abstract_id
stringlengths
10
10
sentences
list
labels
list
confs
list
train_0700
[ "Predictive analytics embraces an extensive range of techniques including statistical modeling, machine learning, and data mining and is applied in business intelligence, public health, disaster management and response, and many other fields.", "To date, visualization has been broadly used to support tasks in the predictive analytics pipeline.", "Primary uses have been in data cleaning, exploratory analysis, and diagnostics.", "For example, scatterplots and bar charts are used to illustrate class distributions and responses.", "More recently, extensive visual analytics systems for feature selection, incremental learning, and various prediction tasks have been proposed to support the growing use of complex models, agent-specific optimization, and comprehensive model comparison and result exploration.", "Such work is being driven by advances in interactive machine learning and the desire of end-users to understand and engage with the modeling process.", "In this state-of-the-art report, we catalogue recent advances in the visualization community for supporting predictive analytics.", "First, we define the scope of predictive analytics discussed in this article and describe how visual analytics can support predictive analytics tasks in a predictive visual analytics (PVA) pipeline.", "We then survey the literature and categorize the research with respect to the proposed PVA pipeline.", "Systems and techniques are evaluated in terms of their supported interactions, and interactions specific to predictive analytics are discussed." ]
[ 0, 0, 0, 0, 1, 4, 4, 1, 1, 1 ]
[ 0.833299994468689, 0.6111000180244446, 0.6388999819755554, 0.41670000553131104, 0.5555999875068665, 0.41670000553131104, 0.41670000553131104, 0.8055999875068665, 0.6111000180244446, 0.44440001249313354 ]
train_0701
[ "A text-to-speech synthesis system typically consists of multiple stages, such as a text analysis frontend, an acoustic model and an audio synthesis module.", "Building these components often requires extensive domain expertise and may contain brittle design choices.", "In this paper, we present Tacotron, an end-to-end generative text-to-speech model that synthesizes speech directly from characters.", "Given <text, audio> pairs, the model can be trained completely from scratch with random initialization.", "We present several key techniques to make the sequence-tosequence framework perform well for this challenging task.", "Tacotron achieves a 3.82 subjective 5-scale mean opinion score on US English, outperforming a production parametric system in terms of naturalness.", "In addition, since Tacotron generates speech at the frame level, it’s substantially faster than sample-level autoregressive methods." ]
[ 0, 0, 2, 1, 1, 1, 1 ]
[ 0.8285999894142151, 0.8285999894142151, 0.571399986743927, 0.5, 1, 0.4000000059604645, 0.800000011920929 ]
train_0702
[ "Cloud computing an emerging approach by sharing infrastructure is an overwhelming trend.", "While in the process of cloud deployment, the security issues can not be underestimated.", "Traditional Intrusion Detection System (IDS) because of lower detection rate and higher false rate couldn’t be suitable the cloud here.", "Extensibility is the main requirement for IDS framework of cloud environment in this paper as follows.", "First the cross-platform and strong isolation properties of virtualization have been fully reflected here, that is to say, an extensible VM-based multiple IDSs are deployed in each layer to monitor specific virtual component.", "Moreover, during the process, we also propose the cloud alliance concept by the communication agents exchanging the mutual alerts mainly to resist Denialof-Service (DoS) and Distributed Denial-of-Service (DDoS) the single point attack of failure.", "On this basis, we have the identity certification of the communication agents to improve the reliability of the alerts.", "Through the comparison of simulation results, the proposed system framework has a great advantage for monitoring VMs on the detection rate." ]
[ 0, 0, 1, 2, 4, 4, 4, 4 ]
[ 1, 0.7894999980926514, 0.39469999074935913, 0.39469999074935913, 0.421099990606308, 0.421099990606308, 0.5788999795913696, 0.5788999795913696 ]
train_0703
[ "Over the past couple of years, clicking and posting selfies has become a popular trend.", "However, since March 2014, 127 people have died and many have been injured while trying to click a selfie.", "Researchers have studied selfies for understanding the psychology of the authors, and understanding its effect on social media platforms.", "In this work, we perform a comprehensive analysis of the selfie-related casualties and infer various reasons behind these deaths.", "We use inferences from incidents and from our understanding of the features, we create a system to make people more aware of the dangerous situations in which these selfies are taken.", "We use a combination of text-based, image-based and location-based features to classify a particular selfie as dangerous or not.", "Our method ran on 3,155 annotated selfies collected on Twitter gave 73% accuracy.", "Individually the image-based features were the most informative for the prediction task.", "The combination of image-based and location-based features resulted in the best accuracy.", "We have made our code and dataset available at http://labs.precog.iiitd.edu.in/killfie." ]
[ 0, 0, 2, 2, 1, 1, 1, 1, 4, 3 ]
[ 0.7705000042915344, 0.7705000042915344, 0.4016000032424927, 0.5983999967575073, 0.4016000032424927, 0.5738000273704529, 0.7705000042915344, 0.8278999924659729, 0.5738000273704529, 0.4016000032424927 ]
train_0704
[ "We have already encountered the sampling theorem and, arguing purely from a trigonometric-identity point of view have established the Nyquist sampling cri-terion for sinusoidal signals.", "However, we have not fully addressed the sampling of more general signals, nor provided a general proof.", "Nor have we indicated how to reconstruct a signal from its samples.", "With the tools of Fourier transforms and Fourier series available to us we are now ready to nish the job that was started months ago." ]
[ 0, 0, 2, 4 ]
[ 0.5983999967575073, 0.7705000042915344, 0.4016000032424927, 0.4262000024318695 ]
train_0705
[ "As projects for developing information systems are getting larger and more complicated, we need to have more advanced development methods suitable for every development situation.", "Method engineering is the discipline to construct new methods from parts of existing methods, called method fragments.", "To achieve this objective, we need to clarify how to model the existing methods and how to assemble method fragments into new project-specific methods, so-called situational methods.", "Especially, to produce meaningful methods, we should impose some constraints or rules on method assembly processes.", "In this paper, we propose a framework for hierarchical method modelling (meta-modelling) from three orthogonal dimensions: perspectives, abstraction and granularity.", "According to each dimension, methods and/or method fragments are hierarchically modelled and classified.", "Furthermore, we present a method assembly mechanism and its formalization as a set of rules.", "These rules are presented in first order predicate logic and play an important role in the assembly process of meaningful methods from existing method fragments.", "The benefit of our technique is illustrated by an example of method assembly, namely the integration of the Object Model and Harel's Statechart into Objectcharts." ]
[ 0, 0, 2, 1, 1, 1, 1, 1, 4 ]
[ 0.5946000218391418, 0.8108000159263611, 0.4323999881744385, 0.8108000159263611, 0.8108000159263611, 0.8108000159263611, 1, 0.5946000218391418, 0.7838000059127808 ]
train_0706
[ "Electronic communications have become the most important kind of communications in business.", "However, trust, privacy and security have become the great challenges for business and governments around the globe.", "The Public Key Infrastructure (PKI) model tries to solve these issues and make the Internet more secure.", "This paper explains the main purposes of PKI and addresses some of the major issues and obstacles that face PKI technology today." ]
[ 0, 0, 2, 2 ]
[ 0.8571000099182129, 0.628600001335144, 0.4571000039577484, 0.628600001335144 ]
train_0707
[ "We investigated whether multitasking with media was a unique predictor of depression and social anxiety symptoms.", "Participants (N=318) completed measures of their media use, personality characteristics, depression, and social anxiety.", "Regression analyses revealed that increased media multitasking was associated with higher depression and social anxiety symptoms, even after controlling for overall media use and the personality traits of neuroticism and extraversion.", "The unique association between media multitasking and these measures of psychosocial dysfunction suggests that the growing trend of multitasking with media may represent a unique risk factor for mental health problems related to mood and anxiety.", "Further, the results strongly suggest that future research investigating the impact of media use on mental health needs to consider the role that multitasking with media plays in the relationship." ]
[ 0, 0, 4, 4, 4 ]
[ 0.6053000092506409, 0.421099990606308, 0.5788999795913696, 0.5788999795913696, 0.7894999980926514 ]
train_0708
[ "This paper discusses a novel hybrid approach for text categorization that combines a machine learning algorithm, which provides a base model trained with a labeled corpus, with a rule-based expert system, which is used to improve the results provided by the previous classifier, by filtering false positives and dealing with false negatives.", "The main advantage is that the system can be easily fine-tuned by adding specific rules for those noisy or conflicting categories that have not been successfully trained.", "We also describe an implementation based on k-Nearest Neighbor and a simple rule language to express lists of positive, negative and relevant (multiword) terms appearing in the input text.", "The system is evaluated in several scenarios, including the popular Reuters-21578 news corpus for comparison to other approaches, and categorization using IPTC metadata, EUROVOC thesaurus and others.", "Results show that this approach achieves a precision that is comparable to top ranked methods, with the added value that it does not require a demanding human expert workload to train." ]
[ 0, 0, 2, 1, 4 ]
[ 1, 0.41029998660087585, 0.41029998660087585, 0.41029998660087585, 0.7949000000953674 ]
train_0709
[ "Recent solutions for sentiment analysis have relied on feature selection methods ranging from lexicon-based approaches where the set of features are generated by humans, to approaches that use general statistical measures where features are selected solely on empirical evidence.", "The advantage of statistical approaches is that they are fully automatic, however, they often fail to separate features that carry sentiment from those that do not.", "In this paper we propose a set of new feature selection schemes that use a Content and Syntax model to automatically learn a set of features in a review document by separating the entities that are being reviewed from the subjective expressions that describe those entities in terms of polarities.", "By focusing only on the subjective expressions and ignoring the entities, we can choose more salient features for document-level sentiment analysis.", "The results obtained from using these features in a maximum entropy classifier are competitive with the state-of-the-art machine learning approaches." ]
[ 0, 0, 2, 1, 4 ]
[ 0.7940999865531921, 1, 0.41179999709129333, 1, 0.6176000237464905 ]
train_0710
[ "We propose a deep learning method for single image superresolution (SR).", "Our method directly learns an end-to-end mapping between the low/high-resolution images.", "The mapping is represented as a deep convolutional neural network (CNN) [15] that takes the lowresolution image as the input and outputs the high-resolution one.", "We further show that traditional sparse-coding-based SR methods can also be viewed as a deep convolutional network.", "But unlike traditional methods that handle each component separately, our method jointly optimizes all layers.", "Our deep CNN has a lightweight structure, yet demonstrates state-of-the-art restoration quality, and achieves fast speed for practical on-line usage." ]
[ 2, 1, 1, 1, 1, 4 ]
[ 0.5249999761581421, 0.800000011920929, 0.6499999761581421, 0.6000000238418579, 0.6000000238418579, 0.875 ]
train_0711
[ "Accurate cardinality estimates are essential for a successful query optimization.", "This is not only true for relational DBMSs but also for RDF stores.", "An RDF database consists of a set of triples and, hence, can be seen as a relational database with a single table with three attributes.", "This makes RDF rather special in that queries typically contain many self joins.", "We show that relational DBMSs are not well-prepared to perform cardinality estimation in this context.", "Further, there are hardly any special cardinality estimation methods for RDF databases.", "To overcome this lack of appropriate cardinality estimation methods, we introduce characteristic sets together with new cardinality estimation methods based upon them.", "We then show experimentally that the new methods are-in the RDF context-highly superior to the estimation methods employed by commercial DBMSs and by the open-source RDF store RDF-3X." ]
[ 0, 0, 1, 1, 1, 0, 4, 4 ]
[ 1, 0.7949000000953674, 0.41029998660087585, 0.41029998660087585, 0.41029998660087585, 0.3846000134944916, 0.6154000163078308, 0.41029998660087585 ]
train_0712
[ "Almost 30 years after the introduction of the CIO position, the ideal CIO reporting structure (whether the CIO should report to the CEO or the CFO) is yet to be identified.", "There is an intuitive assumption among some proponents of IT that the CIO should always report to the CEO to promote the importance of IT and the CIO’s clout in the firm, while some adversaries of IT call for a CIO–CFO reporting structure to keep a tab on IT spending.", "However, we challenge these two ad hoc prescriptions by arguing that neither CIO reporting structure is necessarily optimal, and that the CIO reporting structure should not be used to gauge the strategic role of IT in the firm." ]
[ 0, 0, 0 ]
[ 1, 1, 0.4323999881744385 ]
train_0713
