abstract_id
stringlengths
10
10
sentences
list
labels
list
confs
list
train_0300
[ "Learning to rank refers to machine learning techniques for training the model in a ranking task.", "Learning to rank is useful for many applications in Information Retrieval, Natural Language Processing, and Data Mining.", "Intensive studies have been conducted on the problem and significant progress has been made [1], [2].", "This short paper gives an introduction to learning to rank, and it specifically explains the fundamental problems, existing approaches, and future work of learning to rank.", "Several learning to rank methods using SVM techniques are described in details.", "key words: Learning to rank, information retrieval, natural language processing, SVM" ]
[ 2, 2, 1, 2, 1, 2 ]
[ 0.421099990606308, 0.421099990606308, 0.421099990606308, 0.421099990606308, 0.421099990606308, 0.21050000190734863 ]
train_0301
[ "Discriminant analysis has been used for decades to extract features that preserve class separability.", "It is commonly defined as an optimization problem involving covariance matrices that represent the scatter within and between clusters.", "The requirement that one of these matrices be nonsingular limits its application to data sets with certain relative dimensions.", "We examine a number of optimization criteria, and extend their applicability by using the generalized singular value decomposition to circumvent the nonsingularity requirement.", "The result is a generalization of discriminant analysis that can be applied even when the sample size is smaller than the dimension of the sample data.", "We use classification results from the reduced representation to compare the effectiveness of this approach with some alternatives, and conclude with a discussion of their relative merits." ]
[ 0, 0, 0, 1, 1, 4 ]
[ 1, 1, 0.44440001249313354, 0.7778000235557556, 0.53329998254776, 1 ]
train_0302
[ "Social media platforms such as Twitter and Facebook enable the creation of virtual customer environments (VCEs) where online communities of interest form around specific firms, brands, or products.", "While these platforms can be used as another means to deliver familiar e-commerce applications, when firms fail to fully engage their customers, they also fail to fully exploit the capabilities of social media platforms.", "To gain business value, organizations need to incorporate community building as part of the implementation of social media." ]
[ 0, 0, 4 ]
[ 0.800000011920929, 0.6000000238418579, 0.6000000238418579 ]
train_0303
[ "Attackers often create systems that automatically rewrite and reorder their malware to avoid detection.", "Typical machine learning approaches, which learn a classifier based on a handcrafted feature vector, are not sufficiently robust to such reorderings.", "We propose a different approach, which, similar to natural language modeling, learns the language of malware spoken through the executed instructions and extracts robust, time domain features.", "Echo state networks (ESNs) and recurrent neural networks (RNNs) are used for the projection stage that extracts the features.", "These models are trained in an unsupervised fashion.", "A standard classifier uses these features to detect malicious files.", "We explore a few variants of ESNs and RNNs for the projection stage, including Max-Pooling and Half-Frame models which we propose.", "The best performing hybrid model uses an ESN for the recurrent model, Max-Pooling for non-linear sampling, and logistic regression for the final classification.", "Compared to the standard trigram of events model, it improves the true positive rate by 98.3% at a false positive rate of 0.1%." ]
[ 0, 0, 2, 1, 1, 1, 4, 4, 4 ]
[ 0.800000011920929, 0.6000000238418579, 0.4000000059604645, 0.6000000238418579, 0.4000000059604645, 0.4000000059604645, 0.4000000059604645, 0.6000000238418579, 0.6000000238418579 ]
train_0304
[ "Social media is continually emerging as a platform of information exchange around health challenges.", "We study mental health discourse on the popular social media: reddit.", "Building on findings about health information seeking and sharing practices in online forums, and social media like Twitter, we address three research challenges.", "First, we present a characterization of self-disclosure in mental illness communities on reddit.", "We observe individuals discussing a variety of concerns ranging from the daily grind to specific queries about diagnosis and treatment.", "Second, we build a statistical model to examine the factors that drive social support on mental health reddit communities.", "We also develop language models to characterize mental health social support, which are observed to bear emotional, informational, instrumental, and prescriptive information.", "Finally, we study disinhibition in the light of the dissociative anonymity that reddit’s throwaway accounts provide.", "Apart from promoting open conversations, such anonymity surprisingly is found to gather feedback that is more involving and emotionally engaging.", "Our findings reveal, for the first time, the kind of unique information needs that a social media like reddit might be fulfilling when it comes to a stigmatic illness." ]
[ 0, 0, 0, 1, 1, 1, 1, 1, 1, 4 ]
[ 1, 0.8158000111579895, 0.6053000092506409, 0.6053000092506409, 0.7894999980926514, 0.7894999980926514, 0.7894999980926514, 0.6053000092506409, 0.39469999074935913, 1 ]
train_0305
[ "Photorealistic images can now be created using advanced techniques in computer graphics (CG).", "Synthesized elements could easily be mistaken for photographic (real) images.", "Therefore we need to differentiate between CG and real images.", "In our work, we propose and develop a new framework based on an aggregate of existing features.", "Our framework has a classification accuracy of 90% when tested on the de facto standard Columbia dataset, which is 4% better than the best results obtained by other prominent methods in this area.", "We further show that using feature selection it is possible to reduce the feature dimension of our framework from 557 to 80 without a significant loss in performance (≪ 1%).", "We also investigate different approaches that attackers can use to fool the classification system, including creation of hybrid images and histogram manipulations.", "We then propose and develop filters to effectively detect such attacks, thereby limiting the effect of such attacks to our classification system." ]
[ 0, 0, 0, 2, 4, 1, 2, 4 ]
[ 0.771399974822998, 0.8571000099182129, 0.4571000039577484, 0.628600001335144, 0.22859999537467957, 0.37139999866485596, 0.4000000059604645, 0.4571000039577484 ]
train_0306
[ "In order to respond correctly to a free form factual question given a large collection of text data, one needs to understand the question to a level that allows determining some of the constraints the question imposes on a possible answer.", "These constraints may include a semantic classification of the sought after answer and may even suggest using different strategies when looking for and verifying a candidate answer.", "This work presents the first work on a machine learning approach to question classification.", "Guided by a layered semantic hierarchy of answer types, we develop a hierarchical classifier that classifies questions into fine-grained classes.", "This work also performs a systematic study of the use of semantic information sources in natural language classification tasks.", "It is shown that, in the context of question classification, augmenting the input of the classifier with appropriate semantic category information results in significant improvements to classification accuracy.", "We show accurate results on a large collection of free-form questions used in TREC 10 and 11." ]
[ 0, 0, 2, 1, 2, 4, 4 ]
[ 0.7813000082969666, 0.625, 0.625, 1, 0.40630000829696655, 0.34380000829696655, 0.5938000082969666 ]
train_0307
[ "Competing theoretical perspectives regarding the effects of knowledge management (KM) on performance have underpinned past empirical studies.", "By explicitly surfacing and comparing three such perspectives, we contribute to the theoretical advancement of the KM field.", "We develop hypotheses consistent with the underlying logics of universalistic, complementarity and contingency theories and we empirically test these hypotheses to determine which is best supported.", "Data was collected from a sample of hospitality services firms operating in South Africa.", "Our results show that the universalistic perspective is less preferred.", "We find support for the complementarity perspective by revealing that codification and human capital KM capabilities interact to influence customer service outcomes.", "The contingency perspective also received support as the links between KM capabilities and performance were found to be contingent on the business strategy of the firm.", "Our results suggest that future researchers should explicitly acknowledge the theoretical perspective from which they are observing the performance impacts of KM and ensure that empirical tests are consistent with the logic of the selected" ]
[ 0, 2, 1, 1, 1, 1, 1, 4 ]
[ 0.7828999757766724, 0.4341000020503998, 0.4341000020503998, 0.733299970626831, 0.4341000020503998, 0.4341000020503998, 0.651199996471405, 0.5968999862670898 ]
train_0308
[ "The problem this paper is concerned with is that of unsupervised learning.", "Mainly, what does it mean to learn a probability distribution?", "The classical answer to this is to learn a probability density.", "This is often done by defining a parametric family of densities (Pθ)θ∈Rd and finding the one that maximized the likelihood on our data: if we have real data examples {x}i=1, we would solve the problem" ]
[ 2, 2, 0, 4 ]
[ 0.6571000218391418, 0.628600001335144, 0.37139999866485596, 0.628600001335144 ]
train_0309
[ "This paper reviews the problem of catastrophic forgetting (the loss or disruption of previously learned information when new information is learned) in neural networks, and explores rehearsal mechanisms (the retraining of some of the previously learned information as the new information is added) as a potential solution.", "We replicate some of the experiments described by Ratcliff (1990), including those relating to a simple “recency” based rehearsal regime.", "We then develop further rehearsal regimes which are more effective than recency rehearsal.", "In particular “sweep rehearsal” is very successful at minimising catastrophic forgetting.", "One possible limitation of rehearsal in general, however, is that previously learned information may not be available for retraining.", "We describe a solution to this problem, “pseudorehearsal”, a method which provides the advantages of rehearsal without actually requiring any access to the previously learned information (the original training population) itself.", "We then suggest an interpretation of these rehearsal mechanisms in the context of a function approximation based account of neural network learning.", "Both rehearsal and pseudorehearsal may have practical applications, allowing new information to be integrated into an existing network with minimum disruption of old information." ]
[ 2, 0, 1, 1, 1, 1, 1, 4 ]
[ 0.5676000118255615, 0.4323999881744385, 0.5676000118255615, 0.5676000118255615, 0.5676000118255615, 0.8378000259399414, 0.6215999722480774, 1 ]
train_0310
[ "Motivating students to learn computer networking concepts is often difficult because many students find the subject rather technical, dry, and boring.", "To overcome this problem, the author has prepared some practical laboratory exercises (practicals) and other materials.", "They are designed around a network operating system and a multiuser, multitasking operating system and are suitable for classroom use in undergraduate computer networking courses.", "The effectiveness of these practicals has been evaluated both formally by students and informally in discussion within the teaching team.", "The implementation of the practicals was judged to be successful because of the positive student feedback and also because students scored better in the final exam.", "This paper describes the practicals, their overall effectiveness, and plans for further projects.", "The impact of practicals on student learning and comprehension is also discussed" ]
[ 0, 2, 1, 4, 4, 4, 4 ]
[ 0.7838000059127808, 0.5946000218391418, 0.5946000218391418, 1, 1, 0.40540000796318054, 0.40540000796318054 ]
train_0311
[ "Time series classification (TSC), the problem of predicting class labels of time series, has been around for decades within the community of data mining and machine learning, and found many important applications such as biomedical engineering and clinical prediction.", "However, it still remains challenging and falls short of classification accuracy and efficiency.", "Traditional approaches typically involve extracting discriminative features from the original time series using dynamic time warping (DTW) or shapelet transformation, based on which an off-the-shelf classifier can be applied.", "These methods are ad-hoc and separate the feature extraction part with the classification part, which limits their accuracy performance.", "Plus, most existing methods fail to take into account the fact that time series often have features at different time scales.", "To address these problems, we propose a novel end-to-end neural network model, Multi-scale Convolutional Neural Network (MCNN), which incorporates feature extraction and classification in a single framework.", "Leveraging a novel multi-branch layer and learnable convolutional layers, MCNN automatically extracts features at different scales and frequencies, leading to superior feature representation.", "MCNN is also computationally efficient, as it naturally leverages GPU computing.", "We conduct comprehensive empirical evaluation with various existing methods on a large number of benchmark datasets, and show that MCNN advances the state-of-the-art by achieving superior accuracy performance than other leading methods." ]
[ 0, 0, 0, 1, 1, 1, 1, 4, 4 ]
[ 1, 1, 0.5587999820709229, 0.7940999865531921, 0.8234999775886536, 0.6176000237464905, 0.7940999865531921, 0.5881999731063843, 0.8234999775886536 ]
