abstract_id
stringlengths
10
10
sentences
list
labels
list
confs
list
train_1300
[ "Network embedding algorithms to date are primarily designed for static networks, where all nodes are known before learning.", "How to infer embeddings for out-of-sample nodes, i.e. nodes that arrive after learning, remains an open problem.", "The problem poses great challenges to existing methods, since the inferred embeddings should preserve intricate network properties such as high-order proximity, share similar characteristics (i.e. be of a homogeneous space) with in-sample node embeddings, and be of low computational cost.", "To overcome these challenges, we propose a Deeply Transformed High-order Laplacian Gaussian Process (DepthLGP) method to infer embeddings for out-of-sample nodes.", "DepthLGP combines the strength of nonparametric probabilistic modeling and deep learning.", "In particular, we design a high-order Laplacian Gaussian process (hLGP) to encode network properties, which permits fast and scalable inference.", "In order to further ensure homogeneity, we then employ a deep neural network to learn a nonlinear transformation from latent states of the hLGP to node embeddings.", "DepthLGP is general, in that it is applicable to embeddings learned by any network embedding algorithms.", "We theoretically prove the expressive power of DepthLGP, and conduct extensive experiments on real-world networks.", "Empirical results demonstrate that our approach can achieve significant performance gain over existing approaches." ]
[ 0, 0, 0, 1, 1, 1, 1, 1, 4, 4 ]
[ 0.8529000282287598, 0.8234999775886536, 0.6765000224113464, 0.7940999865531921, 0.8529000282287598, 1, 0.8529000282287598, 0.6765000224113464, 0.5587999820709229, 1 ]
train_1301
[ "In hopes of motivating consumers to provide larger volumes of useful reviews, many retailers offer financial incentives.", "Here, we explore an alternative approach, social norms, wherein we inform people about the volume of reviews authored by peers.", "We test the effectiveness of using financial incentives, social norms, and a combination of both strategies.", "In two randomized experiments, one in the field conducted in partnership with a large online clothing retailer based in China, and a second on Amazon Mechanical Turk, we compare the effectiveness of each strategy at stimulating online reviews in larger numbers and of greater length.", "We find that financial incentives are more effective at inducing larger volumes of reviews, but the reviews that result are not particularly lengthy, whereas social norms have a greater effect on the length of reviews.", "Importantly, we show that the combination of financial incentives and social norms yields the greatest overall benefit, motivating reviews in greater numbers and of greater length.", "We further assess the treatment induced self-selection and sentiment bias by triangulating the experimental results with findings from an observational study." ]
[ 0, 0, 1, 1, 4, 4, 4 ]
[ 0.8158000111579895, 0.421099990606308, 0.7894999980926514, 0.4666999876499176, 0.39469999074935913, 0.5788999795913696, 0.7894999980926514 ]
train_1302
[ "This paper presents a no reference image (NR) quality assessment (IQA) method based on a deep convolutional neural network (CNN).", "The CNN takes unpreprocessed image patches as an input and estimates the quality without employing any domain knowledge.", "By that, features and natural scene statistics are learnt purely data driven and combined with pooling and regression in one framework.", "We evaluate the network on the LIVE database and achieve a linear Pearson correlation superior to state-of-the-art NR IQA methods.", "We also apply the network to the image forensics task of decoder-sided quantization parameter estimation and also here achieve correlations of r = 0.989." ]
[ 2, 1, 1, 4, 4 ]
[ 0.4000000059604645, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.800000011920929 ]
train_1303
[ "Conversion rate optimization (CRO) means designing an ecommerce web interface so that as many users as possible take a desired action such as registering for an account, requesting a contact, or making a purchase.", "Such design is usually done by hand, evaluating one change at a time through A/B testing, or evaluating all combinations of two or three variables through multivariate testing.", "Traditional CRO is thus limited to a small fraction of the design space only.", "This paper describes Sentient Ascend, an automatic CRO system that uses evolutionary search to discover effective web interfaces given a human-designed search space.", "Design candidates are evaluated in parallel on line with real users, making it possible to discover and utilize interactions between the design elements that are difficult to identify otherwise.", "A commercial product since September 2016, Ascend has been applied to numerous web interfaces across industries and search space sizes, with up to four-fold improvements over human design.", "Ascend can therefore be seen as massively multivariate CRO made possible by AI." ]
[ 0, 0, 0, 2, 1, 1, 4 ]
[ 1, 1, 0.5896999835968018, 1, 0.8205000162124634, 0.7419000267982483, 0.6154000163078308 ]
train_1304
[ "This paper presents the design and validation of a fuzzy logic controller implemented with an industrial programmable logic controller (PLC).", "The chosen device belongs to the S7-1200 series of Siemens, whereas the code has been developed in Ladder Diagram language using the software TIA Portal.", "The fuzzy controller is of Mamdani type and is applied to control the speed of a servomotor.", "A comparison with a Simulink/Matlab fuzzy controller is done to validate the developed software module and to show the feasibility of the PLC to manage this kind of control algorithm." ]
[ 2, 4, 1, 1 ]
[ 0.6053000092506409, 0.5788999795913696, 0.6053000092506409, 0.5788999795913696 ]
train_1305
[ "Standard approaches to functional safety as described in the automotive functional safety standard ISO 26262 are focused on reducing the risk of hazards due to random hardware faults or systematic failures during design (e.g. software bugs).", "However, as vehicle systems become increasingly complex and ever more connected to the internet of things, a third source of hazard must be considered, that of intentional manipulation of the electrical/electronic control systems either via direct physical contact or via the systems' open interfaces.", "This article describes how the process prescribed by the ISO 26262 can be extended with methods from the domain of embedded security to protect the systems against this third source of hazard." ]
[ 0, 0, 4 ]
[ 0.5676000118255615, 0.5676000118255615, 0.6485999822616577 ]
train_1306
[ "In the past few years, the field of computer vision has gone through a revolution fueled mainly by the advent of large datasets and the adoption of deep convolutional neural networks for end-to-end learning.", "The person reidentification subfield is no exception to this, thanks to the notable publication of the Market-1501 and MARS datasets and several strong deep learning approaches.", "Unfortunately, a prevailing belief in the community seems to be that the triplet loss is inferior to using surrogate losses (classification, verification) followed by a separate metric learning step.", "We show that, for models trained from scratch as well as pretrained ones, using a variant of the triplet loss to perform end-to-end deep metric learning outperforms any other published method by a large margin." ]
[ 0, 4, 4, 4 ]
[ 1, 0.583299994468689, 0.44440001249313354, 0.8055999875068665 ]
train_1307
[ "This paper discusses the limitations of time-based equipment maintenance methods and the advantages of predictive or online maintenance techniques in identifying the onset of equipment failure.", "The three major predictive maintenance techniques, defined in terms of their source of data, are described as follows: 1) the existing sensor-based technique; 2) the test-sensor-based technique (including wireless sensors); and 3) the test-signal-based technique (including the loop current step response method, the time-domain reflectrometry test, and the inductance-capacitance-resistance test).", "Examples of detecting blockages in pressure sensing lines using existing sensor-based techniques and of verifying calibration using existing-sensor direct current output are given.", "Three Department of Energy (DOE)-sponsored projects, whose aim is to develop online and wireless hardware and software systems for performing predictive maintenance on critical equipment in nuclear power plants, DOE research reactors, and general industrial applications, are described." ]
[ 1, 1, 1, 2 ]
[ 0.39469999074935913, 0.5788999795913696, 0.39469999074935913, 0.421099990606308 ]
train_1308
[ "We present a new keyword extraction algorithm that applies to a single document without using a corpus.", "Frequent terms are extracted first, then a set of co-occurrences between each term and the frequent terms, i.e., occurrences in the same sentences, is generated.", "Co-occurrence distribution shows importance of a term in the document as follows.", "If the probability distribution of co-occurrence between term a and the frequent terms is biased to a particular subset of frequent terms, then term a is likely to be a keyword.", "The degree of bias of a distribution is measured by the χ2-measure.", "Our algorithm shows comparable performance to tfidf without using a corpus." ]
[ 2, 1, 1, 1, 1, 1 ]
[ 0.800000011920929, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.4000000059604645 ]
train_1309
[ "Most modern convolutional neural networks (CNNs) used for object recognition are built using the same principles: Alternating convolution and max-pooling layers followed by a small number of fully connected layers.", "We re-evaluate the state of the art for object recognition from small images with convolutional networks, questioning the necessity of different components in the pipeline.", "We find that max-pooling can simply be replaced by a convolutional layer with increased stride without loss in accuracy on several image recognition benchmarks.", "Following this finding – and building on other recent work for finding simple network structures – we propose a new architecture that consists solely of convolutional layers and yields competitive or state of the art performance on several object recognition datasets (CIFAR-10, CIFAR-100, ImageNet).", "To analyze the network we introduce a new variant of the “deconvolution approach” for visualizing features learned by CNNs, which can be applied to a broader range of network structures than existing approaches." ]
[ 0, 0, 2, 1, 1 ]
[ 1, 0.6348000168800354, 0.42170000076293945, 0.6348000168800354, 0.6043000221252441 ]
train_1310
[ "The Floyd-Warshall algorithm is a simple and widely used algorithm to compute shortest paths between all pairs of vertices in an edge weighted directed graph.", "It can also be used to detect the presence of negative cycles.", "We will show that for this task many existing implementations of the Floyd-Warshall algorithm will fail because exponentially large numbers can appear during its execution." ]
[ 0, 0, 3 ]
[ 0.7828999757766724, 0.37599998712539673, 0.21709999442100525 ]
train_1311
[ "Social media are gaining popularity and are increasingly used in regular operations of many companies, including start-ups, small, medium-sized, and large organizations.", "The purpose of this research is to explore the impact of social media and to analyze to what extent social media have impact on organizational capabilities and business performance.", "We develop a research model and two simple propositions based on the resource based view of the firm.", "We analyze the impact of six social media applications on six business capabilities and on business performance in SponsorPay, a start-up company since 2009 in the on-line game advertising industry.", "We use a mixed research method including qualitative analysis based on interviews and quantitative analysis based on a survey among 60 employees.", "We find that the use of social media enhances business capabilities and business performance.", "The impact is not due to one (out of six) social media tools only, but due to successfully combining the six social media tools into one effective social media ecosystem that enables coordination between internal and external business processes." ]
[ 0, 2, 1, 1, 4, 3, 4 ]
[ 0.5881999731063843, 0.5881999731063843, 0.41179999709129333, 0.41179999709129333, 0.41179999709129333, 0.41179999709129333, 0.41179999709129333 ]
train_1312
[ "Clustering is central to many data-driven application domains and has been studied extensively in terms of distance functions and grouping algorithms.", "Relatively little work has focused on learning representations for clustering.", "In this paper, we propose Deep Embedded Clustering (DEC), a method that simultaneously learns feature representations and cluster assignments using deep neural networks.", "DEC learns a mapping from the data space to a lower-dimensional feature space in which it iteratively optimizes a clustering objective.", "Our experimental evaluations on image and text corpora show significant improvement over state-of-the-art methods." ]
[ 0, 0, 1, 1, 4 ]
[ 0.8087999820709229, 0.8087999820709229, 0.8087999820709229, 0.3903999924659729, 0.7768999934196472 ]
train_1313
[ "A novel multivariable laboratory process that consists of four interconnected water tanks is presented.", "The linearized dynamics of the system have a multivariable zero that is possible to move along the real axis by changing a valve.", "The zero can be placed in both the lefr and the right half-plane.", "I n this way the quadrupletank process is ideal for illustrating many concepts in multivariable control, particularly performance limitations due to multivariable right halfplane zeros.", "Accurate models are derived from both physical and experimental data and multi-loop control is illustrated." ]
[ 0, 1, 1, 2, 4 ]
[ 0.7894999980926514, 0.5788999795913696, 0.5788999795913696, 0.421099990606308, 0.5788999795913696 ]
train_1314
[ "Over the past few years, there has been an increased interest in automatic facial behavior analysis and understanding.", "We present OpenFace 2.0 - a tool intended for computer vision and machine learning researchers, affective computing community and people interested in building interactive applications based on facial behavior analysis.", "OpenFace 2.0 is an extension of OpenFace toolkit and is capable of more accurate facial landmark detection, head pose estimation, facial action unit recognition, and eye-gaze estimation.", "The computer vision algorithms which represent the core of OpenFace 2.0 demonstrate state-of-the-art results in all of the above mentioned tasks.", "Furthermore, our tool is capable of real-time performance and is able to run from a simple webcam without any specialist hardware.", "Finally, unlike a lot of modern approaches or toolkits, OpenFace 2.0 source code for training models and running them is freely available for research purposes." ]
