collaborative filtering.", "We propose Collaborative Metric Learning (CML) which learns a joint metric space to encode not only users’ preferences but also the user-user and itemitem similarity.", "The proposed algorithm outperforms stateof-the-art collaborative filtering algorithms on a wide range of recommendation tasks and uncovers the underlying spectrum of users’ fine-grained preferences.", "CML also achieves significant speedup for Top-K recommendation tasks using off-the-shelf, approximate nearest-neighbor search, with negligible accuracy reduction." ]
[ 0, 2, 2, 1, 4 ]
[ 0.7894999980926514, 1, 0.6053000092506409, 0.7894999980926514, 0.39469999074935913 ]
train_1158
[ "Facebook, as one of the most popular social networking sites among college students, provides a platform for people to manage others' impressions of them.", "People tend to present themselves in a favorable way on their Facebook profile.", "This research examines the impact of using Facebook on people's perceptions of others' lives.", "It is argued that those with deeper involvement with Facebook will have different perceptions of others than those less involved due to two reasons.", "First, Facebook users tend to base judgment on examples easily recalled (the availability heuristic).", "Second, Facebook users tend to attribute the positive content presented on Facebook to others' personality, rather than situational factors (correspondence bias), especially for those they do not know personally.", "Questionnaires, including items measuring years of using Facebook, time spent on Facebook each week, number of people listed as their Facebook \"friends,\" and perceptions about others' lives, were completed by 425 undergraduate students taking classes across various academic disciplines at a state university in Utah.", "Surveys were collected during regular class period, except for two online classes where surveys were submitted online.", "The multivariate analysis indicated that those who have used Facebook longer agreed more that others were happier, and agreed less that life is fair, and those spending more time on Facebook each week agreed more that others were happier and had better lives.", "Furthermore, those that included more people whom they did not personally know as their Facebook \"friends\" agreed more that others had better lives." ]
[ 0, 0, 0, 2, 0, 4, 1, 1, 4, 4 ]
[ 1, 1, 0.41670000553131104, 0.41670000553131104, 0.3610999882221222, 0.5171999931335449, 0.41670000553131104, 0.583299994468689, 0.3889000117778778, 0.6111000180244446 ]
train_1159
[ "This article presents a model for describing the architecture of software-intensive systems, based on the use of multiple, concurrent views.", "This use of multiple views allows to address separately the concerns of the various ‘stakeholders’ of the architecture: end-user, developers, systems engineers, project managers, etc., and to handle separately the functional and non functional requirements.", "Each of the five views is described, together with a notation to capture it.", "The views are designed using an architecture-centered, scenariodriven, iterative development process." ]
[ 1, 1, 1, 1 ]
[ 0.5630999803543091, 0.5630999803543091, 0.6116999983787537, 0.7670000195503235 ]
train_1160
[ "We use Reinforcement Learning (RL) to learn question-answering dialogue policies for a real-world application.", "We analyze a corpus of interactions of museum visitors with two virtual characters that serve as guides at the Museum of Science in Boston, in order to build a realistic model of user behavior when interacting with these characters.", "A simulated user is built based on this model and used for learning the dialogue policy of the virtual characters using RL.", "Our learned policy outperforms two baselines (including the original dialogue policy that was used for collecting the corpus) in a simulation setting." ]
[ 0, 0, 1, 4 ]
[ 0.6154000163078308, 0.41029998660087585, 0.6154000163078308, 0.6154000163078308 ]
train_1161
[ "Audio event recognition, the human-like ability to identify and relate sounds from audio, is a nascent problem in machine perception.", "Comparable problems such as object detection in images have reaped enormous benefits from comprehensive datasets - principally ImageNet.", "This paper describes the creation of Audio Set, a large-scale dataset of manually-annotated audio events that endeavors to bridge the gap in data availability between image and audio research.", "Using a carefully structured hierarchical ontology of 632 audio classes guided by the literature and manual curation, we collect data from human labelers to probe the presence of specific audio classes in 10 second segments of YouTube videos.", "Segments are proposed for labeling using searches based on metadata, context (e.g., links), and content analysis.", "The result is a dataset of unprecedented breadth and size that will, we hope, substantially stimulate the development of high-performance audio event recognizers." ]
[ 0, 0, 1, 1, 1, 4 ]
[ 0.6053000092506409, 0.421099990606308, 0.6053000092506409, 0.8158000111579895, 0.7894999980926514, 0.7894999980926514 ]
train_1162
[ "This paper proposes an efficient active noise cancelling (ANC) circuit design for the in-ear headphones.", "We develop a hardware oriented Least Mean Square (LMS) adaptive algorithm, and design a modified high-performance feed-forward ANC architecture which only uses one microphone to effectively cancel broadband noise for the in-ear headphones.", "The proposed ANC circuit design has been successfully implemented through adopting the standard cell-based design flow based on the TSMC 90nm CMOS technology.", "Besides, the proposed design has been verified under versatile noisy scenarios for its real-time ANC performance by using a Field Programmable Gate Array (FPGA) platform.", "Experimental results show that the proposed high-performance circuit design can reduce disturbing noise of various frequency bands very well, and outperforms the existing works.", "The proposed design can attenuate the broadband pink noise between 300 Hz to 900 Hz, with a maximum performance of 18 dB. Moreover, the proposed design can achieve 406.5 k samples/sec data throughput rate at operating frequency of 50 MHz, at the costs of 111.7 k gates and power consumption of 4.47 mW." ]
[ 0, 1, 1, 1, 4, 4 ]
[ 0.7924000024795532, 0.41530001163482666, 0.8220000267028809, 0.6144000291824341, 1, 1 ]