[ "Inspired by recent work in machine translation and object detection, we introduce an attention based model that automatically learns to describe the content of images.", "We describe how we can train this model in a deterministic manner using standard backpropagation techniques and stochastically by maximizing a variational lower bound.", "We also show through visualization how the model is able to automatically learn to fix its gaze on salient objects while generating the corresponding words in the output sequence.", "We validate the use of attention with state-of-theart performance on three benchmark datasets: Flickr9k, Flickr30k and MS COCO." ]
[ 0, 1, 1, 4 ]
[ 0.6154000163078308, 0.5896999835968018, 0.3846000134944916, 0.41029998660087585 ]
train_0714
[ "Posting pictures is a necessary part of advertising a home for sale.", "Agents typically sort through dozens of images from which to pick the most complimentary ones.", "This is a manual effort involving annotating images accompanied by descriptions (bedroom, bathroom, attic, etc.).", "When volumes are small, manual annotation is not a problem, but there is a point where this becomes too burdensome and ultimately infeasible.", "Here, we propose an approach based on computer vision methodology to radically increase the efficiency of such tasks.", "We present a high-confidence image classification framework, whose inputs are images and outputs are labels.", "The core of the classification algorithm is long short term memory (LSTM), and fully connected neural networks, along with a substantial preprocessing using 'contrast-limited adaptive histogram equalization (CLAHE) for image enhancement.", "Since, there is no standard benchmark containing a comprehensive dataset of well-annotated real estate images, we introduce Real Estate Image (REI) database for evaluating the image classification algorithms.", "Therein we demonstrate empirics based on our proposed framework on the new REI dataset, as well as on the SUN dataset." ]
[ 0, 0, 0, 0, 2, 1, 1, 4, 4 ]
[ 1, 1, 1, 1, 0.8108000159263611, 0.7838000059127808, 0.5946000218391418, 0.5946000218391418, 0.5946000218391418 ]
train_0715
[ "Clustering is an important data mining problem.", "Most of the earlier work on clustering focussed on numeric attributes which have a natural ordering on their attribute values.", "Recently, clustering data with categorical attributes, whose attribute values do not have a natural ordering, has received some attention.", "However, previous algorithms do not give a formal description of the clusters they discover and some of them assume that the user post-processes the output of the algorithm to identify the final clusters.", "In this paper, we introduce a novel formalization of a cluster for categorical attributes by generalizing a definition of a cluster for numerical attributes.", "We then describe a very fast summarizationbased algorithm called CACTUS that discovers exactly such clusters in the data.", "CACTUS has two important characteristics.", "First, the algorithm requires only two scans of the dataset, and hence is very fast and scalable.", "Our experiments on a variety of datasets show that CACTUS outperforms previous work by a factor of 3 to 10.", "Second, CACTUS can find clusters in subsets of all attributes and can thus perform a subspace clustering of the data." ]
[ 0, 0, 0, 0, 1, 1, 1, 1, 4, 1 ]
[ 0.8421000242233276, 0.631600022315979, 0.631600022315979, 0.421099990606308, 0.5788999795913696, 1, 0.421099990606308, 0.7894999980926514, 0.75, 0.5788999795913696 ]
train_0716
[ "ts oby 200 Abstract.", "Digital Still Color Cameras sample the color spectrum using a monolithic array of color filters overlaid on a charge coupled device array such that each pixel samples only one color band.", "The resulting mosaic of color samples is processed to produce a high resolution color image such that the values of the color bands not sampled at a certain location are estimated from its neighbors.", "This process is often referred to as demosaicking.", "This paper introduces and compares a few commonly used demosaicking methods using error metrics like mean squared error in the RGB color space and perceived error in the CIELAB color space.", "© 2002 SPIE and IS&T. [DOI: 10.1117/1.1484495]" ]
[ 3, 0, 0, 0, 1, 3 ]
[ 0.8055999875068665, 0.6111000180244446, 0.6111000180244446, 0.6111000180244446, 0.3889000117778778, 0.8055999875068665 ]
train_0717
[ "This paper puts forward two useful methods for self-adaptation of the mutation distribution - the concepts of derandomization and cumulation.", "Principle shortcomings of the concept of mutative strategy parameter control and two levels of derandomization are reviewed.", "Basic demands on the self-adaptation of arbitrary (normal) mutation distributions are developed.", "Applying arbitrary, normal mutation distributions is equiv-alent to applying a general, linear problem encoding.", "The underlying objective of mutative strategy parameter control is roughly to favor previously selected mutation steps in the future.", "If this objective is pursued rigor-ously, a completely derandomized self-adaptation scheme results, which adapts arbitrary normal mutation distributions.", "This scheme, called covariance matrix adaptation (CMA), meets the previously stated demands.", "It can still be considerably improved by cumulation - utilizing an evolution path rather than single search steps.", "Simulations on various test functions reveal local and global search properties of the evolution strategy with and without covariance matrix adaptation.", "Their performances are comparable only on perfectly scaled functions." ]
[ 2, 1, 2, 1, 2, 4, 4, 4, 4, 4 ]
[ 0.421099990606308, 0.39469999074935913, 0.421099990606308, 0.6053000092506409, 0.631600022315979, 0.39469999074935913, 0.5788999795913696, 0.39469999074935913, 0.39469999074935913, 0.6053000092506409 ]
train_0718
[ "Software-defined networking (SDN) is a new networking paradigm that decouples the forwarding and control planes, traditionally coupled with one another, while adopting a logically centralized architecture aiming to increase network agility and programability.", "While many efforts are currently being made to standardize this emerging paradigm, careful attention needs to be paid to security at this early design stage too, rather than waiting until the technology becomes mature, thereby potentially avoiding previous pitfalls made when designing the Internet in the 1980s.", "This article focuses on the security aspects of SDN networks.", "We begin by discussing the new security advantages that SDN brings and by showing how some of the long-lasting issues in network security can be addressed by exploiting SDN capabilities.", "Then we describe the new security threats that SDN is faced with and discuss possible techniques that can be used to prevent and mitigate such threats." ]
[ 0, 0, 2, 2, 1 ]
[ 0.7838000059127808, 0.5676000118255615, 0.6215999722480774, 0.40540000796318054, 0.5946000218391418 ]
train_0719
[ "We consider a generalization of low-rank matrix completion to the case where the data belongs to an algebraic variety, i.e., each data point is a solution to a system of polynomial equations.", "In this case the original matrix is possibly high-rank, but it becomes low-rank after mapping each column to a higher dimensional space of monomial features.", "Many well-studied extensions of linear models, including a ne subspaces and their union, can be described by a variety model.", "In addition, varieties can be used to model a richer class of nonlinear quadratic and higher degree curves and surfaces.", "We study the sampling requirements for matrix completion under a variety model with a focus on a union of a ne subspaces.", "We also propose an e cient matrix completion algorithm that minimizes a convex or non-convex surrogate of the rank of the matrix of monomial features.", "Our algorithm uses the wellknown “kernel trick” to avoid working directly with the high-dimensional monomial matrix.", "We show the proposed algorithm is able to recover synthetically generated data up to the predicted sampling complexity bounds.", "The proposed algorithm also outperforms standard low rank matrix completion and subspace clustering techniques in experiments with real data." ]
[ 0, 0, 1, 0, 1, 1, 1, 1, 1 ]
[ 1, 0.8158000111579895, 0.5, 0.421099990606308, 0.5788999795913696, 0.39469999074935913, 0.5, 0.421099990606308, 0.421099990606308 ]
train_0720
[ "In this paper, we present an efficient general-purpose objective no-reference (NR) image quality assessment (IQA) framework based on unsupervised feature learning.", "The goal is to build a computational model to automatically predict human perceived image quality without a reference image and without knowing the distortion present in the image.", "Previous approaches for this problem typically rely on hand-crafted features which are carefully designed based on prior knowledge.", "In contrast, we use raw-image-patches extracted from a set of unlabeled images to learn a dictionary in an unsupervised manner.", "We use soft-assignment coding with max pooling to obtain effective image representations for quality estimation.", "The proposed algorithm is very computationally appealing, using raw image patches as local descriptors and using soft-assignment for encoding.", "Furthermore, unlike previous methods, our unsupervised feature learning strategy enables our method to adapt to different domains.", "CORNIA (Codebook Representation for No-Reference Image Assessment) is tested on LIVE database and shown to perform statistically better than the full-reference quality measure, structural similarity index (SSIM) and is shown to be comparable to state-of-the-art general purpose NR-IQA algorithms." ]
[ 0, 2, 2, 1, 1, 1, 1, 4 ]
[ 0.800000011920929, 0.800000011920929, 0.4000000059604645, 1, 1, 0.800000011920929, 0.6000000238418579, 0.4000000059604645 ]
train_0721
[ "This paper addresses the task of user classification in social media, with an application to Twitter.", "We automatically infer the values of user attributes such as political orientation or ethnicity by leveraging observable information such as the user behavior, network structure and the linguistic content of the user’s Twitter feed.", "We employ a machine learning approach which relies on a comprehensive set of features derived from such user information.", "We report encouraging experimental results on 3 tasks with different characteristics: political affiliation detection, ethnicity identification and detecting affinity for a particular business.", "Finally, our analysis shows that rich linguistic features prove consistently valuable across the 3 tasks and show great promise for additional user classification needs." ]
[ 2, 1, 1, 4, 4 ]
[ 0.7894999980926514, 0.5788999795913696, 0.7894999980926514, 0.6053000092506409, 1 ]
train_0722
[ "Recent years have seen a rapid proliferation of mass-market consumer software that takes inspiration from video games.", "Usually summarized as \"gamification\", this trend connects to a sizeable body of existing concepts and research in human-computer interaction and game studies, such as serious games, pervasive games, alternate reality games, or playful design.", "However, it is not clear how \"gamification\" relates to these, whether it denotes a novel phenomenon, and how to define it.", "Thus, in this paper we investigate \"gamification\" and the historical origins of the term in relation to precursors and similar concepts.", "It is suggested that \"gamified\" applications provide insight into novel, gameful phenomena complementary to playful phenomena.", "Based on our research, we propose a definition of \"gamification\" as the use of game design elements in non-game contexts." ]
[ 0, 0, 0, 2, 0, 4 ]
[ 1, 1, 1, 0.7813000082969666, 0.40630000829696655, 0.5938000082969666 ]
train_0723
[ "Audit logs are an important part of any secure system, and they need to be carefully designed in order to give a faithful representation of past system activity.", "This is especially true in the presence of adversaries who might want to tamper with the audit logs.", "While it is important that auditors can inspect audit logs to assess past system activity, the content of an audit log may contain sensitive information, and should therefore be protected from unauthorized" ]
[ 0, 0, 0 ]
[ 1, 1, 0.5946000218391418 ]
train_0724
[ "The Internet has become a rich and large repository of information about us as individuals.", "Anything from the links and text on a user's homepage to the mailing lists the user subscribes to are reflections of social interactions a user has in the real world.", "In this paper we devise techniques to mine this information in order to predict relationships between individuals.", "Further we show that some pieces of information are better indicators of social connections than others, and that these indicators vary between user populations and provide a glimpse into the social lives of individuals in different communities.", "Our techniques provide potential applications in automatically inferring real-world connections and discovering, labeling, and characterizing communities." ]
[ 0, 0, 1, 1, 1 ]
[ 0.800000011920929, 0.6000000238418579, 0.571399986743927, 0.428600013256073, 0.628600001335144 ]
train_0725
[ "Central to the development of computer vision systems is the collection and use of annotated images spanning our visual world.", "Annotations may include information about the identity, spatial extent, and viewpoint of the objects present in a depicted scene.", "Such a database is useful for the training and evaluation of computer vision systems.", "Motivated by the availability of images on the Internet, we introduced a web-based annotation tool that allows online users to label objects and their spatial extent in images.", "To date, we have collected over 400 000 annotations that span a variety of different scene and object classes.", "In this paper, we show the contents of the database, its growth over time, and statistics of its usage.", "In addition, we explore and survey applications of the database in the areas of computer vision and computer graphics.", "Particularly, we show how to extract the real-world 3-D coordinates of images in a variety of scenes using only the user-provided object annotations.", "The output 3-D information is comparable to the quality produced by a laser range scanner.", "We also characterize the space of the images in the database by analyzing 1) statistics of the co-occurrence of large objects in the images and 2) the spatial layout of the labeled images." ]