[ 0, 2, 1, 4, 4, 4 ]
[ 1, 1, 0.6111000180244446, 0.6111000180244446, 0.5555999875068665, 0.6111000180244446 ]
train_1315
[ "We present ShapeNet: a richly-annotated, large-scale repository of shapes represented by 3D CAD models of objects.", "ShapeNet contains 3D models from a multitude of semantic categories and organizes them under the WordNet taxonomy.", "It is a collection of datasets providing many semantic annotations for each 3D model such as consistent rigid alignments, parts and bilateral symmetry planes, physical sizes, keywords, as well as other planned annotations.", "Annotations are made available through a public web-based interface to enable data visualization of object attributes, promote data-driven geometric analysis, and provide a large-scale quantitative benchmark for research in computer graphics and vision.", "At the time of this technical report, ShapeNet has indexed more than 3,000,000 models, 220,000 models out of which are classified into 3,135 categories (WordNet synsets).", "In this report we describe the ShapeNet effort as a whole, provide details for all currently available datasets, and summarize future plans." ]
[ 0, 2, 1, 1, 4, 4 ]
[ 0.5946000218391418, 0.6215999722480774, 0.40540000796318054, 0.40540000796318054, 0.4323999881744385, 0.8108000159263611 ]
train_1316
[ "A leaking water pipe bursting high pressure water jet in the soil will create slurry erosion which will eventually erode the adjacent natural gas pipe, thus causing its failure.", "The standard 300 mm safety distance used to place natural gas pipe away from water pipeline facilities needs to be reviewed to consider accidental damage and provide safety cushion to the natural gas pipe.", "This paper presents a study on underground natural gas pipeline safety distance via experimental and numerical approaches.", "The pressure–distance characteristic curve obtained from this experimental study showed that the pressure was inversely proportional to the square of the separation distance.", "Experimental testing using water-to-water pipeline system environment was used to represent the worst case environment, and could be used as a guide to estimate appropriate safety distance.", "Dynamic pressures obtained from the experimental measurement and simulation prediction mutually agreed along the high-pressure water jetting path.", "From the experimental and simulation exercises, zero effect distance for water-to-water medium was obtained at an estimated horizontal distance at a minimum of 1500 mm, while for the water-to-sand medium, the distance was estimated at a minimum of 1200 mm.", "& 2014 Elsevier Ltd. All rights reserved." ]
[ 0, 0, 2, 1, 1, 4, 4, 3 ]
[ 0.7940999865531921, 0.5587999820709229, 0.7307999730110168, 0.5587999820709229, 0.7940999865531921, 0.6470999717712402, 0.6470999717712402, 1 ]
train_1317
[ "University students are increasingly choosing to purchase e-textbooks for their mobile devices as an alternative to traditional textbooks.", "This study examines the relationship between textbook format and 538 university students’ grades and perceived learning scores.", "Results demonstrate that there was no difference in cognitive learning and grades between the two groups, suggesting that the electronic textbook is as effective for learning as the traditional textbook.", "The mean scores indicated that students who chose e-textbooks for their education courses had significantly higher perceived affective learning and psychomotor learning than students who chose to use traditional print textbooks.", "Published by Elsevier Ltd." ]
[ 0, 0, 4, 0, 3 ]
[ 1, 0.6111000180244446, 0.583299994468689, 0.3610999882221222, 0.41670000553131104 ]
train_1318
[ "This paper presents a model for end-toend learning of task-oriented dialog systems.", "The main component of the model is a recurrent neural network (an LSTM), which maps from raw dialog history directly to a distribution over system actions.", "The LSTM automatically infers a representation of dialog history, which relieves the system developer of much of the manual feature engineering of dialog state.", "In addition, the developer can provide software that expresses business rules and provides access to programmatic APIs, enabling the LSTM to take actions in the real world on behalf of the user.", "The LSTM can be optimized using supervised learning (SL), where a domain expert provides example dialogs which the LSTM should imitate; or using reinforcement learning (RL), where the system improves by interacting directly with end users.", "Experiments show that SL and RL are complementary: SL alone can derive a reasonable initial policy from a small number of training dialogs; and starting RL optimization with a policy trained with SL substantially accelerates the learning rate of RL." ]
[ 2, 1, 1, 1, 1, 4 ]
[ 1, 0.6053000092506409, 1, 1, 0.5788999795913696, 1 ]
train_1319
[ "The aim of the current work is to assess the challenges that gamification in education are facing nowadays.", "Benefits and disadvantages of using gamification in classroom are both discussed to offer a clearer view on the impact of using gamification within learning process.", "Exploratory study –cases are provided to investigate the relation between motivation and engagement of the students and gamification in training.", "Following this idea, a survey was conducted to assess how students’ behavior and motivation is affected by introducing a single, specific gamification element during a semester learning process.", "To stimulate competition among students, a ranking type plugin was introduced within the university learning management system used for extramural education.", "The results prove that motivation decreases by comparison to the previous semester." ]
[ 2, 0, 1, 1, 1, 4 ]
[ 0.5946000218391418, 0.40540000796318054, 0.40540000796318054, 0.8108000159263611, 0.7838000059127808, 0.7838000059127808 ]
train_1320
[ "This paper presents an overview of two maintenance techniques widely discussed in the literature: timebased maintenance (TBM) and condition-based maintenance (CBM).", "The paper discusses how the TBM and CBM techniques work toward maintenance decision making.", "Recent research articles covering the application of each technique are reviewed.", "The paper then compares the challenges of implementing each technique from a practical point of view, focusing on the issues of required data determination and collection, data analysis/modelling, and decision making.", "The paper concludes with significant considerations for future research.", "Each of the techniques was found to have unique concepts/principles, procedures, and challenges for real industrial practise.", "It can be concluded that the application of the CBM technique is more realistic, and thus more worthwhile to apply, than the TBM one.", "However, further research on CBM must be carried out in order to make it more realistic for making maintenance decisions.", "The paper provides useful information regarding the application of the TBM and CBM techniques in maintenance decision making and explores the challenges in implementing each technique from a practical" ]
[ 0, 2, 0, 1, 0, 1, 4, 0, 4 ]
[ 1, 0.5968999862670898, 0.5929999947547913, 0.5659000277519226, 0.40700000524520874, 0.40310001373291016, 0.5659000277519226, 0.40700000524520874, 0.40310001373291016 ]
train_1321
[ "Digital inpainting provides a means for reconstruction of small damaged portions of an image.", "Although the inpainting basics are straightforward, most inpainting techniques published in the literature are complex to understand and implement.", "We present here a new algorithm for digital inpainting based on the fast marching method for level set applications.", "Our algorithm is very simple to implement, fast, and produces nearly identical results to more complex, and usually slower, known methods.", "Source code is available online." ]
[ 0, 0, 2, 1, 3 ]
[ 1, 0.7838000059127808, 0.40540000796318054, 1, 0.6215999722480774 ]
train_1322
[ "1. Established relevance of authalic spherical parametrization for creating geometry images used subsequently in CNN. 2.", "Robust authalic parametrization of arbitrary shapes using area restoring diffeomorphic flow and barycentric mapping.", "3.", "Creation of geometry images (a) with appropriate shape feature for rigid/non-rigid shape analysis, (b) which are robust to cut and amenable to learn using CNNs.", "Experiments Cuts & Data Augmentation" ]
[ 0, 0, 3, 1, 4 ]
[ 0.6159999966621399, 0.7932000160217285, 0.5864999890327454, 0.287200003862381, 0.4092999994754791 ]
train_1323
[ "We are concerned with the issues of outlier detection and change point detection from a data stream.", "In the area of data mining, there have been increased interest in these issues since the former is related to fraud detection, rare event discovery, etc.", ", while the latter is related to event/trend by change detection, activity monitoring, etc.", "Specifically, it is important to consider the situation where the data source is non-stationary, since the nature of data source may change over time in real applications.", "Although in most previous work outlier detection and change point detection have not been related explicitly, this paper presents a unifying framework for dealing with both of them on the basis of the theory of on-line learning of non-stationary time series.", "In this framework a probabilistic model of the data source is incrementally learned using an on-line discounting learning algorithm, which can track the changing data source adaptively by forgetting the effect of past data gradually.", "Then the score for any given data is calculated to measure its deviation from the learned model, with a higher score indicating a high possibility of being an outlier.", "Further change points in a data stream are detected by applying this scoring method into a time series of moving averaged losses for prediction using the learned model.", "Specifically we develop an efficient algorithms for on-line discounting learning of auto-regression models from time series data, and demonstrate the validity of our framework through simulation and experimental applications to stock market data analysis." ]
[ 0, 0, 0, 0, 1, 1, 1, 1, 4 ]
[ 0.40540000796318054, 0.5676000118255615, 0.5676000118255615, 0.5676000118255615, 0.40540000796318054, 0.7838000059127808, 0.6215999722480774, 0.5946000218391418, 1 ]
train_1324
[ "Large-scale Internet of Things (IoT) deployments demand long-range wireless communications, especially in urban and metropolitan areas.", "LoRa is one of the most promising technologies in this context due to its simplicity and flexibility.", "Indeed, deploying LoRa networks in dense IoT scenarios must achieve two main goals: efficient communications among a large number of devices and resilience against dynamic channel conditions due to demanding environmental settings (e.g., the presence of many buildings).", "This work investigates adaptive mechanisms to configure the communication parameters of LoRa networks in dense IoT scenarios.", "To this end, we develop FLoRa, an open-source framework for end-to-end LoRa simulations in OMNeT++.", "We then implement and evaluate the Adaptive Data Rate (ADR) mechanism built into LoRa to dynamically manage link parameters for scalable and efficient network operations.", "Extensive simulations show that ADR is effective in increasing the network delivery ratio under stable channel conditions, while keeping the energy consumption low.", "Our results also show that the performance of ADR is severely affected by a highly-varying wireless channel.", "We thereby propose an improved version of the original ADR mechanism to cope with variable channel conditions.", "Our proposed solution significantly increases both the reliability and the energy efficiency of communications over a noisy channel, almost irrespective of the network size." ]
[ 0, 0, 0, 2, 1, 1, 4, 4, 4, 4 ]
[ 0.6154000163078308, 0.6154000163078308, 0.6154000163078308, 0.6154000163078308, 0.6154000163078308, 0.6154000163078308, 0.6154000163078308, 0.7742000222206116, 0.41029998660087585, 0.41029998660087585 ]
train_1325
[ "ÐThe primary goal of pattern recognition is supervised or unsupervised classification.", "Among the various frameworks in which pattern recognition has been traditionally formulated, the statistical approach has been most intensively studied and used in practice.", "More recently, neural network techniques and methods imported from statistical learning theory have been receiving increasing attention.", "The design of a recognition system requires careful attention to the following issues: definition of pattern classes, sensing environment, pattern representation, feature extraction and selection, cluster analysis, classifier design and learning, selection of training and test samples, and performance evaluation.", "In spite of almost 50 years of research and development in this field, the general problem of recognizing complex patterns with arbitrary orientation, location, and scale remains unsolved.", "New and emerging applications, such as data mining, web searching, retrieval of multimedia data, face recognition, and cursive handwriting recognition, require robust and efficient pattern recognition techniques.", "The objective of this review paper is to summarize and compare some of the well-known methods used in various stages of a pattern recognition system and identify research topics and applications which are at the forefront of this exciting and challenging field.", "Index TermsÐStatistical pattern recognition, classification, clustering, feature extraction, feature selection, error estimation, classifier combination, neural networks." ]
[ 0, 0, 0, 1, 1, 1, 2, 4 ]
[ 0.5788999795913696, 0.5788999795913696, 0.5788999795913696, 0.631600022315979, 0.631600022315979, 0.631600022315979, 0.39469999074935913, 0.39469999074935913 ]
train_1326