train_0312
[ "Business processes can be described with diagrams, e.g. BPMN diagrams, or as text.", "Use cases are a text-based notation.", "They are semiformal: a business process is expressed as a sequence of steps and each step is presented in a natural language.", "In the paper two experiments are described that aimed at comparison of diagrambased and text-based notation.", "Moreover, we describe some extensions to use cases which we have found interesting when working on description of business processes based on use cases.", "Those extensions, among others, allow to describe actor metamorphosis and specify steps which must be performed before the main scenario is executed.", "The ideas described in the paper have been incorporated into UC Workbench – a tool supporting editing and animation of use-case-based models." ]
[ 0, 0, 0, 0, 1, 1, 1 ]
[ 1, 1, 0.8443999886512756, 0.5914000272750854, 0.40860000252723694, 0.2786000072956085, 0.40860000252723694 ]
train_0313
[ "Hammersmith Infant Neurological Examination (HINE) is a popular method to estimate the neurological development of infants aged less than two years.", "Using HINE, especially for preterm or premature babies, the risk of neural disorder can be minimized through proper preventive measures.", "This paper presents the design of a semi-automatic application that can be used as an aid to doctors for efficiently conducting the examinations listed in the Hammersmith chart.", "The user friendly version of the examination interface provides a platform for quantitative neurological assessment of the infants.", "It includes various simplified video and image based schemes that are suited to inexperienced staff.", "It provides an interface to go through the previous records of patients.", "Ten examinations are enlisted in the Hammersmith chart for neonatal babies.", "This paper examines a semi-automatic approach for posture estimation examination.", "For post neonatal infants, a follow-up management interface is designed that can be used to fetch / consult past records of the patients for better diagnosis.", "The application is currently in operation at Neonatal Intensive Care Unit (NICU) of Institute of Post-Graduate Medical Education & Research (IPGME & R) and Seth Sukhlal Karnani Memorial (SSKM) Hospital, Kolkata, India." ]
[ 0, 0, 2, 0, 1, 1, 1, 2, 1, 4 ]
[ 1, 0.8055999875068665, 0.8055999875068665, 0.41670000553131104, 0.7778000235557556, 0.7778000235557556, 0.3889000117778778, 0.6111000180244446, 0.583299994468689, 0.6111000180244446 ]
train_0314
[ "Business Process Management (BPM) is considered an essential strategy to create and maintain sustainable competitive advantage.", "While researchers are anxious to identify critical success factors for the management of business process related projects, the risks associated with these projects have received considerably less attention.", "This is a concern: Although BPM projects contain phases that relate to software development and deployment, simply applying risk mitigation strategies found in software engineering ignores the subsequent process management phases that follow upon the implementation and automation of processes.", "This paper provides an overview of risks associated with BPM projects along the phases of the BPM lifecycle.", "After a classification of the risks identified with the individual life cycle phases and transitions we discuss four strategies to deal with these risks: avoid, mitigate, transfer, and accept.", "The outlook of this paper discusses how assessment frameworks such as CobIT and COSO relate to the identified risks." ]
[ 0, 0, 0, 2, 1, 4 ]
[ 0.7886999845504761, 0.6075000166893005, 0.6075000166893005, 0.3659999966621399, 0.8188999891281128, 0.6075000166893005 ]
train_0315
[ "The Internet of Things (IoT) is experiencing exponential growth in research and industry, but it still suffers from privacy and security vulnerabilities.", "Conventional security and privacy approaches tend to be inapplicable for IoT, mainly due to its decentralized topology and the resource-constraints of the majority of its devices.", "BlockChain (BC) that underpin the cryptocurrency Bitcoin have been recently used to provide security and privacy in peer-to-peer networks with similar topologies to IoT. However, BCs are computationally expensive and involve high bandwidth overhead and delays, which are not suitable for IoT devices.", "This position paper proposes a new secure, private, and lightweight architecture for IoT, based on BC technology that eliminates the overhead of BC while maintaining most of its security and privacy benefits.", "The described method is investigated on a smart home application as a representative case study for broader IoT applications.", "The proposed architecture is hierarchical, and consists of smart homes, an overlay network and cloud storages coordinating data transactions with BC to provide privacy and security.", "Our design uses different types of BC’s depending on where in the network hierarchy a transaction occurs, and uses distributed trust methods to ensure a decentralized topology.", "Qualitative evaluation of the architecture under common threat models highlights its effectiveness in providing security and privacy for IoT applications." ]
[ 0, 0, 0, 2, 1, 1, 1, 4 ]
[ 1, 0.8205000162124634, 0.7742000222206116, 0.6154000163078308, 0.7949000000953674, 0.6154000163078308, 0.5896999835968018, 1 ]
train_0316
[ "The utilization of Information Technology (IT) is spreading in tourism industry with explosive growth of Internet, Social Network Service (SNS) through smart phone applications.", "Especially, since intensive information has high value on tourism area, IT is becoming a crucial factor in the tourism industry.", "The smart tourism is explained as an holistic approach that provide tour information, service related to travel, such as destination, food, transportation, reservation, travel guide, conveniently to tourists through IT devices.", "In our research, we focus on the Korea Tourism Organization’s (KTO’s) smart tourism case.", "This research concentrates on the necessity and effectiveness of smart tourism which delivers travel information in real-time base.", "Also, our study overview how KTO’s IT operation manages each channel, website, SNS, applications and finally suggests the smart tourism’s future direction for the successful realization." ]
[ 0, 0, 0, 2, 2, 1 ]
[ 1, 1, 0.7894999980926514, 0.5788999795913696, 0.6053000092506409, 0.39469999074935913 ]
train_0317
[ "5G will provide broadband access everywhere, entertain higher user mobility, and enable connectivity of massive number of devices (e.g. Internet of Things (IoT)) in an ultrareliable and affordable way.", "The main technological enablers such as cloud computing, Software Defined Networking (SDN) and Network Function Virtualization (NFV) are maturing towards their use in 5G.", "However, there are pressing security challenges in these technologies besides the growing concerns for user privacy.", "In this paper, we provide an overview of the security challenges in these technologies and the issues of privacy in 5G.", "Furthermore, we present security solutions to these challenges and future directions for secure 5G systems." ]
[ 0, 0, 0, 1, 1 ]
[ 0.44440001249313354, 0.44440001249313354, 0.583299994468689, 0.41670000553131104, 0.41670000553131104 ]
train_0318
[ "Neural networks provide state-of-the-art results for most machine learning tasks.", "Unfortunately, neural networks are vulnerable to adversarial examples: given an input x and any target classification t, it is possible to find a new input x' that is similar to x but classified as t. This makes it difficult to apply neural networks in security-critical areas.", "Defensive distillation is a recently proposed approach that can take an arbitrary neural network, and increase its robustness, reducing the success rate of current attacks' ability to find adversarial examples from 95% to 0.5%.In this paper, we demonstrate that defensive distillation does not significantly increase the robustness of neural networks by introducing three new attack algorithms that are successful on both distilled and undistilled neural networks with 100% probability.", "Our attacks are tailored to three distance metrics used previously in the literature, and when compared to previous adversarial example generation algorithms, our attacks are often much more effective (and never worse).", "Furthermore, we propose using high-confidence adversarial examples in a simple transferability test we show can also be used to break defensive distillation.", "We hope our attacks will be used as a benchmark in future defense attempts to create neural networks that resist adversarial examples." ]
[ 0, 0, 0, 1, 1, 4 ]
[ 0.7949000000953674, 0.7949000000953674, 0.41029998660087585, 0.7949000000953674, 0.6154000163078308, 0.41029998660087585 ]
train_0319
[ "While numerous metrics for information retrieval are available in the case of binary relevance, there is only one commonly used metric for graded relevance, namely the Discounted Cumulative Gain (DCG).", "A drawback of DCG is its additive nature and the underlying independence assumption: a document in a given position has always the same gain and discount independently of the documents shown above it.", "Inspired by the \"cascade\" user model, we present a new editorial metric for graded relevance which overcomes this difficulty and implicitly discounts documents which are shown below very relevant documents.", "More precisely, this new metric is defined as the expected reciprocal length of time that the user will take to find a relevant document.", "This can be seen as an extension of the classical reciprocal rank to the graded relevance case and we call this metric Expected Reciprocal Rank (ERR).", "We conduct an extensive evaluation on the query logs of a commercial search engine and show that ERR correlates better with clicks metrics than other editorial metrics." ]
[ 0, 0, 0, 1, 1, 1 ]
[ 1, 1, 0.5586000084877014, 0.6215999722480774, 0.8198000192642212, 0.6531999707221985 ]
train_0320
[ "Databases have been an integral component of Data Fusion from the outset when the JDL model was introduced.", "As advances in High-Level fusion using Multi-Int data have been made, the original concept of databases as a static repository of Level 0/1 content has evolved to support heterogeneous data, and as a necessary enabler of High-Level fusion processes.", "Relatively recent database technologies now support specialized storage for complex content such as multi-media, geospatial, and semantic data types.", "Additionally, database functionality has been extended from what was once almost exclusively storage and retrieval, to include integrated forensic and predictive algorithms, as well as decision support frameworks such as the data cube.", "These data mining capabilities provide a rich tool-set from which to tailor a fusion application.", "However, due to their inherent trade-off space, they present a significant design and integration challenge when implementing an enterprise architecture, which has to provide a comprehensive and cohesive framework across the entire fusion workflow, and which has to meet the needs of various Communities-of-Interest.", "This paper expounds on the role of data architecture as a key discipline to help analyze and synthesize an enterprise fusion system-of-systems, and presents selected principles to maximize heterogeneous data exploitation." ]
[ 0, 0, 0, 1, 1, 0, 2 ]
[ 0.8108000159263611, 0.8108000159263611, 0.4323999881744385, 0.5676000118255615, 0.5676000118255615, 0.4323999881744385, 0.8108000159263611 ]
train_0321
[ "Modern mobile devices have access to a wealth of data suitable for learning models, which in turn can greatly improve the user experience on the device.", "For example, language models can improve speech recognition and text entry, and image models can automatically select good photos.", "However, this rich data is often privacy sensitive, large in quantity, or both, which may preclude logging to the data center and training there using conventional approaches.", "We advocate an alternative that leaves the training data distributed on the mobile devices, and learns a shared model by aggregating locally-computed updates.", "We term this decentralized approach Federated Learning.", "We present a practical method for the federated learning of deep networks based on iterative model averaging, and conduct an extensive empirical evaluation, considering five different model architectures and four datasets.", "These experiments demonstrate the approach is robust to the unbalanced and non-IID data distributions that are a defining characteristic of this setting.", "Communication costs are the principal constraint, and we show a reduction in required communication rounds by 10–100× as compared to synchronized stochastic gradient descent." ]
[ 0, 0, 0, 0, 1, 1, 1, 4 ]
[ 0.7838000059127808, 0.7838000059127808, 0.5676000118255615, 0.40540000796318054, 0.3513999879360199, 1, 0.40540000796318054, 0.6215999722480774 ]
train_0322
[ "The paper motivates, presents, demonstrates in use, and evaluates a methodology for conducting design science (DS) research in information systems.", "DS is of importance in a discipline oriented to the creation of successful artifacts.", "Several IS researchers have pioneered DS research in IS, yet over the last 15 years little DS research has been done within the discipline.", "The lack of a methodology to serve as a commonly accepted framework for DS research and of a template for its presentation may have contributed to its slow adoption.", "The design science research methodology (DSRM) presented here incorporates principles, practices, and procedures required to carry out such research and meets three objectives: it is consistent with prior literature, it provides a nominal process model for doing DS research, and it provides a mental model for presenting and evaluating DS research in IS.", "The DS process includes six steps: problem identification and motivation, definition of the objectives for a solution, design and development, demonstration, evaluation, and communication.", "We demonstrate and evaluate the methodology by presenting four case studies in terms of the DSRM, including cases that present the design of a database to support health assessment methods, a software reuse measure, an Internet video telephony application, and an IS planning method.", "The designed methodology effectively satisfies the three objectives and has the potential to help aid the acceptance of DS research in the IS discipline." ]
