abstract_id
stringlengths
10
10
sentences
list
labels
list
confs
list
train_0900
[ "The Request For Proposal (RFP) process can be agile and efficient.", "At a high level, the key to achieving this is to specify requirements just in time and containing just enough detail.", "This paper applies the following XP practices and concepts to the RFP process: acceptance tests, business value, iterative & incremental delivery, onsite customer, pair development, planning game, spike, story, velocity, and yesterday’s weather.", "In addition, the following concepts are combined with those from XP to achieve maximal benefit: user-goal use case, context diagram, level of detail, and decision tree.", "The contributions of this paper to the agile community are two-fold: describing a practical application of XP concepts to a non-programming project; and making use case style requirements processes more agile." ]
[ 0, 0, 1, 1, 1 ]
[ 1, 0.833299994468689, 0.5555999875068665, 0.6111000180244446, 0.6111000180244446 ]
train_0901
[ "The continuous developments in information and communication technology have recently led to the appearance of distributed computing environments, which comprise several, and different sources of large volumes of data and several computing units.", "The most prominent example of a distributed environment is the Internet, where increasingly more databases and data streams appear that deal with several areas, such as meteorology, oceanography, economy and others.", "In addition the Internet constitutes the communication medium for geographically distributed information systems, as for example the earth observing system of NASA (eos.gsfc. nasa.gov).", "Other examples of distributed environments that have been developed in the last few years are sensor networks for process monitoring and grids where a large number of computing and storage units are interconnected over a highspeed network.", "The application of the classical knowledge discovery process in distributed environments requires the collection of distributed data in a data warehouse for central processing.", "However, this is usually either ineffective or infeasible for the following reasons:" ]
[ 0, 0, 0, 0, 4, 4 ]
[ 0.5676000118255615, 0.5676000118255615, 0.5676000118255615, 0.5676000118255615, 0.4323999881744385, 0.4323999881744385 ]
train_0902
[ "As known, adventure and experience about lesson, entertainment, and knowledge can be gained by only reading a book.", "Even it is not directly done, you can know more about this life, about the world.", "We offer you this proper and easy way to gain those all.", "We offer many book collections from fictions to science at all.", "One of them is this computer vision algorithms and applications that can be your partner." ]
[ 0, 0, 3, 3, 1 ]
[ 1, 1, 0.6111000180244446, 0.6111000180244446, 0.41670000553131104 ]
train_0903
[ "This paper provides an energy-harvesting, shoe-mounted system for medical sensing using piezoelectric transducers for generating power.", "The electronics are integrated inside a conventional consumer shoe, measuring the pressure of the wearer's foot exerted on the sole at six locations.", "The electronics are completely powered by the harvested energy from walking or running, generating 10-20 μJ of energy per step that is then consumed by capturing and storing the force sensor data.", "The overall shoe system demonstrates that wearable sensor electronics can be adequately powered through piezoelectric energy-harvesting." ]
[ 0, 0, 0, 0 ]
[ 0.6215999722480774, 0.6215999722480774, 0.4323999881744385, 0.6215999722480774 ]
train_0904
[ "Reviews and other evaluations are used by consumers to decide what goods to buy and by firms to choose whom to trade with, hire, or promote.", "However, because potential reviewers are not compensated for submitting reviews and may have reasons to omit relevant information in their reviews, reviews may be biased.", "We use the setting of Airbnb to study the determinants of reviewing behavior, the extent to which reviews are biased, and whether changes in the design of reputation systems can reduce that bias.", "We find that reviews on Airbnb are generally informative and 97% of guests privately report having positive experiences.", "Using two field experiments intended to reduce bias, we show that non-reviewers tend to have worse experiences than reviewers and that strategic reviewing behavior occurred on the site, although the aggregate effect of the strategic behavior was relatively small.", "We use a quantitative exercise to show that the mechanisms for bias that we document decrease the rate of reviews with negative text and a non-recommendation by just .86 percentage points.", "Lastly, we discuss how online marketplaces can design more informative review systems." ]
[ 0, 0, 1, 4, 4, 4, 4 ]
[ 0.8421000242233276, 0.7894999980926514, 0.7894999980926514, 0.26669999957084656, 0.631600022315979, 0.631600022315979, 0.8421000242233276 ]
train_0905
[ "We propose two efficient approximations to standard convolutional neural networks: Binary-Weight-Networks and XNOR-Networks.", "In Binary-WeightNetworks, the filters are approximated with binary values resulting in 32× memory saving.", "In XNOR-Networks, both the filters and the input to convolutional layers are binary.", "XNOR-Networks approximate convolutions using primarily binary operations.", "This results in 58× faster convolutional operations and 32× memory savings.", "XNOR-Nets offer the possibility of running state-of-the-art networks on CPUs (rather than GPUs) in real-time.", "Our binary networks are simple, accurate, efficient, and work on challenging visual tasks.", "We evaluate our approach on the ImageNet classification task.", "The classification accuracy with a Binary-Weight-Network version of AlexNet is only 2.9% less than the full-precision AlexNet (in top-1 measure).", "We compare our method with recent network binarization methods, BinaryConnect and BinaryNets, and outperform these methods by large margins on ImageNet, more than 16% in top-1 accuracy." ]
[ 2, 0, 1, 1, 4, 1, 4, 4, 0, 1 ]
[ 0.5612000226974487, 0.3797000050544739, 0.6202999949455261, 0.5864999890327454, 0.5906999707221985, 0.2363000065088272, 0.8227999806404114, 0.7537999749183655, 0.4666999876499176, 0.5569999814033508 ]
train_0906
[ "The ultimate goal of an information provider is to satisfy the user information needs.", "That is, to provide the user with the right information, at the right time, through the right means.", "A prerequisite for developing personalised services is to rely on user profiles representing users’ information needs.", "In this paper we will first address the issue of presenting a general user profile model.", "Then, the general user profile model will be customised for digital libraries users." ]
[ 2, 0, 0, 2, 4 ]
[ 0.4124000072479248, 0.5875999927520752, 0.7526000142097473, 0.6495000123977661, 0.49480000138282776 ]
train_0907
[ "We believe that the field of organization theory is adrift.", "In sailing jargon, we are “in irons”—stalled and making little headway toward understanding organizations and their place in our lives.", "We first attempt to diagnose our maladies and then, in this light, offer three broad research questions that just might reinvigorate our work: First, how can we understand today’s changing organizations?", "Second, how can we live in these organizations?", "And third, how can we best live with them?", "We close by calling attention to how our familiar approaches to building and testing theory might hamper any attempt to revitalize our field." ]