[ 0, 0, 4, 1, 4, 4, 1, 1, 3, 4 ]
[ 1, 1, 0.428600013256073, 1, 0.542900025844574, 0.6000000238418579, 0.571399986743927, 0.800000011920929, 0.4000000059604645, 0.571399986743927 ]
train_0726
[ "The class scheduling problem can be modeled by a graph where the vertices and edges represent the courses and the common students, respectively.", "The problem is to assign the courses a given number of time slots (colors), where each time slot can be used for a given number of class rooms.", "The Vertex Coloring (VC) algorithm is a polynomial time algorithm which produces a conflict free solution using the least number of colors [9].", "However, the VC solution may not be implementable because it uses a number of time slots that exceed the available ones with unbalanced use of class rooms.", "We propose a heuristic approach VC* to (1) promote uniform distribution of courses over the colors and to (2) balance course load for each time slot over the available class rooms.", "The performance function represents the percentage of students in all courses that could not be mapped to time slots or to class rooms.", "A randomized simulation of registration of four departments with up to 1200 students is used to evaluate the performance of proposed heuristic." ]
[ 0, 0, 1, 1, 1, 4, 4 ]
[ 0.583299994468689, 0.583299994468689, 0.3889000117778778, 0.3889000117778778, 0.8055999875068665, 0.41670000553131104, 0.3889000117778778 ]
train_0727
[ "Super-deformed, SD, is a specific artistic style for Japanese manga and anime which exaggerates characters in the goal of appearing cute and funny.", "The SD style characters are widely used, and can be seen in many anime, CG movies, or games.", "However, to create an SD model often requires professional skills and considerable time and effort.", "In this paper, we present a novel technique to generate an SD style counterpart of a normal 3D character model.", "Our approach uses an optimization guided by a number of constraints that can capture the properties of the SD style.", "Users can also customize the results by specifying a small set of parameters related to the body proportions and the emphasis of the signature characteristics.", "With our technique, even a novel user can generate visually pleasing SD models in seconds." ]
[ 0, 0, 1, 0, 1, 4, 4 ]
[ 0.7940999865531921, 0.5587999820709229, 0.44119998812675476, 0.44119998812675476, 0.5587999820709229, 0.44119998812675476, 0.44119998812675476 ]
train_0728
[ "We use logical inference techniques for recognising textual entailment.", "As the performance of theorem proving turns out to be highly dependent on not readily available background knowledge, we incorporate model building, a technique borrowed from automated reasoning, and show that it is a useful robust method to approximate entailment.", "Finally, we use machine learning to combine these deep semantic analysis techniques with simple shallow word overlap; the resulting hybrid model achieves high accuracy on the RTE testset, given the state of the art.", "Our results also show that the different techniques that we employ perform very differently on some of the subsets of the RTE corpus and as a result, it is useful to use the nature of the dataset as a feature." ]
[ 1, 1, 1, 4 ]
[ 0.5587999820709229, 0.4706000089645386, 0.6176000237464905, 0.5881999731063843 ]
train_0729
[ "Learning and then recognizing a route, whether travelled during the day or at night, in clear or inclement weather, and in summer or winter is a challenging task for state of the art algorithms in computer vision and robotics.", "In this paper, we present a new approach to visual navigation under changing conditions dubbed SeqSLAM.", "Instead of calculating the single location most likely given a current image, our approach calculates the best candidate matching location within every local navigation sequence.", "Localization is then achieved by recognizing coherent sequences of these “local best matches”.", "This approach removes the need for global matching performance by the vision front-end - instead it must only pick the best match within any short sequence of images.", "The approach is applicable over environment changes that render traditional feature-based techniques ineffective.", "Using two car-mounted camera datasets we demonstrate the effectiveness of the algorithm and compare it to one of the most successful feature-based SLAM algorithms, FAB-MAP.", "The perceptual change in the datasets is extreme; repeated traverses through environments during the day and then in the middle of the night, at times separated by months or years and in opposite seasons, and in clear weather and extremely heavy rain.", "While the feature-based method fails, the sequence-based algorithm is able to match trajectory segments at 100% precision with recall rates of up to 60%." ]
[ 0, 0, 0, 1, 1, 1, 1, 4, 4 ]
[ 1, 0.542900025844574, 0.542900025844574, 0.628600001335144, 0.8571000099182129, 0.8571000099182129, 0.628600001335144, 0.4000000059604645, 0.4000000059604645 ]
train_0730
[ "Recent years have witnessed an exceptional research interest in cryptographic hash functions, especially after the popular attacks against MD5 and SHA-1 in 2005.", "In 2007, the U.S. National Institute of Standards and Technology (NIST) has also significantly boosted this interest by announcing a public competition to select the next hash function standard, to be named SHA-3.", "Not surprisingly, the hash function literature has since been rapidly growing in an extremely fast pace.", "In this paper, we provide a comprehensive, up-to-date discussion of the current state of the art of cryptographic hash functions security and design.", "We first discuss the various hash functions security properties and notions, then proceed to give an overview of how (and why) hash functions evolved over the years giving raise to the current diverse hash functions design approaches.", "∗A short version of this paper is in [1].", "This version has been thoroughly extended.", "An identical version has been uploaded to the Cryptology ePrint Archive: eprint.iacr.org/2011/565" ]
[ 0, 0, 0, 2, 1, 3, 3, 3 ]
[ 0.7894999980926514, 1, 1, 0.7894999980926514, 0.7894999980926514, 1, 0.5788999795913696, 0.7894999980926514 ]
train_0731
[ "Several recent works on relation extraction have been applying the distant supervision paradigm: instead of relying on annotated text to learn how to predict relations, they employ existing knowledge bases (KBs) as source of supervision.", "Crucially, these approaches are trained based on the assumption that each sentence which mentions the two related entities is an expression of the given relation.", "Here we argue that this leads to noisy patterns that hurt precision, in particular if the knowledge base is not directly related to the text we are working with.", "We present a novel approach to distant supervision that can alleviate this problem based on the following two ideas: First, we use a factor graph to explicitly model the decision whether two entities are related, and the decision whether this relation is mentioned in a given sentence; second, we apply constraint-driven semi-supervision to train this model without any knowledge about which sentences express the relations in our training KB.", "We apply our approach to extract relations from the New York Times corpus and use Freebase as knowledge base.", "When compared to a state-of-the-art approach for relation extraction under distant supervision, we achieve 31% error reduction." ]
[ 0, 0, 2, 1, 1, 4 ]
[ 1, 0.8108000159263611, 0.8108000159263611, 0.5946000218391418, 1, 0.5946000218391418 ]
train_0732
[ "Plant Diseases and Pests are a major challenge in the agriculture sector.", "An accurate and a faster detection of diseases and pests in plants could help to develop an early treatment technique while substantially reducing economic losses.", "Recent developments in Deep Neural Networks have allowed researchers to drastically improve the accuracy of object detection and recognition systems.", "In this paper, we present a deep-learning-based approach to detect diseases and pests in tomato plants using images captured in-place by camera devices with various resolutions.", "Our goal is to find the more suitable deep-learning architecture for our task.", "Therefore, we consider three main families of detectors:", "Faster Region-based Convolutional Neural Network (Faster R-CNN), Region-based Fully Convolutional Network (R-FCN), and Single Shot Multibox Detector (SSD), which for the purpose of this work are called \"deep learning meta-architectures\".", "We combine each of these meta-architectures with \"deep feature extractors\" such as VGG net and Residual Network (ResNet).", "We demonstrate the performance of deep meta-architectures and feature extractors, and additionally propose a method for local and global class annotation and data augmentation to increase the accuracy and reduce the number of false positives during training.", "We train and test our systems end-to-end on our large Tomato Diseases and Pests Dataset, which contains challenging images with diseases and pests, including several inter- and extra-class variations, such as infection status and location in the plant." ]
[ 0, 4, 4, 1, 2, 3, 4, 4, 1, 4 ]
[ 0.5922999978065491, 0.41760000586509705, 0.387800008058548, 0.387800008058548, 0.5922999978065491, 0.4077000021934509, 0.48750001192092896, 0.387800008058548, 0.41339999437332153, 0.387800008058548 ]
train_0733
[ "In this paper, we propose a large training dataset named Celeb-500K for face recognition, which contains 50M images from 500K persons.", "To better facilitate academic research, we clean Celeb-500K to obtain Celeb-500K-2R, which contains 25M aligned face images from 365K persons.", "Based on the developed dataset, we achieve state-of-the-art face recognition performance and reveal two important observations on face recognition study.", "First, metric learning methods have limited performance gain when the training dataset contains a large number of identities.", "Second, in order to develop an efficient training dataset, the number of identities is more important than the average image number of each identity from the perspective of face recognition performance.", "Extensive experimental results show the superiority of Celeb-500K and provide a strong support to the two observations." ]
[ 2, 0, 0, 1, 4, 4 ]
[ 0.41670000553131104, 0.3889000117778778, 0.6111000180244446, 0.41670000553131104, 0.41670000553131104, 0.583299994468689 ]
train_0734
[ "A classical problem in the field of Multiple Criteria Decision Making (mcdm) is to build a preference relation on a set of multi-attributed alternatives on the basis of preferences expresses on each attribute and “inter-attribute” information such as weights.", "Based on this preference relation (or, more generally, on various relations obtained following a robustness analysis) a recommendation is elaborated (e.g. exhibiting of a subset likely to contain the “best” alternatives).", "A common way [20] to do so is to attach a number v(x) to each alternative x ∈ X and to declare that x is at least as good as y if and only if v(x) ≥ v(y).", "The number v(x) depends on the evaluations x1, x2, ...xn of x on the n attributes and we have v(x) = V (x1, x2, ..., xn).", "The most common form for V is an additive value function in which V (x1, x2, ..., xn) = ∑n i=1 kivi(xi); in that case the task of the analyst reduces down to assessing the partial value functions vi and the scaling constants ki.", "The preference relation that is built using this value function approach is a weak order, i.e. a complete and transitive binary relation.", "Using such information it is not difficult, in general, to elaborate a recommendation.", "The definition if the aggregation function V may not always be simple however.", "Making all alternatives comparable in a “nice transitive way” requires much information and, in particular, a detailed analysis of trade-offs between attributes.", "Outranking Methods (OMs) were first developed in France in the late sixties following difficulties experienced with the value function approach in dealing with practical problems." ]
[ 0, 0, 1, 0, 2, 1, 0, 0, 0, 1 ]
[ 0.6000000238418579, 0.6000000238418579, 0.628600001335144, 0.428600013256073, 0.4000000059604645, 0.4000000059604645, 0.428600013256073, 0.428600013256073, 0.428600013256073, 0.628600001335144 ]
train_0735
[ "Busy and no time to digest the news archive ....", "?", "Ever since the Web wide-spreading, the amount of electronically available information online, especially news archive proliferates and threatens to overwhelm human attention.", "Seeing this, we propose an information system that will extract the main topics in the news archive in a weekly basis.", "By getting a weekly report, user can know what were the main news events in the past week." ]
[ 3, 3, 0, 2, 1 ]
[ 0.6053000092506409, 0.6053000092506409, 1, 0.7894999980926514, 0.421099990606308 ]
train_0736
[ "Decades of research and numerous incidents have demonstrated the weaknesses of text passwords and prompted the need for more secure alternatives.", "In recent years, two-factor authentication (2F) has emerged as the most used solution to strengthen passwords.", "By requiring users to provide more than one authentication factor – e.g., a code generated by a security token, along with the password – 2F aims to enhance resilience against guessing attacks and breaches of password databases.", "Alas, it also introduces non-negligible costs for service providers and requires users to carry out additional actions during the authentication process, nevertheless, little research has focused on its usability.", "This paper presents a comparative usability study of twofactor authentication.", "First, we report on a preliminary interview-based study involving 9 participants, identifying the most popular 2F technologies as well as the contexts and motivations in which they are used.", "Then, we design and administer a survey to 219 Mechanical Turk users, aiming to explore the landscape of 2F technologies and measure the usability of three popular solutions: codes generated by security tokens, one-time PINs received via email or SMS, and dedicated smartphone apps (e.g., Google Authenticator).", "We record contexts and motivations, and study their impact on perceived usability.", "We also present an exploratory factor analysis that captures some key factors affecting usability of 2F and highlight interesting findings that call for further research in the field." ]