train_1163
[ "While Instagram, the rising photo-sharing social networking service, has received increasing attention from scholars and practitioners, little is known about the social and psychological factors that lead consumers to become fanatics of this app.", "To provide a baseline understanding of Instagram users, the current study aims to uncover the structural dimensions of consumers' motives for using Instagram and to explore the relationships between identified motivations and key attitudinal and behavioral intention variables.", "A comprehensive survey was developed in which a total of 212 Instagram users evaluated their motivation, primary activities, use intention, and attitude regarding Instagram.", "The results suggest that Instagram users have five primary social and psychological motives: social interaction, archiving, self-expression, escapism, and peeking.", "The implications of this study's findings are discussed." ]
[ 0, 2, 1, 4, 4 ]
[ 1, 0.631600022315979, 0.631600022315979, 0.5788999795913696, 0.7894999980926514 ]
train_1164
[ "In order to characterize the transient dynamics of steam turbines subsections, in this paper, nonlinear mathematical models are first developed based on the energy balance, thermodynamic principles and semi-empirical equations.", "Then, the related parameters of developed models are either determined by empirical relations or they are adjusted by applying genetic algorithms (GA) based on experimental data obtained from a complete set of field experiments.", "In the intermediate and low-pressure turbines where, in the sub-cooled regions, steam variables deviate from prefect gas behavior, the thermodynamic characteristics are highly dependent on pressure and temperature of each region.", "Thus, nonlinear functions are developed to evaluate specific enthalpy and specific entropy at these stages of turbines.", "The parameters of proposed functions are individually adjusted for the operational range of each subsection by using genetic algorithms.", "Comparison between the responses of the overall turbine-generator model and the response of real plant indicates the accuracy and performance of the proposed models over wide range of operations.", "The simulation results show the validation of the developed model in term of more accurate and less deviation between the responses of the models and real system where errors of the proposed functions are less than 0.1% and the modeling error is less than 0.3%.", "2008 Elsevier B.V. All rights reserved." ]
[ 2, 1, 0, 1, 1, 4, 4, 4 ]
[ 0.6176000237464905, 0.44119998812675476, 0.6176000237464905, 0.6765000224113464, 0.44119998812675476, 0.44119998812675476, 0.6765000224113464, 0.5293999910354614 ]
train_1165
[ "The Internet has favored the growth of collaborative platforms where marketers and consumers interact to develop more engaging products and services.", "These platforms are usually centered in a specific brand/product and their members are linked by a shared admiration to that brand.", "This paper analyzes one of the most powerful online collaborative platforms, the free software (FS) case, which involves a lot of virtual communities developed around products such as Linux or Android, the new Google’s mobile operating system.", "Our purpose is to determine some of the main antecedents and consequences of the consumer involvement in this type of communities.", "Results have shown that satisfaction with a virtual community may increase the level of consumer participation in that community.", "At the same time, a greater identification with the virtual community may increase indirectly the consumer participation thanks to the enhancement of his/her satisfaction with the community.", "We have also found positive and significant effects of consumer identification and participation on the level of community promotion.", "Finally, positive and significant effects of consumer participation and satisfaction with the community on loyalty to the FS were also found.", "These findings allow us to conclude some interesting managerial implications.", "© 2010 Elsevier Ltd." ]
[ 0, 0, 4, 2, 4, 4, 4, 4, 4, 3 ]
[ 0.8485000133514404, 0.6363999843597412, 0.3635999858379364, 0.4544999897480011, 0.666700005531311, 0.6363999843597412, 0.6363999843597412, 0.6061000227928162, 0.7878999710083008, 0.7878999710083008 ]
train_1166
[ "We present DeepWalk, a novel approach for learning latent representations of vertices in a network.", "These latent representations encode social relations in a continuous vector space, which is easily exploited by statistical models.", "DeepWalk generalizes recent advancements in language modeling and unsupervised feature learning (or deep learning) from sequences of words to graphs.", "DeepWalk uses local information obtained from truncated random walks to learn latent representations by treating walks as the equivalent of sentences.", "We demonstrate DeepWalk's latent representations on several multi-label network classification tasks for social networks such as BlogCatalog, Flickr, and YouTube.", "Our results show that DeepWalk outperforms challenging baselines which are allowed a global view of the network, especially in the presence of missing information.", "DeepWalk's representations can provide F1 scores up to 10% higher than competing methods when labeled data is sparse.", "In some experiments, DeepWalk's representations are able to outperform all baseline methods while using 60% less training data.", "DeepWalk is also scalable.", "It is an online learning algorithm which builds useful incremental results, and is trivially parallelizable." ]
[ 0, 0, 1, 1, 1, 1, 1, 1, 1, 4 ]
[ 0.6075000166893005, 0.6075000166893005, 0.5794000029563904, 0.5888000130653381, 0.39250001311302185, 0.6168000102043152, 0.6168000102043152, 0.4205999970436096, 0.6075000166893005, 0.4205999970436096 ]
train_1167