[ 0, 0, 1, 4, 4, 4 ]
[ 1, 1, 0.6154000163078308, 0.20509999990463257, 0.20509999990463257, 0.5896999835968018 ]
train_0908
[ "This paper presents an effective method to simulate the ink diffusion process in real time that yields realistic visual effects.", "Our algorithm updates the dynamic ink volume using a hybrid grid-particle method: the fluid velocity field is calculated with a low-resolution grid structure, whereas the highly detailed ink effects are controlled and visualized with the particles.", "To facilitate user interaction and extend this method, we propose a particle-guided method that allows artists to design the overall states using the coarse-resolution particles and to preview the motion quickly.", "To treat coupling with solids and other fluids, we update the grid-particle representation with no-penetration boundary conditions and implicit interaction conditions.", "To treat moving ‘‘ink-emitting’’ objects, we introduce an extra drag-force model to enhance the particle motion effects; this force might not be physically accurate, but it proves effective for producing animations.", "We also propose an improved ink rendering method that uses particle sprites and motion blurring techniques.", "The simulation and the rendering processes are efficiently implemented on graphics hardware at interactive frame rates.", "Compared to traditional fluid simulation methods that treat water and ink as two mixable fluids, our method is simple but effective: it captures various ink effects, such as pinned boundaries (Nelson, 2005 [1]) and filament patterns (Shiny et al., 2010 [2]), while still running in real time, it allows easy control of the animation, it includes basic solid–fluid interactions, and it can address multiple ink sources without complex interface tracking.", "Our method is attractive for animation production and art design.", "& 2012 Elsevier Ltd." ]
[ 2, 1, 1, 1, 1, 1, 4, 4, 4, 3 ]
[ 0.421099990606308, 0.8158000111579895, 0.8158000111579895, 0.421099990606308, 1, 0.6053000092506409, 0.7894999980926514, 0.6053000092506409, 0.421099990606308, 1 ]
train_0909
[ "cleverhans is a software library that provides standardized reference implementations of adversarial example construction techniques and adversarial training.", "The library may be used to develop more robust machine learning models and to provide standardized benchmarks of models’ performance in the adversarial setting.", "Benchmarks constructed without a standardized implementation of adversarial example construction are not comparable to each other, because a good result may indicate a robust model or it may merely indicate a weak implementation of the adversarial example construction procedure.", "This technical report is structured as follows.", "Section 1 provides an overview of adversarial examples in machine learning and of the cleverhans software.", "Section 2 presents the core functionalities of the library: namely the attacks based on adversarial examples and defenses to improve the robustness of machine learning models to these attacks.", "Section 3 describes how to report benchmark results using the library.", "Section 4 describes the versioning system." ]
[ 0, 1, 0, 2, 1, 1, 4, 4 ]
[ 1, 0.5946000218391418, 0.7838000059127808, 0.40540000796318054, 0.40540000796318054, 0.3783999979496002, 0.40540000796318054, 0.40540000796318054 ]
train_0910
[ "The field of cyber security is faced with ever-expanding amounts of data and a constant barrage of cyber attacks.", "Within this space, we have designed BubbleNet as a cyber security dashboard to help network analysts identify and summarize patterns within the data.", "This design study faced a range of interesting constraints from limited time with various expert users and working with users beyond the network analyst, such as network managers.", "To overcome these constraints, the design study employed a user-centered design process and a variety of methods to incorporate user feedback throughout the design of BubbleNet.", "This approach resulted in a successfully evaluated dashboard with users and further deployments of these ideas in both research and operational environments.", "By explaining these methods and the process, it can benefit future visualization designers to help overcome similar challenges in cyber security or alternative domains." ]
[ 0, 2, 1, 1, 4, 4 ]
[ 1, 0.6388999819755554, 0.583299994468689, 1, 0.7778000235557556, 0.583299994468689 ]
train_0911
[ "This research study proposes Hybrid Encryption System using new public key algorithm and private key algorithm.", "A hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetrickey cryptosystem.", "Here, we propose a provably two way secured data encryption system, which addresses the concerns of user’s privacy, authentication and accuracy.", "This system has two different encryption algorithms have been used both in the Encryption and decryption sequence.", "One is public key cryptography based on linear block cipher another one is private key cryptography based on simple symmetric algorithm.", "This cryptography algorithm provides more security as well as authentication comparing to other existing hybrid algorithm." ]
[ 0, 0, 2, 1, 1, 4 ]
[ 1, 1, 0.4000000059604645, 0.6000000238418579, 0.4571000039577484, 0.8285999894142151 ]
train_0912
[ "Trajectory planning for serial 6 degree of freedom (DOF) machinery systems is demanding due to complex kinematic structure which affects the machinery tool fame, position, orientation and singularity.", "These three characteristics represent the key elements for production planning and layout design of the manufacturing systems.", "Both, simple and complex machine trajectory is defined as series of connected points in 3D space.", "Each point is defined with its position and orientation related to the machine's base frames.", "To visualize the machine's reachable space, the work envelope is calculated and graphically presented as very well known machine's property.", "A methodology to predetermine regions of feasible tool orientation (work window) is analytically and graphically presented.", "The work envelope boundary is generated using the filtering points algorithm, while work window is generated using either empirical or analytical methods.", "The singularity regions are calculated by finding the determinant of the reconfigurable Jacobian matrix.", "These three tool path characteristics represent three different spaces which are identified both analytically and graphically and plotted in Cartesian space using MATLAB tools.", "The singularity regions will be represented within the workspace and work window for a single machinery kinematic structure." ]
[ 0, 0, 1, 0, 1, 1, 1, 1, 1, 1 ]
[ 0.6053000092506409, 0.6053000092506409, 0.39469999074935913, 0.6053000092506409, 0.39469999074935913, 0.5788999795913696, 0.7894999980926514, 0.6053000092506409, 0.39469999074935913, 0.39469999074935913 ]
train_0913