[ 2, 2, 2, 2, 1, 4, 4, 1 ]
[ 0.3889000117778778, 0.41670000553131104, 0.41670000553131104, 0.6388999819755554, 0.41670000553131104, 0.583299994468689, 0.583299994468689, 0.44440001249313354 ]
train_0323
[ "We present a robust and real-time monocular six degree of freedom relocalization system.", "Our system trains a convolutional neural network to regress the 6-DOF camera pose from a single RGB image in an end-to-end manner with no need of additional engineering or graph optimisation.", "The algorithm can operate indoors and outdoors in real time, taking 5ms per frame to compute.", "It obtains approximately 2m and 3 degrees accuracy for large scale outdoor scenes and 0.5m and 5 degrees accuracy indoors.", "This is achieved using an efficient 23 layer deep convnet, demonstrating that convnets can be used to solve complicated out of image plane regression problems.", "This was made possible by leveraging transfer learning from large scale classification data.", "We show that the PoseNet localizes from high level features and is robust to difficult lighting, motion blur and different camera intrinsics where point based SIFT registration fails.", "Furthermore we show how the pose feature that is produced generalizes to other scenes allowing us to regress pose with only a few dozen training examples." ]
[ 0, 0, 1, 1, 1, 1, 4, 4 ]
[ 0.7838000059127808, 0.7838000059127808, 0.5946000218391418, 0.8108000159263611, 1, 0.40540000796318054, 0.8108000159263611, 0.6215999722480774 ]
train_0324
[ "Phonemes are the standard modelling unit in HMM-based continuous speech recognition systems.", "Visemes are the equivalent unit in the visual domain, but there is less agreement on precisely what visemes are, or how many to model on the visual side in audio-visual speech recognition systems.", "This paper compares the use of 5 viseme maps in a continuous speech recognition task.", "The focus of the study is visual-only recognition to examine the choice of viseme map.", "All the maps are based on the phoneme-to-viseme approach, created either using a linguistic method or a data driven method.", "DCT, PCA and optical flow are used to derive the visual features.", "The best visual-only recognition on the VidTIMIT database is achieved using a linguistically motivated viseme set.", "These initial experiments demonstrate that the choice of visual unit requires more careful attention in audio-visual speech recognition system development." ]
[ 0, 0, 0, 1, 1, 4, 1, 4 ]
[ 0.7778000235557556, 0.7778000235557556, 0.6388999819755554, 0.3610999882221222, 0.7778000235557556, 0.44440001249313354, 0.5555999875068665, 1 ]
train_0325
[ "We developed the project presented in this paper for an undergraduate computer architecture course specifically aimed at non-engineering students.", "The project is designed to develop understanding of processor organisation at the functional unit level by building a series software execution driven simulators, from a single cycle sequential processor to a simple pipelined processor.", "The students are lead through the functional design process step by step, in a succession of carefully structured tasks.", "The project starts by building functional units of a processor.", "These units are then used to construct a single cycle processor, a multi cycle processor, and finally a pipelined processor with data hazard detection and forwarding.", "The main goal of the project is to give students a true insight into the fundamental ideas, which are the basis of the development of the modern microprocessor." ]
[ 0, 2, 1, 4, 1, 4 ]
[ 0.3939000070095062, 0.666700005531311, 0.5758000016212463, 0.42419999837875366, 0.42419999837875366, 0.3939000070095062 ]
train_0326
[ "Dynamics of human body skeletons convey significant information for human action recognition.", "Conventional approaches for modeling skeletons usually rely on hand-crafted parts or traversal rules, thus resulting in limited expressive power and difficulties of generalization.", "In this work, we propose a novel model of dynamic skeletons called SpatialTemporal Graph Convolutional Networks (ST-GCN), which moves beyond the limitations of previous methods by automatically learning both the spatial and temporal patterns from data.", "This formulation not only leads to greater expressive power but also stronger generalization capability.", "On two large datasets, Kinetics and NTU-RGBD, it achieves substantial improvements over mainstream methods." ]
[ 0, 0, 2, 2, 4 ]
[ 1, 0.6111000180244446, 0.583299994468689, 0.41670000553131104, 0.7857000231742859 ]
train_0327
[ "This article proposes an approach to generate test cases from BPMN models, for automated testing of Web applications implemented with the support of BPM suites.", "The work is primarily focused on functional testing and has the following objectives: (i) identify execution paths from the flow analysis in the BPMN model and (ii) generate the initial code of test scripts to be run on a given Web application testing tool.", "Throughout the article, we describe the design and implementation of a solution to achieve these goals, targeting automated tests using Selenium and Cucumber as tools.", "The approach was applied to processes from a public repository and was able to generate test scenarios from different BPMN models." ]
[ 0, 2, 1, 4 ]
[ 0.6176000237464905, 0.5881999731063843, 0.5881999731063843, 0.3528999984264374 ]
train_0328
[ "This paper develops and tests a model of consumer trust in an electronic commerce vendor.", "Building consumer trust is a strategic imperative for web-based vendors because trust strongly influences consumer intentions to transact with unfamiliar vendors via the web.", "Trust allows consumers to overcome perceptions of risk and uncertainty, and to engage in the following three behaviors that are critical to the realization of a web-based vendor’s strategic objectives: following advice offered by the web vendor, sharing personal information with the vendor, and purchasing from the vendor’s web site.", "Trust in the vendor is defined as a multi-dimensional construct with two inter-related components—trusting beliefs (perceptions of the competence, benevolence, and integrity of the vendor), and trusting intentions—willingness to depend (that is, a decision to make oneself vulnerable to the vendor).", "Three factors are proposed for building consumer trust in the vendor: structural assurance (that is, consumer perceptions of the safety of the web environment), perceived web vendor reputation, and perceived web site quality.", "The model is tested in the context of a hypothetical web site offering legal advice.", "All three factors significantly influenced consumer trust in the web vendor.", "That is, these factors, especially web site quality and reputation, are powerful levers that vendors can use to build consumer trust, in order to overcome the negative perceptions people often have about the safety of the web environment.", "The study also demonstrates that perceived Internet risk negatively affects consumer intentions to transact with a web-based vendor.", "q 2002 Elsevier Science B.V." ]
[ 0, 2, 0, 0, 2, 1, 4, 4, 4, 3 ]
[ 0.583299994468689, 0.583299994468689, 0.583299994468689, 0.41670000553131104, 0.583299994468689, 0.6388999819755554, 0.41670000553131104, 0.41670000553131104, 0.833299994468689, 0.8055999875068665 ]
train_0329
[ "A new technique for three-dimensional (3D) camera calibration for machine vision metrology using off-the-shelf TV cameras and lenses is described.", "The two-stage technique is aimed at efficient computation of camera external position and orientation relative to object reference coordinate system as well as the effective focal length, radial lens distortion, and image scanning parameters.", "The two-stage technique has advantage in terms of accuracy, speed, and versatility over existing state of the art.", "A critical review of the state of the art is given in the beginning.", "A theoretical framework is established, supported by comprehensive proof in five appendixes, and may pave the way for future research on 3D robotics vision.", "Test results using real data are described.", "Both accuracy and speed are reported.", "The experimental results are analyzed and compared with theoretical prediction.", "Recent effort indicates that with slight modification, the two-stage calibration can be done in real time." ]
[ 2, 2, 2, 1, 1, 4, 4, 4, 4 ]
[ 0.4375, 0.807699978351593, 0.4375, 0.8317000269889832, 0.8317000269889832, 0.5288000106811523, 0.36059999465942383, 1, 1 ]
train_0330
[ "In Data Warehouse (DW) scenarios, ETL (Extraction, Transformation, Loading) processes are responsible for the extraction of data from heterogeneous operational data sources, their transformation (conversion, cleaning, normalization, etc.) and their loading into the DW.", "In this paper, we present a framework for the design of the DW back-stage (and the respective ETL processes) based on the key observation that this task fundamentally involves dealing with the specificities of information at very low levels of granularity including transformation rules at the attribute level.", "Specifically, we present a disciplined framework for the modeling of the relationships between sources and targets in different levels of granularity (including coarse mappings at the database and table levels to detailed inter-attribute mappings at the attribute level).", "In order to accomplish this goal, we extend UML (Unified Modeling Language) to model attributes as first-class citizens.", "In our attempt to provide complementary views of the design artifacts in different levels of detail, our framework is based on a principled approach in the usage of UML packages, to allow zooming in and out the design of a scenario." ]
[ 0, 0, 0, 2, 1 ]
[ 0.6563000082969666, 0.6875, 0.6875, 0.40630000829696655, 0.40630000829696655 ]
train_0331
[ "Deep learning (DL) based semantic segmentation methods have been providing state-of-the-art performance in the last few years.", "More specifically, these techniques have been successfully applied to medical image classification, segmentation, and detection tasks.", "One deep learning technique, U-Net, has become one of the most popular for these applications.", "In this paper, we propose a Recurrent Convolutional Neural Network (RCNN) based on U-Net as well as a Recurrent Residual Convolutional Neural Network (RRCNN) based on U-Net models, which are named RU-Net and R2U-Net respectively.", "The proposed models utilize the power of U-Net, Residual Network, as well as RCNN.", "There are several advantages of these proposed architectures for segmentation tasks.", "First, a residual unit helps when training deep architecture.", "Second, feature accumulation with recurrent residual convolutional layers ensures better feature representation for segmentation tasks.", "Third, it allows us to design better U-Net architecture with same number of network parameters with better performance for medical image segmentation.", "The proposed models are tested on three benchmark datasets such as blood vessel segmentation in retina images, skin cancer segmentation, and lung lesion segmentation." ]
[ 0, 0, 0, 2, 1, 1, 1, 1, 1, 2 ]
[ 0.628600001335144, 0.628600001335144, 0.771399974822998, 0.800000011920929, 0.428600013256073, 0.428600013256073, 0.628600001335144, 0.628600001335144, 0.628600001335144, 0.22859999537467957 ]
train_0332
[ "A recent issue of a popular computing journal asked which laws would apply if a self-driving car killed a pedestrian.", "This paper considers the question of legal liability for artificially intelligent computer systems.", "It discusses whether criminal liability could ever apply; to whom it might apply; and, under civil law, whether an AI program is a product that is subject to product design legislation or a service to which the tort of negligence applies.", "The issue of sales warranties is also considered.", "A discussion of some of the practical limitations that AI systems are subject to is also included." ]
[ 0, 2, 1, 2, 4 ]
[ 0.7949000000953674, 0.5896999835968018, 0.6154000163078308, 0.41029998660087585, 0.5896999835968018 ]
train_0333
[ "Artificial neural net models have been studied for many years in the hope of achieving human-like performance in the fields of speech and image recognition.", "These models are composed of many nonlinear computational elements operating in parallel and arranged in patterns reminiscent of biological neural nets.", "Computational elements or nodes are connected via weights that are typically adapted during use to improve performance.", "There has been a recent resurgence in the field of artificial neural nets caused by new net topologies and algorithms, analog VLSI implementation techniques, and the belief that massive parallelism is essential for high performance speech and image recognition.", "This paper provides an introduction to the field of artificial neural nets by reviewing six important neural net models that can be used for pattern classification.", "These nets are highly parallel building blocks that illustrate neural net components and design principles and can be used to construct more complex systems.", "In addition to describing these nets, a major emphasis is placed on exploring how some existing classification and clustering algorithms can be performed using simple neuron-like components.", "Single-layer nets can implement algorithms required by Gaussian maximum-likelihood classifiers and optimum minimum-error classifiers for binary patterns corrupted by noise.", "More generally, the decision regions required by any classification algorithm can be generated in a straightforward manner by three-layer feed-forward nets." ]