[ 0, 0, 0, 0, 2, 1, 1, 1, 1 ]
[ 0.8269000053405762, 0.8269000053405762, 0.5961999893188477, 0.7692000269889832, 0.40380001068115234, 0.6345999836921692, 0.6345999836921692, 0.6345999836921692, 0.5769000053405762 ]
train_0737
[ "Taxi ridesharing can be of significant social and environmental benefit, e.g. by saving energy consumption and satisfying people's commute needs.", "Despite the great potential, taxi ridesharing, especially with dynamic queries, is not well studied.", "In this paper, we formally define the dynamic ridesharing problem and propose a large-scale taxi ridesharing service.", "It efficiently serves real-time requests sent by taxi users and generates ridesharing schedules that reduce the total travel distance significantly.", "In our method, we first propose a taxi searching algorithm using a spatio-temporal index to quickly retrieve candidate taxis that are likely to satisfy a user query.", "A scheduling algorithm is then proposed.", "It checks each candidate taxi and inserts the query's trip into the schedule of the taxi which satisfies the query with minimum additional incurred travel distance.", "To tackle the heavy computational load, a lazy shortest path calculation strategy is devised to speed up the scheduling algorithm.", "We evaluated our service using a GPS trajectory dataset generated by over 33,000 taxis during a period of 3 months.", "By learning the spatio-temporal distributions of real user queries from this dataset, we built an experimental platform that simulates user real behaviours in taking a taxi." ]
[ 0, 0, 2, 0, 1, 1, 0, 1, 4, 1 ]
[ 0.7828999757766724, 0.7828999757766724, 0.5659000277519226, 0.40700000524520874, 0.5659000277519226, 0.5968999862670898, 0.40310001373291016, 0.7828999757766724, 0.40310001373291016, 0.3797999918460846 ]
train_0738
[ "L-BFGS-B is a limited-memory algorithm for solving large nonlinear optimization problems subject to simple bounds on the variables.", "It is intended for problems in which information on the Hessian matrix is difficult to obtain, or for large dense problems.", "L-BFGS-B can also be used for unconstrained problems and in this case performs similarly to its predessor, algorithm L-BFGS (Harwell routine VA15).", "The algorithm is implemented in Fortran 77." ]
[ 2, 2, 1, 1 ]
[ 0.40540000796318054, 0.5946000218391418, 0.40540000796318054, 0.40540000796318054 ]
train_0739
[ "Information Technology Infra-structure Library (ITIL) is the most popular “best practices” framework for managing Information Technology (IT) services.", "However, implementing ITIL not only is very difficult but there also are no best practices for implementing ITIL.", "As a result, ITIL implementations are usually long, expensive, and risky.", "In this paper, we propose a maturity model to assess an ITIL implementation and provide a roadmap for improvement based on priorities, dependencies, and guidelines.", "We then demonstrate a practical application of the proposed model with a questionnaire to assess the ITIL Incident Management process that was evaluated in two real-world organizations." ]
[ 0, 0, 0, 2, 4 ]
[ 0.7949000000953674, 0.7949000000953674, 0.5896999835968018, 0.5896999835968018, 0.75 ]
train_0740
[ "Recent rapid advances in ICTs, specifically in Internet and mobile technologies, have highlighted the rising importance of the Business Model (BM) in Information Systems (IS).", "Despite agreement on its importance to an organization’s success, the concept is still fuzzy and vague, and there is no consensus regarding its definition.", "Furthermore, understanding the BM domain by identifying its meaning, fundamental pillars, and its relevance to other business concepts is by no means complete.", "In this paper we aim to provide further clarification by first presenting a classification of definitions found in the IS literature; second, proposing guidelines on which to develop a more comprehensive definition in order to reach consensus; and third, identifying the four main business model concepts and values and their interaction, and thus place the business model within the world of digital business.", "Based on this discussion, we propose a new definition for the business model that we argue is more appropriate to this new world." ]
[ 0, 0, 2, 2, 1 ]
[ 1, 1, 0.421099990606308, 0.7894999980926514, 0.421099990606308 ]
train_0741
[ "We study the use of kinematic and dynamic vehicle models for model-based control design used in autonomous driving.", "In particular, we analyze the statistics of the forecast error of these two models by using experimental data.", "In addition, we study the effect of discretization on forecast error.", "We use the results of the first part to motivate the design of a controller for an autonomous vehicle using model predictive control (MPC) and a simple kinematic bicycle model.", "The proposed approach is less computationally expensive than existing methods which use vehicle tire models.", "Moreover it can be implemented at low vehicle speeds where tire models become singular.", "Experimental results show the effectiveness of the proposed approach at various speeds on windy roads." ]
[ 0, 2, 0, 1, 1, 1, 4 ]
[ 0.42260000109672546, 0.5774000287055969, 0.6037999987602234, 0.6075000166893005, 0.8188999891281128, 0.8151000142097473, 1 ]
train_0742
[ "Most tasks in natural language processing can be cast into question answering (QA) problems over language input.", "We introduce the dynamic memory network (DMN), a unified neural network framework which processes input sequences and questions, forms semantic and episodic memories, and generates relevant answers.", "Questions trigger an iterative attention process which allows the model to condition its attention on the result of previous iterations.", "These results are then reasoned over in a hierarchical recurrent sequence model to generate answers.", "The DMN can be trained end-to-end and obtains state of the art results on several types of tasks and datasets: question answering (Facebook’s bAbI dataset), sequence modeling for part of speech tagging (WSJ-PTB), coreference resolution (Quizbowl dataset) and text classification for sentiment analysis (Stanford Sentiment Treebank).", "The model relies exclusively on trained word vector representations and requires no string matching or manually engineered features." ]
[ 0, 1, 1, 1, 4, 4 ]
[ 1, 0.39469999074935913, 0.5788999795913696, 0.6053000092506409, 0.421099990606308, 0.39469999074935913 ]
train_0743
[ "Automatically recognizing entailment relations between pairs of natural language sentences has so far been the dominion of classifiers employing hand engineered features derived from natural language processing pipelines.", "End-to-end differentiable neural architectures have failed to approach state-of-the-art performance until very recently.", "In this paper, we propose a neural model that reads two sentences to determine entailment using long short-term memory units.", "We extend this model with a word-by-word neural attention mechanism that encourages reasoning over entailments of pairs of words and phrases.", "Furthermore, we present a qualitative analysis of attention weights produced by this model, demonstrating such reasoning capabilities.", "On a large entailment dataset this model outperforms the previous best neural model and a classifier with engineered features by a substantial margin.", "It is the first generic end-to-end differentiable system that achieves state-of-the-art accuracy on a textual entailment dataset." ]
[ 0, 0, 2, 1, 1, 4, 1 ]
[ 0.8055999875068665, 0.8055999875068665, 0.6388999819755554, 0.41670000553131104, 0.3610999882221222, 0.41670000553131104, 0.3889000117778778 ]
train_0744
[ "Impulse buying accounts for a large proportion of consumer shopping behavior in the bricks-and-mortar retail market.", "Online retailers also expect to profit from impulse buying.", "It is therefore interesting and beneficial to investigate the design elements of online stores and the sales promotion stimuli that eretailers can use to either arouse consumers’ desire or decrease their self-control to evoke their purchase impulses.", "This study seeks to explicitly identify the factors associated with online store design and sales promotion stimuli that most affect online impulse buying behavior throughout the consumer decisionmaking process.", "Drawing on the two-factor theory, it successfully identifies the hygiene and motivation factors that trigger online impulse buying.", "The questionnaire responses of 239 valid respondents revealed that most of the hygiene factors are associated with the design of online stores, and all of the motivation factors are forms of sales promotion stimuli that effectively facilitate online impulse buying and present utilitarian or hedonic benefits to consumers.", "This study also identifies the most effective sales promotion stimuli and offers a comprehensive checklist for Web designers.", "Moreover, the distribution of motivation and hygiene factors for each stage of the EKB model is uneven, and some stages include only hygiene factors.", "The findings of this study demonstrate that the triggers of consumers’ online shopping behavior do not always apply to online impulse buying, and have important implications for impulse buying research" ]
[ 0, 0, 2, 1, 1, 1, 4, 4, 4 ]
[ 0.6111000180244446, 0.6111000180244446, 0.8055999875068665, 0.41670000553131104, 0.583299994468689, 0.41670000553131104, 0.583299994468689, 0.4828000068664551, 0.7778000235557556 ]
train_0745
[ "Purpose – Customer relationship management (CRM) is an information system that tracks customers’ interactions with the firm and allows employees to instantly pull up information about the customers such as past sales, service records, outstanding records and unresolved problem calls.", "This paper aims to put forward strategies for successful implementation of CRM and discusses barriers to CRM in e-business and m-business.", "Design/methodology/approach – The paper combines narrative with argument and analysis.", "Findings – CRM stores all information about its customers in a database and uses this data to coordinate sales, marketing, and customer service departments so as to work together smoothly to best serve their customers’ needs.", "Originality/value – The paper demonstrates how CRM, if used properly, could enhance a company’s ability to achieve the ultimate goal of retaining customers and gain strategic advantage over its competitors." ]
[ 0, 2, 1, 4, 4 ]
[ 0.6154000163078308, 0.7949000000953674, 0.5896999835968018, 0.5896999835968018, 0.7949000000953674 ]
train_0746
[ "Processing: A Programming Handbook for Visual Designers and Artists With this completely revised edition, Casey Reas and Ben Fry show readers how.", "Processing: A Programming Handbook for Visual Designers and Artists by Ben Fry, Casey Reas, John Maeda download pdf book.", "Jun 28, 2010 –", "All right,.", "With Ben Fry, Reas initiated Processing in 2001.", "Reas and Fry published Processing: A Programming Handbook for Visual Designers and Artists, a comprehensive introduction to programming within the context of visual media (MIT Press." ]
[ 0, 0, 0, 3, 0, 4 ]
[ 0.8055999875068665, 0.8055999875068665, 0.5160999894142151, 0.41670000553131104, 0.41670000553131104, 0.583299994468689 ]
train_0747
[ "We develop an algorithm that can detect pneumonia from chest X-rays at a level exceeding practicing radiologists.", "Our algorithm, CheXNet, is a 121-layer convolutional neural network trained on ChestX-ray14, currently the largest publicly available chest Xray dataset, containing over 100,000 frontalview X-ray images with 14 diseases.", "Four practicing academic radiologists annotate a test set, on which we compare the performance of CheXNet to that of radiologists.", "We find that CheXNet exceeds average radiologist performance on the F1 metric.", "We extend CheXNet to detect all 14 diseases in ChestX-ray14 and achieve state of the art results on all 14 diseases." ]
[ 2, 0, 1, 4, 4 ]
[ 0.4000000059604645, 0.428600013256073, 0.628600001335144, 0.6000000238418579, 0.6000000238418579 ]
train_0748
[ "It is important for researchers to efficiently conduct quality literature studies.", "Hence, a structured and efficient approach is essential.", "We overview work that has demonstrated the potential for using software tools in literature reviews.", "We highlight the untapped opportunities in using an end-to-end tool-supported literature review methodology.", "Qualitative data-analysis tools such as NVivo are immensely useful as a means to analyze, synthesize, and write up literature reviews.", "In this paper, we describe how to organize and prepare papers for analysis and provide detailed guidelines for actually coding and analyzing papers, including detailed illustrative strategies to effectively write up and present the results.", "We present a detailed case study as an illustrative example of the proposed approach put into practice.", "We discuss the means, value, and also pitfalls of applying tool-supported literature review approaches.", "We contribute to the literature by proposing a four-phased tool-supported methodology that serves as best practice in conducting literature reviews in IS.", "By viewing the literature review process as a qualitative study and treating the literature as the “data set”, we address the complex puzzle of how best to extract relevant literature and justify its scope, relevance, and quality." ]
[ 0, 0, 2, 2, 1, 1, 1, 1, 1, 1 ]
[ 1, 0.5881999731063843, 0.6176000237464905, 0.6176000237464905, 0.41179999709129333, 0.5881999731063843, 0.5881999731063843, 0.7940999865531921, 0.7940999865531921, 0.6176000237464905 ]
train_0749
[ "Organizations adopt sophisticated management information systems, which provide top managers with an ample range of information to achieve multiple strategic performances.", "However, organizations differ in the extent to which they improve their performance.", "This paper analyzes the role of top management team in the relationship between management information systems and strategic performance.", "Using data collected from 92 top management teams, it analyses how different team compositions interact with a sophisticated management information system, and how this interaction affects strategic performances, which are focused on cost reduction and flexibility.", "The findings show how the effect of management information system on strategic performance (focused on flexibility) is moderated by top management" ]
[ 0, 0, 2, 1, 4 ]