[ "Missing data is a well-recognized problem impacting all domains.", "State-of-theart framework to minimize missing data bias is multiple imputation, for which the choice of an imputation model remains nontrivial.", "We propose a multiple imputation model based on overcomplete deep denoising autoencoders, capable of handling different data types, missingness patterns, missingness proportions and distributions.", "Evaluation on real life datasets shows our proposed model outperforms the state-of-the-art methods under varying conditions and improves the end of the line analytics." ]
[ 0, 0, 2, 4 ]
[ 1, 0.8173999786376953, 0.42170000076293945, 0.4260999858379364 ]
train_0914
[ "In this article, we present a real-time 3D hybrid beamforming approach for 5G wireless networks.", "One of the key concepts in 5G cellular systems is the small cell network, which settles the high mobile traffic demand and provides uniform user-experienced data rates.", "The overall capacity of the small cell network can be enhanced with the enabling technology of 3D hybrid beamforming.", "This study validates the feasibility of 3D hybrid beamforming, mostly for link-level performance, through the implementation of a real-time testbed using a SDR platform and fabricated antenna array.", "Based on the measured data, we also investigate system-level performance to verify the gain of the proposed smart small cell system over LTE systems by performing system-level simulations based on a 3D ray-tracing tool." ]
[ 0, 2, 2, 1, 4 ]
[ 0.6000000238418579, 0.4000000059604645, 0.6000000238418579, 0.800000011920929, 0.6000000238418579 ]
train_0915
[ "Traditional methods of computer vision and machine learning cannot match human performance on tasks such as the recognition of handwritten digits or traffic signs.", "Our biologically plausible, wide and deep artificial neural network architectures can.", "Small (often minimal) receptive fields of convolutional winner-take-all neurons yield large network depth, resulting in roughly as many sparsely connected neural layers as found in mammals between retina and visual cortex.", "Only winner neurons are trained.", "Several deep neural columns become experts on inputs preprocessed in different ways; their predictions are averaged.", "Graphics cards allow for fast training.", "On the very competitive MNIST handwriting benchmark, our method is the first to achieve near-human performance.", "On a traffic sign recognition benchmark it outperforms humans by a factor of two.", "We also improve the state-of-the-art on a plethora of common image classification benchmarks." ]
[ 0, 0, 0, 0, 0, 4, 1, 2, 4 ]
[ 1, 0.6470999717712402, 0.6176000237464905, 0.6176000237464905, 1, 0.3824000060558319, 0.42309999465942383, 0.2353000044822693, 0.3824000060558319 ]
train_0916
[ "Twitter sentiment analysis has become widely popular.", "However, stable Twitter sentiment classification performance remains elusive due to several issues: heavy class imbalance in a multi-class problem, representational richness issues for sentiment cues, and the use of diverse colloquial linguistic patterns.", "These issues are problematic since many forms of social media analytics rely on accurate underlying Twitter sentiments.", "Accordingly, a text analytics framework is proposed for Twitter sentiment analysis.", "The framework uses an elaborate bootstrapping ensemble to quell class imbalance, sparsity, and representational richness issues.", "Experiment results reveal that the proposed approach is more accurate and balanced in its predictions across sentiment classes, as compared to various comparison tools and algorithms.", "Consequently, the bootstrapping ensemble framework is able to build sentiment time series that are better able to reflect events eliciting strong positive and negative sentiments from users.", "Considering the importance of Twitter as one of the premiere social media platforms, the results have important implications for social media analytics and social intelligence." ]
[ 0, 0, 0, 1, 1, 4, 4, 4 ]
[ 0.8055999875068665, 0.6111000180244446, 0.6111000180244446, 0.3889000117778778, 0.6111000180244446, 0.8055999875068665, 0.41670000553131104, 0.6111000180244446 ]
train_0917
[ "This paper presents a survey on hate speech detection.", "Given the steadily growing body of social media content, the amount of online hate speech is also increasing.", "Due to the massive scale of the web, methods that automatically detect hate speech are required.", "Our survey describes key areas that have been explored to automatically recognize these types of utterances using natural language processing.", "We also discuss limits of those approaches." ]
[ 0, 0, 2, 1, 4 ]
[ 0.6053000092506409, 0.7419000267982483, 0.39469999074935913, 0.7894999980926514, 0.6053000092506409 ]
train_0918
[ "Reearch into virtual environments on the one hand and artificial intelligence and artificial life on the other has largely been carried out by two different groups of people with different preoccupations and interests, but some convergence is now apparent between the two fields.", "Applications in which activity independent of the user takes place — involving crowds or other agents — are beginning to be tackled, while synthetic agents, virtual humans and computer pets are all areas in which techniqes from the two fields require strong integration.", "The two communities have much to learn from each other if wheels are not to be reinvented on both sides.", "This paper reviews the issues arising from combining artificial intelligence and artificial life techniques with those of virtual environments to produce just such intelligent virtual environments.", "The discussion is illustrated with examples that include environments providing knowledge to direct or assist the user rather than relying entirely on the user’s knowledge and skills, those in which the user is represented by a partially autonomous avatar, those containing intelligent agents separate from the user, and many others from both sides of the area." ]
[ 0, 0, 0, 2, 4 ]
[ 1, 0.7838000059127808, 0.6485999822616577, 0.4323999881744385, 0.4323999881744385 ]
train_0919
[ "In this paper, we use data augmentation to improve performance of deep neural network (DNN) embeddings for speaker recognition.", "The DNN, which is trained to discriminate between speakers, maps variable-length utterances to fixed-dimensional embeddings that we call x-vectors.", "Prior studies have found that embeddings leverage large-scale training datasets better than i-vectors.", "However, it can be challenging to collect substantial quantities of labeled data for training.", "We use data augmentation, consisting of added noise and reverberation, as an inexpensive method to multiply the amount of training data and improve robustness.", "The x-vectors are compared with i-vector baselines on Speakers in the Wild and NIST SRE 2016 Cantonese.", "We find that while augmentation is beneficial in the PLDA classifier, it is not helpful in the i-vector extractor.", "However, the x-vector DNN effectively exploits data augmentation, due to its supervised training.", "As a result, the x-vectors achieve superior performance on the evaluation datasets." ]
[ 0, 0, 0, 0, 1, 2, 0, 2, 4 ]
[ 0.567300021648407, 0.7980999946594238, 0.7980999946594238, 0.42309999465942383, 0.40380001068115234, 0.3653999865055084, 0.42309999465942383, 0.39419999718666077, 0.7674000263214111 ]