[ 0, 0, 0, 0, 2, 1, 1, 4, 4 ]
[ 1, 1, 0.8108000159263611, 0.5946000218391418, 0.5946000218391418, 0.7838000059127808, 0.5946000218391418, 0.40540000796318054, 0.7838000059127808 ]
train_0334
[ "Work ow systems hold the promise of facilitating the everyday operation of many enterprises and work environments.", "As a result, many commercial work ow management systems have been developed.", "These systems, although useful, do not scale well, have limited fault-tolerance, and are in exible in terms of interoperating with other work ow systems.", "In this paper, we discuss the limitations of contemporary work ow management systems, and then elaborate on various directions for research and potential future extensions to the design and modeling of work ow management systems." ]
[ 0, 0, 0, 2 ]
[ 0.7949000000953674, 0.6154000163078308, 0.6154000163078308, 0.5896999835968018 ]
train_0335
[ "We present a hybrid algorithm for detection and tracking of text in natural scenes that goes beyond the full-detection approaches in terms of time performance optimization.", "A state-of-the-art scene text detection module based on Maximally Stable Extremal Regions (MSER) is used to detect text asynchronously, while on a separate thread detected text objects are tracked by MSER propagation.", "The cooperation of these two modules yields real time video processing at high frame rates even on low-resource devices." ]
[ 2, 1, 4 ]
[ 0.41029998660087585, 0.3846000134944916, 0.41029998660087585 ]
train_0336
[ "Online social networks have now become the most popular platforms for people to share information with others.", "Along with this, there is a serious threat to individuals’ privacy.", "One privacy risk comes from the sharing of co-owned data, i.e., when a user shares a data item that involves multiple users, some users’ privacy may be compromised, since different users generally have different opinions on who can access the data.", "How to design a collaborative management mechanism to deal with such a privacy issue has recently attracted much attention.", "In this paper, we propose a trust-based mechanism to realize collaborative privacy management.", "Basically, a user decides whether or not to post a data item based on the aggregated opinion of all involved users.", "The trust values between users are used to weight users’ opinions, and the values are updated according to users’ privacy loss.", "Moreover, the user can make a tradeoff between data sharing and privacy preserving by tuning the parameter of the proposed mechanism.", "We formulate the selecting of the parameter as a multi-armed bandit problem and apply the upper confidence bound policy to solve the problem.", "Simulation results demonstrate that the trust-based mechanism can encourage the user to be considerate of others’ privacy, and the proposed bandit approach can bring the user a high payoff." ]
[ 0, 0, 0, 0, 2, 1, 1, 1, 1, 4 ]
[ 0.8108000159263611, 0.8108000159263611, 0.8108000159263611, 0.40540000796318054, 0.8108000159263611, 0.40540000796318054, 0.8108000159263611, 0.8108000159263611, 0.8108000159263611, 0.8108000159263611 ]
train_0337
[ "In this paper, we consider the variable sized bin packing problem where the objective is to minimize the total cost of used bins when the cost of unit size of each bin does not increase as the bin size increases.", "Two greedy algorithms are described, and analyzed in three special cases: (a) the sizes of items and bins are divisible, respectively, (b) only the sizes of bins are divisible, and (c) the sizes of bins are not divisible.", "Here, we say that a list of numbers a1; a2; . .", ". ; am are divisible when aj exactly divides aj 1, for each 1 < j6m.", "In the case of (a), the algorithms give optimal solutions, and in the case of (b), each algorithm gives a solution whose value is less than 11 9 CðB Þ þ 4 9 , where CðB Þ is the optimal value.", "In the case of (c), each algorithm gives a solution whose value is less than 3 2 CðB Þ þ 1.", "2002 Elsevier Science B.V. All rights reserved." ]
[ 0, 1, 1, 1, 1, 1, 3 ]
[ 0.733299970626831, 0.39469999074935913, 0.6053000092506409, 0.8158000111579895, 0.6053000092506409, 0.6053000092506409, 0.5788999795913696 ]
train_0338
[ "Imagine a large mass of nonhomogeneous metal.", "Imagine that it is struck a severe blow by a large hammer.", "The shock wave of the impact will travel throughout the mass and arrive at different parts at different times.", "Furthermore, this shock wave will be reflected from boundaries and regions of nonhomogeneity.", "These reflected shock waves will affect some portions of the mass time and time again.", "Occasionally, shock waves reflected from several directions will converge on some internal region to give an aftershock as great (or greater than) the original shock.", "Such shock waves may persist for a considerable time." ]
[ 0, 0, 0, 0, 0, 1, 0 ]
[ 0.6116999983787537, 0.4828000068664551, 0.40779998898506165, 0.5121999979019165, 0.4828000068664551, 0.37860000133514404, 0.4828000068664551 ]
train_0339
[ "We present a method for estimating the KL divergence between continuous densities and we prove it converges almost surely.", "Divergence estimation is typically solved estimating the densities first.", "Our main result shows this intermediate step is unnecessary and that the divergence can be either estimated using the empirical cdf or k-nearest-neighbour density estimation, which does not converge to the true measure for finite k.", "The convergence proof is based on describing the statistics of our estimator using waiting-times distributions, as the exponential or Erlang.", "We illustrate the proposed estimators and show how they compare to existing methods based on density estimation, and we also outline how our divergence estimators can be used for solving the two-sample problem." ]
[ 1, 1, 1, 1, 4 ]
[ 0.5946000218391418, 0.4323999881744385, 0.40540000796318054, 0.7838000059127808, 0.6215999722480774 ]
train_0340
[ "In 1979, David Fabian found a complete game of two-person Chinese Checkers in 30 moves (15 by each player).", "This solution requires that the two players cooperate to generate a win as quickly as possible for one of them.", "We show, using computational search techniques, that no shorter game is possible.", "We also consider a solitaire version of Chinese Checkers where one player attempts to move her pieces across the board in as few moves as possible.", "In 1971, Octave Levenspiel found a solution in 27 moves; we demonstrate that no shorter solution exists.", "To show optimality, we employ a variant of A* search, as well as bidirectional search." ]
[ 0, 2, 1, 1, 4, 4 ]
[ 1, 0.6111000180244446, 0.6388999819755554, 0.22220000624656677, 0.3889000117778778, 0.6111000180244446 ]
train_0341
[ "We propose and study a novel panoptic segmentation (PS) task.", "Panoptic segmentation unifies the typically distinct tasks of semantic segmentation (assign a class label to each pixel) and instance segmentation (detect and segment each object instance).", "The proposed task requires generating a coherent scene segmentation that is rich and complete, an important step toward real-world vision systems.", "While early work in computer vision addressed related image/scene parsing tasks, these are not currently popular, possibly due to lack of appropriate metrics or associated recognition challenges.", "To address this, we first propose a novel panoptic quality (PQ) metric that captures performance for all classes (stuff and things) in an interpretable and unified manner.", "Using the proposed metric, we perform a rigorous study of both human and machine performance for PS on three existing datasets, revealing interesting insights about the task.", "Second, we are working to introduce panoptic segmentation tracks at upcoming recognition challenges.", "The aim of our work is to revive the interest of the community in a more unified view of image segmentation." ]
[ 2, 0, 2, 0, 1, 1, 4, 2 ]
[ 0.6053000092506409, 0.7894999980926514, 0.6053000092506409, 0.5788999795913696, 0.6053000092506409, 0.421099990606308, 0.39469999074935913, 0.6053000092506409 ]
train_0342
[ "In this paper, we propose \"SHAPIO\"', a game controller that inputs and outputs game events through its three-dimensional shape.", "SHAPIO consists of multiple triangular prisms, and its three-dimensional shape can be freely changed by twisting each prism.", "When a game player changes the shape of SHAPIO, the game system changes the shape of an item in the game into the same shape as SHAPIO, and vice versa.", "The player can feel the sense of unity with the game character, because SHAPIO always has the same shape as the item.", "We confirmed that the shape of our prototype could go hand-in-hand with the corresponding game item in a practical response time." ]
[ 2, 1, 1, 4, 4 ]
[ 0.4000000059604645, 0.6000000238418579, 0.800000011920929, 0.4000000059604645, 0.800000011920929 ]
train_0343
[ "This paper proposes a new model for extracting an interpretable sentence embedding by introducing self-attention.", "Instead of using a vector, we use a 2-D matrix to represent the embedding, with each row of the matrix attending on a different part of the sentence.", "We also propose a self-attention mechanism and a special regularization term for the model.", "As a side effect, the embedding comes with an easy way of visualizing what specific parts of the sentence are encoded into the embedding.", "We evaluate our model on 3 different tasks: author profiling, sentiment classification and textual entailment.", "Results show that our model yields a significant performance gain compared to other sentence embedding methods in all of the 3 tasks." ]
[ 2, 1, 1, 1, 4, 4 ]
[ 0.7894999980926514, 0.6053000092506409, 0.6053000092506409, 0.39469999074935913, 0.421099990606308, 0.8158000111579895 ]
train_0344
[ "Personal identification numbers are widely used for user authentication and security.", "Password authentication using PINs requires users to physically input the PIN, which could be vulnerable to password cracking via shoulder surfing or thermal tracking.", "PIN authentication with hands-off gaze-based PIN entry techniques, on the other hand, leaves no physical footprints behind and therefore offer a more secure password entry option.", "Gaze-based authentication refers to finding the eye location across sequential image frames, and tracking eye center over time.", "This paper presents a real-time application for gaze-based PIN entry, and eye detection and tracking for PIN identification using a smart camera." ]
[ 0, 0, 0, 0, 2 ]
[ 0.800000011920929, 0.8285999894142151, 0.628600001335144, 0.4000000059604645, 0.571399986743927 ]
train_0345
[ "Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform.", "However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content.", "Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis.", "The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information.", "Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content." ]
[ 0, 0, 0, 0, 0 ]
[ 0.6053000092506409, 0.421099990606308, 0.631600022315979, 0.421099990606308, 0.421099990606308 ]
train_0346
[ "Gatys et al. recently introduced a neural algorithm that renders a content image in the style of another image, achieving so-called style transfer.", "However, their framework requires a slow iterative optimization process, which limits its practical application.", "Fast approximations with feed-forward neural networks have been proposed to speed up neural style transfer.", "Unfortunately, the speed improvement comes at a cost: the network is usually tied to a fixed set of styles and cannot adapt to arbitrary new styles.", "In this paper, we present a simple yet effective approach that for the first time enables arbitrary style transfer in real-time.", "At the heart of our method is a novel adaptive instance normalization (AdaIN) layer that aligns the mean and variance of the content features with those of the style features.", "Our method achieves speed comparable to the fastest existing approach, without the restriction to a pre-defined set of styles.", "In addition, our approach allows flexible user controls such as content-style trade-off, style interpolation, color & spatial controls, all using a single feed-forward neural network." ]
[ 0, 0, 0, 0, 2, 1, 1, 4 ]
[ 0.833299994468689, 0.6111000180244446, 0.44440001249313354, 0.3889000117778778, 0.3889000117778778, 0.6111000180244446, 0.6111000180244446, 0.3889000117778778 ]
train_0347
[ "This paper presents a diffusion method for generating terrains from a set of parameterized curves that characterize the landform features such as ridge lines, riverbeds or cliffs.", "Our approach provides the user with an intuitive vector-based feature-oriented control over the terrain.", "Different types of constraints (such as elevation, slope angle and roughness) can be attached to the curves so as to define the shape of the terrain.", "The terrain is generated from the curve representation by using an efficient multigrid diffusion algorithm.", "The algorithm can be efficiently implemented on the GPU, which allows the user to interactively create a vast variety of landscapes." ]
[ 1, 1, 1, 1, 4 ]
[ 0.4571000039577484, 0.685699999332428, 0.685699999332428, 0.6000000238418579, 0.628600001335144 ]
train_0348
[ "With the rapid development of the computer technology, cloud-based services have become a hot topic.", "Cloud-based services not only provide users with convenience, but also bring many security issues.", "Therefore, the study of access control scheme to protect users' privacy in cloud environment is of great significance.", "In this paper, we present an access control system with privilege separation based on privacy protection (PS-ACS).", "In the PS-ACS scheme, we divide the users into personal domain (PSD) and public domain (PUD) logically.", "In the PSD, we set read and write access permissions for users respectively.", "The Key-Aggregate Encryption (KAE) is exploited to implement the read access permission which improves the access efficiency.", "A high degree of patient privacy is guaranteed simultaneously by exploiting an Improved Attribute-based Signature (IABS) which can determine the users' write access.", "For the users of PUD, a hierarchical attribute-based encryption (HABE) is applied to avoid the issues of single point of failure and complicated key distribution.", "Function and performance testing result shows that the PS-ACS scheme can achieve privacy protection in cloud-based services." ]