[ "Bottleneck features have been shown to be effective in improving the accuracy of automatic speech recognition (ASR) systems.", "Conventionally, bottleneck features are extracted from a multi-layer perceptron (MLP) trained to predict context-independent monophone states.", "The MLP typically has three hidden layers and is trained using the backpropagation algorithm.", "In this paper, we propose two improvements to the training of bottleneck features motivated by recent advances in the use of deep neural networks (DNNs) for speech recognition.", "First, we show how the use of unsupervised pretraining of a DNN enhances the network’s discriminative power and improves the bottleneck features it generates.", "Second, we show that a neural network trained to predict context-dependent senone targets produces better bottleneck features than one trained to predict monophone states.", "Bottleneck features trained using the proposed methods produced a 16% relative reduction in sentence error rate over conventional bottleneck features on a large vocabulary business search task." ]
[ 2, 1, 1, 2, 1, 4, 4 ]
[ 0.41670000553131104, 0.6388999819755554, 0.41670000553131104, 1, 0.7585999965667725, 0.41670000553131104, 1 ]
train_1327
[ "In this paper, we derive the Cramér-Rao bound (CRB) for range estimation, which does not only exploit the range information in the time delay, but also in the amplitude of the received signal.", "This new bound is lower than the conventional CRB that only makes use of the range information in the time delay.", "We investigate the new bound in an additive white Gaussian noise (AWGN) channel with attenuation by employing both narrowband (NB) signals and ultra-wideband (UWB) signals.", "For NB signals, the new bound can be 3dB lower than the conventional CRB under certain conditions.", "However, there is not much difference between the new bound and the conventional CRB for UWB signals.", "Further, shadowing effects are added into the data model.", "Several CRB-like bounds for range estimation are derived to take these shadowing effects into account." ]
[ 0, 1, 1, 4, 4, 4, 4 ]
[ 0.5938000082969666, 0.46880000829696655, 0.5938000082969666, 0.4375, 0.4375, 0.34380000829696655, 0.5938000082969666 ]
train_1328
[ "In the spectrum of vision-based autonomous driving, vanilla end-to-end models are not interpretable and suboptimal in performance, while mediated perception models require additional intermediate representations such as segmentation masks or detection bounding boxes, whose annotation can be prohibitively expensive as we move to a larger scale.", "Raw images and existing intermediate representations are also loaded with nuisance details that are irrelevant to the prediction of vehicle commands, e.g. the style of the car in front or the view beyond the road boundaries.", "More critically, all prior works fail to deal with the notorious domain shift if we were to merge data collected from different sources, which greatly hinders the model generalization ability.", "In this work, we address the above limitations by taking advantage of virtual data collected from driving simulators, and present DU-drive, an unsupervised real to virtual domain unification framework for end-to-end driving.", "It transforms real driving data to its canonical representation in the virtual domain, from which vehicle control commands are predicted.", "Our framework has several advantages: 1) it maps driving data collected from different source distributions into a unified domain, 2) it takes advantage of annotated virtual data which is free to obtain, 3) it learns an interpretable, canonical representation of driving image that is specialized for vehicle command prediction.", "Extensive experiments on two public highway driving datasets clearly demonstrate the performance superiority and interpretive capability of DU-drive." ]
[ 0, 0, 0, 1, 1, 1, 4 ]
[ 1, 1, 1, 0.41029998660087585, 0.6154000163078308, 0.6154000163078308, 0.7949000000953674 ]
train_1329
[ "In recent years broad community of researchers has emerged, focusing on the original ambitious goals of the AI field – the creation and study of software or hardware systems with general intelligence comparable to, and ultimately perhaps greater than, that of human beings.", "This paper surveys this diverse community and its progress.", "Approaches to defining the concept of Artificial General Intelligence (AGI) are reviewed including mathematical formalisms, engineering, and biology inspired perspectives.", "The spectrum of designs for AGI systems includes systems with symbolic, emergentist, hybrid and universalist characteristics.", "Metrics for general intelligence are evaluated, with a conclusion that, although metrics for assessing the achievement of human-level AGI may be relatively straightforward (e.g. the Turing Test, or a robot that can graduate from elementary school or university), metrics for assessing partial progress remain more controversial and problematic." ]
[ 0, 0, 2, 1, 4 ]
[ 0.8072999715805054, 0.5871999859809875, 0.44040000438690186, 0.6606000065803528, 0.8532000184059143 ]
train_1330
[ "| In this paper, we consider path planning for a car-like vehicle.", "We deene a new problem adding to the classical one a continuous-curvature constraint and a bound on the curvature derivative, so as to reeect the fact that a car-like vehicle can only reorient its front wheels with a nite velocity.", "As optimal solutions can contain an innnity of pieces, we propose a solution to compute Sub-optimal Continuous Curvature paths, called SCC-paths.", "These paths contain at most eight pieces, each piece being either a line segment, a circular arc of maximum curvature, or a clothoid arc.", "Praxit ele programme on individual urban public transports 1993-1997], and the Inco-Copernicus ERB-IC15-CT96-0702 project \\Multi-agent robot systems for industrial applications in the transport domain\" 1997-1999].", "Abstract: In this paper, we consider path planning for a car-like vehicle.", "We deene a new problem adding to the classical one a continuous-curvature constraint and a bound on the curvature derivative, so as to reeect the fact that a car-like vehicle can only reorient its front wheels with a nite velocity.", "As optimal solutions can contain an innnity of pieces, we propose a solution to compute Sub-optimal Continuous Curvature paths, called SCC-paths.", "These paths contain at most eight pieces, each piece being either a line segment, a circular arc of maximum curvature, or a clothoid arc." ]
[ 0, 0, 0, 1, 1, 1, 1, 4, 4 ]
[ 0.5896999835968018, 0.5896999835968018, 0.41029998660087585, 0.5896999835968018, 0.41029998660087585, 0.6154000163078308, 0.5896999835968018, 0.41029998660087585, 0.41029998660087585 ]
train_1331
[ "Convolutional Neural Networks (CNNs) are an alternative type of neural network that can be used to reduce spectral variations and model spectral correlations which exist in signals.", "Since speech signals exhibit both of these properties, CNNs are a more effective model for speech compared to Deep Neural Networks (DNNs).", "In this paper, we explore applying CNNs to large vocabulary speech tasks.", "First, we determine the appropriate architecture to make CNNs effective compared to DNNs for LVCSR tasks.", "Specifically, we focus on how many convolutional layers are needed, what is the optimal number of hidden units, what is the best pooling strategy, and the best input feature type for CNNs.", "We then explore the behavior of neural network features extracted from CNNs on a variety of LVCSR tasks, comparing CNNs to DNNs and GMMs.", "We find that CNNs offer between a 13-30% relative improvement over GMMs, and a 4-12% relative improvement over DNNs, on a 400-hr Broadcast News and 300-hr Switchboard task." ]
[ 0, 0, 2, 1, 1, 1, 4 ]
[ 0.771399974822998, 1, 0.6571000218391418, 0.571399986743927, 0.628600001335144, 1, 0.8571000099182129 ]
train_1332
[ "Scientific Question Answering (SQA) is a challenging open-domain task which requires the capability to understand questions and choices, collect useful information, and reason over evidence.", "Previous work typically formulates this task as a reading comprehension or entailment problem given evidence retrieved from search engines.", "However, existing techniques struggle to retrieve indirectly related evidence when no directly related evidence is provided, especially for complex questions where it is hard to parse precisely what the question asks.", "In this paper we propose a retriever-reader model that learns to attend on essential terms during the question answering process.", "We build 1) an essential-term-aware ‘retriever’ which first identifies the most important words in a question, then reformulates the queries and searches for related evidence 2) an enhanced ‘reader’ to distinguish between essential terms and distracting words to predict the answer.", "We experimentally evaluate our model on the ARC dataset where it outperforms the existing state-of-the-art model by 7.4%." ]
[ 0, 0, 1, 1, 4, 4 ]
[ 0.5788999795913696, 0.7894999980926514, 0.6053000092506409, 0.5788999795913696, 0.39469999074935913, 0.7894999980926514 ]
train_1333
[ "Automatic age and gender classification has become relevant to an increasing amount of applications, particularly since the rise of social platforms and social media.", "Nevertheless, performance of existing methods on real-world images is still significantly lacking, especially when compared to the tremendous leaps in performance recently reported for the related task of face recognition.", "In this paper we show that by learning representations through the use of deep-convolutional neural networks (CNN), a significant increase in performance can be obtained on these tasks.", "To this end, we propose a simple convolutional net architecture that can be used even when the amount of learning data is limited.", "We evaluate our method on the recent Adience benchmark for age and gender estimation and show it to dramatically outperform current state-of-the-art methods." ]
[ 0, 0, 1, 1, 4 ]
[ 0.5881999731063843, 0.5881999731063843, 0.5881999731063843, 1, 0.7940999865531921 ]
train_1334
[ "This work describes MATLAB/Simulink implementation of three induction motor tests, namely dc, no-load, and blocked-rotor tests performed to identify equivalent circuit parameters.", "These simulation models are developed to support and enhance electric machinery education at the undergraduate level.", "The proposed tests have been successfully integrated into electric machinery courses at Drexel University, Philadelphia, PA, and Nigde University, Nigde, Turkey." ]
[ 0, 2, 4 ]
[ 0.6111000180244446, 0.3610999882221222, 0.583299994468689 ]
train_1335
[ "The move from hand-designed features to learned features in machine learning has been wildly successful.", "In spite of this, optimization algorithms are still designed by hand.", "In this paper we show how the design of an optimization algorithm can be cast as a learning problem, allowing the algorithm to learn to exploit structure in the problems of interest in an automatic way.", "Our learned algorithms, implemented by LSTMs, outperform generic, hand-designed competitors on the tasks for which they are trained, and also generalize well to new tasks with similar structure.", "We demonstrate this on a number of tasks, including simple convex problems, training neural networks, and styling images with neural art." ]
[ 0, 0, 1, 4, 4 ]
[ 0.7838000059127808, 0.7838000059127808, 0.3783999979496002, 0.3783999979496002, 0.3783999979496002 ]
train_1336
[ "The Boeing Employee Credit Union (BECU) has been providing financial assistance to employees since 1935.", "By 1938, membership had grown to 850 members.", "During the 1990s, BECU grew from 150,000 members with 362,000 accounts to 260,000 members with 1,170,174 accounts.", "BECU is the largest financial cooperative in Washington State, and the third largest credit union in the country.", "Without significant investments in information technology, however, it would be impossible for BECU to deliver personalized service to its members.", "The idea of creating a member-centric information systems capability was first expressed in May 1999.", "Today, the data warehouse has resulted in many benefits, including plans to leverage the $2 million investment by providing three distinct types of service.", "This case study details these three types of service, the impact of each service on BECU's performance, and the future directions and the lessons learned from the project." ]
[ 0, 0, 0, 0, 0, 0, 0, 1 ]
[ 0.8108000159263611, 0.8108000159263611, 0.8108000159263611, 0.5946000218391418, 0.5946000218391418, 0.6215999722480774, 0.40540000796318054, 0.40540000796318054 ]
train_1337
[ "We believe that current research in creativity (especially in artificial intelligence and to a great extent psychology) focuses too much on the product and on exceptional (big-C) creativity.", "In this paper we want to argue that creative thinking and creative behavior result from the continuation of typical human cognitive development and that by looking into the early stages of this development, we can learn more about creativity.", "Furthermore, we wish to see analogy as a core mechanism in human cognitive development rather than a special skill among many.", "Some developmental psychology results that support this claim are reviewed.", "Analogy and metaphor are also seen as central for the creative process.", "Whereas mainstream research in artificial creativity and computational models of reasoning by analogy stresses the importance of matching the structure between the source and the target domains, we suggest that perceptual similarities play a much more important role, at least when it comes to creative problem solving.", "We provide some empirical data to support these claims and discuss their consequences." ]
[ 0, 2, 0, 4, 1, 4, 3 ]
[ 0.6176000237464905, 0.5357000231742859, 0.5881999731063843, 0.44119998812675476, 0.7940999865531921, 0.3824000060558319, 0.2856999933719635 ]
train_1338
[ "In this paper, we present the strategy for trajectory planning that was used on-board the vehicle that completed the 103 km of the Bertha-Benz-Memorial-Route fully autonomously.", "We suggest a local, continuous method that is derived from a variational formulation.", "The solution trajectory is the constrained extremum of an objective function that is designed to express dynamic feasibility and comfort.", "Static and dynamic obstacle constraints are incorporated in the form of polygons.", "The constraints are carefully designed to ensure that the solution converges to a single, global optimum." ]
[ 0, 1, 1, 1, 1 ]
[ 0.5946000218391418, 0.8108000159263611, 0.5946000218391418, 0.7838000059127808, 1 ]
train_1339