train_0920
[ "Backpropagation and contrastive Hebbian learning are two methods of training networks with hidden neurons.", "Backpropagation computes an error signal for the output neurons and spreads it over the hidden neurons.", "Contrastive Hebbian learning involves clamping the output neurons at desired values and letting the effect spread through feedback connections over the entire network.", "To investigate the relationship between these two forms of learning, we consider a special case in which they are identical: a multilayer perceptron with linear output units, to which weak feedback connections have been added.", "In this case, the change in network state caused by clamping the output neurons turns out to be the same as the error signal spread by backpropagation, except for a scalar prefactor.", "This suggests that the functionality of backpropagation can be realized alternatively by a Hebbian-type learning algorithm, which is suitable for implementation in biological networks." ]
[ 0, 0, 0, 1, 4, 4 ]
[ 0.771399974822998, 1, 0.8285999894142151, 0.6000000238418579, 0.628600001335144, 0.8285999894142151 ]
train_0921
[ "We describe a parsing system based upon a language model for English that is, in turn, based upon assigning probabilities to possible parses for a sentence.", "This model is used in a parsing system by nding the parse for the sentence with the highest probability.", "This system outperforms previous schemes.", "As this is the third in a series of parsers by di erent authors that are similar enough to invite detailed comparisons but di erent enough to give rise to di erent levels of performance, we also report on some experiments designed to identify what aspects of these systems best explain their relative performance." ]
[ 0, 1, 0, 4 ]
[ 0.40540000796318054, 0.8108000159263611, 0.40540000796318054, 1 ]
train_0922
[ "The paper provides an overview of the development of intelligent data analysis in medicine from a machine learning perspective: a historical view, a state-of-the-art view, and a view on some future trends in this subfield of applied artificial intelligence.", "The paper is not intended to provide a comprehensive overview but rather describes some subareas and directions which from my personal point of view seem to be important for applying machine learning in medical diagnosis.", "In the historical overview, I emphasize the naive Bayesian classifier, neural networks and decision trees.", "I present a comparison of some state-of-the-art systems, representatives from each branch of machine learning, when applied to several medical diagnostic tasks.", "The future trends are illustrated by two case studies.", "The first describes a recently developed method for dealing with reliability of decisions of classifiers, which seems to be promising for intelligent data analysis in medicine.", "The second describes an approach to using machine learning in order to verify some unexplained phenomena from complementary medicine, which is not (yet) approved by the orthodox medical community but could in the future play an important role in overall medical diagnosis and treatment." ]
[ 2, 2, 2, 1, 1, 1, 4 ]
[ 0.583299994468689, 0.7778000235557556, 0.41670000553131104, 0.583299994468689, 0.8055999875068665, 0.41670000553131104, 0.583299994468689 ]
train_0923
[ "With rapid progress and significant successes in a wide spectrum of applications, deep learning is being applied in many safety-critical environments.", "However, deep neural networks (DNNs) have been recently found vulnerable to well-designed input samples called adversarial examples.", "Adversarial perturbations are imperceptible to human but can easily fool DNNs in the testing/deploying stage.", "The vulnerability to adversarial examples becomes one of the major risks for applying DNNs in safety-critical environments.", "Therefore, attacks and defenses on adversarial examples draw great attention.", "In this paper, we review recent findings on adversarial examples for DNNs, summarize the methods for generating adversarial examples, and propose a taxonomy of these methods.", "Under the taxonomy, applications for adversarial examples are investigated.", "We further elaborate on countermeasures for adversarial examples.", "In addition, three major challenges in adversarial examples and the potential solutions are discussed." ]
[ 0, 0, 0, 0, 0, 2, 1, 1, 1 ]
[ 1, 0.766700029373169, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.3666999936103821 ]
train_0924
[ "Spreadsheets are among the most widely used programming systems in the world.", "Individuals and businesses use spreadsheets for a wide variety of applications, ranging from performing simple calculations to building complex financial models.", "In this article, we first discuss how spreadsheet programs are actually functional programs.", "We then describe concepts in spreadsheet programming, followed by a brief history of spreadsheet systems.", "Widespread use of spreadsheets, coupled with their high error-proneness and the impact of spreadsheet errors, has motivated research into techniques aimed at the prevention, detection, and correction of errors in spreadsheets.", "We present an overview of research effort that seeks to rectify this problem." ]
[ 0, 0, 1, 1, 1, 1 ]
[ 0.8378000259399414, 0.6215999722480774, 0.6215999722480774, 0.6215999722480774, 0.40540000796318054, 0.40540000796318054 ]
train_0925
[ "In this study, we have assessed the validity and reliability of an automated labeling system that we have developed for subdividing the human cerebral cortex on magnetic resonance images into gyral based regions of interest (ROIs).", "Using a dataset of 40 MRI scans we manually identified 34 cortical ROIs in each of the individual hemispheres.", "This information was then encoded in the form of an atlas that was utilized to automatically label ROIs.", "To examine the validity, as well as the intra- and inter-rater reliability of the automated system, we used both intraclass correlation coefficients (ICC), and a new method known as mean distance maps, to assess the degree of mismatch between the manual and the automated sets of ROIs.", "When compared with the manual ROIs, the automated ROIs were highly accurate, with an average ICC of 0.835 across all of the ROIs, and a mean distance error of less than 1 mm.", "Intra- and inter-rater comparisons yielded little to no difference between the sets of ROIs.", "These findings suggest that the automated method we have developed for subdividing the human cerebral cortex into standard gyral-based neuroanatomical regions is both anatomically valid and reliable.", "This method may be useful for both morphometric and functional studies of the cerebral cortex as well as for clinical investigations aimed at tracking the evolution of disease-induced changes over time, including clinical trials in which MRI-based measures are used to examine response to treatment." ]
[ 0, 0, 0, 1, 1, 1, 4, 4 ]
[ 0.8188999891281128, 0.8188999891281128, 0.3962000012397766, 0.5774000287055969, 0.5774000287055969, 0.5774000287055969, 0.42260000109672546, 0.6340000033378601 ]
train_0926