[ 0, 0, 0, 1, 1, 1, 1, 4, 1, 4 ]
[ 1, 1, 0.8033000230789185, 0.4016000032424927, 0.4016000032424927, 0.7991999983787537, 0.5983999967575073, 0.4016000032424927, 0.39750000834465027, 0.8033000230789185 ]
train_0349
[ "A study on the steps to follow in linguistic decision analysis is presented in a context of multi-criteria=multi-person decision making.", "Three steps are established for solving a multi-criteria decision making problem under linguistic information: (i) the choice of the linguistic term set with its semantic in order to express the linguistic performance values according to all the criteria, (ii) the choice of the aggregation operator of linguistic information in order to aggregate the linguistic performance values, and (iii) the choice of the best alternatives, which is made up by two phases: (a) the aggregation of linguistic information for obtaining a collective linguistic performance value on the alternatives, and (b) the exploitation of the collective linguistic performance value in order to establish a rank ordering among the alternatives for choosing the best alternatives.", "Finally, an example is shown.", "c © 2000 Elsevier Science B.V.", "All rights reserved." ]
[ 0, 1, 1, 3, 3 ]
[ 0.3635999858379364, 0.6363999843597412, 0.42419999837875366, 0.7576000094413757, 0.7576000094413757 ]
train_0350
[ "We show how to learn many layers of features on color images and we use these features to initialize deep autoencoders.", "We then use the autoencoders to map images to short binary codes.", "Using semantic hashing [6], 28-bit codes can be used to retrieve images that are similar to a query image in a time that is independent of the size of the database.", "This extremely fast retrieval makes it possible to search using multiple di erent transformations of the query image.", "256-bit binary codes allow much more accurate matching and can be used to prune the set of images found using the 28-bit codes." ]
[ 1, 1, 1, 1, 4 ]
[ 0.6053000092506409, 1, 0.8158000111579895, 0.421099990606308, 0.5788999795913696 ]
train_0351
[ "A graph G = (V,E) is a set V of vertices and a set E of edges, in which an edge joins a pair of vertices.", "1 Normally, graphs are depicted with their vertices as points in a plane and their edges as line or curve segments connecting those points.", "There are different styles of representation, suited to different types of graphs or different purposes of presentation.", "We concentrate on the most general class of graphs: undirected graphs, drawn with straight edges.", "In this paper, we introduce an algorithm that attempts to produce aesthetically-pleasing, two-dimensional pictures of graphs by doing simplified simulations of physical systems.", "We are concerned with drawing undirected graphs according to some generally accepted aesthetic criteria: 2" ]
[ 0, 0, 0, 0, 1, 4 ]
[ 0.7576000094413757, 1, 0.7878999710083008, 0.6061000227928162, 0.8181999921798706, 0.3939000070095062 ]
train_0352
[ "We present a telerobotics research platform that provides complete access to all levels of control via open-source electronics and software.", "The electronics employs an FPGA to enable a centralized computation and distributed I/O architecture in which all control computations are implemented in a familiar development environment (Linux PC) and low-latency I/O is performed over an IEEE-1394a (FireWire) bus at speeds up to 400 Mbits/sec.", "The mechanical components are obtained from retired first-generation da Vinci ® Surgical Systems.", "This system is currently installed at 11 research institutions, with additional installations underway, thereby creating a research community around a common open-source hardware and software platform." ]
[ 0, 0, 1, 4 ]
[ 0.8055999875068665, 0.41670000553131104, 0.583299994468689, 0.583299994468689 ]
train_0353
[ "The paucity of videos in current action classification datasets (UCF-101 and HMDB-51) has made it difficult to identify good video architectures, as most methods obtain similar performance on existing small-scale benchmarks.", "This paper re-evaluates state-of-the-art architectures in light of the new Kinetics Human Action Video dataset.", "Kinetics has two orders of magnitude more data, with 400 human action classes and over 400 clips per class, and is collected from realistic, challenging YouTube videos.", "We provide an analysis on how current architectures fare on the task of action classification on this dataset and how much performance improves on the smaller benchmark datasets after pre-training on Kinetics.", "We also introduce a new Two-Stream Inflated 3D ConvNet (I3D) that is based on 2D ConvNet inflation: filters and pooling kernels of very deep image classification ConvNets are expanded into 3D, making it possible to learn seamless spatio-temporal feature extractors from video while leveraging successful ImageNet architecture designs and even their parameters.", "We show that, after pre-training on Kinetics, I3D models considerably improve upon the state-of-the-art in action classification, reaching 80.2% on HMDB-51 and 97.9% on UCF-101." ]
[ 0, 2, 2, 2, 1, 4 ]
[ 0.7695000171661377, 0.7983999848365784, 0.4609000086784363, 0.6049000024795532, 0.7695000171661377, 1 ]
train_0354
[ "Cause-Effect Graphing (CEG) is used to identify test cases from a given specification to validate its corresponding implementation.", "This paper gives detail about this technique of software testing.", "It also shows how the CEG technique can be used to test that software fulfill requirement specification or not.", "This paper surveys how CEG converted into decision table.", "The aim of this paper is to overcome existing algorithm's shortcomings and generate all possible test cases." ]
[ 0, 2, 2, 2, 2 ]
[ 0.7778000235557556, 0.6388999819755554, 0.41670000553131104, 0.41670000553131104, 0.6388999819755554 ]
train_0355
[ "Derived from rapid advances in computer vision and machine learning, video analysis tasks have been moving from inferring the present state to predicting the future state.", "Vision-based action recognition and prediction from videos are such tasks, where action recognition is to infer human actions (present state) based upon complete action executions, and action prediction to predict human actions (future state) based upon incomplete action executions.", "These two tasks have become particularly prevalent topics recently because of their explosively emerging real-world applications, such as visual surveillance, autonomous driving vehicle, entertainment, and video retrieval, etc.", "Many attempts have been devoted in the last a few decades in order to build a robust and effective framework for action recognition and prediction.", "In this paper, we survey the complete state-of-the-art techniques in the action recognition and prediction.", "Existing models, popular algorithms, technical difficulties, popular action databases, evaluation protocols, and promising future directions are also provided with systematic discussions." ]
[ 0, 0, 0, 4, 4, 4 ]
[ 0.5946000218391418, 0.5946000218391418, 0.4828000068664551, 0.4323999881744385, 0.4323999881744385, 0.6485999822616577 ]
train_0356
[ "A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source.", "One of the way is to do this is by comparing selected facial features from the image and a facial database.", "It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems.", "In this paper we focus on 3-D facial recognition system and biometric facial recognision system.", "We do critics on facial recognision system giving effectiveness and weaknesses.", "This paper also introduces scope of recognision system in India.", "Keywords-3-D facial recognition; biometric facial recognition; alignment; matching;FRGC." ]
[ 0, 0, 0, 2, 2, 4, 4 ]
[ 0.6154000163078308, 0.6154000163078308, 0.6154000163078308, 0.7949000000953674, 0.41029998660087585, 0.3846000134944916, 0.5896999835968018 ]
train_0357
[ "1 Stanford University 2 Concordia University 3 Princeton University Abstract.", "We formalize the use of Bitcoin as a source of publiclyverifiable randomness.", "As a side-effect of Bitcoin’s proof-of-work-based consensus system, random values are broadcast every time new blocks are mined.", "We can derive strong lower bounds on the computational min-entropy in each block: currently, at least 68 bits of min-entropy are produced every 10 minutes, from which one can derive over 32 nearuniform bits using standard extractor techniques.", "We show that any attack on this beacon would form an attack on Bitcoin itself and hence have a monetary cost that we can bound, unlike any other construction for a public randomness beacon in the literature.", "In our simplest construction, we show that a lottery producing a single unbiased bit is manipulation-resistant against an attacker with a stake of less than 50 bitcoins in the output, or about US$12,000 today.", "Finally, we propose making the beacon output available to smart contracts and demonstrate that this simple tool enables a number of interesting applications." ]
[ 0, 2, 2, 1, 1, 4, 4 ]
[ 0.6388999819755554, 0.6388999819755554, 0.44440001249313354, 0.583299994468689, 0.8055999875068665, 0.583299994468689, 1 ]
train_0358
[ "Although Bayesian analysis has been in use since Laplace, the Bayesian method of model-comparison has only recently been developed in depth.", "In this paper, the Bayesian approach to regularization and model-comparison is demonstrated by studying the inference problem of interpolating noisy data.", "The concepts and methods described are quite general and can be applied to many other data modeling problems.", "Regularizing constants are set by examining their posterior probability distribution.", "Alternative regularizers (priors) and alternative basis sets are objectively compared by evaluating the evidence for them.", "Occam's razor is automatically embodied by this process.", "The way in which Bayes infers the values of regularizing constants and noise levels has an elegant interpretation in terms of the effective number of parameters determined by the data set.", "This framework is due to Gull and Skilling." ]
[ 0, 0, 1, 0, 4, 2, 4, 0 ]
[ 0.7838000059127808, 0.8108000159263611, 0.40540000796318054, 0.3783999979496002, 0.4323999881744385, 0.3783999979496002, 0.5946000218391418, 0.5946000218391418 ]
train_0359
[ "Given a grayscale photograph as input, this paper attacks the problem of hallucinating a plausible color version of the photograph.", "This problem is clearly underconstrained, so previous approaches have either relied on significant user interaction or resulted in desaturated colorizations.", "We propose a fully automatic approach that produces vibrant and realistic colorizations.", "We embrace the underlying uncertainty of the problem by posing it as a classification task and use class-rebalancing at training time to increase the diversity of colors in the result.", "The system is implemented as a feed-forward pass in a CNN at test time and is trained on over a million color images.", "We evaluate our algorithm using a “colorization Turing test,” asking human participants to choose between a generated and ground truth color image.", "Our method successfully fools humans on 32% of the trials, significantly higher than previous methods.", "Moreover, we show that colorization can be a powerful pretext task for self-supervised feature learning, acting as a cross-channel encoder.", "This approach results in state-of-the-art performance on several feature learning benchmarks." ]
[ 0, 0, 1, 1, 1, 4, 1, 4, 4 ]
[ 0.6388999819755554, 0.8055999875068665, 0.6111000180244446, 1, 1, 0.583299994468689, 0.41670000553131104, 0.7778000235557556, 1 ]
train_0360
[ "Blockchain has drawn attention as the next-generation financial technology due to its security that suits the informatization era.", "In particular, it provides security through the authentication of peers that share virtual cash, encryption, and the generation of hash value.", "According to the global financial industry, the market for security-based blockchain technology is expected to grow to about USD 20 billion by 2020.", "In addition, blockchain can be applied beyond the Internet of Things (IoT) environment; its applications are expected to expand.", "Cloud computing has been dramatically adopted in all IT environments for its efficiency and availability.", "In this paper, we discuss the concept of blockchain technology and its hot research trends.", "In addition, we will study how to adapt blockchain security to cloud computing and its secure solutions in detail." ]
[ 0, 0, 0, 1, 1, 1, 4 ]
[ 0.7949000000953674, 0.7949000000953674, 0.6154000163078308, 0.5896999835968018, 0.6154000163078308, 0.6154000163078308, 0.41029998660087585 ]
train_0361
[ "Organizational compliance with laws, industrial standards, procedures and enterprise architectures has become a highly relevant topic for both practitioners and academics.", "However, both the fundamental insights into compliance as a concept and the tactics for bringing an organization into a compliant state have been described in a fragmented manner.", "Using literature from various disciplines, this paper presents two contributions.", "First, it describes the fundamental concepts regarding compliance.", "Second, it presents a framework in which the various tactics for achieving organizational compliance can be positioned." ]
[ 0, 0, 0, 2, 4 ]
[ 0.7975000143051147, 0.7975000143051147, 0.6202999949455261, 0.4429999887943268, 0.7932000160217285 ]
train_0362