[ 1, 1, 0.4571000039577484, 0.8285999894142151, 0.8285999894142151 ]
train_0750
[ "Capturing the uncertain aspects in cyber security is important for security analysis in enterprise networks.", "However, there has been insufficient effort in studying what modeling approaches correctly capture such uncertainty, and how to construct the models to make them useful in practice.", "In this paper, we present our work on justifying uncertainty modeling for cyber security, and initial evidence indicating that it is a useful approach.", "Our work is centered around near real-time security analysis such as intrusion response.", "We need to know what is really happening, the scope and severity level, possible consequences, and potential countermeasures.", "We report our current efforts on identifying the important types of uncertainty and on using Bayesian networks to capture them for enhanced security analysis.", "We build an example Bayesian network based on a current security graph model, justify our modeling approach through attack semantics and experimental study, and show that the resulting Bayesian network is not sensitive to parameter perturbation." ]
[ 0, 0, 2, 1, 1, 1, 1 ]
[ 0.8205000162124634, 0.6154000163078308, 0.6154000163078308, 0.5896999835968018, 0.7949000000953674, 0.7949000000953674, 0.5896999835968018 ]
train_0751
[ "Machine learning and Data mining are becoming increasingly important in the recent years and have been successfully applied to solve a number of problems, especially in the areas of science and engineering.", "A variety of algorithms exist in the popular data mining tool ‘Weka’ to classify a given set of records into different classes.", "However, choosing the right classifier among them is a tricky task as the performance of a particular algorithm depends on various factors such as the application domain and the data set.", "In order to aid the researchers in comparing the performances of various classification algorithms in Weka, we have developed an online resource named Web-Weka using which one can compare a set of classification algorithms on a single data set on the fly and choose the right classifier for their study.", "The tool is available for free at www.mcr.org.in/webweka." ]
[ 0, 0, 0, 1, 3 ]
[ 0.7838000059127808, 0.5946000218391418, 0.3783999979496002, 0.766700029373169, 0.5946000218391418 ]
train_0752
[ "We present a unified model for face detection, pose estimation, and landmark estimation in real-world, cluttered images.", "Our model is based on a mixtures of trees with a shared pool of parts; we model every facial landmark as a part and use global mixtures to capture topological changes due to viewpoint.", "We show that tree-structured models are surprisingly effective at capturing global elastic deformation, while being easy to optimize unlike dense graph structures.", "We present extensive results on standard face benchmarks, as well as a new “in the wild” annotated dataset, that suggests our system advances the state-of-the-art, sometimes considerably, for all three tasks.", "Though our model is modestly trained with hundreds of faces, it compares favorably to commercial systems trained with billions of examples (such as Google Picasa and face.com)." ]
[ 0, 2, 1, 4, 0 ]
[ 0.5738000273704529, 0.4302999973297119, 0.5983999967575073, 0.7705000042915344, 0.4016000032424927 ]
train_0753
[ "Risk Management, according with the ISO Guide 73 is the set of \"coordinated activities to direct and control an organization with regard to risk\".", "In a nutshell, Risk Management is the business process used to manage risk in organizations.", "ISO 31000 defines a framework and process for risk management.", "However, implementing this standard without a detailed plan can become a burden on organizations.", "This paper presents a maturity model for the risk management process based on ISO 31000.", "The purpose of this model is to provide an assessment tool for organizations to use in order to get their current risk management maturity level.", "The results can then be used to create an improvement plan which will guide organizations to reach their target maturity level.", "This maturity model allows organizations to assess a risk management process according to the best practices defined in risk management references.", "The maturity model can also be used as a reference for improving this process since it sets a clear path of how a risk management process should be performed." ]
[ 0, 0, 0, 0, 2, 2, 4, 4, 4 ]
[ 0.7838000059127808, 0.7838000059127808, 1, 0.5946000218391418, 0.5946000218391418, 0.5946000218391418, 0.6215999722480774, 0.6215999722480774, 0.5946000218391418 ]
train_0754
[ "This brief presents a time-domain model for the slew rate of CMOS two-stage Miller compensated operational transconductance amplifiers.", "The effects of both the first- and second-stage currents are considered in this model and a simple analytical expression is given in terms of the compensation and load capacitors, output voltage change, and device sizes.", "HSPICE simulation results are provided to show the validity of the proposed model using a 0.25-/spl mu/m CMOS technology." ]
[ 0, 1, 4 ]
[ 0.5946000218391418, 0.6215999722480774, 0.6215999722480774 ]
train_0755
[ "Fake news detection is a critical yet challenging problem in Natural Language Processing (NLP).", "The rapid rise of social networking platforms has not only yielded a vast increase in information accessibility but has also accelerated the spread of fake news.", "Given the massive amount of Web content, automatic fake news detection is a practical NLP problem required by all online content providers.", "This paper presents a survey on fake news detection.", "Our survey introduces the challenges of automatic fake news detection.", "We systematically review the datasets and NLP solutions that have been developed for this task.", "We also discuss the limits of these datasets and problem formulations, our insights, and recommended solutions." ]
[ 0, 0, 0, 2, 1, 1, 4 ]
[ 1, 1, 1, 0.6111000180244446, 0.53329998254776, 0.44440001249313354, 0.44440001249313354 ]
train_0756
[ "We present QuAC, a dataset for Question Answering in Context that contains 14K information-seeking QA dialogs (100K questions in total).", "The dialogs involve two crowd workers: (1) a student who poses a sequence of freeform questions to learn as much as possible about a hidden Wikipedia text, and (2) a teacher who answers the questions by providing short excerpts from the text.", "QuAC introduces challenges not found in existing machine comprehension datasets: its questions are often more open-ended, unanswerable, or only meaningful within the dialog context, as we show in a detailed qualitative evaluation.", "We also report results for a number of reference models, including a recently state-ofthe-art reading comprehension architecture extended to model dialog context.", "Our best model underperforms humans by 20 F1, suggesting that there is significant room for future work on this data.", "Dataset, baseline, and leaderboard available at http://quac.ai." ]
[ 2, 1, 4, 4, 4, 4 ]
[ 0.3513999879360199, 0.40540000796318054, 0.21619999408721924, 0.6215999722480774, 0.6485999822616577, 0.4323999881744385 ]
train_0757
[ "With smart devices, particular smartphones, becoming our everyday companions, the ubiquitous mobile Internet and computing applications pervade people’s daily lives.", "With the surge demand on high-quality mobile services at anywhere, how to address the ubiquitous user demand and accommodate the explosive growth of mobile traffics is the key issue of the next generation mobile networks.", "The Fog computing is a promising solution towards this goal.", "Fog computing extends cloud computing by providing virtualized resources and engaged location-based services to the edge of the mobile networks so as to better serve mobile traffics.", "Therefore, Fog computing is a lubricant of the combination of cloud computing and mobile applications.", "In this article, we outline the main features of Fog computing and describe its concept, architecture and design goals.", "Lastly, we discuss some of the future research issues from the networking perspective." ]
[ 0, 0, 2, 2, 4, 2, 0 ]
[ 0.7949000000953674, 0.5896999835968018, 0.5896999835968018, 0.41029998660087585, 0.5160999894142151, 0.6154000163078308, 0.41029998660087585 ]
train_0758
[ "Data is nowadays an invaluable resource, indeed it guides all business decisions in most of the computer-aided human activities.", "Threats to data integrity are thus of paramount relevance, as tampering with data may maliciously affect crucial business decisions.", "This issue is especially true in cloud computing environments, where data owners cannot control fundamental data aspects, like the physical storage of data and the control of its accesses.", "Blockchain has recently emerged as a fascinating technology which, among others, provides compelling properties about data integrity.", "Using the blockchain to face data integrity threats seems to be a natural choice, but its current limitations of low throughput, high latency, and weak stability hinder the practical feasibility of any blockchain-based solutions.", "In this paper, by focusing on a case study from the European SUNFISH project, which concerns the design of a secure by-design cloud federation platform for the public sector, we precisely delineate the actual data integrity needs of cloud computing environments and the research questions to be tackled to adopt blockchain-based databases.", "First, we detail the open research questions and the difficulties inherent in addressing them.", "Then, we outline a preliminary design of an effective blockchain-based database for cloud computing environments." ]
[ 0, 0, 2, 1, 1, 2, 4, 1 ]
[ 0.7646999955177307, 0.7646999955177307, 0.3824000060558319, 0.5881999731063843, 0.5881999731063843, 0.41179999709129333, 0.5587999820709229, 0.5357000231742859 ]
train_0759
[ "Compressed sensing is a novel research area, which was introduced in 2006, and since then has already become a key concept in various areas of applied mathematics, computer science, and electrical engineering.", "It surprisingly predicts that high-dimensional signals, which allow a sparse representation by a suitable basis or, more generally, a frame, can be recovered from what was previously considered highly incomplete linear measurements by using efficient algorithms.", "This article shall serve as an introduction to and a survey about compressed sensing." ]
[ 0, 2, 2 ]
[ 1, 0.4000000059604645, 0.5 ]
train_0760
[ "This study explores teenage girls' narrations of the relationship between self-presentation and peer comparison on social media in the context of beauty.", "Social media provide new platforms that manifest media and peer influences on teenage girls' understanding of beauty towards an idealized notion.", "Through 24 in-depth interviews, this study examines secondary school girls' self-presentation and peer comparison behaviors on social network sites where the girls posted self-portrait photographs or “selfies” and collected peer feedback in the forms of “likes,” “followers,” and comments.", "Results of thematic analysis reveal a gap between teenage girls' self-beliefs and perceived peer standards of beauty.", "Feelings of low self-esteem and insecurity underpinned their efforts in edited self-presentation and quest for peer recognition.", "Peers played multiple roles that included imaginary audiences, judges, vicarious learning sources, and comparison targets in shaping teenage girls' perceptions and presentation of beauty.", "Findings from this study reveal the struggles that teenage girls face today and provide insights for future investigations and interventions pertinent to teenage girls’ presentation and evaluation of self on" ]
[ 2, 0, 1, 4, 4, 1, 4 ]
[ 0.6388999819755554, 0.583299994468689, 0.5555999875068665, 0.5555999875068665, 0.5555999875068665, 0.583299994468689, 1 ]
train_0761
[ "Starting from Shannon's celebrated 1948 channel coding theorem, we trace the evolution of channel coding from Hamming codes to capacity-approaching codes.", "We focus on the contributions that have led to the most significant improvements in performance versus complexity for practical applications, particularly on the additive white Gaussian noise channel.", "We discuss algebraic block codes, and why they did not prove to be the way to get to the Shannon limit.", "We trace the antecedents of today's capacity-approaching codes: convolutional codes, concatenated codes, and other probabilistic coding schemes.", "Finally, we sketch some of the practical applications of these codes." ]
[ 0, 0, 1, 1, 4 ]
[ 1, 0.6111000180244446, 0.6111000180244446, 0.3889000117778778, 0.6388999819755554 ]
train_0762
[ "We propose a simple, yet effective approach for spatiotemporal feature learning using deep 3-dimensional convolutional networks (3D ConvNets) trained on a large scale supervised video dataset.", "Our findings are three-fold: 1) 3D ConvNets are more suitable for spatiotemporal feature learning compared to 2D ConvNets, 2) A homogeneous architecture with small 3x3x3 convolution kernels in all layers is among the best performing architectures for 3D ConvNets, and 3) Our learned features, namely C3D (Convolutional 3D), with a simple linear classifier outperform state-of-the-art methods on 4 different benchmarks and are comparable with current best methods on the other 2 benchmarks.", "In addition, the features are compact: achieving 52.8% accuracy on UCF101 dataset with only 10 dimensions and also very efficient to compute due to the fast inference of ConvNets.", "Finally, they are conceptually very simple and easy to train and use." ]
[ 0, 0, 4, 4 ]
[ 0.6154000163078308, 0.41029998660087585, 0.3846000134944916, 0.7419000267982483 ]
train_0763
[ "The use of virtual-reality technology in the areas of rehabilitation and therapy continues to grow, with encouraging results being reported for applications that address human physical, cognitive, and psychological functioning.", "This article presents a SWOT (Strengths, Weaknesses, Opportunities, and Threats) analysis for the field of VR rehabilitation and therapy.", "The SWOT analysis is a commonly employed framework in the business world for analyzing the factors that influence a company's competitive position in the marketplace with an eye to the future.", "However, the SWOT framework can also be usefully applied outside of the pure business domain.", "A quick check on the Internet will turn up SWOT analyses for urban-renewal projects, career planning, website design, youth sports programs, and evaluation of academic research centers, and it becomes obvious that it can be usefully applied to assess and guide any organized human endeavor designed to accomplish a mission.", "It is hoped that this structured examination of the factors relevant to the current and future status of VR rehabilitation will provide a good overview of the key issues and concerns that are relevant for understanding and advancing this vital application area." ]