[ "Automated classification of text into predefined categories has always been considered as a vital method to manage and process a vast amount of documents in digital forms that are widespread and continuously increasing.", "This kind of web information, popularly known as the digital/electronic information is in the form of documents, conference material, publications, journals, editorials, web pages, e-mail etc.", "People largely access information from these online sources rather than being limited to archaic paper sources like books, magazines, newspapers etc.", "But the main problem is that this enormous information lacks organization which makes it difficult to manage.", "Text classification is recognized as one of the key techniques used for organizing such kind of digital data.", "In this paper we have studied the existing work in the area of text classification which will allow us to have a fair evaluation of the progress made in this field till date.", "We have investigated the papers to the best of our knowledge and have tried to summarize all existing information in a comprehensive and succinct manner.", "The studies have been summarized in a tabular form according to the publication year considering numerous key" ]
[ 0, 0, 0, 2, 0, 2, 1, 4 ]
[ 0.800000011920929, 0.800000011920929, 0.6000000238418579, 0.4000000059604645, 0.6000000238418579, 0.75, 0.6000000238418579, 0.4000000059604645 ]
train_0927
[ "Departing from the comprehensive reviews carried out in the field, we identify the key challenges that agent-based methodology faces when modeling coupled socio-ecological systems.", "Focusing primarily on the papers presented in this thematic issue, we review progress in spatial agent-based models along the lines of four methodological challenges: (1) design and parameterizing of agent decision models, (2) verification, validation and sensitivity analysis, (3) integration of socio-demographic, ecological, and biophysical models, and (4) spatial representation.", "Based on this we critically reflect on the future work that is required to make agent-based modeling widely accepted as a tool to support the real world policy.", "2013 Elsevier Ltd. All rights reserved." ]
[ 0, 0, 1, 3 ]
[ 1, 0.571399986743927, 0.6571000218391418, 0.771399974822998 ]
train_0928
[ "Currently, Belgium is introducing an electronic version of its identity card.", "In this article, we shortly describe the card, and give a brief introduction to its cryptographic features.", "In particular, we focus on the Public-Key Infrastructure (PKI) associated with the card." ]
[ 0, 1, 4 ]
[ 0.800000011920929, 0.4000000059604645, 0.20000000298023224 ]
train_0929
[ "In this paper, we address the problems of contour detection, bottom-up grouping, object detection and semantic segmentation on RGB-D data.", "We focus on the challenging setting of cluttered indoor scenes, and evaluate our approach on the recently introduced NYU-Depth V2 (NYUD2) dataset (Silberman et al., ECCV, 2012).", "We propose algorithms for object boundary detection and hierarchical segmentation that generalize the $$gPb-ucm$$ g P b - u c m approach of Arbelaez et al. (TPAMI, 2011) by making effective use of depth information.", "We show that our system can label each contour with its type (depth, normal or albedo).", "We also propose a generic method for long-range amodal completion of surfaces and show its effectiveness in grouping.", "We train RGB-D object detectors by analyzing and computing histogram of oriented gradients on the depth image and using them with deformable part models (Felzenszwalb et al., TPAMI, 2010).", "We observe that this simple strategy for training object detectors significantly outperforms more complicated models in the literature.", "We then turn to the problem of semantic segmentation for which we propose an approach that classifies superpixels into the dominant object categories in the NYUD2 dataset.", "We design generic and class-specific features to encode the appearance and geometry of objects.", "We also show that additional features computed from RGB-D object detectors and scene classifiers further improves semantic segmentation accuracy." ]
[ 2, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ 0.548799991607666, 0.43689998984336853, 0.6407999992370605, 0.548799991607666, 0.8446999788284302, 0.7961000204086304, 0.6407999992370605, 0.7961000204086304, 0.8446999788284302, 0.43689998984336853 ]
train_0930
[ "A genetic algorithm, GENEsYs, is applied to an NP-complele problem, the 0/1 multiple knapsack problem.", "The partitioning of the search space resulting from this highly constrained problem may include substantially large infeasible regions.", "Our implementation allows for the breeding and participation of infeasible strings in the population.", "Unlike many other GA-based algorithms lhat are augmented with domainspecific knowledge, GENEsYs uses a simple fitness function that uses a graded penalty term to penalize infeasibly bred strings.", "We apply our genetic algorithm to problem inslances trom the literature of well known test problems and report our experimental results.", "These encouraging results, especially for relatively large test problems, indicate that genetic algorithms can be successfully used as heuristics for finding good solutions for highly constrained NP-complete problems." ]
[ 0, 0, 2, 2, 1, 4 ]
[ 0.5896999835968018, 0.5896999835968018, 0.7949000000953674, 0.41029998660087585, 1, 1 ]
train_0931
[ "We develop a new approach that uses the ordered weighted averaging (OWA) operator in the selection of financial products.", "In doing so, we introduce the ordered weighted averaging distance (OWAD) operator and the ordered weighted averaging adequacy coefficient (OWAAC) operator.", "These aggregation operators are very useful for decision-making problems because they establish a comparison between an ideal alternative and available options in order to find the optimal choice.", "The objective of this new model is to manipulate the attitudinal character of previous methods based on distance measures, so that the decision maker can select financial products according to his or her degree of optimism, which is also known as the orness measure.", "The main advantage of using the OWA operator is that we can generate a parameterized family of aggregation operators between the maximum and the minimum.", "Thus, the analysis developed in the decision process by the decision maker is much more complete, because he or she is able to select the particular case in accordance with his or her interests in the aggregation process.", "The paper ends with an illustrative example that shows results obtained by using different types of aggregation operators in the selection of financial products.", "2010 Elsevier Inc. All rights reserved." ]
[ 2, 1, 1, 2, 4, 4, 4, 3 ]
[ 0.7838000059127808, 0.5676000118255615, 0.5676000118255615, 1, 0.5946000218391418, 0.5946000218391418, 1, 1 ]
train_0932