[ "In this paper we present a novel street scene semantic recognition framework, which takes advantage of 3D point clouds captured by a high-definition LiDAR laser scanner.", "An important problem in object recognition is the need for sufficient labeled training data to learn robust classifiers.", "In this paper we show how to significantly reduce the need for manually labeled training data by reduction of scene complexity using non-supervised ground and building segmentation.", "Our system first automatically segments grounds point cloud, this is because the ground connects almost all other objects and we will use a connect component based algorithm to oversegment the point clouds.", "Then, using binary range image processing building facades will be detected.", "Remained point cloud will grouped into voxels which are then transformed to super voxels.", "Local 3D features extracted from super voxels are classified by trained boosted decision trees and labeled with semantic classes e.g. tree, pedestrian, car, etc.", "The proposed method is evaluated both quantitatively and qualitatively on a challenging fixed-position Terrestrial Laser Scanning (TLS) Velodyne data set and two Mobile Laser Scanning (MLS), Paris-rue-Madam and NAVTEQ True databases.", "Robust scene parsing results are reported." ]
[ 0, 0, 1, 1, 1, 1, 1, 1, 4 ]
[ 0.7894999980926514, 0.5788999795913696, 0.6053000092506409, 0.5788999795913696, 0.5788999795913696, 0.5788999795913696, 0.7894999980926514, 0.8158000111579895, 1 ]
train_0363
[ "This paper presents ORB-SLAM, a feature-based monocular simultaneous localization and mapping (SLAM) system that operates in real time, in small and large indoor and outdoor environments.", "The system is robust to severe motion clutter, allows wide baseline loop closing and relocalization, and includes full automatic initialization.", "Building on excellent algorithms of recent years, we designed from scratch a novel system that uses the same features for all SLAM tasks: tracking, mapping, relocalization, and loop closing.", "A survival of the fittest strategy that selects the points and keyframes of the reconstruction leads to excellent robustness and generates a compact and trackable map that only grows if the scene content changes, allowing lifelong operation.", "We present an exhaustive evaluation in 27 sequences from the most popular datasets.", "ORB-SLAM achieves unprecedented performance with respect to other state-of-the-art monocular SLAM approaches.", "For the benefit of the community, we make the source code public." ]
[ 2, 1, 1, 1, 4, 4, 4 ]
[ 0.5483999848365784, 0.3871000111103058, 0.7419000267982483, 1, 0.7419000267982483, 0.32260000705718994, 0.3871000111103058 ]
train_0364
[ "There are many different definitions and understandings of the concept of privacy.", "Here we bring all the different aspects of privacy together and propose a comprehensive definition thereof.", "We also introduce the three different approaches to privacy preservation, and propose a comprehensive and multi-faceted approach in order to gain from the benefits of each and maximise privacy protection.", "We report on the evaluation of a prototype of such a privacy protective shopping environment." ]
[ 0, 0, 1, 4 ]
[ 1, 0.5881999731063843, 0.6470999717712402, 0.5881999731063843 ]
train_0365
[ "We introduce a complete pipeline for recognizing and classifying people’s clothing in natural scenes.", "This has several interesting applications, including e-commerce, event and activity recognition, online advertising, etc.", "The stages of the pipeline combine a number of state-of-the-art building blocks such as upper body detectors, various feature channels and visual attributes.", "The core of our method consists of a multi-class learner based on a Random Forest that uses strong discriminative learners as decision nodes.", "To make the pipeline as automatic as possible we also integrate automatically crawled training data from the web in the learning process.", "Typically, multi-class learning benefits from more labeled data.", "Because the crawled data may be noisy and contain images unrelated to our task, we extend Random Forests to be capable of transfer learning from different domains.", "For evaluation, we define 15 clothing classes and introduce a benchmark data set for the clothing classification task consisting of over 80, 000 images, which we make publicly available.", "We report experimental results, where our classifier outperforms an SVM baseline with 41.38 % vs 35.07 % average accuracy on challenging benchmark data." ]
[ 1, 1, 1, 1, 1, 1, 1, 4, 4 ]
[ 0.6053000092506409, 0.39469999074935913, 0.39469999074935913, 0.5788999795913696, 0.6053000092506409, 0.39469999074935913, 0.4839000105857849, 0.6053000092506409, 0.7894999980926514 ]
train_0366
[ "Credit is a widely used tool to finance personal and corporate projects.", "The risk of default has motivated lenders to use a credit scoring system, which helps them make more efficient decisions about whom to extend credit.", "Credit scores serve as a financial user model, and have been traditionally computed from the user’s past financial history.", "As a result, people without any prior financial history might be excluded from the credit system.", "In this paper we present MobiScore, an approach to build a model of the user’s financial risk from mobile phone usage data, which previous work has shown to convey information about e.g. personality and socioeconomic status.", "MobiScore could replace traditional credit scores when no financial history is available, providing credit access to currently excluded population sectors, or be used as a complementary source of information to improve traditional finance-based scores.", "We validate the proposed approach using real data from a telecommunications operator and a financial institution in a Latin American country, resulting in an accurate model of default comparable to traditional credit scoring techniques." ]
[ 0, 0, 0, 0, 1, 1, 4 ]
[ 1, 0.5946000218391418, 0.5946000218391418, 0.5946000218391418, 0.40540000796318054, 0.4323999881744385, 0.40540000796318054 ]
train_0367
[ "This paper describes InfoGAN, an information-theoretic extension to the Generative Adversarial Network that is able to learn disentangled representations in a completely unsupervised manner.", "InfoGAN is a generative adversarial network that also maximizes the mutual information between a small subset of the latent variables and the observation.", "We derive a lower bound of the mutual information objective that can be optimized efficiently.", "Specifically, InfoGAN successfully disentangles writing styles from digit shapes on the MNIST dataset, pose from lighting of 3D rendered images, and background digits from the central digit on the SVHN dataset.", "It also discovers visual concepts that include hair styles, presence/absence of eyeglasses, and emotions on the CelebA face dataset.", "Experiments show that InfoGAN learns interpretable representations that are competitive with representations learned by existing supervised methods.", "For an up-to-date version of this paper, please see https://arxiv.org/abs/1606.03657." ]
[ 0, 0, 0, 0, 4, 1, 3 ]
[ 1, 1, 0.6388999819755554, 0.44440001249313354, 0.22220000624656677, 0.583299994468689, 0.7778000235557556 ]
train_0368
[ "Emergence of peer-to-peer lending has opened an appealing option for micro-financing and is growing rapidly as an option in the financial industry.", "However, peer-to-peer lending possesses a high risk of investment failure due to the lack of expertise on the borrowers' creditworthiness.", "In addition, information asymmetry, the unsecured nature of loans as well as lack of rigid rules and regulations increase the credit risk in peer-to-peer lending.", "This paper proposes a credit scoring model using artificial neural networks in classifying peer-to-peer loan applications into default and non-default groups.", "The results indicate that the neural network-based credit scoring model performs effectively in screening default applications." ]
[ 0, 0, 0, 1, 4 ]
[ 0.8055999875068665, 0.8055999875068665, 0.3889000117778778, 0.41670000553131104, 1 ]
train_0369
[ "Previous approaches for scene text detection have already achieved promising performances across various benchmarks.", "However, they usually fall short when dealing with challenging scenarios, even when equipped with deep neural network models, because the overall performance is determined by the interplay of multiple stages and components in the pipelines.", "In this work, we propose a simple yet powerful pipeline that yields fast and accurate text detection in natural scenes.", "The pipeline directly predicts words or text lines of arbitrary orientations and quadrilateral shapes in full images, eliminating unnecessary intermediate steps (e.g., candidate aggregation and word partitioning), with a single neural network.", "The simplicity of our pipeline allows concentrating efforts on designing loss functions and neural network architecture.", "Experiments on standard datasets including ICDAR 2015, COCO-Text and MSRA-TD500 demonstrate that the proposed algorithm significantly outperforms state-of-the-art methods in terms of both accuracy and efficiency.", "On the ICDAR 2015 dataset, the proposed algorithm achieves an F-score of 0.7820 at 13.2fps at 720p resolution." ]
[ 0, 4, 1, 0, 0, 4, 4 ]
[ 0.625, 0.5199999809265137, 0.375, 0.4375, 0.4375, 0.375, 0.21879999339580536 ]
train_0370
[ "The odds for success of a future CAI system (as well as the present CAI movement) are completely dependent on the quality of an underlying theory of innovation and the effectiveness of its tools, processes and models.", "This paper establishes a set of requirements for such a theory, evaluates existing approaches, methodologies and theories (including TRIZ), and presents an overview of the General Theory of Innovation (GTI) that, in the author’s opinion, satisfies most of the established criteria.", "The overview includes the theoretical foundation of GTI, a list of available applications, a list of future tasks, and other pertinent information." ]
[ 0, 0, 4 ]
[ 0.6053000092506409, 0.39469999074935913, 0.39469999074935913 ]
train_0371
[ "This paper presents a method for extracting distinctive invariant features from images that can be used to perform reliable matching between different views of an object or scene.", "The features are invariant to image scale and rotation, and are shown to provide robust matching across a substantial range of affine distortion, change in 3D viewpoint, addition of noise, and change in illumination.", "The features are highly distinctive, in the sense that a single feature can be correctly matched with high probability against a large database of features from many images.", "This paper also describes an approach to using these features for object recognition.", "The recognition proceeds by matching individual features to a database of features from known objects using a fast nearest-neighbor algorithm, followed by a Hough transform to identify clusters belonging to a single object, and finally performing verification through least-squares solution for consistent pose parameters.", "This approach to recognition can robustly identify objects among clutter and occlusion while achieving near real-time performance." ]
[ 1, 1, 1, 1, 1, 4 ]
[ 0.39469999074935913, 0.421099990606308, 0.631600022315979, 0.421099990606308, 0.6053000092506409, 0.5788999795913696 ]
train_0372
[ "Computerized algorithms and solutions in processing and diagnosis mammography X-ray, cardiovascular CT/MRI scans, and microscopy image play an important role in disease detection and computer-aided decision-making.", "Machine learning techniques have powered many aspects in medical investigations and clinical practice.", "Recently, deep learning is emerging a leading machine learning tool in computer vision and begins attracting considerable attentions in medical imaging.", "In this chapter, we provide a snapshot of this fast growing field specifically for mammography, cardiovascular, and microscopy image analysis.", "We briefly explain the popular deep neural networks and summarize current deep learning achievements in various tasks such as detection, segmentation, and classification in these heterogeneous imaging modalities.", "In addition, we discuss the challenges and the potential future trends for ongoing work.", "2." ]
[ 0, 0, 0, 2, 2, 1, 3 ]
[ 1, 1, 1, 0.7894999980926514, 0.39469999074935913, 0.5788999795913696, 1 ]
train_0373
[ "Despite the great advances made by deep learning in many machine learning problems, there is a relative dearth of deep learning approaches for anomaly detection.", "Those approaches which do exist involve networks trained to perform a task other than anomaly detection, namely generative models or compression, which are in turn adapted for use in anomaly detection; they are not trained on an anomaly detection based objective.", "In this paper we introduce a new anomaly detection method—Deep Support Vector Data Description—, which is trained on an anomaly detection based objective.", "The adaptation to the deep regime necessitates that our neural network and training procedure satisfy certain properties, which we demonstrate theoretically.", "We show the effectiveness of our method on MNIST and CIFAR-10 image benchmark datasets as well as on the detection of adversarial examples of GTSRB stop signs." ]
[ 0, 0, 1, 1, 4 ]
[ 1, 0.5788999795913696, 0.7894999980926514, 0.7894999980926514, 0.8421000242233276 ]
train_0374
[ "The rapid development of the RF power electronics requires the introduction of wide bandgap material due to its potential in high output power density, high operation voltage and high input impedance.", "GaN-based RF power devices have made substantial progresses in the last decade.", "This paper attempts to review the latest developments of the GaN HEMT technologies, including material growth, processing technologies, device epitaxial structures and MMIC designs, to achieve the state-of-the-art microwave and millimeter-wave performance.", "The reliability and manufacturing challenges are also discussed." ]
[ 0, 0, 2, 4 ]
[ 1, 1, 1, 0.5 ]
train_0375