[ "Sketch-based modeling strives to bring the ease and immediacy of drawing to the 3D world.", "However, while drawings are easy for humans to create, they are very challenging for computers to interpret due to their sparsity and ambiguity.", "We propose a data-driven approach that tackles this challenge by learning to reconstruct 3D shapes from one or more drawings.", "At the core of our approach is a deep convolutional neural network (CNN) that predicts occupancy of a voxel grid from a line drawing.", "This CNN provides an initial 3D reconstruction as soon as the user completes a single drawing of the desired shape.", "We complement this single-view network with an updater CNN that refines an existing prediction given a new drawing of the shape created from a novel viewpoint.", "A key advantage of our approach is that we can apply the updater iteratively to fuse information from an arbitrary number of viewpoints, without requiring explicit stroke correspondences between the drawings.", "We train both CNNs by rendering synthetic contour drawings from hand-modeled shape collections as well as from procedurally-generated abstract shapes.", "Finally, we integrate our CNNs in an interactive modeling system that allows users to seamlessly draw an object, rotate it to see its 3D reconstruction, and refine it by re-drawing from another vantage point using the 3D reconstruction as guidance." ]
[ 0, 0, 1, 1, 1, 1, 1, 1, 4 ]
[ 0.666700005531311, 0.833299994468689, 0.6111000180244446, 0.666700005531311, 0.666700005531311, 0.6111000180244446, 0.44440001249313354, 0.44440001249313354, 1 ]
train_1168
[ "The use of Social Network Sites (SNS) is increasing nowadays especially by the younger generations.", "The availability of SNS allows users to express their interests, feelings and share daily routine.", "Many researchers prove that using user-generated content (UGC) in a correct way may help determine people's mental health levels.", "Mining the UGC could help to predict the mental health levels and depression.", "Depression is a serious medical illness, which interferes most with the ability to work, study, eat, sleep and having fun.", "However, from the user profile in SNS, we can collect all the information that relates to person's mood, and negativism.", "In this research, our aim is to investigate how SNS user's posts can help classify users according to mental health levels.", "We propose a system that uses SNS as a source of data and screening tool to classify the user using artificial intelligence according to the UGC on SNS.", "We created a model that classify the UGC using two different classifiers: Support Vector Machine (SVM), and Naïve Bayes." ]
[ 0, 0, 2, 2, 1, 4, 2, 4, 4 ]
[ 1, 0.8055999875068665, 0.41670000553131104, 0.41670000553131104, 0.6111000180244446, 0.583299994468689, 0.8055999875068665, 0.3889000117778778, 0.583299994468689 ]
train_1169
[ "Understanding the behavior of source code written in an unfamiliar programming language is difficult.", "One way to aid understanding of difficult code is to add corresponding pseudo-code, which describes in detail the workings of the code in a natural language such as English.", "In spite of its usefulness, most source code does not have corresponding pseudo-code because it is tedious to create.", "This paper demonstrates a tool Pseudogen that makes it possible to automatically generate pseudo-code from source code using statistical machine translation (SMT).", "Pseudogen currently supports generation of English or Japanese pseudo-code from Python source code, and the SMT framework makes it easy for users to create new generators for their preferred source code/pseudo-code pairs." ]
[ 0, 1, 0, 1, 4 ]
[ 0.6485999822616577, 0.5676000118255615, 0.4323999881744385, 0.5946000218391418, 0.6215999722480774 ]
train_1170
[ "We have designed and presented a wireless sensor network monitoring and control system for aquaculture.", "The system can detect and control water quality parameters of temperature, dissolved oxygen content, pH value, and water level in real-time.", "The sensor nodes collect the water quality parameters and transmit them to the base station host computer through ZigBee wireless communication standard.", "The host computer is used for data analysis, processing and presentation using LabVIEW software platform.", "The water quality parameters will be sent to owners through short messages from the base station via the Global System for Mobile (GSM) module for notification.", "The experimental evaluation of the network performance metrics of quality of communication link, battery performance and data aggregation was presented.", "The experimental results show that the system has great prospect and can be used to operate in real world environment for optimum control of aquaculture" ]
[ 4, 0, 4, 1, 1, 4, 4 ]
[ 0.421099990606308, 0.3684000074863434, 0.421099990606308, 1, 0.7894999980926514, 0.6053000092506409, 1 ]
train_1171
[ "While the importance of customer loyalty has been recognized in marketing literature for at least three decades, the development and empirical validation of a customer loyalty model in a mobile commerce (m-commerce) context had not been addressed.", "The purpose of our study was to develop and validate such a customer loyalty model.", "Based on IS and marketing literature, a comprehensive set of constructs and hypotheses were compiled with a methodology for testing them.", "A questionnaire was constructed and data were collected from 255 users of m-commerce systems in Taiwan.", "Structural modeling techniques were then applied to analyze the data.", "The results indicated that customer loyalty was affected by perceived value, trust, habit, and customer satisfaction, with customer satisfaction playing a crucial intervening role in the relationship of perceived value and trust to loyalty.", "Based on the findings, its implications and limitations are discussed.", "# 2005 Elsevier B.V. All rights reserved." ]
[ 0, 2, 1, 1, 1, 4, 4, 3 ]
[ 0.766700029373169, 0.8108000159263611, 0.7838000059127808, 0.40540000796318054, 0.5946000218391418, 1, 0.5946000218391418, 1 ]
train_1172
[ "This paper introduces an Intelligent agent for the vacuum cleaner named as VROBO.", "Objectives of this work are to prepare a pedagogical device for Artificial Intelligence students and to practically implement the Artificial Intelligent Technology in real world problems to enhance the physical capabilities of human being.", "Most of the significant Intelligent Agent’s attributes like; Goals, Perception, Autonomy and Action, may be found in this agent.", "Two options are given for the implementation of proposed setup i.e. Screen oriented simulation developed in java and Java API for “real” robotic simulation using LEGO Mindstorms robots developed by Frank and Scott.", "Home location is represented by blue color, while yellow color is used to represent dirt.", "When robot sees dirt it emits beep.", "This Intelligent Agent is just like a prototype system and conceptual in nature, which can be extended for enhancements to be implemented physically." ]