[ "The highest accuracy object detectors to date are based on a two-stage approach popularized by R-CNN, where a classifier is applied to a sparse set of candidate object locations.", "In contrast, one-stage detectors that are applied over a regular, dense sampling of possible object locations have the potential to be faster and simpler, but have trailed the accuracy of two-stage detectors thus far.", "In this paper, we investigate why this is the case.", "We discover that the extreme foreground-background class imbalance encountered during training of dense detectors is the central cause.", "We propose to address this class imbalance by reshaping the standard cross entropy loss such that it down-weights the loss assigned to well-classified examples.", "Our novel Focal Loss focuses training on a sparse set of hard examples and prevents the vast number of easy negatives from overwhelming the detector during training.", "To evaluate the effectiveness of our loss, we design and train a simple dense detector we call RetinaNet.", "Our results show that when trained with the focal loss, RetinaNet is able to match the speed of previous one-stage detectors while surpassing the accuracy of all existing state-of-the-art two-stage detectors.", "Code is at: https://github.com/facebookresearch/Detectron." ]
[ 0, 0, 2, 4, 2, 1, 1, 4, 3 ]
[ 0.628600001335144, 0.800000011920929, 0.428600013256073, 0.4000000059604645, 0.571399986743927, 0.6000000238418579, 0.428600013256073, 0.800000011920929, 0.6000000238418579 ]
train_0933
[ "The technology acceptance model proposes that perceived ease of use and perceived usefulness predict the acceptance of information technology.", "Since its inception, the model has been tested with various applications in tens of studies and has become a most widely applied model of user acceptance and usage.", "Nevertheless, the reported findings on the model are mixed in terms of statistical significance, direction, and magnitude.", "In this study, we conducted a meta-analysis based on 26 selected empirical studies in order to synthesize the empirical evidence.", "The results suggest that both the correlation between usefulness and acceptance and between usefulness and ease of use are somewhat strong.", "However, the relationship between ease of use and acceptance is weak, and its significance does not pass the fail-safe test.", "IDEA GROUP PUBLISHING This chapter appears in the book, Advanced Topics in End User Computing, vol.", "4 edited by M. Adam Mahmood © 2005, Idea Group Inc. 701 E. Chocolate Avenue, Suite 200, Hershey PA 17033-1240, USA Tel: 717/533-8845; Fax 717/533-8661; URL-http://www.idea-group.com ITB11300" ]
[ 0, 0, 0, 1, 4, 4, 3, 3 ]
[ 1, 1, 1, 0.5896999835968018, 0.6154000163078308, 0.7949000000953674, 0.41029998660087585, 1 ]
train_0934
[ "We present an end-to-end system for augmented and virtual reality telepresence, called Holoportation.", "Our system demonstrates high-quality, real-time 3D reconstructions of an entire space, including people, furniture and objects, using a set of new depth cameras.", "These 3D models can also be transmitted in real-time to remote users.", "This allows users wearing virtual or augmented reality displays to see, hear and interact with remote participants in 3D, almost as if they were present in the same physical space.", "From an audio-visual perspective, communicating and interacting with remote users edges closer to face-to-face communication.", "This paper describes the Holoportation technical system in full, its key interactive capabilities, the application scenarios it enables, and an initial qualitative study of using this new communication medium." ]
[ 0, 0, 0, 1, 1, 4 ]
[ 0.800000011920929, 0.800000011920929, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579, 0.6000000238418579 ]
train_0935
[ "This paper explores a simple and efficient baseline for text classification.", "Our experiments show that our fast text classifier fastText is often on par with deep learning classifiers in terms of accuracy, and many orders of magnitude faster for training and evaluation.", "We can train fastText on more than one billion words in less than ten minutes using a standard multicore CPU, and classify half a million sentences among 312K classes in less than a minute." ]
[ 0, 2, 1 ]
[ 0.7768999934196472, 0.3865000009536743, 0.3903999924659729 ]
train_0936
[ "This paper presents a method for measuring the semantic similarity of texts, using corpus-based and knowledge-based measures of similarity.", "Previous work on this problem has focused mainly on either large documents (e.g. text classification, information retrieval) or individual words (e.g. synonymy tests).", "Given that a large fraction of the information available today, on the Web and elsewhere, consists of short text snippets (e.g. abstracts of scientific documents, imagine captions, product descriptions), in this paper we focus on measuring the semantic similarity of short texts.", "Through experiments performed on a paraphrase data set, we show that the semantic similarity method outperforms methods based on simple lexical matching, resulting in up to 13% error rate reduction with respect to the traditional vector-based similarity metric." ]
[ 1, 1, 1, 4 ]
[ 0.6075000166893005, 0.42260000109672546, 0.5160999894142151, 0.6075000166893005 ]
train_0937
[ "In classification, it is often difficult or expensive to obtain completely accurate and reliable labels.", "Indeed, labels may be polluted by label noise, due to e.g. insufficient information, expert mistakes, and encoding errors.", "The problem is that errors in training labels that are not properly handled may deteriorate the accuracy of subsequent predictions, among other effects.", "Many works have been devoted to label noise and this paper provides a concise and comprehensive introduction to this research topic.", "In particular, it reviews the types of label noise, their consequences and a number of state of the art approaches to deal with label noise." ]
[ 0, 0, 2, 1, 4 ]
[ 1, 1, 0.4000000059604645, 0.800000011920929, 0.6000000238418579 ]
train_0938
[ "This study involved developing a computer-aided diagnosis (CAD) system for discriminating the grades of breast cancer tumors in ultrasound (US) images.", "Histological tumor grades of breast cancer lesions are standard prognostic indicators.", "Tumor grade information enables physicians to determine appropriate treatments for their patients.", "US imaging is a noninvasive approach to breast cancer examination.", "In this study, 148 3-dimensional US images of malignant breast tumors were obtained.", "Textural, morphological, ellipsoid fitting, and posterior acoustic features were quantified to characterize the tumor masses.", "A support vector machine was developed to classify breast tumor grades as either low or high.", "The proposed CAD system achieved an accuracy of 85.14% (126/148), a sensitivity of 79.31% (23/29), a specificity of 86.55% (103/119), and an A Z of 0.7940." ]
[ 0, 0, 2, 0, 4, 4, 1, 2 ]
[ 0.7894999980926514, 0.7894999980926514, 0.421099990606308, 0.421099990606308, 0.631600022315979, 0.421099990606308, 0.5788999795913696, 0.39469999074935913 ]
train_0939
[ "This paper describes an algorithm for Successive Approximation Register (SAR) ADCs with overlapping steps that allow comparison decision errors (due to, such as DAC incomplete settling) to be digitally corrected.", "We generalize this non-binary search algorithm, and clarify which decision errors it can digitally correct.", "This algorithm requires more SAR ADC conversion steps than a binary search algorithm, but we show that the sampling speed of an SAR ADC using this algorithm can be faster than that of a conventional binary-search SAR ADC — because the latter must wait for the settling time of the DAC inside the SAR ADC.", "key words: SAR ADC, digital error correction, non-binary, redundancy" ]