[ "Motivated by requirements of Web 2.0 applications, a plethora of non-relational databases raised in recent years.", "Since it is very difficult to choose a suitable database for a specific use case, this paper evaluates the underlying techniques of NoSQL databases considering their applicability for certain requirements.", "These systems are compared by their data models, query possibilities, concurrency controls, partitioning and replication opportunities." ]
[ 0, 0, 0 ]
[ 0.7768999934196472, 0.41429999470710754, 0.358599990606308 ]
train_1340
[ "A large number of 3D models are created and available on the Web, since more and more 3D modelling and digitizing tools are developed for ever increasing applications.", "The techniques for content-based 3D model retrieval then become necessary.", "In this paper, a visual similarity-based 3D model retrieval system is proposed.", "This approach measures the similarity among 3D models by visual similarity, and the main idea is that if two 3D models are similar, they also look similar from all viewing angles.", "Therefore, one hundred orthogonal projections of an object, excluding symmetry, are encoded both by Zernike moments and Fourier descriptors as features for later retrieval.", "The visual similarity-based approach is robust against similarity transformation, noise, model degeneracy etc., and provides 42%, 94% and 25% better performance (precision-recall evaluation diagram) than three other competing approaches: (1)the spherical harmonics approach developed by Funkhouser et al., (2)the MPEG-7 Shape 3D descriptors, and (3)the MPEG-7 Multiple View Descriptor.", "The proposed system is on the Web for practical trial use (http://3d.csie.ntu.edu.tw), and the database contains more than 10,000 publicly available 3D models collected from WWW pages.", "Furthermore, a user friendly interface is provided to retrieve 3D models by drawing 2D shapes.", "The retrieval is fast enough on a server with Pentium IV 2.4GHz CPU, and it takes about 2 seconds and 0.1 seconds for querying directly by a 3D model and by hand drawn 2D shapes, respectively." ]
[ 0, 0, 2, 2, 2, 2, 1, 1, 4 ]
[ 1, 0.771399974822998, 0.628600001335144, 0.428600013256073, 0.571399986743927, 0.4000000059604645, 0.4000000059604645, 0.571399986743927, 0.771399974822998 ]
train_1341
[ "We propose the use of classifiers and machine learning techniques to extract useful information from data sets (e.g., images) to solve important problems in Image Processing and Computer Vision.", "We are interested in: two and multiclass image categorization, hidden messages detection, discrimination among natural and forged images, authentication, and multi-classification.", "Keywords-Machine Learning Techniques; Digital Forensics; Steganalysis; Feature Fusion; Classifier Fusion; Multi-class Classification; Image Categorization." ]
[ 2, 2, 3 ]
[ 0.6388999819755554, 0.583299994468689, 0.44440001249313354 ]
train_1342
[ "Extracting open relational tuples that are mediated by nouns (instead of verbs) is important since titles and entity attributes are often expressed nominally.", "While appositives and possessives are easy to handle, a difficult and important class of nominal extractions requires interpreting compound noun phrases (e.g., “Google CEO Larry Page”).", "We substantially improve the quality of Open IE from compound noun phrases by focusing on phenomena like demonyms and compound relational nouns.", "We release RELNOUN 2.2, which obtains 3.5 times yield with over 15 point improvement in precision compared to RELNOUN 1.1, a publicly available nominal Open IE system." ]
[ 0, 0, 1, 4 ]
[ 0.6053000092506409, 0.421099990606308, 0.766700029373169, 0.5788999795913696 ]
train_1343
[ "The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to certain \"identifying\" attributes) contains at least k records.", "Recently, several authors have recognized that k-anonymity cannot prevent attribute disclosure.", "The notion of l-diversity has been proposed to address this; l-diversity requires that each equivalence class has at least l well-represented values for each sensitive attribute.", "In this paper we show that l-diversity has a number of limitations.", "In particular, it is neither necessary nor sufficient to prevent attribute disclosure.", "We propose a novel privacy notion called t-closeness, which requires that the distribution of a sensitive attribute in any equivalence class is close to the distribution of the attribute in the overall table (i.e., the distance between the two distributions should be no more than a threshold t).", "We choose to use the earth mover distance measure for our t-closeness requirement.", "We discuss the rationale for t-closeness and illustrate its advantages through examples and experiments." ]
[ 2, 0, 0, 0, 0, 1, 1, 4 ]
[ 0.4000000059604645, 1, 0.6000000238418579, 0.4000000059604645, 0.800000011920929, 0.800000011920929, 0.800000011920929, 0.6000000238418579 ]
train_1344
[ "A text-to-speech synthesis system typically consists of multiple stages, such as a text analysis frontend, an acoustic model and an audio synthesis module.", "Building these components often requires extensive domain expertise and may contain brittle design choices.", "In this paper, we present Tacotron, an end-to-end generative text-to-speech model that synthesizes speech directly from characters.", "Given <text, audio> pairs, the model can be trained completely from scratch with random initialization.", "We present several key techniques to make the sequence-tosequence framework perform well for this challenging task.", "Tacotron achieves a 3.82 subjective 5-scale mean opinion score on US English, outperforming a production parametric system in terms of naturalness.", "In addition, since Tacotron generates speech at the frame level, it’s substantially faster than sample-level autoregressive methods." ]
[ 0, 0, 2, 1, 1, 4, 4 ]
[ 0.771399974822998, 1, 0.428600013256073, 0.800000011920929, 0.571399986743927, 1, 0.428600013256073 ]
train_1345
[ "Energy management means to optimize one of the most complex and important technical creations that we know: the energy system.", "While there is plenty of experience in optimizing energy generation and distribution, it is the demand side that receives increasing attention by research and industry.", "Demand Side Management (DSM) is a portfolio of measures to improve the energy system at the side of consumption.", "It ranges from improving energy efficiency by using better materials, over smart energy tariffs with incentives for certain consumption patterns, up to sophisticated real-time control of distributed energy resources.", "This paper gives an overview and a taxonomy for DSM, analyzes the various types of DSM, and gives an outlook on the latest demonstration projects in this domain." ]
[ 0, 0, 0, 1, 4 ]
[ 1, 0.8378000259399414, 0.5946000218391418, 0.4323999881744385, 0.7838000059127808 ]
train_1346
[ "In this paper we consider the problem of multi-view face detection.", "While there has been significant research on this problem, current state-of-the-art approaches for this task require annotation of facial landmarks, e.g. TSM [25], or annotation of face poses [28, 22].", "They also require training dozens of models to fully capture faces in all orientations, e.g. 22 models in HeadHunter method [22].", "In this paper we propose Deep Dense Face Detector (DDFD), a method that does not require pose/landmark annotation and is able to detect faces in a wide range of orientations using a single model based on deep convolutional neural networks.", "The proposed method has minimal complexity; unlike other recent deep learning object detection methods [9], it does not require additional components such as segmentation, bounding-box regression, or SVM classifiers.", "Furthermore, we analyzed scores of the proposed face detector for faces in different orientations and found that 1) the proposed method is able to detect faces from different angles and can handle occlusion to some extent, 2) there seems to be a correlation between distribution of positive examples in the training set and scores of the proposed face detector.", "The latter suggests that the proposed method's performance can be further improved by using better sampling strategies and more sophisticated data augmentation techniques.", "Evaluations on popular face detection benchmark datasets show that our single-model face detector algorithm has similar or better performance compared to the previous methods, which are more complex and require annotations of either different poses or facial landmarks." ]
[ 0, 0, 0, 1, 1, 1, 1, 4 ]
[ 1, 1, 0.6061000227928162, 0.5758000016212463, 1, 0.7878999710083008, 0.7878999710083008, 1 ]
train_1347
[ "Network traffic monitoring and analysis-related research has struggled to scale for massive amounts of data in real time.", "Some of the vertical scaling solutions provide good implementation of signature based detection.", "Unfortunately these approaches treat network flows across different subnets and cannot apply anomaly-based classification if attacks originate from multiple machines at a lower speed, like the scenario of Peer-to-Peer Botnets.", "In this paper the authors build up on the progress of open source tools like Hadoop, Hive and Mahout to provide a scalable implementation of quasi-real-time intrusion detection system.", "The implementation is used to detect Peer-to-Peer Botnet attacks using machine learning approach.", "The contributions of this paper are as follows: (1) Building a distributed framework using Hive for sniffing and processing network traces enabling extraction of dynamic network features; (2) Using the parallel processing power of Mahout to build Random Forest based Decision Tree model which is applied to the problem of Peer-to-Peer Botnet detection in quasi-real-time.", "The implementation setup and performance metrics are presented as initial observations and future extensions are proposed.", "2014 Elsevier Inc. All rights reserved." ]
[ 0, 0, 0, 1, 1, 1, 4, 3 ]
[ 1, 0.8055999875068665, 0.7585999965667725, 0.6111000180244446, 0.6111000180244446, 0.41670000553131104, 0.6111000180244446, 0.7778000235557556 ]
train_1348
[ "This paper describes experiments, on two domains, to investigate the effect of averaging over predictions of multiple decision trees, instead of using a single tree.", "Other authors have pointed out theoretical and commonsense reasons for preferring· the multiple tree approach.", "Ideally, we would like to consider predictions from all trees, weighted by their probability.", "However, there is a vast·number of different trees, and it is difficult to estimate the probability of each tree.", "We sidestep the estimation problem by using a modified version of the ID3 algorithm to build good trees, and average over only these trees.", "Our results are encouraging.", "For each domain, we managed to produce a small number of good trees.", "We fmd that it is best to average across sets of trees with different structure; this usually gives better perfonnance than any of the constituent trees, including the ID3 tree." ]
[ 0, 0, 0, 0, 1, 4, 4, 4 ]
[ 0.6000000238418579, 0.771399974822998, 0.4000000059604645, 0.6000000238418579, 0.771399974822998, 1, 1, 1 ]
train_1349
[ "This work introduces a new dataset and framework for the exploration of topological data analysis (TDA) techniques applied to time-series data.", "We examine the end-toend TDA processing pipeline for persistent homology applied to time-delay embeddings of time series – embeddings that capture the underlying system dynamics from which time series data is acquired.", "In particular, we consider stability with respect to time series length, the approximation accuracy of sparse filtration methods, and the discriminating ability of persistence diagrams as a feature for learning.", "We explore these properties across a wide range of time-series datasets spanning multiple domains for single source multi-segment signals as well as multi-source single segment signals.", "Our analysis and dataset captures the entire TDA processing pipeline and includes time-delay embeddings, persistence diagrams, topological distance measures, as well as kernels for similarity learning and classification tasks for a broad set of time-series data sources.", "We outline the TDA framework and rationale behind the dataset and provide insights into the role of TDA for time-series analysis as well as opportunities for new work." ]
[ 2, 1, 1, 1, 4, 4 ]
[ 0.41029998660087585, 0.6154000163078308, 0.7949000000953674, 0.3846000134944916, 0.41029998660087585, 0.41029998660087585 ]
train_1350
[ "The body structure of an anatomically correct tendon-driven musculoskeletal humanoid is complex, and the difference between its geometric model and the actual robot is very large because expressing the complex routes of tendon wires in a geometric model is very difficult.", "If we move a tendon-driven musculoskeletal humanoid by the tendon wire lengths of the geometric model, unintended muscle tension and slack will emerge.", "In some cases, this can lead to the wreckage of the actual robot.", "To solve this problem, we focused on reciprocal innervation in the human nervous system, and then implemented antagonist inhibition control (AIC)-based on the reflex.", "This control makes it possible to avoid unnecessary internal muscle tension and slack of tendon wires caused by model error, and to perform wide range motion safely for a long time.", "To verify its effectiveness, we applied AIC to the upper limb of the tendon-driven musculoskeletal humanoid, Kengoro, and succeeded in dangling for 14 min and doing pull-ups." ]
[ 0, 0, 0, 1, 1, 1 ]
[ 1, 1, 1, 0.428600013256073, 1, 0.800000011920929 ]
train_1351
[ "It is necessary to understand the content of articles and user preferences to make effective news recommendations.", "While ID-based methods, such as collaborative filtering and low-rank factorization, are well known for making recommendations, they are not suitable for news recommendations because candidate articles expire quickly and are replaced with new ones within short spans of time.", "Word-based methods, which are often used in information retrieval settings, are good candidates in terms of system performance but have issues such as their ability to cope with synonyms and orthographical variants and define \"queries\" from users' historical activities.", "This paper proposes an embedding-based method to use distributed representations in a three step end-to-end manner: (i) start with distributed representations of articles based on a variant of a denoising autoencoder, (ii) generate user representations by using a recurrent neural network (RNN) with browsing histories as input sequences, and (iii) match and list articles for users based on inner-product operations by taking system performance into consideration.", "The proposed method performed well in an experimental offline evaluation using past access data on Yahoo!", "JAPAN's homepage.", "We implemented it on our actual news distribution system based on these experimental results and compared its online performance with a method that was conventionally incorporated into the system.", "As a result, the click-through rate (CTR) improved by 23% and the total duration improved by 10%, compared with the conventionally incorporated method.", "Services that incorporated the method we propose are already open to all users and provide recommendations to over ten million individual users per day who make billions of accesses per month." ]