[ 0, 2, 2, 1, 1, 1, 0 ]
[ 0.7940999865531921, 1, 0.41179999709129333, 0.7940999865531921, 0.6176000237464905, 0.41179999709129333, 0.3824000060558319 ]
train_1173
[ "While direct social ties have been intensely studied in the context of computer-mediated social networks, indirect ties (e.g., friends of friends) have seen little attention.", "Yet in real life, we often rely on friends of our friends for recommendations (of good doctors, good schools, or good babysitters), for introduction to a new job opportunity, and for many other occasional needs.", "In this work we attempt to 1) quantify the strength of indirect social ties, 2) validate the quantification, and 3) empirically demonstrate its usefulness for applications on two examples.", "We quantify social strength of indirect ties using a measure of the strength of the direct ties that connect two people and the intuition provided by the sociology literature.", "We evaluate the proposed metric by framing it as a link prediction problem and experimentally demonstrate that our metric accurately (up to 87.2%) predicts link’s formation.", "We show via data-driven experiments that the proposed metric for social strength can be used successfully for social applications.", "Specifically, we show that it can be used for predicting the effects of information diffusion with an accuracy of up to 0.753.", "We also show that it alleviates known problems in friend-to-friend storage systems by addressing two previously documented shortcomings: reduced set of storage candidates and data availability correlations.", "© 2015 Elsevier B.V.", "All rights reserved." ]
[ 0, 0, 2, 0, 1, 1, 1, 1, 1, 3 ]
[ 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.4000000059604645, 0.628600001335144, 0.628600001335144, 0.4571000039577484, 0.628600001335144, 0.4000000059604645, 0.37139999866485596 ]
train_1174
[ "RAID triple parity (RTP) is a new algorithm for protecting against three-disk failures.", "It is an extension of the double failure correction Row-Diagonal Parity code.", "For any number of data disks, RTP uses only three parity disks.", "This is optimal with respect to the amount of redundant information required and accessed.", "RTP uses XOR operations and stores all data un-encoded.", "The algorithm's parity computation complexity is provably optimal.", "The decoding complexity is also much lower than that of existing comparable codes.", "This paper also describes a symmetric variant of the algorithm where parity computation is identical to triple reconstruction." ]
[ 1, 1, 0, 0, 1, 4, 4, 2 ]
[ 0.3889000117778778, 0.5555999875068665, 0.583299994468689, 0.6388999819755554, 0.5555999875068665, 0.44440001249313354, 0.44440001249313354, 0.41670000553131104 ]
train_1175
[ "We introduce a new approach for exploration based on the concept of frontiers, regions on the boundary between open space and unexplored space.", "By moving to new frontiers, a mobile robot can extend its map into new territory until the entire environment has been explored.", "We describe a method for detecting frontiers in evidence grids and navigating to these frontiers.", "We also introduce a technique for minimizing specular reflections in evidence grids using laser-limited sonar.", "We have tested this approach with a real mobile robot, exploring real-world office environments cluttered with a variety of obstacles.", "An advantage of our approach is its ability to explore both large open spaces and narrow cluttered spaces, with walls and obstacles in arbitrary orientations." ]
[ 0, 2, 2, 1, 4, 2 ]
[ 0.7838000059127808, 0.40540000796318054, 0.4323999881744385, 0.6215999722480774, 0.5676000118255615, 0.6485999822616577 ]
train_1176
[ "Service innovations, enabled by the confluence of big data, mobile solutions, cloud, social, and cognitive computing, and the Internet of Things, have gained a lot of attention among many enterprises in the past few years because they represent promising ways for companies to effectively and rapidly deliver new services.", "But one of today's most pervasive and bedeviling challenges is how to start this journey and stay on course.", "In this paper, we review some of the important developments in this area and reports the views voiced by five industry leaders from IBM, Cisco, HP, and ISSIP at a panel session at the 24th Annual Compete through Service Symposium in 2013.", "Panelists provided an extensive list of recommendations to academicians and professionals.", "The biggest conclusion is that all of the information and communications technology (ICT)-enabled service innovations need to be human-centered and focused on co-creating value." ]
[ 0, 0, 2, 2, 4 ]
[ 1, 1, 0.40540000796318054, 0.4323999881744385, 0.5676000118255615 ]
train_1177
[ "Controllable generation of emphasis in speech is desirable for expressive TTS systems utilized in various dialog applications.", "Usually such models remain voice-specific and the strength of emphasis can't be readily controlled.", "In this work we present a flexible emphatic prosody generation model based on Deep Recurrent Neural Networks (DRNN) for controllable word-level emphasis realization.", "The word emphasis DRNN model was trained on syllable-level piecewise linear prosodic trajectory parameters.", "A special data preprocessing technique was introduced to enable emphasis strength control, allowing to generate emphatic prosody trajectories of various strength.", "Additionally, we trained a DRNN model generating a sentence-level emphasis, i.e. producing whole sentences in forceful, decisive manner.", "Both models preserve quality and naturalness of the baseline TTS output." ]
[ 0, 0, 2, 1, 1, 1, 1 ]
[ 0.7894999980926514, 0.6053000092506409, 0.6053000092506409, 1, 0.7894999980926514, 0.5788999795913696, 0.5788999795913696 ]
train_1178
[ "A large set of email messages, the Enron corpus, was made public during the legal investigation concerning the Enron corporation.", "This dataset, along with a thorough explanation of its origin, is available at http://www-2.cs.cmu.edu/~enron/. This paper provides a brief introduction and analysis of the dataset.", "The raw Enron corpus contains 619,446 messages belonging to 158 users.", "We cleaned the corpus before this analysis by removing certain folders from each user, such as “discussion_threads”.", "These folders were present for most users, and did not appear to be used directly by the users, but rather were computer generated.", "Many, such as “all_documents”, also contained large numbers of duplicate emails, which were already present in the users’ other folders.", "Our goal in this paper is to analyze the suitability of this corpus for exploring how to classify messages as organized by a human, so these folders would have likely been misleading." ]