[ 0, 1, 1, 4 ]
[ 0.8108000159263611, 0.5676000118255615, 0.8108000159263611, 0.40540000796318054 ]
train_0940
[ "In this paper, we propose <italic>DeepCut</italic>, a method to obtain pixelwise object segmentations given an image dataset labelled weak annotations, in our case bounding boxes.", "It extends the approach of the well-known <italic>GrabCut</italic> <xref ref-type=\"bibr\" rid=\"ref1\">[1]</xref> method to include machine learning by training a neural network classifier from bounding box annotations.", "We formulate the problem as an energy minimisation problem over a densely-connected conditional random field and iteratively update the training targets to obtain pixelwise object segmentations.", "Additionally, we propose variants of the <italic>DeepCut</italic> method and compare those to a naïve approach to CNN training under weak supervision.", "We test its applicability to solve brain and lung segmentation problems on a challenging fetal magnetic resonance dataset and obtain encouraging results in terms of accuracy." ]
[ 0, 1, 0, 1, 4 ]
[ 0.4323999881744385, 0.5676000118255615, 0.4323999881744385, 0.7585999965667725, 0.5676000118255615 ]
train_0941
[ "The enormous amount of information stored in unstructured texts cannot simply be used for further processing by computers, which typically handle text as simple sequences of character strings.", "Therefore, specific (pre-)processing methods and algorithms are required in order to extract useful patterns.", "Text mining refers generally to the process of extracting interesting information and knowledge from unstructured text.", "In this article, we discuss text mining as a young and interdisciplinary field in the intersection of the related areas information retrieval, machine learning, statistics, computational linguistics and especially data mining.", "We describe the main analysis tasks preprocessing, classification, clustering, information extraction and visualization.", "In addition, we briefly discuss a number of successful applications of text mining." ]
[ 0, 0, 0, 2, 0, 2 ]
[ 1, 1, 0.628600001335144, 0.428600013256073, 0.37139999866485596, 0.22859999537467957 ]
train_0942
[ "A technique for software system behavior specification appropriate for use in designing systems with concurrency is presented.", "The technique is based upon a generalized ability to define events, or significant occurrences in a software system, and then indicate whatever constraints the designer might wish to see imposed upon the ordering or simultaneity of those events.", "Constructs implementing this technique in the DREAM software design system are presented and illustrated.", "The relationship of this technique to other behavior specification techniques is also discussed." ]
[ 0, 0, 1, 4 ]
[ 0.7778000235557556, 0.583299994468689, 0.41670000553131104, 0.44440001249313354 ]
train_0943
[ "Dynamic voltage (IR) drop, unlike the static voltage drop depends on the switching activity of the design, and hence it is vector dependent.", "In this paper we have highlighted the pitfalls in the common design closure methodology that addresses static IR drop well, but often fails to bound the impact of dynamic voltage drops robustly.", "Factors that can affect the accuracy of dynamic IR analysis and the related metrics for design closure are discussed.", "A structured approach to planning the power distribution and grid for power managed designs is then presented, with an emphasis to cover realistic application scenarios, and how it can be done early in the design cycle.", "Care-about and solutions to avoid and fix the Dynamic voltage drop issues are also presented.", "Results are from industrial designs in 45nm process are presented related to the said topics." ]
[ 0, 0, 2, 1, 1, 4 ]
[ 1, 0.5555999875068665, 0.41670000553131104, 0.6388999819755554, 0.6388999819755554, 1 ]
train_0944
[ "This paper takes the stance that some cases of information systems development can be considered knowledge creating activities, and, in those cases, information systems development can be a legitimate research method.", "In these cases not only is knowledge created about the development process itself but also a deeper understanding emerges about the organisational problem that the system is designed to solve.", "The paper begins with a brief overview of research in the design sciences and a comparison of research methods that are concerned with the design, and use, of information systems.", "This is followed by an assessment of the way systems development as a research method deals with the scientific research processes of data collection, analysis, synthesis and display.", "A case study, where the systems development research method was use, is described to illustrate the method and give the reader a better understanding of the approach." ]
[ 0, 0, 1, 4, 4 ]
[ 0.6340000033378601, 0.6340000033378601, 0.7886999845504761, 0.5774000287055969, 0.8188999891281128 ]
train_0945
[ "The increasing advances in hardware technology for sensor processing and mobile technology has resulted in greater access and availability of sensor data from a wide variety of applications.", "For example, the commodity mobile devices contain a wide variety of sensors such as GPS, accelerometers, and other kinds of data.", "Many other kinds of technology such as RFID-enabled sensors also produce large volumes of data over time.", "This has lead to a need for principled methods for efficient sensor data processing.", "This chapter will provide an overview of the challenges of sensor data analytics and the different areas of research in this context.", "We will also present the organization of the chapters in this book in this context." ]
[ 0, 0, 1, 1, 4, 1 ]
[ 0.7778000235557556, 0.5555999875068665, 0.666700005531311, 0.666700005531311, 0.44440001249313354, 0.44440001249313354 ]
train_0946
[ "Objective methods for assessing perceptual image quality traditionally attempted to quantify the visibility of errors (differences) between a distorted image and a reference image using a variety of known properties of the human visual system.", "Under the assumption that human visual perception is highly adapted for extracting structural information from a scene, we introduce an alternative complementary framework for quality assessment based on the degradation of structural information.", "As a specific example of this concept, we develop a structural similarity index and demonstrate its promise through a set of intuitive examples, as well as comparison to both subjective ratings and state-of-the-art objective methods on a database of images compressed with JPEG and JPEG2000.", "A MATLAB implementation of the proposed algorithm is available online at http://www.cns.nyu.edu//spl sim/lcv/ssim/." ]
[ 2, 1, 1, 4 ]
[ 0.40310001373291016, 0.40310001373291016, 0.7921000123023987, 0.4341000020503998 ]
train_0947