[ 0, 0, 1, 1, 4, 3, 1, 4, 4 ]
[ 0.8611000180244446, 0.666700005531311, 0.5555999875068665, 0.44440001249313354, 0.3610999882221222, 0.5555999875068665, 0.6388999819755554, 0.666700005531311, 0.666700005531311 ]
train_1352
[ "Crowdsourcing is an umbrella term for a variety of approaches that tap into the potential of a large and open crowd of people.", "So far, there is no systematic understanding of the processes used to source and aggregate contributions from the crowd.", "In particular, crowdsourcing organizations striving to achieve a specific goal should be able to evaluate the mechanisms that impact these processes.", "Following a method of IS taxonomy development we propose a new taxonomic framework for crowdsourcing processes.", "In contrast to previous work, this classification scheme focuses exclusively on an organizational perspective and on the mechanisms available to these organizations.", "The resulting dimensions are preselection of contributors, accessibility of peer contributions, aggregation of contributions, and remuneration for contributions.", "By classifying the processes of 46 crowdsourcing examples, we identify 19 distinct process types.", "A subsequent cluster analysis shows general patterns among these types and indicates a link to certain applications of crowdsourcing." ]
[ 0, 0, 2, 1, 1, 4, 4, 4 ]
[ 0.8055999875068665, 0.583299994468689, 0.8055999875068665, 0.7778000235557556, 0.8055999875068665, 0.3610999882221222, 0.583299994468689, 1 ]
train_1353
[ "In remote sensing image processing, relaxation is defined as a method that uses the local relationship among neighboring pixels to correct spectral or spatial distortions.", "In recent years, relaxation methods have shown great success in classification of remotely sensed data.", "Relaxation, as a preprocessing step, can reduce noise and improve the class separability in the spectral domain.", "On the other hand, relaxation (as a postprocessing approach) works on the label image or class probabilities obtained from pixelwise classifiers.", "In this work, we develop a discontinuity preserving relaxation strategy, which can be used for postprocessing of class probability estimates, as well as preprocessing of the original hyperspectral image.", "The newly proposed method is an iterative relaxation procedure, which exploits spatial information in such a way that it considers discontinuities existing in the data cube.", "Our experimental results indicate that the proposed methodology leads to state-of-the-art classification results when combined with probabilistic classifiers for several widely used hyperspectral data sets, even when very limited training samples are available." ]
[ 2, 1, 4, 2, 1, 1, 4 ]
[ 0.428600013256073, 0.628600001335144, 0.428600013256073, 0.571399986743927, 0.571399986743927, 0.628600001335144, 0.571399986743927 ]
train_1354
[ "This paper presents a model, synthesized from the literature, of factors that explain how business analytics contributes to business value.", "It also reports results from a preliminary test of that model.", "The model consists of two parts: a process and a variance model.", "The process model depicts the analyze-insight-decision-action process through which use of an organization’s business-analytic capabilities create business value.", "The variance model proposes that the five factors in Davenport et al.’s (2010) DELTA model of BA success factors, six from Watson and Wixom (2007), and three from Seddon et al.’s (2010) model of organizational benefits from enterprise systems, assist a firm to gain business value from business analytics.", "A preliminary test of the model was conducted using data from 100 customer-success stories from vendors such as IBM, SAP, and Teradata.", "Our conclusion is that the model is likely to be a useful basis for future research." ]
[ 0, 2, 1, 1, 1, 4, 4 ]
[ 0.5817000269889832, 0.6134999990463257, 0.6134999990463257, 0.8087999820709229, 0.5856999754905701, 0.7573999762535095, 0.8087999820709229 ]
train_1355
[ "We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication.", "In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user's identity before storing data.", "Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information.", "The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud.", "We also address user revocation.", "Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized.", "The communication, computation, and storage overheads are comparable to centralized approaches." ]
[ 2, 1, 1, 1, 1, 1, 4 ]
[ 0.421099990606308, 0.421099990606308, 0.631600022315979, 0.6053000092506409, 0.6053000092506409, 0.421099990606308, 0.766700029373169 ]
train_1356
[ "In this paper, we propose a simple but effective image prior-dark channel prior to remove haze from a single input image.", "The dark channel prior is a kind of statistics of outdoor haze-free images.", "It is based on a key observation-most local patches in outdoor haze-free images contain some pixels whose intensity is very low in at least one color channel.", "Using this prior with the haze imaging model, we can directly estimate the thickness of the haze and recover a high-quality haze-free image.", "Results on a variety of hazy images demonstrate the power of the proposed prior.", "Moreover, a high-quality depth map can also be obtained as a byproduct of haze removal." ]
[ 0, 0, 2, 1, 4, 4 ]
[ 0.5946000218391418, 0.5946000218391418, 0.5946000218391418, 1, 0.8108000159263611, 0.6215999722480774 ]
train_1357
[ "We present a set of algorithms that can be used to locate and crop the chess-board/chesspieces from the picture, including every rectangular grid with any pattern.", "Our method is nonparametric, and thus does not require the prior knowledge from computer vision and machine learning, which is instead inferred from data.", "We illustrate the application of our method to a variety of examples, such as chess-board cropping and regular grid-pattern localization.", "In addition, we present two independent algorithms: PAMG (vertices detector) and FAPL (thermal lines) that can be widely used for other tasks in computer vision." ]
[ 1, 1, 1, 1 ]
[ 0.6485999822616577, 0.7838000059127808, 0.4323999881744385, 0.6485999822616577 ]
train_1358
[ "In the era of big data, transformation of biomedical big data into valuable knowledge has been one of the most important challenges in bioinformatics.", "Deep learning has advanced rapidly since the early 2000s and now demonstrates state-of-the-art performance in various fields.", "Accordingly, application of deep learning in bioinformatics to gain insight from data has been emphasized in both academia and industry.", "Here, we review deep learning in bioinformatics, presenting examples of current research.", "To provide a useful and comprehensive perspective, we categorize research both by the bioinformatics domain (i.e. omics, biomedical imaging, biomedical signal processing) and deep learning architecture (i.e. deep neural networks, convolutional neural networks, recurrent neural networks, emergent architectures) and present brief descriptions of each study.", "Additionally, we discuss theoretical and practical issues of deep learning in bioinformatics and suggest future research directions.", "We believe that this review will provide valuable insights and serve as a starting point for researchers to apply deep learning approaches in their bioinformatics studies." ]
[ 0, 0, 0, 0, 1, 1, 4 ]
[ 0.8181999921798706, 0.8181999921798706, 0.5758000016212463, 0.33329999446868896, 0.666700005531311, 0.666700005531311, 0.42419999837875366 ]
train_1359
[ "This paper introduces SC2LE (StarCraft II Learning Environment), a reinforcement learning environment based on the game StarCraft II.", "This domain poses a new grand challenge for reinforcement learning, representing a more difficult class of problems than considered in most prior work.", "It is a multi-agent problem with multiple players interacting; there is imperfect information due to a partially observed map; it has a large action space involving the selection and control of hundreds of units; it has a large state space that must be observed solely from raw input feature planes; and it has delayed credit assignment requiring long-term strategies over thousands of steps.", "We describe the observation, action, and reward specification for the StarCraft II domain and provide an open source Python-based interface for communicating with the game engine.", "In addition to the main game maps, we provide a suite of mini-games focusing on different elements of StarCraft II gameplay.", "For the main game maps, we also provide an accompanying dataset of game replay data from human expert players.", "We give initial baseline results for neural networks trained from this data to predict game outcomes and player actions.", "Finally, we present initial baseline results for canonical deep reinforcement learning agents applied to the StarCraft II domain.", "On the mini-games, these agents learn to achieve a level of play that is comparable to a novice player.", "However, when trained on the main game, these agents are unable to make significant progress." ]
[ 0, 2, 0, 2, 2, 1, 1, 4, 4, 4 ]
[ 0.5946000218391418, 0.40540000796318054, 0.6215999722480774, 0.4323999881744385, 0.40540000796318054, 0.6215999722480774, 0.6215999722480774, 0.6215999722480774, 0.4323999881744385, 0.6215999722480774 ]
train_1360
[ "In this article, we build models to predict the existence of citations among papers by formulating link prediction for 5 large-scale datasets of citation networks.", "The supervised machine-learning model is applied with 11 features.", "As a result, our learner performs very well, with the F1 values of between 0.74 and 0.82.", "Three features in particular, link-based Jaccard coefficient , difference in betweenness centrality , and cosine similarity of term frequency–inverse document frequency vectors, largely affect the predictions of citations.", "The results also indicate that different models are required for different types of research areas—research fields with a single issue or research fields with multiple issues.", "In the case of research fields with multiple issues, there are barriers among research fields because our results indicate that papers tend to be cited in each research field locally.", "Therefore, one must consider the typology of targeted research areas when building models for link prediction in citation networks." ]
[ 0, 1, 4, 0, 1, 4, 4 ]
[ 0.41670000553131104, 0.41670000553131104, 0.5171999931335449, 0.41670000553131104, 0.41670000553131104, 1, 0.8055999875068665 ]
train_1361
[ "Twitter is one of the biggest platforms where massive instant messages (i.e. tweets) are published every day.", "Users tend to express their real feelings freely in Twitter, which makes it an ideal source for capturing the opinions towards various interesting topics, such as brands, products or celebrities, etc.", "Naturally, people may anticipate an approach to receiving the common sentiment tendency towards these topics directly rather than through reading the huge amount of tweets about them.", "On the other side, Hashtags, starting with a symbol \"#\" ahead of keywords or phrases, are widely used in tweets as coarse-grained topics.", "In this paper, instead of presenting the sentiment polarity of each tweet relevant to the topic, we focus our study on hashtag-level sentiment classification.", "This task aims to automatically generate the overall sentiment polarity for a given hashtag in a certain time period, which markedly differs from the conventional sentence-level and document-level sentiment analysis.", "Our investigation illustrates that three types of information is useful to address the task, including (1) sentiment polarity of tweets containing the hashtag; (2) hashtags co-occurrence relationship and (3) the literal meaning of hashtags.", "Consequently, in order to incorporate the first two types of information into a classification framework where hashtags can be classified collectively, we propose a novel graph model and investigate three approximate collective classification algorithms for inference.", "Going one step further, we show that the performance can be remarkably improved using an enhanced boosting classification setting in which we employ the literal meaning of hashtags as semi-supervised information.", "Experimental results on a real-life data set consisting of 29,195 tweets and 2,181 hashtags show the effectiveness of the proposed model and algorithms." ]
[ 0, 0, 2, 1, 2, 2, 2, 4, 4, 4 ]
[ 1, 1, 0.41029998660087585, 0.5896999835968018, 0.41029998660087585, 0.41029998660087585, 0.41029998660087585, 0.41029998660087585, 0.5160999894142151, 1 ]
train_1362
[ "Being able to build a map of the environment and to simultaneously localize within this map is an essential skill for mobile robots navigating in unknown environments in absence of external referencing systems such as GPS.", "This so-called simultaneous localization and mapping (SLAM) problem has been one of the most popular research topics in mobile robotics for the last two decades and efficient approaches for solving this task have been proposed.", "One intuitive way of formulating SLAM is to use a graph whose nodes correspond to the poses of the robot at different points in time and whose edges represent constraints between the poses.", "The latter are obtained from observations of the environment or from movement actions carried out by the robot.", "Once such a graph is constructed, the map can be computed by finding the spatial configuration of the nodes that is mostly consistent with the measurements modeled by the edges.", "In this paper, we provide an introductory description to the graph-based SLAM problem.", "Furthermore, we discuss a state-of-the-art solution that is based on least-squares error minimization and exploits the structure of the SLAM problems during optimization.", "The goal of this tutorial is to enable the reader to implement the proposed methods from scratch." ]