[ 0, 2, 1, 1, 1, 4 ]
[ 0.7778000235557556, 0.583299994468689, 0.666700005531311, 0.666700005531311, 0.8055999875068665, 0.8055999875068665 ]
train_0764
[ "We have recently shown that deep Long Short-Term Memory (LSTM) recurrent neural networks (RNNs) outperform feed forward deep neural networks (DNNs) as acoustic models for speech recognition.", "More recently, we have shown that the performance of sequence trained context dependent (CD) hidden Markov model (HMM) acoustic models using such LSTM RNNs can be equaled by sequence trained phone models initialized with connectionist temporal classification (CTC).", "In this paper, we present techniques that further improve performance of LSTM RNN acoustic models for large vocabulary speech recognition.", "We show that frame stacking and reduced frame rate lead to more accurate models and faster decoding.", "CD phone modeling leads to further improvements.", "We also present initial results for LSTM RNN models outputting words directly." ]
[ 0, 0, 1, 1, 1, 4 ]
[ 0.7768999934196472, 0.5856999754905701, 0.6096000075340271, 0.6134999990463257, 0.8047999739646912, 0.41830000281333923 ]
train_0765
[ "Designing a database system for both efficient data management and data services has been one of the enduring challenges in the healthcare domain.", "In many healthcare systems, data services and data management are often viewed as two orthogonal tasks; data services refer to retrieval and analytic queries such as search, joins, statistical data extraction, and simple data mining algorithms, while data management refers to building error-tolerant and non-redundant database systems.", "The gap between service and management has resulted in rigid database systems and schemas that do not support effective analytics.", "We compose a rich graph structure from an abstracted healthcare RDBMS to illustrate how we can fill this gap in practice.", "We show how a healthcare graph can be automatically constructed from a normalized relational database using the proposed “3NF Equivalent Graph” (3EG) transformation.", "We discuss a set of real world graph queries such as finding self-referrals, shared providers, and collaborative filtering, and evaluate their performance over a relational database and its 3EG-transformed graph.", "Experimental results show that the graph representation serves as multiple de-normalized tables, thus reducing complexity in a database and enhancing data accessibility of users.", "Based on this finding, we propose an ensemble framework of databases for healthcare applications." ]
[ 0, 0, 1, 1, 1, 1, 4, 4 ]
[ 0.5774000287055969, 0.5774000287055969, 0.42260000109672546, 0.6340000033378601, 0.8151000142097473, 0.6037999987602234, 0.7321000099182129, 1 ]
train_0766
[ "We present a system for online handwritten signature verification, approaching the problem as a two-class pattern recognition problem.", "A test signature s authenticity is established by first aligning it with each reference signature for the claimed user, using dynamic time warping.", "The distances of the test signature to the nearest, farthest and template reference signatures are normalized by the corresponding mean values obtained from the reference set, to form a threedimensional feature vector.", "This feature vector is then classified into one of the two classes (genuine or forgery).", "A linear classifier used in conjunction with the principal component analysis obtained a 1.4% error rate for a data set of 94 people and 619 test signatures (genuine signatures and skilled forgeries).", "Our method received the first place at SVC2004 with a 2.8% error rate.", "2005 Elsevier B.V. All rights reserved." ]
[ 2, 1, 1, 1, 1, 1, 3 ]
[ 0.41670000553131104, 0.833299994468689, 0.833299994468689, 0.833299994468689, 0.6388999819755554, 0.583299994468689, 0.6111000180244446 ]
train_0767
[ "This work on GGS-NN is motivated by the program verification application, where we need to analyze dynamic data structures created in the heap.", "On a very high level, in this application a machine learning model analyzes the heap states (a graph with memory nodes and pointers as edges) during the execution of a program and comes up with logical formulas that describes the heap.", "These logical formulas are then fed into a theorem prover to prove the correctness of the program.", "Problem-specific node annotations are used to initialize ." ]
[ 0, 0, 1, 1 ]
[ 0.8399999737739563, 0.3919999897480011, 1, 0.8040000200271606 ]
train_0768
[ "Training classifiers with datasets which suffer of imbalanced class distributions is an important problem in data mining.", "This issue occurs when the number of examples representing the class of interest is much lower than the ones of the other classes.", "Its presence in many real-world applications has brought along a growth of attention from researchers.", "We shortly review the many issues in machine learning and applications of this problem, by introducing the characteristics of the imbalanced dataset scenario in classification, presenting the specific metrics for evaluating performance in class imbalanced learning and enumerating the proposed solutions.", "In particular, we will describe preprocessing, costsensitive learning and ensemble techniques, carrying out an experimental study to contrast these approaches in an intra and inter-family comparison.", "We will carry out a thorough discussion on the main issues related to using data intrinsic characteristics in this classification problem.", "This will help to improve the current models with respect to: the presence of small disjuncts, the lack of density in the training data, the overlapping between classes, the identification of noisy data, the significance of the borderline instances, and the dataset shift between the training and the test distributions.", "Finally, we introduce several approaches and recommendations to address these problems in conjunction with imbalanced data, and we will show some experimental examples on the behavior of the learning algorithms on data with such intrinsic characteristics.", "2013 Elsevier Inc. All rights reserved." ]
[ 0, 0, 0, 1, 1, 1, 3, 4, 3 ]
[ 0.583299994468689, 0.583299994468689, 0.583299994468689, 0.7778000235557556, 0.7778000235557556, 0.7778000235557556, 0.44440001249313354, 0.5555999875068665, 1 ]
train_0769
[ "An in-depth analysis of the 80x86 processor families identi es architectural properties that may have unexpected, and undesirable, results in secure computer systems.", "In addition, reported implementation errors in some processor versions render them undesirable for secure systems because of potential security and reliability problems.", "In this paper, we discuss the imbalance in scrutiny for hardware protection mechanisms relative to software, and why this imbalance is increasingly di cult to justify as hardware complexity increases.", "We illustrate this di culty with examples of architectural subtleties and reported implementation errors." ]
[ 0, 0, 2, 3 ]
[ 0.8108000159263611, 1, 0.5946000218391418, 0.40540000796318054 ]
train_0770
[ "Visual place recognition is a challenging problem due to the vast range of ways in which the appearance of real-world places can vary.", "In recent years, improvements in visual sensing capabilities, an ever-increasing focus on long-term mobile robot autonomy, and the ability to draw on state-of-the-art research in other disciplines-particularly recognition in computer vision and animal navigation in neuroscience-have all contributed to significant advances in visual place recognition systems.", "This paper presents a survey of the visual place recognition research landscape.", "We start by introducing the concepts behind place recognition-the role of place recognition in the animal kingdom, how a “place” is defined in a robotics context, and the major components of a place recognition system.", "Long-term robot operations have revealed that changing appearance can be a significant factor in visual place recognition failure; therefore, we discuss how place recognition solutions can implicitly or explicitly account for appearance change within the environment.", "Finally, we close with a discussion on the future of visual place recognition, in particular with respect to the rapid advances being made in the related fields of deep learning, semantic scene understanding, and video description." ]
[ 0, 0, 2, 1, 1, 4 ]
[ 1, 1, 0.8055999875068665, 0.8055999875068665, 0.583299994468689, 0.583299994468689 ]
train_0771
[ "Continuing growth of energy use by commercial buildings has created a need to develop innovative techniques to reduce and optimize building energy use.", "Recently Building Energy Management Systems (BEMS) have gained popularity because of increasing interest in building energy conservation and savings.", "In this study, a conceptual framework for real-time weather responsive control systems combined with BEMS is proposed to achieve model simulation based Smart BEMS.", "The proposed control system is developed using building energy control patterns, which are generated from the combinations of weather data changes.", "As a result, building energy use can be adjusted by, for example, using daylighting responsive controls for electrical lighting as well as by adjusting the HVAC operational schedule, in response to weather changes.", "To create control logics for model based Smart systems, BIM and Computational Fluid Dynamic (CFD) simulation are used to obtain material properties and to develop air flow operational algorithms, respectively." ]
[ 0, 0, 2, 1, 1, 1 ]
[ 1, 0.8278999924659729, 0.6310999989509583, 0.6557000279426575, 0.5983999967575073, 0.5738000273704529 ]
train_0772
[ "Restricted Boltzmann machines were developed using binary stochastic hidden units.", "These can be generalized by replacing each binary unit by an infinite number of copies that all have the same weights but have progressively more negative biases.", "The learning and inference rules for these “Stepped Sigmoid Units” are unchanged.", "They can be approximated efficiently by noisy, rectified linear units.", "Compared with binary units, these units learn features that are better for object recognition on the NORB dataset and face verification on the Labeled Faces in the Wild dataset.", "Unlike binary units, rectified linear units preserve information about relative intensities as information travels through multiple layers of feature detectors." ]
[ 0, 1, 1, 1, 4, 1 ]
[ 0.8108000159263611, 0.6215999722480774, 0.21619999408721924, 0.8108000159263611, 0.40540000796318054, 0.6215999722480774 ]
train_0773
[ "The variety and complexity in cloud marketplaces is growing, making it difficult for cloud consumers to choose cloud services from multiple providers in an economic and suitable way by taking into account multiple objectives and constraints.", "In this paper, we present an extension of CloudSim implementing cloud management functionality to enable the assessment of consumer-oriented brokering schemes.", "The underlying discrete-event simulation framework allows evaluating their performance in more realistic operating conditions in a repeatable manner.", "We integrate brokering mechanisms to support a multi-criteria location-aware selection of virtual machines in multi-cloud environments by implementing a greedy heuristic and two large neighborhood search metaheuristics.", "Based on microbenchmarks of real cloud offerings and a diverse set of scenarios and workloads, we conduct simulation experiments to assess the performance of our approaches.", "The results show that approximately 10 12 % of the total costs can be saved by using a large neighborhood search approach compared to the greedy heuristic.", "Finally, we analyze and discuss the trade-off between costs and latency as well as the impact of region constraints, showing, e.g., that latency improvements often come at a high price and a greater regional flexibility can lead to latency improvements while solely optimizing costs.", "Using real data of cloud marketplaces, we show that the proposed CloudSim extension can support decision makers as a tool for assessing cloud portfolios and market dynamics." ]
[ 0, 2, 4, 1, 1, 1, 4, 4 ]
[ 1, 0.5946000218391418, 0.4323999881744385, 0.5946000218391418, 0.5946000218391418, 0.5946000218391418, 0.8108000159263611, 1 ]
train_0774
[ "Interleaving is an online evaluation method that compares two ranking functions by mixing their results and interpreting the users' click feedback.", "An important property of an interleaving method is its sensitivity, i.e. the ability to obtain reliable comparison outcomes with few user interactions.", "Several methods have been proposed so far to improve interleaving sensitivity, which can be roughly divided into two areas: (a) methods that optimize the credit assignment function (how the click feedback is interpreted), and (b) methods that achieve higher sensitivity by controlling the interleaving policy (how often a particular interleaved result page is shown).", "In this paper, we propose an interleaving framework that generalizes the previously studied interleaving methods in two aspects.", "First, it achieves a higher sensitivity by performing a joint data-driven optimization of the credit assignment function and the interleaving policy.", "Second, we formulate the framework to be general w.r.t.", "the search domain where the interleaving experiment is deployed, so that it can be applied in domains with grid-based presentation, such as image search.", "In order to simplify the optimization, we additionally introduce a stratified estimate of the experiment outcome.", "This stratification is also useful on its own, as it reduces the variance of the outcome and thus increases the interleaving sensitivity.", "We perform an extensive experimental study using large-scale document and image search datasets obtained from a commercial search engine." ]