[ 0, 0, 0, 1, 4, 4, 2 ]
[ 0.6215999722480774, 0.4323999881744385, 0.4323999881744385, 0.40540000796318054, 0.3783999979496002, 0.3783999979496002, 0.8108000159263611 ]
train_1179
[ "Ontology alignment is the task of identifying semantically equivalent entities from two given ontologies.", "Different ontologies have different representations of the same entity, resulting in a need to de-duplicate entities when merging ontologies.", "We propose a method for enriching entities in an ontology with external definition and context information, and use this additional information for ontology alignment.", "We develop a neural architecture capable of encoding the additional information when available, and show that the addition of external data results in an F1-score of 0.69 on the Ontology Alignment Evaluation Initiative (OAEI) largebio SNOMEDNCI subtask, comparable with the entitylevel matchers in a SOTA system." ]
[ 0, 0, 1, 1 ]
[ 1, 1, 0.5799999833106995, 0.3840000033378601 ]
train_1180
[ "Most object detectors contain two important components: a feature extractor and an object classifier.", "The feature extractor has rapidly evolved with significant research efforts leading to better deep convolutional architectures.", "The object classifier, however, has not received much attention and many recent systems (like SPPnet and Fast/Faster R-CNN) use simple multi-layer perceptrons.", "This paper demonstrates that carefully designing deep networks for object classification is just as important.", "We experiment with region-wise classifier networks that use shared, region-independent convolutional features.", "We call them “Networks on Convolutional feature maps” (NoCs).", "We discover that aside from deep feature maps, a deep and convolutional per-region classifier is of particular importance for object detection, whereas latest superior image classification models (such as ResNets and GoogLeNets) do not directly lead to good detection accuracy without using such a per-region classifier.", "We show by experiments that despite the effective ResNets and Faster R-CNN systems, the design of NoCs is an essential element for the 1st-place winning entries in ImageNet and MS COCO challenges 2015." ]
[ 0, 0, 0, 2, 1, 3, 4, 4 ]
[ 1, 1, 0.5938000082969666, 0.7307999730110168, 0.7813000082969666, 0.40630000829696655, 0.7813000082969666, 1 ]
train_1181
[ "Semantic matching is of central importance to many natural language tasks [2, 28].", "A successful matching algorithm needs to adequately model the internal structures of language objects and the interaction between them.", "As a step toward this goal, we propose convolutional neural network models for matching two sentences, by adapting the convolutional strategy in vision and speech.", "The proposed models not only nicely represent the hierarchical structures of sentences with their layerby-layer composition and pooling, but also capture the rich matching patterns at different levels.", "Our models are rather generic, requiring no prior knowledge on language, and can hence be applied to matching tasks of different nature and in different languages.", "The empirical study on a variety of matching tasks demonstrates the efficacy of the proposed model on a variety of matching tasks and its superiority to competitor models." ]
[ 0, 0, 1, 1, 1, 4 ]
[ 1, 0.7949000000953674, 0.41029998660087585, 0.41029998660087585, 0.5896999835968018, 0.8205000162124634 ]
train_1182
[ "Lazy learning algorithms, exemplified by nearestneighbor algorithms, do not induce a concise hypothesis from a given training set; the inductive process is delayed until a test instance is given.", "Algorithms for constructing decision trees, such as C4.5, ID3, and CART create a single “best” decision tree during the training phase, and this tree is then used to classify test instances.", "The tests at the nodes of the constructed tree are good on average, but there may be better tests for classifying a specific instance.", "We propose a lazy decision tree algorithm-LAzuDT-that conceptually constructs the “best” decision tree for each test instance.", "In practice, only a path needs to be constructed, and a caching scheme makes the algorithm fast.", "The algorithm is robust with respect to missing values without resorting to the complicated methods usually seen in induction of decision trees.", "Experiments on real and artificial problems are presented." ]
[ 0, 0, 0, 1, 4, 4, 4 ]
[ 0.8055999875068665, 0.3889000117778778, 0.583299994468689, 0.3889000117778778, 0.2759000062942505, 0.22220000624656677, 0.41670000553131104 ]
train_1183
[ "One of the main building blocks and major challenges for 5G cellular systems is the design of flexible network architectures which can be realized by the software defined networking paradigm.", "Existing commercial cellular systems rely on closed and inflexible hardware-based architectures both at the radio frontend and in the core network.", "These problems significantly delay the adoption and deployment of new standards, impose significant challenges in implementing and innovation of new techniques to maximize the network capacity and accordingly the coverage, and prevent provisioning of trulydifferentiated services which are able to adapt to growing and uneven and highly variable traffic patterns.", "In this paper, a new softwaredefined architecture, called SoftAir, for next generation (5G) wireless systems, is introduced.", "Specifically, the novel ideas of network function cloudification and network virtualization are exploited to provide a scalable, flexible and resilient network architecture.", "Moreover, the essential enabling technologies to support and manage the proposed architecture are discussed in details, including fine-grained base station decomposition, seamless incorporation of Openflow, mobilityaware control traffic balancing, resource-efficient network virtualization, and distributed and collaborative traffic classification.", "Furthermore, the major benefits of SoftAir architecture with its enabling technologies are showcased by introducing softwaredefined traffic engineering solutions.", "The challenging issues for realizing SoftAir are also discussed in details.", "© 2015 Elsevier B.V.", "All rights reserved." ]