[ 0, 0, 1, 1, 1, 1, 1, 4 ]
[ 0.637499988079071, 0.8605999946594238, 0.53329998254776, 0.637499988079071, 0.8205000162124634, 0.637499988079071, 0.44620001316070557, 0.637499988079071 ]
train_1363
[ "We report the results of a survey on music listening and management behaviours.", "The survey was conducted online with 222 participants with mostly technical backgrounds drawn from a college age population.", "The median size of offline music collections was found to be roughly 2540 songs (both physical media and digital files).", "The major findings of our survey show that elements such as familiarity of songs, how distracting they are, how much they match the listener’s mood, and the desire of changing the mood within one listening session, are all affected by the activity during which music is listened to.", "While people want to have options for manipulating the above elements to control their experience, they prefer a minimal amount of interaction in general.", "Current music players lack such flexibility in their controls.", "Finally, online recommender systems have not gained much popularity thus far." ]
[ 2, 1, 4, 4, 4, 0, 4 ]
[ 0.3846000134944916, 0.41029998660087585, 0.6154000163078308, 0.41029998660087585, 0.5160999894142151, 0.4839000105857849, 0.8205000162124634 ]
train_1364
[ "Most existing machine learning classifiers are highly vulnerable to adversarial examples.", "An adversarial example is a sample of input data which has been modified very slightly in a way that is intended to cause a machine learning classifier to misclassify it.", "In many cases, these modifications can be so subtle that a human observer does not even notice the modification at all, yet the classifier still makes a mistake.", "Adversarial examples pose security concerns because they could be used to perform an attack on machine learning systems, even if the adversary has no access to the underlying model.", "Up to now, all previous work have assumed a threat model in which the adversary can feed data directly into the machine learning classifier.", "This is not always the case for systems operating in the physical world, for example those which are using signals from cameras and other sensors as an input.", "This paper shows that even in such physical world scenarios, machine learning systems are vulnerable to adversarial examples.", "We demonstrate this by feeding adversarial images obtained from cell-phone camera to an ImageNet Inception classifier and measuring the classification accuracy of the system.", "We find that a large fraction of adversarial examples are classified incorrectly even when perceived through the camera." ]
[ 0, 0, 0, 0, 0, 0, 0, 1, 4 ]
[ 1, 1, 0.7894999980926514, 1, 1, 1, 0.421099990606308, 0.8158000111579895, 1 ]
train_1365
[ "Recently there has been quite a number of independent research activities that investigate the potentialities of integrating social networking concepts into Internet of Things (IoT) solutions.", "The resulting paradigm, named Social Internet of Things (SIoT), has the potential to support novel applications and networking services for the IoT in more effective and efficient ways.", "In this context, the main contributions of this paper are the following: i) we identify appropriate policies for the establishment and the management of social relationships between objects in such a way that the resulting social network is navigable; ii) we describe a possible architecture for the IoT that includes the functionalities required to integrate things into a social network; iii) we analyze the characteristics of the SIoT network structure by means of simulations." ]
[ 2, 2, 4 ]
[ 0.41029998660087585, 0.3846000134944916, 0.41029998660087585 ]
train_1366
[ "This paper presents a scheme for large engineering project risk management using a Bayesian belief network and applies it to the Korean shipbuilding industry.", "Twenty-six different risks were deduced from expert interviews and a literature review.", "A survey analysis was conducted on 252 experts from 11 major Korean shipbuilding companies in April 2007.", "The overall major risks were design change, design manpower, and raw material supply as internal risks, and exchange rate as external risk in both large-scale and medium-sized shipbuilding companies.", "Differences of project performance risks between large-scale and medium-sized shipbuilding companies were identified.", "Exceeding time schedule and specification discontent were more important to large-scale shipbuilding companies, while exceeding budget and exceeding time schedule were more important to medium-sized shipbuilding companies.", "The change of project performance risks was measured by risk reduction activities of quality management, and strikes at headquarters and subcontractors, in both large-scale and medium-sized shipbuilding companies.", "The research results should be valuable in enabling industrial participants to manage their large engineering project risks and in extending our understanding of Korean shipbuilding risks.", "2008 Elsevier Ltd. All rights reserved." ]
[ 0, 0, 0, 1, 1, 1, 1, 4, 3 ]
[ 0.8108000159263611, 0.8108000159263611, 0.5946000218391418, 0.40540000796318054, 0.7838000059127808, 0.5946000218391418, 0.5946000218391418, 1, 0.5946000218391418 ]
train_1367
[ "Online social networks (OSNs) gradually integrate financial capabilities by enabling the usage of real and virtual currency.", "They serve as new platforms to host a variety of business activities, such as online promotion events, where users can possibly get virtual currency as rewards by participating in such events.", "Both OSNs and business partners are significantly concerned when attackers instrument a set of accounts to collect virtual currency from these events, which make these events ineffective and result in significant financial loss.", "It becomes of great importance to proactively detecting these malicious accounts before the online promotion activities and subsequently decreases their priority to be rewarded.", "In this paper, we propose a novel system, namely ProGuard, to accomplish this objective by systematically integrating features that characterize accounts from three perspectives including their general behaviors, their recharging patterns, and the usage of their currency.", "We have performed extensive experiments based on data collected from the Tencent QQ, a global leading OSN with built-in financial management activities.", "Experimental results have demonstrated that our system can accomplish a high detection rate of 96.67% at a very low false positive rate of 0.3%." ]
[ 0, 0, 0, 0, 1, 1, 4 ]
[ 1, 0.8108000159263611, 0.8108000159263611, 0.6215999722480774, 0.5946000218391418, 0.6215999722480774, 1 ]
train_1368
[ "There is a vast amount of financial information on companies’ financial performance available to investors today.", "While automatic analysis of financial figures is common, it has been difficult to automatically extract meaning from the textual part of financial reports.", "The textual part of an annual report contains richer information than the financial ratios.", "In this paper, we combine data mining methods for analyzing quantitative and qualitative data from financial reports, in order to see if the textual part of the report contains some indication about future financial performance.", "The quantitative analysis has been performed using selforganizing maps, and the qualitative analysis using prototype-matching text clustering.", "The analysis is performed on the quarterly reports of three leading companies in the telecommunications sector." ]
[ 0, 0, 0, 1, 1, 4 ]
[ 0.8205000162124634, 0.6154000163078308, 0.41029998660087585, 0.7949000000953674, 0.5896999835968018, 0.5896999835968018 ]
train_1369
[ "Automatic identification is an efficient technology for the identification of butterfly species and pest control.", "As the major agriculture and forest pest, butterflies can be accurately classified based on the taxonomic characters.", "However, such identification can be only achieved by a few insect experts with years of experience.", "In the study, the shape and texture of butterflies were investigated for the automatic identification of butterfly species in the digital images: Histograms of multi-scale curvature (HoMSC) and gray-level co-occurrence matrix of image blocks (GLCMoIB) were used to describe the shape and texture of butterfly wings, respectively.", "To get an accurate identification result, a weight-based k-nearest neighbor classifier was designed.", "In addition, 750 images of 50 butterfly species were used for the identification test.", "The accuracy rate of this automatic identification method reached 98%.", "The result suggested that the HoMSC and GLCMoIB features can be efficient for the identification of butterfly species." ]
[ 0, 0, 0, 4, 1, 4, 4, 4 ]
[ 0.7975000143051147, 0.7975000143051147, 0.6202999949455261, 0.5864999890327454, 0.6202999949455261, 0.41350001096725464, 0.7932000160217285, 0.6159999966621399 ]
train_1370
[ "Label noise is an important issue in classification, with many potential negative consequences.", "For example, the accuracy of predictions may decrease, whereas the complexity of inferred models and the number of necessary training samples may increase.", "Many works in the literature have been devoted to the study of label noise and the development of techniques to deal with label noise.", "However, the field lacks a comprehensive survey on the different types of label noise, their consequences and the algorithms that consider label noise.", "This paper proposes to fill this gap.", "First, the definitions and sources of label noise are considered and a taxonomy of the types of label noise is proposed.", "Second, the potential consequences of label noise are discussed.", "Third, label noise-robust, label noise cleansing, and label noise-tolerant algorithms are reviewed.", "For each category of approaches, a short discussion is proposed to help the practitioner to choose the most suitable technique in its own particular field of application.", "Eventually, the design of experiments is also discussed, what may interest the researchers who would like to test their own algorithms." ]
[ 0, 1, 0, 1, 2, 2, 2, 1, 2, 1 ]
[ 0.5, 0.5, 0.5, 0.2856999933719635, 0.2856999933719635, 0.40380001068115234, 0.23080000281333923, 0.3653999865055084, 0.5769000053405762, 0.40380001068115234 ]
train_1371
[ "The face image is the most accessible biometric modality which is used for highly accurate face recognition systems, while it is vulnerable to many different types of presentation attacks.", "Face anti-spoofing is a very critical step before feeding the face image to biometric systems.", "In this paper, we propose a novel two-stream CNN-based approach for face anti-spoofing, by extracting the local features and holistic depth maps from the face images.", "The local features facilitate CNN to discriminate the spoof patches independent of the spatial face areas.", "On the other hand, holistic depth map examine whether the input image has a face-like depth.", "Extensive experiments are conducted on the challenging databases (CASIA-FASD, MSU-USSA, and Replay Attack), with comparison to the state of the art." ]
[ 0, 0, 1, 1, 1, 1 ]
[ 1, 1, 0.7894999980926514, 0.6053000092506409, 0.631600022315979, 0.421099990606308 ]
train_1372
[ "A major challenge for managers in turbulent environments is to make sound decisions quickly.", "Dynamic capabilities have been proposed as a means for addressing turbulent environments by helping managers extend, modify, and reconfigure existing operational capabilities into new ones that better match the environment.", "However, because dynamic capabilities have been viewed as an elusive black box, it is difficult for managers to make sound decisions in turbulent environments if they cannot effectively measure dynamic capabilities.", "Therefore, we first seek to propose a measurable model of dynamic capabilities by conceptualizing, operationalizing, and measuring dynamic capabilities.", "Specifically, drawing upon the dynamic capabilities literature, we identify a set of capabilities—sensing the environment, learning, coordinating, and integrating— that help reconfigure existing operational capabilities into new ones that better match the environment.", "Second, we propose a structural model where dynamic capabilities influence performance by reconfiguring existing operational capabilities in the context of new product development (NPD).", "Data from 180 NPD units support both the measurable model of dynamic capabilities and also the structural model by which dynamic capabilities influence performance in NPD by reconfiguring operational capabilities, particularly in higher levels of environmental turbulence.", "The study’s implications for managerial decision making in turbulent environments by capturing the elusive black box of dynamic capabilities are discussed.", "Subject Areas: Decision Making in Turbulent Environments, Dynamic Capabilities, Environmental Turbulence, New Product Development, and Operational Capabilities." ]
[ 0, 0, 0, 1, 1, 1, 4, 4, 3 ]
[ 1, 0.421099990606308, 0.6053000092506409, 0.6053000092506409, 0.8158000111579895, 0.8158000111579895, 0.6053000092506409, 0.39469999074935913, 0.6053000092506409 ]
train_1373
[ "While deep learning based methods for generic object detection have improved rapidly in the last two years, most approaches to face detection are still based on the R-CNN framework [11], leading to limited accuracy and processing speed.", "In this paper, we investigate applying the Faster RCNN [26], which has recently demonstrated impressive results on various object detection benchmarks, to face detection.", "By training a Faster R-CNN model on the large scale WIDER face dataset [34], we report state-of-the-art results on the WIDER test set as well as two other widely used face detection benchmarks, FDDB and the recently released IJB-A." ]
[ 1, 1, 4 ]
[ 0.6053000092506409, 0.39469999074935913, 0.6053000092506409 ]
train_1374