[ 1, 0, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 0.583299994468689, 0.6111000180244446, 0.7778000235557556, 0.583299994468689, 0.3889000117778778, 0.6111000180244446, 0.8055999875068665, 0.8055999875068665, 0.41670000553131104, 0.41670000553131104 ]
train_0775
[ "It is often important for designers and photographers to convey or enhance desired color themes in their work.", "A color theme is typically defined as a template of colors and an associated verbal description.", "This paper presents a data-driven method for enhancing a desired color theme in an image.", "We formulate our goal as a unified optimization that simultaneously considers a desired color theme, texture-color relationships as well as automatic or user-specified color constraints.", "Quantifying the difference between an image and a color theme is made possible by color mood spaces and a generalization of an additivity relationship for two-color combinations.", "We incorporate prior knowledge, such as texture-color relationships, extracted from a database of photographs to maintain a natural look of the edited images.", "Experiments and a user study have confirmed the effectiveness of our method." ]
[ 0, 0, 1, 3, 1, 1, 4 ]
[ 0.8378000259399414, 0.6215999722480774, 0.4323999881744385, 0.21619999408721924, 0.3513999879360199, 0.5946000218391418, 0.6215999722480774 ]
train_0776
[ "Because of the properties such as transparency, decentralization, irreversibility, nonrepudiation, etc.", ", blockchain is not only a fundamental technology of great interest in its own right, but also has large potential when integrated into many other areas.", "In this paper, based on the blockchain technology, we propose a decentralized e-voting protocol, without the existence of a trusted third party.", "Furthermore, we provide several possible extensions and improvements that meet the requirements in some specific voting scenarios." ]
[ 0, 0, 2, 2 ]
[ 0.8055999875068665, 0.833299994468689, 0.41670000553131104, 0.41670000553131104 ]
train_0777
[ "Current research has yet to examine the phenomenon of rape culture, particularly within social media forums.", "The present study investigated the attitudes about rape, rapists, and gender-based violence within the comments section of newspaper articles reporting about rape and sexual assault.", "Naturalistic observation was used in order to gather statements within the comment sections following newspaper articles posted on either the periodical website or the periodical’s Facebook page.", "Four themes and various sub-themes emerged from the data.", "The major themes include, Victim Blaming and Questioning, Survivor Support, Perpetrator Support, and Trolling Statements about Law and Society.", "Notable findings were found in the amount of victim blaming statements made in the comments responding to articles (25.8 percent) and perpetrator support comments were found responding to every article collected, except for one.", "The authors discuss the implications of rape culture within and outside social media and suggest future research to be conducted to further understand the impacts of rape culture within the online sphere.", "© 2016 Elsevier Ltd.", "All rights reserved." ]
[ 0, 0, 1, 0, 2, 4, 4, 3, 3 ]
[ 0.800000011920929, 0.628600001335144, 0.428600013256073, 0.428600013256073, 0.37139999866485596, 0.428600013256073, 0.4571000039577484, 0.771399974822998, 0.771399974822998 ]
train_0778
[ "This paper evaluates the four leading techniques proposed in the literature for construction of prediction intervals (PIs) for neural network point forecasts.", "The delta, Bayesian, bootstrap, and mean-variance estimation (MVE) methods are reviewed and their performance for generating high-quality PIs is compared.", "PI-based measures are proposed and applied for the objective and quantitative assessment of each method's performance.", "A selection of 12 synthetic and real-world case studies is used to examine each method's performance for PI construction.", "The comparison is performed on the basis of the quality of generated PIs, the repeatability of the results, the computational requirements and the PIs variability with regard to the data uncertainty.", "The obtained results in this paper indicate that: 1) the delta and Bayesian methods are the best in terms of quality and repeatability, and 2) the MVE and bootstrap methods are the best in terms of low computational load and the width variability of PIs.", "This paper also introduces the concept of combinations of PIs, and proposes a new method for generating combined PIs using the traditional PIs.", "Genetic algorithm is applied for adjusting the combiner parameters through minimization of a PI-based cost function subject to two sets of restrictions.", "It is shown that the quality of PIs produced by the combiners is dramatically better than the quality of PIs obtained from each individual method." ]
[ 0, 1, 1, 1, 1, 4, 3, 3, 3 ]
[ 0.6053000092506409, 0.7419000267982483, 0.6053000092506409, 0.6053000092506409, 0.421099990606308, 0.631600022315979, 0.421099990606308, 0.421099990606308, 0.421099990606308 ]
train_0779
[ "One of the primary goals of computer architects is to design computers that are more costeffective than their predecessors.", "Cost-effectiveness includes the cost of hardware to manufacture the machine, the cost of programming, and costs incurred related to the architecture in debugging both the initial hardware and subsequent programs.", "If we review the history of computer families we find that the most common architectural change is the trend toward ever more complex machines.", "Presumably this additional complexity has a positive tradeoff with regard to the costeffectiveness of newer models.", "In this paper we propose that this trend is not always cost-effective, and in fact, may even do more harm than good.", "We shall examine the case for a Reduced Instruction Set Computer (RISC) being as cost-effective as a Complex Instruction Set Computer (CISC).", "This paper will argue that the next generation of VLSI computers may be more effectively implemented as RISC's than CISC's." ]
[ 2, 0, 0, 0, 1, 4, 4 ]
[ 0.5881999731063843, 0.5881999731063843, 0.7646999955177307, 0.5587999820709229, 0.6470999717712402, 0.44119998812675476, 0.8234999775886536 ]
train_0780
[ "This paper documents a work on all-purpose discrete event simulation tools evaluation.", "Selected tools must be suitable for process design (e.g. manufacturing or services industries).", "Rather than making specific judgments of the tools, authors tried to measure the intensity of usage or presence in different sources, which they called “popularity”.", "It was performed in several different ways, including occurrences in the WWW and scientific publications with tool name and vendor name.", "This work is an upgrade to the same study issued 5 years ago (2011), which in its turn was also an upgrade of 10 years ago (in 2006).", "It is obvious that more popularity does not assure more quality, or being better to the purpose of a simulation tool; however, a positive correlation may exist between them.", "The result of this work is a short list, of 19 commercial simulation tools, with probably the nowadays' most relevant ones." ]
[ 0, 0, 0, 0, 0, 1, 4 ]
[ 0.7894999980926514, 0.7894999980926514, 0.7894999980926514, 0.421099990606308, 0.6053000092506409, 0.631600022315979, 0.8158000111579895 ]
train_0781
[ "We develop a new edge detection algorithm that addresses two important issues in this long-standing vision problem: (1) holistic image training and prediction; and (2) multi-scale and multi-level feature learning.", "Our proposed method, holistically-nested edge detection (HED), performs image-to-image prediction by means of a deep learning model that leverages fully convolutional neural networks and deeply-supervised nets.", "HED automatically learns rich hierarchical representations (guided by deep supervision on side responses) that are important in order to resolve the challenging ambiguity in edge and object boundary detection.", "We significantly advance the state-of-the-art on the BSDS500 dataset (ODS F-score of 0.790) and the NYU Depth dataset (ODS F-score of 0.746), and do so with an improved speed (0.4 s per image) that is orders of magnitude faster than some CNN-based edge detection algorithms developed before HED.", "We also observe encouraging results on other boundary detection benchmark datasets such as Multicue and PASCAL-Context." ]
[ 2, 1, 1, 1, 4 ]
[ 0.421099990606308, 0.7894999980926514, 0.8158000111579895, 0.421099990606308, 0.5788999795913696 ]
train_0782
[ "Describing clothing appearance with semantic attributes is an appealing technique for many important applications.", "In this paper, we propose a fully automated system that is capable of generating a list of nameable attributes for clothes on human body in unconstrained images.", "We extract low-level features in a pose-adaptive manner, and combine complementary features for learning attribute classifiers.", "Mutual dependencies between the attributes are then explored by a Conditional Random Field to further improve the predictions from independent classifiers.", "We validate the performance of our system on a challenging clothing attribute dataset, and introduce a novel application of dressing style analysis that utilizes the semantic attributes produced by our system." ]
[ 0, 2, 1, 1, 4 ]
[ 1, 0.4828000068664551, 0.6000000238418579, 0.4000000059604645, 0.4000000059604645 ]
train_0783
[ "The human forearm is composed of two long, thin bones called the radius and the ulna, and rotates using two axle joints.", "We aimed to develop a forearm based on the body proportion, weight ratio, muscle arrangement, and joint performance of the human body in order to bring out its benefits.", "For this, we need to miniaturize the muscle modules.", "To approach this task, we arranged two muscle motors inside one muscle module, and used the space effectively by utilizing common parts.", "In addition, we enabled the muscle module to also be used as the bone structure.", "Moreover, we used miniature motors and developed a way to dissipate the motor heat to the bone structure.", "Through these approaches, we succeeded in developing a forearm with a radioulnar joint based on the body proportion, weight ratio, muscle arrangement, and joint performance of the human body, while keeping maintainability and reliability.", "Also, we performed some motions such as soldering, opening a book, turning a screw, and badminton swinging using the benefits of the radioulnar structure, which have not been discussed before, and verified that Kengoro can realize skillful motions using the radioulnar joint like a human." ]
[ 0, 2, 1, 1, 1, 1, 4, 4 ]
[ 1, 0.800000011920929, 0.6000000238418579, 0.6000000238418579, 0.800000011920929, 0.800000011920929, 0.8285999894142151, 0.8285999894142151 ]
train_0784
[ "We present an unsupervised visual feature learning algorithm driven by context-based pixel prediction.", "By analogy with auto-encoders, we propose Context Encoders - a convolutional neural network trained to generate the contents of an arbitrary image region conditioned on its surroundings.", "In order to succeed at this task, context encoders need to both understand the content of the entire image, as well as produce a plausible hypothesis for the missing part(s).", "When training context encoders, we have experimented with both a standard pixel-wise reconstruction loss, as well as a reconstruction plus an adversarial loss.", "The latter produces much sharper results because it can better handle multiple modes in the output.", "We found that a context encoder learns a representation that captures not just appearance but also the semantics of visual structures.", "We quantitatively demonstrate the effectiveness of our learned features for CNN pre-training on classification, detection, and segmentation tasks.", "Furthermore, context encoders can be used for semantic inpainting tasks, either stand-alone or as initialization for non-parametric methods." ]
[ 0, 0, 0, 0, 4, 1, 4, 1 ]
[ 1, 0.8151000142097473, 0.42260000109672546, 0.42260000109672546, 0.5774000287055969, 0.6340000033378601, 0.7886999845504761, 0.6075000166893005 ]
train_0785
[ "Customer relationship management is a popular and strategic topic in marketing and quality of service.", "The availability of big transactions data as well as computing systems have provided a great opportunity to model and predict customer behaviour.", "However, there is a lack of modern modelling and analytical methods to perform analysis on such data.", "Deep learning techniques can assist marketing decision makers to provide more reliable and practical marketing strategic plans.", "In this paper, we propose a customer behaviour prediction model using recurrent neural networks (RNNs) based on the client loyalty number (CLN), recency, frequency, and monetary (RFM) variables.", "The experiment results show that RNNs can predict RFM values of customers efficiently.", "This model can be later used in recommender systems for exclusive promotional offers and loyalty programs management." ]
[ 0, 0, 2, 1, 1, 4, 4 ]
[ 1, 0.7576000094413757, 0.42419999837875366, 0.42419999837875366, 0.6061000227928162, 0.3939000070095062, 0.8181999921798706 ]
train_0786
[ "And has been very often be produced.", "I should be obtained from dynamic, models are introduced through the discipline on?", "Addendum simulations can easily be migrated from simple introductory text presents.", "This is an articulated way a, virtual twin of models that shall.", "But they are well written easy to estimate the acpe as they.", "This is a special use of technical and simulation society secretary models that they." ]
[ 3, 3, 0, 3, 3, 3 ]
[ 0.6053000092506409, 0.6053000092506409, 0.39469999074935913, 0.421099990606308, 0.421099990606308, 0.421099990606308 ]
train_0787
[ "The digital workplace is widely acknowledged as an important organizational asset for optimizing knowledge worker productivity.", "While there is no particular research stream on the digital workplace, scholars have conducted intensive research on related topics.", "This study aims to summarize the practical implications of the current academic body of knowledge on the digital workplace.", "For this purpose, a screening of academic-practitioner literature was conducted, followed by a systematic review of academic top journal literature.", "The screening revealed four main research topics on the digital workplace that are present in academic-practitioner literature: 1) Collaboration, 2) Compliance, 3) Mobility, and 4) Stress and overload.", "Based on the four topics, this study categorizes practical implications on the digital workplace into 15 concepts.", "Thereby, it provides two main contributions.", "First, the study delivers condensed information for practitioners about digital workplace design.", "Second, the results shed light on the relevance of IS research." ]