[ 0, 0, 0, 2, 1, 2, 2, 4, 3, 3 ]
[ 1, 0.7240999937057495, 0.5516999959945679, 0.7240999937057495, 0.44830000400543213, 0.37929999828338623, 0.37929999828338623, 0.44830000400543213, 1, 1 ]
train_1184
[ "The mining process in blockchain requires solving a proof-of-work puzzle, which is resource expensive to implement in mobile devices due to the high computing power and energy needed.", "In this paper, we, for the first time, consider edge computing as an enabler for mobile blockchain.", "In particular, we study edge computing resource management and pricing to support mobile blockchain applications in which the mining process of miners can be offloaded to an edge computing service provider.", "We formulate a two-stage Stackelberg game to jointly maximize the profit of the edge computing service provider and the individual utilities of the miners.", "In the first stage, the service provider sets the price of edge computing nodes.", "In the second stage, the miners decide on the service demand to purchase based on the observed prices.", "We apply the backward induction to analyze the sub-game perfect equilibrium in each stage for both uniform and discriminatory pricing schemes.", "For the uniform pricing where the same price is applied to all miners, the existence and uniqueness of Stackelberg equilibrium are validated by identifying the best response strategies of the miners.", "For the discriminatory pricing where the different prices are applied to different miners, the Stackelberg equilibrium is proved to exist and be unique by capitalizing on the Variational Inequality theory.", "Further, the real experimental results are employed to justify our proposed model." ]
[ 0, 0, 2, 1, 1, 1, 1, 1, 4, 4 ]
[ 0.583299994468689, 0.583299994468689, 0.41670000553131104, 0.6388999819755554, 0.5555999875068665, 0.5555999875068665, 0.7778000235557556, 0.3889000117778778, 0.583299994468689, 1 ]
train_1185
[ "We present an algorithm for simultaneous face detection, landmarks localization, pose estimation and gender recognition using deep convolutional neural networks (CNN).", "The proposed method called, HyperFace, fuses the intermediate layers of a deep CNN using a separate CNN followed by a multi-task learning algorithm that operates on the fused features.", "It exploits the synergy among the tasks which boosts up their individual performances.", "Additionally, we propose two variants of HyperFace: (1) HyperFace-ResNet that builds on the ResNet-101 model and achieves significant improvement in performance, and (2) Fast-HyperFace that uses a high recall fast face detector for generating region proposals to improve the speed of the algorithm.", "Extensive experiments show that the proposed models are able to capture both global and local information in faces and performs significantly better than many competitive algorithms for each of these four tasks." ]
[ 0, 1, 1, 1, 4 ]
[ 0.8158000111579895, 1, 0.6053000092506409, 0.5788999795913696, 0.5788999795913696 ]
train_1186
[ "This paper describes the five development stages of the rope human parasite.", "Rope parasites have been discovered as a result of cleansing enemas.", "Parasite adult stages live in human gastrointestinal tract and are anaerobic.", "They move inside the body by releasing gas bubbles utilizing jet propulsion.", "Rope parasites look like a rope, and can be over a meter long.", "It takes tens of years for them to fully develop into mature species (fifth stage).", "The fourth stage looks similar, but the parasite is shorter and has softer slimier body.", "The third stage looks like branched jellyfish.", "The second stage is viscous snot, or mucus with visible gas bubbles that act as suction cups.", "The first stage is slimier mucus with fewer bubbles, which can reside almost anywhere in the body." ]
[ 0, 0, 0, 0, 0, 4, 4, 4, 0, 0 ]
[ 0.6363999843597412, 0.6363999843597412, 0.6363999843597412, 0.3635999858379364, 0.3635999858379364, 0.4544999897480011, 0.3939000070095062, 0.3939000070095062, 0.6061000227928162, 0.3635999858379364 ]
train_1187
[ "We give an overview of the scripting languages used in existing cryptocurrencies, and in particular we review in some detail the scripting languages of Bitcoin, Nxt and Ethereum, in the context of a high-level overview of Distributed Ledger Technology and cryptocurrencies.", "We survey different approaches, and give an overview of critiques of existing languages.", "We also cover technologies that might be used to underpin extensions and innovations in scripting and contracts, including technologies for verification, such as zero knowledge proofs, proof-carrying code and static analysis, as well as approaches to making systems more efficient, e.g. Merkelized Abstract Syntax Trees." ]
[ 0, 1, 1 ]
[ 0.6159999966621399, 0.6079999804496765, 0.3840000033378601 ]
train_1188
[ "Digital divide research has benefitted from theories that account for unevenness between individuals, households, and geographic units in access to, and uses of information and communications technologies (ICTs).", "The objective of this paper is to explain and examine important digital divide theories, compare and contrast their major features, and identify appropriate methodologies to test them.", "Four theories examined are Adoption-Diffusion Theory (ADT), van Dijk's Theory of Digital Technology Access and Societal Impacts, Unified Theory of Acceptance and Use of Technology (UTAUT), and Spatially Aware Technology Utilization Model (SATUM).", "The theories are compared based on their independent and outcome factors, units of analysis, spatial components, and amount of scholarly literature.", "The methodologies utilized depend on sample size and range from varied regression and multinominal logit models to structured equation modeling, event history, and spatial analyses.", "The strengths and weaknesses of the digital divide theories are compared and can inform investigators on appropriate theoretical choice for particular settings." ]
[ 0, 2, 2, 4, 1, 4 ]
[ 0.8158000111579895, 0.6053000092506409, 0.39469999074935913, 0.39469999074935913, 0.6053000092506409, 0.7894999980926514 ]