[ "Recently, Convolutional Neural Network (CNN) based models have achieved great success in Single Image Super-Resolution (SISR).", "Owing to the strength of deep networks, these CNN models learn an effective nonlinear mapping from the low-resolution input image to the high-resolution target image, at the cost of requiring enormous parameters.", "This paper proposes a very deep CNN model (up to 52 convolutional layers) named Deep Recursive Residual Network (DRRN) that strives for deep yet concise networks.", "Specifically, residual learning is adopted, both in global and local manners, to mitigate the difficulty of training very deep networks, recursive learning is used to control the model parameters while increasing the depth.", "Extensive benchmark evaluation shows that DRRN significantly outperforms state of the art in SISR, while utilizing far fewer parameters.", "Code is available at https://github.com/tyshiwo/DRRN_CVPR17." ]
[ 0, 0, 2, 1, 1, 3 ]
[ 1, 0.7894999980926514, 1, 0.6053000092506409, 0.5788999795913696, 1 ]
train_1375
[ "_______________________________________________ This work was supported in part by the U.K. EPSRC, grant number 06R00456 Department of Computer Systems, P.O. Box 325, S-751 05 Uppsala, Sweden (E-mail: ken@docs.uu.se)", "Abstract The increasing use of communication networks in time critical applications presents engineers with fundamental problems with the determination of response times of communicating distributed processes.", "Although there has been some work on the analysis of communication protocols, most of this is for idealised networks.", "Experience with single processor scheduling analysis has shown that models which abstract away from implementation details are at best very pessimistic and at worst lead to unschedulable system being deemed schedulable.", "In this paper, we derive idealised scheduling analysis for the CAN network, and then study two actual interface chips to see how the analysis can be applied." ]
[ 3, 0, 0, 0, 0 ]
[ 0.5198000073432922, 0.7573999762535095, 0.5659000277519226, 0.5929999947547913, 0.6240000128746033 ]
train_1376
[ "A critical decision problem for top management, and the focus of this study, is whether the CEO (chief executive officer) and CIO (chief information officer) should commit their time to formal planning with the expectation of producing an information technology (IT)-based competitive advantage.", "Using the perspective of the resource-based view, a model is presented that examines how strategic IT alignment can produce enhanced organizational strategies that yield competitive advantage.", "One hundred sixty-one CIOs provided data using a postal survey.", "Results supported seven of the eight hypotheses.", "They showed that information intensity is an important antecedent to strategic IT alignment, that strategic IT alignment is best explained by multiple constructs which operationalize both process and content measures, and that alignment between the IT plan and the business plan is significantly related to the use of IT for competitive advantage.", "Study results raise questions about the effect of CEO participation, which appears to be the weak link in the process, and also about the perception of the CIO on the importance of CEO involvement.", "The paper contributes to our understanding of how knowledge sharing in the alignment process contributes to the creation of superior organizational strategies, provides a framework of the alignment-performance relationship, and furnishes several new constructs.", "Subject Areas: Competitive Advantage, Information Systems Planning, Knowledge Sharing, Resource-Based View, Strategic Planning, and Structural Equation Modeling." ]
[ 0, 0, 4, 4, 4, 4, 4, 3 ]
[ 1, 0.6111000180244446, 0.44440001249313354, 0.6111000180244446, 0.6111000180244446, 0.833299994468689, 1, 0.6111000180244446 ]
train_1377
[ "Researchers have made significant progress in disciplines such as scientific and information visualization, statistically based exploratory and confirmatory analysis, data and knowledge representations, and perceptual and cognitive sciences.", "Although some research is being done in this area, the pace at which new technologies and technical talents are becoming available is far too slow to meet the urgent need.", "National Visualization and Analytics Center's goal is to advance the state of the science to enable analysts to detect the expected and discover the unexpected from massive and dynamic information streams and databases consisting of data of multiple types and from multiple sources, even though the data are often conflicting and incomplete.", "Visual analytics is a multidisciplinary field that includes the following focus areas: (i) analytical reasoning techniques, (ii) visual representations and interaction techniques, (iii) data representations and transformations, (iv) techniques to support production, presentation, and dissemination of analytical results.", "The R&D agenda for visual analytics addresses technical needs for each of these focus areas, as well as recommendations for speeding the movement of promising technologies into practice.", "This article provides only the concise summary of the R&D agenda.", "We encourage reading, discussion, and debate as well as active innovation toward the agenda for visual analysis." ]
[ 0, 0, 2, 1, 1, 4, 4 ]
[ 0.800000011920929, 0.800000011920929, 0.6000000238418579, 0.6000000238418579, 0.800000011920929, 0.428600013256073, 0.428600013256073 ]
train_1378
[ "There is significant interest in managing IT resources as a portfolio of assets.", "The concept of IT portfolio management (ITPM) is relatively new, compared to portfolio management in the context of finance, new product development (NPD), and research and development (R&D).", "This article compares ITPM with other types of portfolio management, and develops an improved understanding of IT assets and their characteristics.", "It presents a process-oriented framework for identifying critical ITPM decision stages.", "The proposed framework can be used by managers as well as researchers." ]
[ 0, 0, 1, 1, 4 ]
[ 1, 1, 0.6215999722480774, 0.5676000118255615, 0.4323999881744385 ]
train_1379
[ "The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge of security engineering.", "Market forces are driving software practitioners who are not security specialists to develop software that requires security features.", "When these practitioners develop software solutions without appropriate security-specific processes and models, they sometimes fail to produce effective solutions.", "We have adapted a proven object-oriented modeling technique, use cases, to capture and analyze security requirements in a simple way.", "We call the adaptation an abuse case model.", "Its relationship to other security engineering work products is relatively simple, from a" ]
[ 0, 0, 0, 1, 1, 4 ]
[ 0.7949000000953674, 1, 0.3846000134944916, 1, 0.3846000134944916, 0.6154000163078308 ]
train_1380
[ "Face-related biometrics research in recent years has moved from attempting merely to recognize faces, and even doing so under varying conditions, to considering a wide variety of aspects such as dynamics, gesture, aging, and expression.", "The state of an individual's face is a revealing indicator that may be used for soft biometrics, active authentication, deception detection, response feedback, and other areas of interface.", "One related psychological indicator is the Duchenne smile that usually indicates a genuine, spontaneous, or enjoyed emotional state rather than a forced or posed state, as likely expressed by a non-Duchenne smile.", "Differentiating between these is a useful task to automate for a variety of reasons.", "This paper discusses a classification technique that achieves higher recognition rates than previously published for similar comparisons." ]
[ 0, 0, 0, 0, 1 ]
[ 1, 1, 0.7838000059127808, 0.3513999879360199, 0.4323999881744385 ]
train_1381
[ "Industry 4.0 is characterized by smart manufacturing, implementation of Cyber Physical Systems (CPS) for production, i.e., embedded actuators and sensors, networks of microcomputers, and linking the machines to the value chain.", "It further considers the digital enhancement and reengineering of products.", "It is also characterized by highly differentiated customized products, and well-coordinated combination of products and services, and also the value added services with the actual product or service, and efficient supply chain.", "All these challenges require continuous innovation and learning, which is dependent on people and enterprise's capabilities.", "Appropriate management approaches can play a vital role in the development of dynamic capabilities, and effective learning and innovation climate.", "This paper aims at offering a viewpoint on best suitable management practices which can promote the climate of innovation and learning in the organization, and hence facilitate the business to match the pace of industry 4.0.", "This paper is one of the initial attempts to draw the attention towards the important role of management practices in industry 4.0, as most of the recent studies are discussing the technological aspect.", "This paper also suggests empirical and quantitative investigation on these management approaches in the context of industry 4.0." ]
[ 0, 0, 0, 0, 0, 2, 4, 4 ]
[ 0.5676000118255615, 0.7838000059127808, 0.5676000118255615, 0.7838000059127808, 0.5676000118255615, 0.7838000059127808, 0.6485999822616577, 0.4323999881744385 ]
train_1382
[ "Sudoku is a very simple and well-known puzzle that has achieved international popularity in the recent past.", "This paper addresses the problem of encoding Sudoku puzzles into conjunctive normal form (CNF), and subsequently solving them using polynomial-time propositional satisfiability (SAT) inference techniques.", "We introduce two straightforward SAT encodings for Sudoku: the minimal encoding and the extended encoding.", "The minimal encoding suffices to characterize Sudoku puzzles, whereas the extended encoding adds redundant clauses to the minimal encoding.", "Experimental results demonstrate that, for thousands of very hard puzzles, inference techniques struggle to solve these puzzles when using the minimal encoding.", "However, using the extended encoding, unit propagation is able to solve about half of our set of puzzles.", "Nonetheless, for some puzzles more sophisticated inference techniques are required." ]
[ 0, 2, 1, 1, 4, 4, 4 ]
[ 1, 0.5896999835968018, 0.5896999835968018, 0.6154000163078308, 0.7949000000953674, 0.7949000000953674, 0.7949000000953674 ]
train_1383
[ "Brain anatomy is characterized by dramatic growth from the end of the second trimester through the neonatal stage.", "The characterization of normal axonal growth of the white matter tracts has not been well-documented to date and could provide important clues to understanding the extensive inhomogeneity of white matter injuries in cerebral palsy (CP) patients.", "However, anatomical studies of human brain development during this period are surprisingly scarce and histology-based atlases have become available only recently.", "Diffusion tensor magnetic resonance imaging (DTMRI) can reveal detailed anatomy of white matter.", "We acquired diffusion tensor images (DTI) of postmortem fetal brain samples and in vivo neonates and children.", "Neural structures were annotated in two-dimensional (2D) slices, segmented, measured, and reconstructed three-dimensionally (3D).", "The growth status of various white matter tracts was evaluated on cross-sections at 19-20 gestational weeks, and compared with 0-month-old neonates and 5- to 6-year-old children.", "Limbic, commissural, association, and projection white matter tracts and gray matter structures were illustrated in 3D and quantitatively characterized to assess their dynamic changes.", "The overall pattern of the time courses for the development of different white matter is that limbic fibers develop first and association fibers last and commissural and projection fibers are forming from anterior to posterior part of the brain.", "The resultant DTMRI-based 3D human brain data will be a valuable resource for human brain developmental study and will provide reference standards for diagnostic radiology of premature newborns." ]
[ 0, 0, 0, 1, 1, 1, 1, 1, 1, 4 ]
[ 0.7894999980926514, 0.7894999980926514, 0.5788999795913696, 0.5788999795913696, 0.631600022315979, 0.421099990606308, 0.631600022315979, 0.631600022315979, 0.631600022315979, 0.7894999980926514 ]
train_1384
[ "In this paper, we presented the design and development of a new integrated device for measuring heart rate using fingertip to improve estimating the heart rate.", "As heart related diseases are increasing day by day, the need for an accurate and affordable heart rate measuring device or heart monitor is essential to ensure quality of health.", "However, most heart rate measuring tools and environments are expensive and do not follow ergonomics.", "Our proposed Heart Rate Measuring (HRM) device is economical and user friendly and uses optical technology to detect the flow of blood through index finger.", "Three phases are used to detect pulses on the fingertip that include pulse detection, signal extraction, and pulse amplification.", "Qualitative and quantitative performance evaluation of the device on real signals shows accuracy in heart rate estimation, even under intense of physical activity.", "We compared the performance of HRM device with Electrocardiogram reports and manual pulse measurement of heartbeat of 90 human subjects of different ages.", "The results showed that the error rate of the device is negligible." ]
[ 2, 0, 0, 1, 1, 1, 1, 4 ]
[ 0.6053000092506409, 0.5788999795913696, 0.7894999980926514, 0.8158000111579895, 0.7894999980926514, 0.8158000111579895, 0.6053000092506409, 0.7894999980926514 ]
train_1385
[ "Since organizational information security policies can only improve security if employees comply with them, understanding the factors that affect employee security compliance is crucial for strengthening information security.", "Based on a survey with 200 German employees, we find that reward for production goal achievement negatively impacts security compliance.", "Whereas a distinct error aversion culture also seems to impair security compliance, the results provide no evidence for an impact of error management culture, affective commitment towards the organization, security policy information quality or quality of the goal setting process.", "Furthermore, the intention to comply with security policies turns out to be a bad predictor for actual security compliance.", "We therefore suggest future studies to measure actual behavior instead of behavioral intention." ]
[ 0, 0, 0, 1, 3 ]
[ 0.8217999935150146, 0.6237999796867371, 0.47519999742507935, 0.5248000025749207, 0.38609999418258667 ]
train_1386