[ "In this work we explore recent advances in Recurrent Neural Networks for large scale Language Modeling, a task central to language understanding.", "We extend current models to deal with two key challenges present in this task: corpora and vocabulary sizes, and complex, long term structure of language.", "We perform an exhaustive study on techniques such as character Convolutional Neural Networks or Long-Short Term Memory, on the One Billion Word Benchmark.", "Our best single model significantly improves state-of-the-art perplexity from 51.3 down to 30.0 (whilst reducing the number of parameters by a factor of 20), while an ensemble of models sets a new record by improving perplexity from 41.0 down to 24.2.", "We also release these models for the NLP and ML community to study and improve upon." ]
[ 0, 1, 0, 1, 1 ]
[ 0.6111000180244446, 0.3889000117778778, 0.44440001249313354, 0.3889000117778778, 0.666700005531311 ]
train_0376
[ "The consumer electronics industry is a $ 240 billion global industry with a small number of highly competitive global players.", "We describe many of the risks associated with any global supply chain in this industry.", "As illustration, we also list steps that Samsung Electronics and its subsidiary, Samsung Electronics UK, have taken to mitigate these risks.", "Our description of the risks and illustration of mitigation efforts provides the backdrop to identify areas of future research." ]
[ 0, 0, 1, 1 ]
[ 0.6154000163078308, 0.41029998660087585, 0.6154000163078308, 0.41029998660087585 ]
train_0377
[ "Binomial filters are simple and efficient structures based on the binomial coefficients for implementing Gaussian filtering.", "They do not require multipliers and can therefore be implemented efficiently in programmable hardware.", "There are many possible variations of the basic binomial filter structure, and they provide a wide range of space-time trade-offs; a number of these designs have been captured in a parametrised form and their features are compared.", "This technique can be used for multi-dimensional filtering, provided that the filter is separable.", "The numerical performance of binomial filters, and their implementation using field-programmable devices for an image processing application, are also discussed." ]
[ 0, 0, 0, 1, 1 ]
[ 1, 1, 1, 0.44440001249313354, 0.583299994468689 ]
train_0378
[ "We describe a single convolutional neural network architecture that, given a sentence, outputs a host of language processing predictions: part-of-speech tags, chunks, named entity tags, semantic roles, semantically similar words and the likelihood that the sentence makes sense (grammatically and semantically) using a language model.", "The entire network is trained jointly on all these tasks using weight-sharing, an instance of multitask learning.", "All the tasks use labeled data except the language model which is learnt from unlabeled text and represents a novel form of semi-supervised learning for the shared tasks.", "We show how both multitask learning and semi-supervised learning improve the generalization of the shared tasks, resulting in state-of-the-art-performance." ]
[ 0, 0, 1, 4 ]
[ 1, 0.583299994468689, 1, 0.3889000117778778 ]
train_0379
[ "The problem of position estimation from Time Difference Of Arrival (TDOA) measurements occurs in a range of applications from wireless communication networks to electronic warfare positioning.", "Correlation analysis of the transmitted signal to two receivers gives rise to one hyperbolic function.", "With more than two receivers, we can compute more hyperbolic functions, which ideally intersect in one unique point.", "With TDOA measurement uncertainty, we face a non-linear estimation problem.", "We here suggest and compare both a Monte Carlo based method for positioning and a gradient search algorithm using a non-linear least squares framework.", "The former has the feature to be easily extended to a dynamic framework where a motion model of the transmitter is included.", "A small simulation study is presented." ]
[ 0, 0, 2, 0, 1, 1, 1 ]
[ 1, 0.8158000111579895, 0.39469999074935913, 0.421099990606308, 0.8158000111579895, 0.8158000111579895, 0.6053000092506409 ]
train_0380
[ "Person re-identification across cameras remains a very challenging problem, especially when there are no overlapping fields of view between cameras.", "In this paper, we present a novel multi-channel parts-based convolutional neural network (CNN) model under the triplet framework for person re-identification.", "Specifically, the proposed CNN model consists of multiple channels to jointly learn both the global full-body and local body-parts features of the input persons.", "The CNN model is trained by an improved triplet loss function that serves to pull the instances of the same person closer, and at the same time push the instances belonging to different persons farther from each other in the learned feature space.", "Extensive comparative evaluations demonstrate that our proposed method significantly outperforms many state-of-the-art approaches, including both traditional and deep network-based ones, on the challenging i-LIDS, VIPeR, PRID2011 and CUHK01 datasets." ]
[ 0, 2, 1, 1, 4 ]
[ 1, 0.7576000094413757, 0.5454999804496765, 1, 0.7576000094413757 ]
train_0381
[ "This paper is a survey of inductive rule learning algorithms that use a separate-and-conquer strategy.", "This strategy can be traced back to the AQ learning system and still enjoys popularity as can be seen from its frequent use in inductive logic programming systems.", "We will put this wide variety of algorithms into a single framework and analyze them along three different dimensions, namely their search, language and overfitting avoidance biases." ]
[ 0, 0, 0 ]
[ 1, 0.8144000172615051, 0.49480000138282776 ]
train_0382
[ "The chest X-ray is one of the most commonly accessible radiological examinations for screening and diagnosis of many lung diseases.", "A tremendous number of X-ray imaging studies accompanied by radiological reports are accumulated and stored in many modern hospitals Picture Archiving and Communication Systems (PACS).", "On the other side, it is still an open question how this type of hospital-size knowledge database containing invaluable imaging informatics (i.e., loosely labeled) can be used to facilitate the data-hungry deep learning paradigms in building truly large-scale high precision", "computer-aided diagnosis (CAD) systems.", "In this paper, we present a new chest X-ray database, namely ChestX-ray8, which comprises 108,948 frontal-view X-ray images of 32,717 unique patients with the text-mined eight disease image labels (where each image can have multi-labels), from the associated radiological reports using natural language processing.", "Importantly, we demonstrate that these commonly occurring thoracic diseases can be detected and even spatially-located via a unified weakly-supervised multi-label image classification and disease localization framework, which is validated using our proposed dataset.", "Although the initial quantitative results are promising as reported, deep convolutional neural network based reading chest X-rays (i.e., recognizing and locating the common disease patterns trained with only image-level labels) remains a strenuous task for fully-automated high precision CAD systems." ]
[ 0, 0, 0, 1, 4, 4, 4 ]
[ 1, 0.8108000159263611, 0.5946000218391418, 0.5946000218391418, 0.5676000118255615, 0.6215999722480774, 0.7838000059127808 ]
train_0383
[ "Email has now become the most-used communication tool in the world and has also become the primary business productivity applications for most organizations and individuals.", "With the ever increasing popularity of emails, email over-load and prioritization becomes a major problem for many email users.", "Users spend a lot of time reading, replying and organizing their emails.", "To help users organize and prioritize their email messages, we propose a new framework; email reply prediction with unsupervised learning.", "The goal is to provide concise, highly structured and prioritized emails, thus saving the user from browsing through each email one by one and help to save time.", "In this paper, we discuss the features used to differentiate emails, show promising initial results with unsupervised machine learning model, and outline future directions for this work." ]
[ 0, 0, 0, 1, 2, 1 ]
[ 1, 0.800000011920929, 0.800000011920929, 0.428600013256073, 0.800000011920929, 0.428600013256073 ]
train_0384
[ "This paper presents a design pattern of an adaptive scheduling based on the management of the tasks execution time, achieved through multiple versions of the tasks, applied to the real-time specification for Java.", "A structure of classes is used to facilitate the development of tasks, while allowing the independence of the application code from the code responsible for the adaptive control.", "The design pattern is described through UML diagrams and an example implementation is presented." ]
[ 0, 1, 1 ]
[ 0.36250001192092896, 0.5537999868392944, 0.3865000009536743 ]
train_0385
[ "This paper addresses the problem of 3D human pose estimation from a single image.", "We follow a standard two-step pipeline by first detecting the 2D position of the N body joints, and then using these observations to infer 3D pose.", "For the first step, we use a recent CNN-based detector.", "For the second step, most existing approaches perform 2N-to-3N regression of the Cartesian joint coordinates.", "We show that more precise pose estimates can be obtained by representing both the 2D and 3D human poses using NxN distance matrices, and formulating the problem as a 2D-to-3D distance matrix regression.", "For learning such a regressor we leverage on simple Neural Network architectures, which by construction, enforce positivity and symmetry of the predicted matrices.", "The approach has also the advantage to naturally handle missing observations and allowing to hypothesize the position of non-observed joints.", "Quantitative results on Humaneva and Human3.6M datasets demonstrate consistent performance gains over state-of-the-art.", "Qualitative evaluation on the images in-the-wild of the LSP dataset, using the regressor learned on Human3.6M, reveals very promising generalization results." ]
[ 0, 1, 1, 1, 0, 4, 1, 4, 4 ]
[ 0.421099990606308, 0.7894999980926514, 1, 0.8158000111579895, 0.39469999074935913, 0.21050000190734863, 0.39469999074935913, 0.6053000092506409, 0.6053000092506409 ]
train_0386
[ "Heart rate is an important indicator of people's physiological state.", "Recently, several papers reported methods to measure heart rate remotely from face videos.", "Those methods work well on stationary subjects under well controlled conditions, but their performance significantly degrades if the videos are recorded under more challenging conditions, specifically when subjects' motions and illumination variations are involved.", "We propose a framework which utilizes face tracking and Normalized Least Mean Square adaptive filtering methods to counter their influences.", "We test our framework on a large difficult and public database MAHNOB-HCI and demonstrate that our method substantially outperforms all previous methods.", "We also use our method for long term heart rate monitoring in a game evaluation scenario and achieve promising results." ]
[ 0, 0, 0, 2, 1, 4 ]
[ 1, 0.7949000000953674, 0.5896999835968018, 0.5896999835968018, 0.5896999835968018, 0.6154000163078308 ]
train_0387
[ "We consider the following scheduling problem.", "There are m parallel machines and n independent jobs.", "Each job is to be assigned to one of the machines.", "The processing of job j on machine i requires time pij.", "The objective is to find a schedule that minimizes the makespan.", "Our main result is a polynomial algorithm which constructs a schedule that is guaranteed to be no longer than twice the optimum.", "We also present a polynomial approximation scheme for the case that the number of machines is fixed.", "Both approximation results are corollaries of a theorem about the relationship of a class of integer programming problems and their linear programming relaxations.", "In particular, we give a polynomial method to round the fractional extreme points of the linear program to integral points that nearly satisfy the constraints.", "In contrast to our main result, we prove that no polynomial algorithm can achieve a worst-case ratio less than 3/2 unless P = NP." ]
[ 0, 0, 2, 1, 2, 1, 0, 4, 1, 4 ]
[ 0.41029998660087585, 0.41029998660087585, 0.3846000134944916, 0.5896999835968018, 0.5896999835968018, 0.6154000163078308, 0.41029998660087585, 0.25, 0.4839000105857849, 0.5896999835968018 ]
train_0388
[ "The landscape of cloud computing has significantly changed over the last decade.", "Not only have more providers and service offerings crowded the space, but also cloud infrastructure that was traditionally limited to single provider data centers is now evolving.", "In this paper, we firstly discuss the changing cloud infrastructure and consider the use of infrastructure from multiple providers and the benefit of decentralising computing away from data centers.", "These trends have resulted in the need for a variety of new computing architectures that will be offered by future cloud infrastructure.", "These architectures are anticipated to impact areas, such as connecting people and devices, data-intensive computing, the service space and self-learning systems.", "Finally, we lay out a roadmap of challenges thatwill need to be addressed for realising the potential of next generation cloud systems.", "© 2017 Elsevier B.V.", "All rights reserved." ]
[ 0, 0, 2, 2, 2, 1, 3, 3 ]
[ 0.8055999875068665, 0.8055999875068665, 0.41670000553131104, 0.41670000553131104, 0.41670000553131104, 0.5555999875068665, 0.583299994468689, 0.8055999875068665 ]
train_0389
[ "With the increase in available data parallel machine learning has become an increasingly pressing problem.", "In this paper we present the first parallel stochastic gradient descent algorithm including a detailed analysis and experimental evidence.", "Unlike prior work on parallel optimization algorithms [5, 7] our variant comes with parallel acceleration guarantees and it poses no overly tight latency constraints, which might only be available in the multicore setting.", "Our analysis introduces a novel proof technique — contractive mappings to quantify the speed of convergence of parameter distributions to their asymptotic limits.", "As a side effect this answers the question of how quickly stochastic gradient descent algorithms reach the asymptotically normal regime [1, 8]." ]