train_1189
[ "Facial sketches are widely used by law enforcement agencies to assist in the identification and apprehension of suspects involved in criminal activities.", "Sketches used in forensic investigations are either drawn by forensic artists (forensic sketches) or created with computer software (composite sketches) following the verbal description provided by an eyewitness or the victim.", "These sketches are posted in public places and in media in hopes that some viewers will provide tips about the identity of the suspect.", "This method of identifying suspects is slow and tedious and may not lead to apprehension of the suspect.", "Hence, there is a need for a method that can automatically and quickly match facial sketches to large police mugshot databases.", "We address the problem of automatic facial sketch to mugshot matching and, for the first time, compare the effectiveness of forensic sketches and composite sketches.", "The contributions of this paper include: (i) a database containing mugshots and corresponding forensic and composite sketches that will be made available to interested researchers; (ii) a comparison of holistic facial representations versus component based representations for sketch to mugshot matching; and (iii) an analysis of the effect of filtering a mugshot gallery using three sources of demographic information (age, gender and race/ethnicity).", "Our experimental results show that composite sketches are matched with higher accuracy than forensic sketches to the corresponding mugshots.", "Both of the face representations studied here yield higher sketch to photo matching accuracy compared to a commercial face matcher." ]
[ 0, 0, 0, 0, 0, 1, 1, 4, 4 ]
[ 0.8151000142097473, 0.8151000142097473, 0.6340000033378601, 0.42260000109672546, 0.42260000109672546, 0.39250001311302185, 0.42260000109672546, 0.39250001311302185, 0.39250001311302185 ]
train_1190
[ "The segmentation of cursive and mixed scripts persists to be a difficult problem in the area of handwriting recognition.", "This research details advances for segmenting characters in off-line cursive script.", "Specifically, a heuristic algorithm and a neural network-based technique, which uses a structural feature vector representation, are proposed and combined for identifying incorrect segmentation points.", "Following the location of appropriate anchorage points, a character extraction technique, using segmentation paths, is employed to complete the segmentation process.", "Results are presented for neural-based heuristic segmentation, segmentation point validation, character recognition, segmentation path detection and overall segmentation accuracy." ]
[ 0, 2, 2, 2, 4 ]
[ 1, 0.5555999875068665, 0.7142999768257141, 0.44440001249313354, 0.5555999875068665 ]
train_1191
[ "Obtaining models that capture imaging markers relevant for disease progression and treatment monitoring is challenging.", "Models are typically based on large amounts of data with annotated examples of known markers aiming at automating detection.", "High annotation effort and the limitation to a vocabulary of known markers limit the power of such approaches.", "Here, we perform unsupervised learning to identify anomalies in imaging data as candidates for markers.", "We propose AnoGAN, a deep convolutional generative adversarial network to learn a manifold of normal anatomical variability, accompanying a novel anomaly scoring scheme based on the mapping from image space to a latent space.", "Applied to new data, the model labels anomalies, and scores image patches indicating their fit into the learned distribution.", "Results on optical coherence tomography images of the retina demonstrate that the approach correctly identifies anomalous images, such as images containing retinal fluid or hyperreflective foci." ]
[ 0, 0, 0, 2, 1, 1, 4 ]
[ 0.7838000059127808, 0.5946000218391418, 0.5946000218391418, 0.4323999881744385, 0.4323999881744385, 0.5946000218391418, 0.7838000059127808 ]
train_1192
[ "This paper motivates a comprehensive academic study of metadata and the roles that metadata plays in organizational information systems.", "While the benefits of metadata and challenges in implementing metadata solutions are widely addressed in practitioner publications, explicit discussion of metadata in academic literature is rare.", "Metadata, when discussed, is perceived primarily as a technology solution.", "Integrated management of metadata and its business value are not well addressed.", "This paper discusses both the benefits offered by and the challenges associated with integrating metadata.", "It also describes solutions for addressing some of these challenges.", "The inherent complexity of an integrated metadata repository is demonstrated by reviewing the metadata functionality required in a data warehouse: a decision support environment where its importance is acknowledged.", "Comparing this required functionality with metadata management functionalities offered by data warehousing software products identifies crucial gaps.", "Based on these analyses, topics for further research on metadata are proposed." ]
[ 0, 0, 0, 0, 2, 2, 1, 1, 4 ]
[ 0.44119998812675476, 0.8529000282287598, 0.6176000237464905, 0.6176000237464905, 0.7646999955177307, 0.7646999955177307, 0.6176000237464905, 0.44119998812675476, 0.7940999865531921 ]
train_1193
[ "Received: 31 August 2009 Revised: 25 September 2011 Accepted: 16 October 2011 Abstract This paper offers guidance to conducting a rigorous literature review.", "We present this in the form of a five-stage process in which we use Grounded Theory as a method.", "We first probe the guidelines explicated by Webster and Watson, and then we show the added value of Grounded Theory for rigorously analyzing a carefully chosen set of studies; it assures solidly legitimized, indepth analyses of empirical facts and related insights.", "This includes, the emergence of new themes, issues and opportunities; interrelationships and dependencies in or beyond a particular area; as well as inconsistencies.", "If carried out meticulously, reviewing a well-carved out piece of literature by following this guide is likely to lead to more integrated and fruitful theory emergence, something that would enrich many fields in the social sciences.", "European Journal of Information Systems advance online publication, 29 November 2011; doi:10.1057/ejis.2011.51" ]
[ 0, 1, 1, 2, 4, 3 ]