[ "We introduce the beat spectrum, a new method of automatically characterizing the rhythm and tempo of music and audio.", "The beat spectrum is a measure of acoustic self-similarity as a function of time lag.", "Highly structured or repetitive music will have strong beat spectrum peaks at the repetition times.", "This reveals both tempo and the relative strength of particular beats, and therefore can distinguish between different kinds of rhythms at the same tempo.", "We also introduce the beat spectrogram which graphically illustrates rhythm variation over time.", "Unlike previous approaches to tempo analysis, the beat spectrum does not depend on particular attributes such as energy or frequency, and thus will work for any music or audio in any genre.", "We present tempo estimation results which are accurate to within 1% for a variety of musical genres.", "This approach has a variety of applications, including music retrieval by similarity and automatically generating music videos." ]
[ 1, 0, 0, 0, 1, 4, 4, 4 ]
[ 0.5896999835968018, 0.5896999835968018, 0.5896999835968018, 0.3846000134944916, 1, 0.41029998660087585, 0.6154000163078308, 0.41029998660087585 ]
train_1387
[ "Virtualization of operating systems provides a common way to run different services in the cloud.", "Recently, the lightweight virtualization technologies claim to offer superior performance.", "In this paper, we present a detailed performance comparison of traditional hypervisor based virtualization and new lightweight solutions.", "In our measurements, we use several benchmarks tools in order to understand the strengths, weaknesses, and anomalies introduced by these different platforms in terms of processing, storage, memory and network.", "Our results show that containers achieve generally better performance when compared with traditional virtual machines and other recent solutions.", "Albeit containers offer clearly more dense deployment of virtual machines, the performance difference with other technologies is in many cases relatively small." ]
[ 0, 0, 1, 1, 4, 4 ]
[ 0.5896999835968018, 0.5896999835968018, 0.41029998660087585, 0.8205000162124634, 0.5896999835968018, 0.7949000000953674 ]
train_1388
[ "This paper presents an extensive study of the software implementation on workstations of the NIST-recommended elliptic curves over prime fields.", "We present the results of our implementation in C and assembler on a Pentium II 400 MHz workstation.", "We also provide a comparison with the NIST-recommended curves over binary fields." ]
[ 0, 4, 4 ]
[ 0.6000000238418579, 0.4000000059604645, 0.4000000059604645 ]
train_1389
[ "A simple odd number frequency divider with 50% duty cycle is presented.", "The odd number frequency divider consists of a general odd number counter and the proposed duty cycle trimming circuit.", "The duty cycle trimming circuit can output 50% duty cycle with only additional six transistors.", "A prototype divide-by-5 circuit with 50% duty cycle was implemented for a 500-Mb/s ∼ 5.6-Gb/s 1:10 CDR/DEMUX IC in a 0.13μm 1P8M CMOS process." ]
[ 0, 0, 1, 4 ]
[ 0.6053000092506409, 0.6053000092506409, 0.421099990606308, 0.5788999795913696 ]
train_1390
[ "Internet of Things (IoT), which will create a huge network of billions or trillions of “Things” communicating with one another, are facing many technical and application challenges.", "This paper introduces the status of IoT development in China, including policies, R&D plans, applications, and standardization.", "With China's perspective, this paper depicts such challenges on technologies, applications, and standardization, and also proposes an open and general IoT architecture consisting of three platforms to meet the architecture challenge.", "Finally, this paper discusses the opportunity and prospect of IoT." ]
[ 0, 2, 2, 4 ]
[ 0.8055999875068665, 0.3889000117778778, 0.3889000117778778, 0.8055999875068665 ]
train_1391
[ "Image representations, from SIFT and Bag of Visual Words to Convolutional Neural Networks (CNNs), are a crucial component of almost any image understanding system.", "Nevertheless, our understanding of them remains limited.", "In this paper we conduct a direct analysis of the visual information contained in representations by asking the following question: given an encoding of an image, to which extent is it possible to reconstruct the image itself?", "To answer this question we contribute a general framework to invert representations.", "We show that this method can invert representations such as HOG more accurately than recent alternatives while being applicable to CNNs too.", "We then use this technique to study the inverse of recent state-of-the-art CNN image representations for the first time.", "Among our findings, we show that several layers in CNNs retain photographically accurate information about the image, with different degrees of geometric and photometric invariance." ]
[ 0, 0, 0, 1, 1, 1, 4 ]
[ 0.7894999980926514, 1, 0.5788999795913696, 0.7894999980926514, 1, 0.421099990606308, 1 ]
train_1392
[ "One of the most important design problems for multi-UAV (Unmanned Air Vehicle) systems is the communication which is crucial for cooperation and collaboration between the UAVs.", "If all UAVs are directly connected to an infrastructure, such as a ground base or a satellite, the communication between UAVs can be realized through the in-frastructure.", "However, this infrastructure based communication architecture restricts the capabilities of the multi-UAV systems.", "Ad-hoc networking between UAVs can solve the problems arising from a fully infrastructure based UAV networks.", "In this paper, Flying Ad-Hoc Networks (FANETs) are surveyed which is an ad hoc network connecting the UAVs.", "The differences between FANETs, MANETs (Mobile Ad-hoc Networks) and VANETs (Vehicle Ad-Hoc Networks) are clarified first, and then the main FANET design challenges are introduced.", "Along with the existing FANET protocols, open research issues are also discussed.", "2013 Published by Elsevier B.V." ]
[ 0, 1, 0, 1, 2, 1, 4, 3 ]
[ 0.4323999881744385, 0.5946000218391418, 0.5946000218391418, 0.7838000059127808, 0.4323999881744385, 0.6215999722480774, 0.3513999879360199, 0.7838000059127808 ]
train_1393
[ "Multi-layer perceptron (MLP) and other artificial neural networks (ANNs) have been widely applied to time series forecasting since 1980s.", "However, for some problems such as initialization and local optima existing in applications, the improvement of ANNs is, and still will be the most interesting study for not only time series forecasting but also other intelligent computing fields.", "In this study, we propose a method for time series prediction using Hinton & Salakhutdinov’s deep belief nets (DBN) which are probabilistic generative neural network composed by multiple layers of restricted Boltzmann machine (RBM).", "We use a 3-layer deep network of RBMs to capture the feature of input space of time series data, and after pretraining of RBMs using their energy functions, gradient descent training, i.e., back-propagation learning algorithm is used for fine-tuning connection weights between “visible layers” and “hidden layers” of RBMs.", "To decide the sizes of neural networks and the learning rates, Kennedy & Eberhart’s particle swarm optimization (PSO) is adopted during the training processes.", "Furthermore, “trend removal”, a preprocessing to the original data, is also approached in the forecasting experiment using CATS benchmark data.", "Additionally, approximating and short-term prediction of chaotic time series such as Lorenz chaos and logistic map were also applied by the proposed method." ]
[ 0, 0, 1, 1, 1, 1, 3 ]
[ 1, 1, 0.6388999819755554, 0.7778000235557556, 0.7778000235557556, 0.583299994468689, 0.41670000553131104 ]
train_1394
[ "The productive use of English past tense morphology in school-aged children (N= 74; 3 years, 8 months to 13 years, 5 months) is explored using on elicited production task.", "Errors represented 20% of the responses overall.", "Virtually all of the children demonstrated productivity with regular (e.g., good) and irregular patterns (zero-marking, e.g., sit + sit; vowel-change, e.g., ride -+ rid).", "Overall frequency of errors decreased with age, yet the tendency for certain types of irregularizations increased in the older groups.", "Analyses across items indicated that all error types were predicted by combinations of item frequency, phonological chamcteristics of stems and past tense forms, and aspects of phonological past tense “neighborhoods.", "”", "Contrary to “hybrid” or dual-mechanism models incorporating a phonologically-insensitive default mechanism (e.g., Prasada & Pinker, 1993), these results suggest that children’s productivity with regular and irregular patterns is consistent with a phonologically-based constraint satisfaction system similar to that implemented in connectionist models (Daugherty & Seidenberg, 1992; Plunkett 81 Marchman, 1991,1993)." ]
[ 0, 0, 4, 0, 4, 3, 4 ]
[ 0.5896999835968018, 0.5896999835968018, 0.41029998660087585, 0.5896999835968018, 0.6154000163078308, 1, 0.7949000000953674 ]
train_1395
[ "A dynamical extension that makes possible the integration of a kinematic controller and a torque controller for nonholonomic mobile robots is presented.", "A combined kinematic/torque control law is developed using backstepping, and asymptotic stability is guaranteed by Lyapunov theory.", "Moreover, this control algorithm can be applied to the three basic nonholonomic navigation problems: tracking a reference trajectory, path following, and stabilization about a desired posture.", "The result is a general structure for controlling a mobile robot that can accommodate different control techniques, ranging from a conventional computed-torque controller, when all dynamics are known, to robust-adaptive controllers if this is not the case.", "A robust-adaptive controller based on neural networks (NNs) is proposed in this work.", "The NN controller can deal with unmodeled bounded disturbances and/or unstructured unmodeled dynamics in the vehicle.", "On-line NN weight tuning algorithms that do not require off-line learning yet guarantee small tracking errors and bounded control signals are utilized.", " 1997 John Wiley & Sons, Inc." ]
[ 0, 0, 1, 4, 1, 1, 1, 3 ]
[ 0.6215999722480774, 0.8108000159263611, 0.5946000218391418, 0.40540000796318054, 0.40540000796318054, 0.3783999979496002, 0.5676000118255615, 0.5946000218391418 ]
train_1396
[ "In this paper, we propose a novel approach, 3D-RecGAN++, which reconstructs the complete 3D structure of a given object from a single arbitrary depth view using generative adversarial networks.", "Unlike existing work which typically requires multiple views of the same object or class labels to recover the full 3D geometry, the proposed 3D-RecGAN++ only takes the voxel grid representation of a depth view of the object as input, and is able to generate the complete 3D occupancy grid with a high resolution of 2563 by recovering the occluded/missing regions.", "The key idea is to combine the generative capabilities of autoencoders and the conditional Generative Adversarial Networks (GAN) framework, to infer accurate and fine-grained 3D structures of objects in high-dimensional voxel space.", "Extensive experiments on large synthetic datasets and real-world Kinect datasets show that the proposed 3D-RecGAN++ significantly outperforms the state of the art in single view 3D object reconstruction, and is able to reconstruct unseen types of objects." ]
[ 0, 0, 1, 4 ]
[ 0.5788999795913696, 0.3684000074863434, 0.421099990606308, 0.631600022315979 ]
train_1397
[ "The MP4 files has become to most used video media file available, and will mostly likely remain at the top for some time to come.", "This makes MP4 files an interesting candidate for steganography.", "With its size and structure, it offers a challenge to steganography developers.", "While some attempts have been made to create a truly covert file, few are as successful as Martin Fiedler's TCSteg.", "TCSteg allows users to hide a TrueCrypt hidden volume in an MP4 file.", "The structure of the file makes it difficult to identify that a volume exists.", "In our analysis of TCSteg, we will show how Fielder's code works and how we may be able to detect the existence of steganography.", "We will then implement these methods in hope that other steganography analysis can use them to determine if an MP4 file is a carrier file.", "Finally, we will address the future of MP4 steganography." ]
[ 0, 0, 0, 0, 1, 0, 1, 1, 4 ]
[ 1, 1, 0.8108000159263611, 0.6215999722480774, 0.40540000796318054, 0.5946000218391418, 0.5946000218391418, 0.5946000218391418, 0.5946000218391418 ]
train_1398
[ "Non-work-related personal use of the Internet within organizations has received increased attention from scholars.", "We increase previous understanding of this phenomenon by proposing a novel model based on the theory of interpersonal behavior (TIB).", "The TIB includes previous researched constructs (i.e., attitudes, social influence, and intentions) as well as emotional factors, habits, and different sources of social influence.", "Our results (N = 238) suggest that the model well predicts the use of the Internet at work for non-work purposes.", "Our results shed new light on the influence of habit, affect, role, and self-concept in the use of the Internet.", "2013 Elsevier B.V. All rights reserved." ]
[ 0, 0, 1, 4, 4, 3 ]
[ 1, 0.5676000118255615, 0.6215999722480774, 0.6215999722480774, 0.8108000159263611, 1 ]
train_1399
[ "Malaria is a life-threatening disease caused by parasite of genus plasmodium, which is transmitted through the bite of infected Anopheles.", "A rapid and accurate diagnosis of malaria is demanded for proper treatment on time.", "Mostly, conventional microscopy is followed for diagnosis of malaria in developing countries, where pathologist visually inspects the stained slide under light microscope.", "However, conventional microscopy has occasionally proved inefficient since it is time consuming and results are difficult to reproduce.", "Alternate techniques for malaria diagnosis based on computer vision were proposed by several researchers.", "The aim of this paper is to review, analyze, categorize and address the recent developments in the area of computer aided diagnosis of malaria parasite.", "Research efforts in quantification of malaria infection include normalization of images, segmentation followed by features extraction and classification, which were reviewed in detail in this paper.", "At the end of review, the existent challenges as well as possible research perspectives were discussed." ]
[ 0, 0, 0, 0, 1, 2, 1, 4 ]
[ 1, 1, 0.5896999835968018, 0.5896999835968018, 0.5896999835968018, 0.8205000162124634, 0.6154000163078308, 0.7949000000953674 ]