[ 0, 0, 0, 1, 4 ]
[ 1, 0.6111000180244446, 0.6111000180244446, 0.7778000235557556, 0.3889000117778778 ]
train_0390
[ "Unobtrusive, contactless recordings of physiological signals are very important for many health and human-computer interaction applications.", "Most current systems require sensors which intrusively touch the user's skin.", "Recent advances in contact-free physiological signals open the door to many new types of applications.", "This technology promises to measure heart rate (HR) and respiration using video only.", "The effectiveness of this technology, its limitations, and ways of overcoming them deserves particular attention.", "In this paper, we evaluate this technique for measuring HR in a controlled situation, in a naturalistic computer interaction session, and in an exercise situation.", "For comparison, HR was measured simultaneously using an electrocardiography device during all sessions.", "The results replicated the published results in controlled situations, but show that they cannot yet be considered as a valid measure of HR in naturalistic human-computer interaction.", "We propose a machine learning approach to improve the accuracy of HR detection in naturalistic measurements.", "The results demonstrate that the root mean squared error is reduced from 43.76 to 3.64 beats/min using the proposed method." ]
[ 0, 0, 0, 2, 4, 4, 1, 4, 2, 4 ]
[ 1, 1, 1, 0.6215999722480774, 0.40540000796318054, 0.6215999722480774, 0.8108000159263611, 0.5946000218391418, 0.40540000796318054, 0.5946000218391418 ]
train_0391
[ "This paper presents a comprehensive physical characterization and modeling of the three-phase common-mode (CM) inductors along with the equivalent circuits that are relevant for their design.", "Modeling issues that are treated sparsely in previous literature are explained in this paper, and novel insightful aspects are presented.", "The calculation of the leakage inductance is reviewed, along with the magnetic core saturation issues, and a new expression for the leakage flux path is derived.", "The influence of the core material characteristics on the performance of the component is discussed, and a new method for the selection of the material for the minimized volume CM inductors is proposed in order to simplify the design procedure.", "Experimental results which validate the model are presented." ]
[ 2, 0, 1, 1, 4 ]
[ 0.7838000059127808, 0.40540000796318054, 0.5946000218391418, 0.7838000059127808, 1 ]
train_0392
[ "Trading rules have been utilized in the stock market to make profit for more than a century.", "However, only using a single trading rule may not be sufficient to predict the stock price trend accurately.", "Although some complex trading strategies combining various classes of trading rules have been proposed in the literature, they often pick only one rule for each class, which may lose valuable information from other rules in the same class.", "In this paper, a complex stock trading strategy, namely weight reward strategy (WRS), is proposed.", "WRS combines the two most popular classes of trading rules-moving average (MA) and trading range break-out (TRB).", "For both MA and TRB, WRS includes different combinations of the rule parameters to get a universe of 140 component trading rules in all.", "Each component rule is assigned a start weight and a reward/penalty mechanism based on profit is proposed to update these rules' weights over time.", "To determine the best parameter values of WRS, we employ an improved time variant Particle Swarm Optimization (PSO) algorithm with the objective of maximizing the annual net profit generated by WRS.", "The experiments show that our proposed WRS optimized by PSO outperforms the best moving average and trading range break-out rules." ]
[ 0, 0, 0, 2, 1, 1, 1, 4, 4 ]
[ 0.7894999980926514, 0.631600022315979, 0.421099990606308, 0.631600022315979, 0.733299970626831, 0.5788999795913696, 0.7894999980926514, 0.631600022315979, 0.7894999980926514 ]
train_0393
[ "Forecasting performances of feed-forward and recurrent neural networks (NN) trained with different learning algorithms are analyzed and compared using the Mackey-Glass nonlinear chaotic time series.", "This system is a known benchmark test whose elements are hard to predict.", "Multi-layer Perceptron NN was chosen as a feed-forward neural network because it is still the most commonly used network in financial forecasting models.", "It is compared with the modified version of the so-called Dynamic Multi-layer Perceptron NN characterized with a dynamic neuron model, i.e., Auto Regressive Moving Average filter built into the hidden layer neurons.", "Thus, every hidden layer neuron has the ability to process previous values of its own activity together with new input signals.", "The obtained results indicate satisfactory forecasting characteristics of both networks.", "However, recurrent NN was more accurate in practically all tests using less number of hidden layer neurons than the feed-forward NN.", "This study once again confirmed a great effectiveness and potential of dynamic neural networks in modeling and predicting highly nonlinear processes.", "Their application in the design of financial forecasting models is therefore most recommended." ]
[ 0, 0, 1, 1, 1, 4, 4, 4, 4 ]
[ 0.7949000000953674, 0.5896999835968018, 0.41029998660087585, 0.6154000163078308, 0.6154000163078308, 1, 0.5896999835968018, 1, 0.7949000000953674 ]
train_0394
[ "In this paper, we present a fully automatic brain tumor segmentation method based on Deep Neural Networks (DNNs).", "The proposed networks are tailored to glioblastomas (both low and high grade) pictured in MR images.", "By their very nature, these tumors can appear anywhere in the brain and have almost any kind of shape, size, and contrast.", "These reasons motivate our exploration of a machine learning solution that exploits a flexible, high capacity DNN while being extremely efficient.", "Here, we give a description of different model choices that we've found to be necessary for obtaining competitive performance.", "We explore in particular different architectures based on Convolutional Neural Networks (CNN), i.e. DNNs specifically adapted to image data.", "We present a novel CNN architecture which differs from those traditionally used in computer vision.", "Our CNN exploits both local features as well as more global contextual features simultaneously.", "Also, different from most traditional uses of CNNs, our networks use a final layer that is a convolutional implementation of a fully connected layer which allows a 40 fold speed up.", "We also describe a 2-phase training procedure that allows us to tackle difficulties related to the imbalance of tumor labels." ]
[ 2, 0, 0, 2, 1, 1, 1, 1, 1, 1 ]
[ 0.39469999074935913, 0.6053000092506409, 0.39469999074935913, 0.5788999795913696, 0.5788999795913696, 1, 1, 0.8158000111579895, 0.6053000092506409, 1 ]
train_0395
[ "In this paper, it is proposed a new methodology based on invariant moments and multi-class support vector machine (MCSVM) for classification of human parasite eggs in microscopic images.", "The MCSVM is one of the most used classifiers but it has not used for classification of human parasite eggs to date.", "This method composes four stages.", "These are pre-processing stage, feature extraction stage, classification stage, and testing stage.", "In pre-processing stage, the digital image processing methods, which are noise reduction, contrast enhancement, thresholding, and morphological and logical processes.", "In feature extraction stage, the invariant moments of pre-processed parasite images are calculated.", "Finally, in classification stage, the multi-class support vector machine (MCSVM) classifier is used for classification of features extracted feature extraction stage.", "We used MATLAB software for estimating the success classification rate of proposed approach in this study.", "For this aim, proposed approach was tested by using test data.", "At end of test, 97.70% overall success rates were obtained." ]
[ 2, 1, 1, 1, 1, 1, 1, 1, 1, 4 ]
[ 0.41029998660087585, 0.6154000163078308, 1, 0.7949000000953674, 1, 1, 1, 0.6154000163078308, 0.5896999835968018, 1 ]
train_0396
[ "Hate speech detection on Twitter is critical for applications like controversial event extraction, building AI chatterbots, content recommendation, and sentiment analysis.", "We define this task as being able to classify a tweet as racist, sexist or neither.", "The complexity of the natural language constructs makes this task very challenging.", "We perform extensive experiments with multiple deep learning architectures to learn semantic word embeddings to handle this complexity.", "Our experiments on a benchmark dataset of 16K annotated tweets show that such deep learning methods outperform state-of-the-art char/word n-gram methods by ∼18 F1 points." ]
[ 0, 0, 0, 1, 1 ]
[ 0.8108000159263611, 0.40540000796318054, 0.5946000218391418, 0.8108000159263611, 0.40540000796318054 ]
train_0397
[ "Software architecture has become a centerpiece subject for software engineers, both researchers and practitioners alike.", "At the heart of every software system is its software architecture, i.e., \"the set of principal design decisions about the system\".", "Architecture permeates all major facets of a software system, for principal design decisions may potentially be made at any time during a system's lifetime, and potentially by any stakeholder.", "Such decisions encompass structural concerns, such as the system's high-level building blocks---components, connectors, and configurations; the system's deployment; the system's non-functional properties; and the system's evolution patterns, including runtime adaptation.", "Software architectures found particularly useful for families of systems---product lines---are often codified into architectural patterns, architectural styles, and reusable, parameterized reference architectures.", "This tutorial affords the participant an extensive treatment of the field of software architecture, its foundation, principles, and elements, including those mentioned above.", "Additionally, the tutorial introduces the participants to the state-of-the-art as well as the state-of-the-practice in software architecture, and looks at emerging and likely future trends in this field.", "The discussion is illustrated with numerous real-world examples.", "One example given prominent treatment is the architecture of the World Wide Web and its underlying architectural style, REpresentational State Transfer (REST)." ]
[ 0, 0, 0, 0, 0, 1, 1, 1, 4 ]
[ 1, 1, 0.7894999980926514, 0.7894999980926514, 0.6053000092506409, 0.5788999795913696, 0.7894999980926514, 0.5788999795913696, 0.421099990606308 ]
train_0398
[ "Years of heavy regulation and bureaucratic inefficiency have slowed innovation for electronic medical records (EMRs).", "We now face a critical need for such innovation, as personalization and data science prompt patients to engage in the details of their healthcare and restore agency over their medical data.", "In this paper, we propose MedRec: a novel, decentralized record management system to handle EMRs, using blockchain technology.", "Our system gives patients a comprehensive, immutable log and easy access to their medical information across providers and treatment sites.", "Leveraging unique blockchain properties, MedRec manages authentication, confidentiality, accountability and data sharing- crucial considerations when handling sensitive information.", "A modular design integrates with providers' existing, local data storage solutions, facilitating interoperability and making our system convenient and adaptable.", "We incentivize medical stakeholders (researchers, public health authorities, etc.) to participate in the network as blockchain “miners”.", "This provides them with access to aggregate, anonymized data as mining rewards, in return for sustaining and securing the network via Proof of Work.", "MedRec thus enables the emergence of data economics, supplying big data to empower researchers while engaging patients and providers in the choice to release metadata.", "The purpose of this short paper is to expose, prior to field tests, a working prototype through which we analyze and discuss our approach." ]
[ 0, 0, 2, 1, 1, 1, 1, 1, 1, 4 ]
[ 1, 0.8108000159263611, 1, 1, 0.5946000218391418, 0.7838000059127808, 1, 1, 0.5946000218391418, 1 ]
train_0399
[ "Recent years have produced great advances in training large, deep neural networks (DNNs), including notable successes in training convolutional neural networks (convnets) to recognize natural images.", "However, our understanding of how these models work, especially what computations they perform at intermediate layers, has lagged behind.", "Progress in the field will be further accelerated by the development of better tools for visualizing and interpreting neural nets.", "We introduce two such tools here.", "The first is a tool that visualizes the activations produced on each layer of a trained convnet as it processes an image or video (e.g. a live webcam stream).", "We have found that looking at live activations that change in response to user input helps build valuable intuitions about how convnets work.", "The second tool enables visualizing features at each layer of a DNN via regularized optimization in image space.", "Because previous versions of this idea produced less recognizable images, here we introduce several new regularization methods that combine to produce qualitatively clearer, more interpretable visualizations.", "Both tools are open source and work on a pretrained convnet with minimal setup.", "Published in the Deep Learning Workshop, 31 st International Conference on Machine Learning, Lille, France, 2015." ]
[ 0, 0, 0, 2, 1, 1, 1, 1, 4, 3 ]
[ 0.8158000111579895, 0.8158000111579895, 0.6053000092506409, 0.421099990606308, 0.6053000092506409, 0.6053000092506409, 0.6053000092506409, 1, 0.421099990606308, 0.7894999980926514 ]