[ 0, 0, 2, 2, 1, 1, 4, 4, 4 ]
[ 0.8378000259399414, 1, 1, 0.6485999822616577, 0.4323999881744385, 0.6485999822616577, 0.40540000796318054, 0.8378000259399414, 0.8378000259399414 ]
train_0788
[ "We explore an original strategy for building deep networks, based on stacking layers of denoising autoencoderswhich are trained locally to denoise corrupted versions of t heir inputs.", "The resulting algorithm is a straightforward variation on the stacking of ordinary autoencoders.", "It is however shown on a benchmark of classification problems to yield sign ificantly lower classification error, thus bridging the performance gap with deep belief networks (DBN), and in several cases surpassing it.", "Higher level representations learnt in this purely u ns pervised fashion also help boost the performance of subsequent SVM classifiers.", "Qualitative exp eriments show that, contrary to ordinary autoencoders, denoising autoencoders are able to lear n Gabor-like edge detectors from natural image patches and larger stroke detectors from digit images .", "Thi work clearly establishes the value of using a denoising criterion as a tractable unsupervised o bjective to guide the learning of useful higher level representations." ]
[ 0, 0, 0, 1, 4, 4 ]
[ 0.41670000553131104, 0.583299994468689, 0.583299994468689, 0.3889000117778778, 0.3889000117778778, 0.7778000235557556 ]
train_0789
[ "Cancer detection from gene expression data continues to pose a challenge due to the high dimensionality and complexity of these data.", "After decades of research there is still uncertainty in the clinical diagnosis of cancer and the identification of tumor-specific markers.", "Here we present a deep learning approach to cancer detection, and to the identification of genes critical for the diagnosis of breast cancer.", "First, we used Stacked Denoising Autoencoder (SDAE) to deeply extract functional features from high dimensional gene expression profiles.", "Next, we evaluated the performance of the extracted representation through supervised classification models to verify the usefulness of the new features in cancer detection.", "Lastly, we identified a set of highly interactive genes by analyzing the SDAE connectivity matrices.", "Our results and analysis illustrate that these highly interactive genes could be useful cancer biomarkers for the detection of breast cancer that deserve further studies." ]
[ 0, 0, 1, 1, 4, 1, 4 ]
[ 0.7817999720573425, 0.5909000039100647, 0.4090999960899353, 0.8181999921798706, 0.4090999960899353, 0.4090999960899353, 1 ]
train_0790
[ "Along with the popularity of mobile social networks (MSNs) is the increasing danger of privacy breaches due to user location exposures.", "In this work, we take an initial step towards quantifying location privacy leakage from MSNs by matching the users’ shared locations with their real mobility traces.", "We conduct a three-week real-world experiment with 30 participants and discover that both direct location sharing (e.g., Weibo or Renren) and indirect location sharing (e.g., Wechat or Skout) can reveal a small percentage of users’ real points of interests (POIs).", "We further propose a novel attack to allow an external adversary to infer the demographics (e.g., age, gender, education) after observing users’ exposed location profiles.", "We implement such an attack in a large real-world dataset involving 22,843 mobile users.", "The experimental results show that the attacker can effectively predict demographic attributes about users with some shared locations.", "To resist such attacks, we propose SmartMask, a context-based system-level privacy protection solution, designed to automatically learn users’ privacy preferences under different contexts and provide a transparent privacy control for MSN users.", "The effectiveness and efficiency of SmartMask have been well validated by extensive experiments." ]
[ 0, 0, 1, 1, 1, 1, 1, 4 ]
[ 0.8125, 0.5938000082969666, 0.6563000082969666, 0.4375, 1, 0.7692000269889832, 0.40630000829696655, 0.46880000829696655 ]
train_0791
[ "Online feedback mechanisms harness the bidirectional communication capabilities of the Internet to engineer large-scale, word-of-mouth networks.", "Best known so far as a technology for building trust and fostering cooperation in online marketplaces, such as eBay, these mechanisms are poised to have a much wider impact on organizations.", "Their growing popularity has potentially important implications for a wide range of management activities such as brand building, customer acquisition and retention, product development, and quality assurance.", "This paper surveys our progress in understanding the new possibilities and challenges that these mechanisms represent.", "It discusses some important dimensions in which Internet-based feedback mechanisms differ from traditional word-of-mouth networks and surveys the most important issues related to their design, evaluation, and use.", "It provides an overview of relevant work in game theory and economics on the topic of reputation.", "It discusses how this body of work is being extended and combined with insights from computer science, management science, sociology, and psychology to take into consideration the special properties of online environments.", "Finally, it identifies opportunities that this new area presents for operations research/management science (OR/MS) research.", "(Reputation Mechanisms; Online Feedback; Electronic Markets; Trust; Internet; Game Theory )" ]
[ 2, 2, 0, 2, 2, 2, 1, 4, 3 ]
[ 0.6000000238418579, 0.6000000238418579, 0.4000000059604645, 0.800000011920929, 0.4000000059604645, 0.4000000059604645, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579 ]
train_0792
[ "The visual recognition problem is central to computer vision research.", "From robotics to information retrieval, many desired applications demand the ability to identify and localize categories, places, and objects.", "This tutorial overviews computer vision algorithms for visual object recognition and image classification.", "We introduce primary representations and learning approaches, with an emphasis on recent advances in the field.", "The target audience consists of researchers or students working in AI, robotics, or vision who would like to understand what methods and representations are available for these problems.", "This lecture summarizes what is and isn’t possible to do reliably today, and overviews key concepts that could be employed in systems requiring visual categorization." ]
[ 0, 2, 2, 1, 4, 4 ]
[ 0.7838000059127808, 0.4323999881744385, 0.5676000118255615, 0.5676000118255615, 0.6485999822616577, 0.7838000059127808 ]
train_0793
[ "In this paper we construct a Star Join Schema and show how this schema can be created using the basic tools delivered with SQL Server 7.0.", "Major objectives are to keep the operational database unchanged so that data loading can be done without disturbing the business logic of the operational database.", "The operational database is an expanded version of the Pubs database [Sol96]." ]
[ 0, 2, 4 ]
[ 0.8205000162124634, 0.41029998660087585, 0.41029998660087585 ]
train_0794
[ "The dynamic Boltzmann machine (DyBM) has been proposed as a stochastic generative model of multi-dimensional time series, with an exact, learning rule that maximizes the log-likelihood of a given time series.", "The DyBM, however, is defined only for binary valued data, without any nonlinear hidden units.", "Here, in our first contribution, we extend the DyBM to deal with real valued data.", "We present a formulation called Gaussian DyBM, that can be seen as an extension of a vector autoregressive (VAR) model.", "This uses, in addition to standard (explanatory) variables, components that captures long term dependencies in the time series.", "In our second contribution, we extend the Gaussian DyBM model with a recurrent neural network (RNN) that controls the bias input to the DyBM units.", "We derive a stochastic gradient update rule such that, the output weights from the RNN can also be trained online along with other DyBM parameters.", "Furthermore, this acts as nonlinear hidden layer extending the capacity of DyBM and allows it to model nonlinear components in a given time-series.", "Numerical experiments with synthetic datasets show that the RNN-Gaussian DyBM improves predictive accuracy upon standard VAR by up to ≈ 35%.", "On real multi-dimensional time-series prediction, consisting of high nonlinearity and non-stationarity, we demonstrate that this nonlinear DyBM model achieves significant improvement upon state of the art baseline methods like VAR and long short-term memory (LSTM) networks at a reduced com-" ]
[ 0, 0, 2, 1, 1, 1, 1, 1, 4, 4 ]
[ 0.7838000059127808, 1, 0.4323999881744385, 0.7838000059127808, 1, 0.7838000059127808, 0.7838000059127808, 1, 0.6485999822616577, 0.5676000118255615 ]
train_0795
[ "Recognition techniques for printed and handwritten text in scanned documents are significantly different.", "In this paper we address the problem of identifying each type.", "We can list at least four steps: digitalization, preprocessing, feature extraction and decision or classification.", "A new aspect of our approach is the use of data mining techniques on the decision step.", "A new set of features extracted of each word is proposed as well.", "Classification rules are mining and used to discern printed text from handwritten.", "The proposed system was tested in two public image databases.", "All possible measures of efficiency were computed achieving on every occasion quantities above 80%." ]
[ 0, 2, 1, 1, 1, 1, 4, 4 ]
[ 0.8158000111579895, 0.39469999074935913, 0.6053000092506409, 0.421099990606308, 0.421099990606308, 1, 0.39469999074935913, 1 ]
train_0796
[ "Data Centers (DCs) are experiencing a tremendous growth in the number of hosted servers.", "Aggregate bandwidth requirement is a major bottleneck to data center performance.", "New Data Center Network (DCN) architectures are proposed to handle different challenges faced by current DCN architecture.", "In this paper we have implemented and simulated two promising DCN architectural models, namely switch-based and hybrid models, and compared their effectiveness by monitoring the network throughputs and average packet latencies.", "The presented analysis may be a background for the further studies on the simulation and implementation of the DCN customized topologies, and customized addressing protocols in the large-scale data centers." ]
[ 0, 0, 0, 1, 4 ]
[ 0.7623999714851379, 0.7828999757766724, 0.5659000277519226, 0.40310001373291016, 0.40700000524520874 ]
train_0797
[ "The Port of Singapore Authority (PSA) used information technology (IT) extensively to create a high-tech port that has become the busiest port in the world.", "Now corporatised as a commercial port operator, PSA Corporation Ltd employs four key management success factors in managing IT to meet the demands and challenges facing port operators.", "They are: (1) having a business-driven IT investment; (2) aligning business and IT plans; (3) maintaining a ̄exible and extensible IT infrastructure; and (4) encouraging IT innovation and creativity.", "These management success factors are discussed and examples are given to illustrate how they help PSA more effectively leverage IT to streamline operations and sustain its competitive advantage.", "q 2000 Elsevier Science B.V.", "All rights reserved." ]
[ 2, 0, 1, 1, 3, 3 ]
[ 0.40540000796318054, 0.40540000796318054, 0.6215999722480774, 0.40540000796318054, 0.5946000218391418, 1 ]
train_0798
[ "As healthcare organizations continue to be asked to do more with less, access to information is essential for sound evidence-based decision making.", "Business intelligence (BI) systems are designed to deliver decision-support information and have been repeatedly shown to provide value to organizations.", "Many healthcare organizations have yet to implement BI systems and no existing research provides a healthcare-specific framework to guide implementation.", "To address this research gap, we employ a case study in a Canadian Health Authority in order to address three questions: (1) what are the most significant adverse impacts to the organization’s decision processes and outcomes attributable to a lack of decision-support capabilities?", "(2) what are the root causes of these impacts, and what workarounds do they necessitate?", "and (3) in light of the issues identified, what are the key considerations for healthcare organizations in the early stages of BI implementation?", "Using the concept of co-agency as a guide we identified significant decision-related adverse impacts and their root causes.", "We found strong management support, the right skill sets and an information-oriented culture to be key implementation considerations.", "Our major contribution is a framework for defining and prioritizing decision-support information needs in the context of healthcare-specific processes.", "© 2013 Elsevier Ltd." ]
[ 0, 0, 0, 1, 1, 1, 4, 4, 4, 3 ]
[ 1, 1, 0.7390999794006348, 0.817300021648407, 0.478300005197525, 0.39590001106262207, 1, 0.7868000268936157, 0.42640000581741333, 0.817300021648407 ]
train_0799
[ "The Internet has become an indispensable tool in peoples' daily life.", "It also bring us serious computer security problem.", "One big security threat comes from malicious webpages.", "In this paper we study how to detect malicious pages.", "Since malicious webpages are generated inconstantly, we use on line learning methods to detect malicious webpages.", "To keep the client side as safe as possible, we do not download the webpages, and analysis webpages' content.", "We only use URL information to determine if the URL links to a malicious pages.", "The feature selection methods for URL are discussed, and the performances of different on line learning methods are compared.", "To improve the performance of on line learning classifiers, an improved on line learning method is proposed, experiments show that this method is effective." ]
[ 0, 0, 0, 4, 1, 1, 1, 1, 4 ]
[ 0.7875999808311462, 0.5752000212669373, 0.6105999946594238, 0.21240000426769257, 0.5752000212669373, 0.6105999946594238, 0.7875999808311462, 0.3628000020980835, 0.39820000529289246 ]