[ 0.6000000238418579, 0.4000000059604645, 0.4000000059604645, 0.4000000059604645, 0.4000000059604645, 0.4000000059604645 ]
train_1194
[ "State-of-the-art sequence labeling systems traditionally require large amounts of taskspecific knowledge in the form of handcrafted features and data pre-processing.", "In this paper, we introduce a novel neutral network architecture that benefits from both wordand character-level representations automatically, by using combination of bidirectional LSTM, CNN and CRF.", "Our system is truly end-to-end, requiring no feature engineering or data preprocessing, thus making it applicable to a wide range of sequence labeling tasks on different languages.", "We evaluate our system on two data sets for two sequence labeling tasks — Penn Treebank WSJ corpus for part-of-speech (POS) tagging and CoNLL 2003 corpus for named entity recognition (NER).", "We obtain stateof-the-art performance on both datasets — 97.55% accuracy for POS tagging and 91.21% F1 for NER." ]
[ 0, 0, 0, 1, 4 ]
[ 1, 0.6025999784469604, 0.4278999865055084, 0.8471999764442444, 0.8166000247001648 ]
train_1195
[ "We propose Meta-Prod2vec, a novel method to compute item similarities for recommendation that leverages existing item metadata.", "Such scenarios are frequently encountered in applications such as content recommendation, ad targeting and web search.", "Our method leverages past user interactions with items and their attributes to compute low-dimensional embeddings of items.", "Specifically, the item metadata is injected into the model as side information to regularize the item embeddings.", "We show that the new item representations lead to better performance on recommendation tasks on an open music dataset." ]
[ 0, 0, 1, 1, 4 ]
[ 0.44119998812675476, 0.6176000237464905, 0.7646999955177307, 0.6176000237464905, 0.6176000237464905 ]
train_1196
[ "This paper has always been one of my favorite “children,” combining as it does elements of the duality of linear programming and combinatorial tools from graph theory.", "It may be of some interest to tell the story of its origin.", "I spent the summer of 1953 at the Institute for Numerical Analysis which was housed on the U.C.L.A. campus.", "I was supported by the National Bureau of Standards and shared an office with Ted Motzkin, a pioneer in the theory of inequalities and one of the most scholarly mathematicians I have ever known.", "I had no fixed duties and spent the summer working on subjects that were of interest to me at the time, such as the traveling salesman problem and the assignment problem.", "The Institute for Numerical Analysis was the home of the SWAC (Standards Western Automatic Computer), which had been designed by Harry Huskey and had a memory of 256 words of 40 bits each on 40 Williamson tubes.", "The formulation of the assignment problem as a linear program was well known, but a 10 by 10 assignment problem has 100 variables in its primal statement and 100 constraints in the dual and so was too large for the SWAC to solve as a linear program.", "The SEAC (Standard Eastern Automatic Computer), housed in the National Bureau of Standards in Washington, could solve linear programs with about 25 variables and 25 constraints.", "The SEAC had a liquid mercury memory system which was extremely limiting.", "During that summer, I was reading König’s book on graph theory." ]
[ 0, 0, 0, 0, 0, 0, 1, 1, 1, 1 ]
[ 1, 1, 1, 0.7778000235557556, 0.7778000235557556, 0.583299994468689, 0.6388999819755554, 0.6388999819755554, 0.44440001249313354, 0.22220000624656677 ]
train_1197
[ "In this paper, we propose an approximate multiplier that is high speed yet energy efficient.", "The approach is to round the operands to the nearest exponent of two.", "This way the computational intensive part of the multiplication is omitted improving speed and energy consumption at the price of a small error.", "The proposed approach is applicable to both signed and unsigned multiplications.", "We propose three hardware implementations of the approximate multiplier that includes one for the unsigned and two for the signed operations.", "The efficiency of the proposed multiplier is evaluated by comparing its performance with those of some approximate and accurate multipliers using different design parameters.", "In addition, the efficacy of the proposed approximate multiplier is studied in two image processing applications, i.e., image sharpening and smoothing." ]
[ 2, 2, 1, 2, 1, 4, 4 ]
[ 0.7949000000953674, 0.5896999835968018, 0.41029998660087585, 0.5896999835968018, 0.7949000000953674, 0.7949000000953674, 0.5896999835968018 ]
train_1198
[ "STORM, presented in this paper, is a UML-based software engineering tool designed for the purpose of automating as much of the requirements specification phase as possible.", "The main idea of the STORM approach is to combine adequate requirements writing with robust use case modelling in order to expedite the process leading up to the actual design of the software.", "This paper presents a description of our approach to software requirements specification as well as an overview of STORM’s design concepts, organizing principles, and modes of operation.", "Also included are examples of the tool’s use, a comparison between STORM and similar CASE tools, and a discussion of needed features for software environments that support text aspects of requirements and use case modelling." ]
[ 0, 0, 1, 1 ]
[ 0.7838000059127808, 0.5516999959945679, 0.6215999722480774, 0.8378000259399414 ]
train_1199
[ "We propose to train trading systems by optimizing financial objective functions via reinforcement learning.", "The performance functions that we consider are profit or wealth, the Sharpe ratio and our recently proposed differential Sharpe ratio for online learning.", "In Moody & Wu (1997), we presented empirical results that demonstrate the advantages of reinforcement learning relative to supervised learning.", "Here we extend our previous work to compare Q-Learning to our Recurrent Reinforcement Learning (RRL) algorithm.", "We provide new simulation results that demonstrate the presence of predictability in the monthly S&P 500 Stock Index for the 25 year period 1970 through 1994, as well as a sensitivity analysis that provides economic insight into the trader's structure." ]
[ 2, 0, 1, 1, 4 ]
[ 0.421099990606308, 0.5788999795913696, 0.421099990606308, 0.6053000092506409, 0.8158000111579895 ]