[ "The Recurrent Neural Network (RNN) is an extremely powerful sequence model that is often difficult to train.", "The Long Short-Term Memory (LSTM) is a specific RNN architecture whose design makes it much easier to train.", "While wildly successful in practice, the LSTM’s architecture appears to be ad-hoc so it is not clear if it is optimal, and the significance of its individual components is unclear.", "In this work, we aim to determine whether the LSTM architecture is optimal or whether much better architectures exist.", "We conducted a thorough architecture search where we evaluated over ten thousand different RNN architectures, and identified an architecture that outperforms both the LSTM and the recently-introduced Gated Recurrent Unit (GRU) on some but not all tasks.", "We found that adding a bias of 1 to the LSTM’s forget gate closes the gap between the LSTM and the GRU." ]
[ 0, 0, 0, 2, 1, 4 ]
[ 1, 1, 0.8205000162124634, 0.41029998660087585, 0.5896999835968018, 0.5896999835968018 ]
train_0948
[ "As the Internet becomes the critical information infrastructure for both personal and business applications, survivable routing protocols need to be designed that maintain the performance of those services in the presence of failures.", "This paper examines the survivability of interdoamin routing protocols in the presence of routing failure events, and provides a backup route aware routing protocol that performs non-stop routing in the presence of failures.", "We demonstrate through simulation its effectiveness in preventing packet losses during transient routing failures." ]
[ 0, 0, 4 ]
[ 0.8485000133514404, 0.3939000070095062, 0.6061000227928162 ]
train_0949
[ "We describe a graphical system for automatically generating multiple 2D diagrams of ligand-protein interactions from 3D coordinates.", "The diagrams portray the hydrogen-bond interaction patterns and hydrophobic contacts between the ligand(s) and the main-chain or side-chain elements of the protein.", "The system is able to plot, in the same orientation, related sets of ligand-protein interactions.", "This facilitates popular research tasks, such as analyzing a series of small molecules binding to the same protein target, a single ligand binding to homologous proteins, or the completely general case where both protein and ligand change." ]
[ 0, 1, 1, 1 ]
[ 0.5871999859809875, 0.7797999978065491, 0.7797999978065491, 0.44040000438690186 ]
train_0950
[ "Automated diagnosis of glaucoma disease has been studied for years.", "A great amount of research work in this field has been focused on the analysis of retinal fundus images to localize, detect and evaluate the optic disc.", "An open fundus image database with accurate gold standards of the optic nerve head has been implemented.", "A variability measurement by zones of the optic disc is also proposed.", "The relevance of this work is to provide accurate ONH segmentations and a segmentation assessment procedure to allow the design of computerized methods for glaucoma detection." ]
[ 0, 0, 1, 1, 4 ]
[ 1, 1, 0.5906999707221985, 0.41350001096725464, 0.3840000033378601 ]
train_0951
[ "This study examines the effect of five factors on the adoption of electronic commerce among small and medium enterprises in Brunei Darussalam.", "A review of the literature shows that owner characteristics such as lack of perceived relative advantage, lack of knowledge, and perceived lack of trust are significant inhibitors while environment characteristics such as competitive pressure and, government support are significant motivators of electronic commerce in Brunei Darussalam.", "A questionnaire survey was conducted in 360 small and medium enterprises.", "A total of 184 valid responses were obtained.", "Stratified random sampling was adopted over other techniques to enhance representativeness.", "Data analysis shows that significant relationship exists between each of the five variables and electronic commerce adoption among small and medium enterprises in Brunei Darussalam.", "This study concludes that the five factors explain more than fifty percent of the variation in small and medium enterprises adoption.", "Competitive pressure emerged as the most important factor in terms of relative importance.", "This factor is followed by IT knowledge, relative advantage, security and government support." ]
[ 0, 0, 1, 1, 1, 1, 1, 4, 4 ]
[ 0.6215999722480774, 0.6215999722480774, 0.5676000118255615, 0.7838000059127808, 0.6215999722480774, 0.40540000796318054, 0.5946000218391418, 0.7838000059127808, 0.6215999722480774 ]
train_0952
[ "Popcorn kernels are a natural, edible, and inexpensive material that has the potential to rapidly expand with high force upon application of heat.", "Although this transition is irreversible, it carries potential for several robotic applications.", "Here, we examine relevant characteristics of three types of kernels including expansion ratio, transition temperature, popping force, compression strength, and biodegradability.", "We test the viability of popping by hot oil, hot air, microwaves, and direct contact with heated Nichrome wire.", "As kernels can change from regular to (larger) irregular shapes, we examine the change in inter-granular friction and propose their use as granular fluids in jamming actuators, without the need for a vacuum pump.", "Furthermore, as a proof-of-concept, we also demonstrate the use of popcorn-driven actuation in soft, compliant, and rigid-link grippers.", "Serving as a first introduction of popcorn into robotics, we hope this paper will inspire novel mechanisms for multi-functional designs." ]
[ 0, 0, 1, 1, 1, 4, 4 ]
[ 1, 0.8234999775886536, 0.32350000739097595, 0.5587999820709229, 0.7940999865531921, 0.5881999731063843, 0.6176000237464905 ]
train_0953
[ "Clustering is an unsupervised technique of Data Mining.", "It means grouping similar objects together and separating the dissimilar ones.", "Each object in the data set is assigned a class label in the clustering process using a distance measure.", "This paper has captured the problems that are faced in real when clustering algorithms are implemented .It", "also considers the most extensively used tools which are readily available and support functions which ease the programming.", "Once algorithms have been implemented, they also need to be tested for its validity.", "There exist several validation indexes for testing the performance and accuracy which have also been discussed here." ]
[ 0, 0, 0, 2, 1, 1, 4 ]
[ 0.7949000000953674, 0.5896999835968018, 0.41029998660087585, 0.41029998660087585, 0.41029998660087585, 0.6154000163078308, 0.5896999835968018 ]
train_0954
[ "The recent increase in reported incidents of surveillance and security breaches compromising users' privacy call into question the current model, in which third-parties collect and control massive amounts of personal data.", "Bit coin has demonstrated in the financial space that trusted, auditable computing is possible using a decentralized network of peers accompanied by a public ledger.", "In this paper, we describe a decentralized personal data management system that ensures users own and control their data.", "We implement a protocol that turns a block chain into an automated access-control manager that does not require trust in a third party.", "Unlike Bit coin, transactions in our system are not strictly financial -- they are used to carry instructions, such as storing, querying and sharing data.", "Finally, we discuss possible future extensions to block chains that could harness them into a well-rounded solution for trusted computing problems in society." ]
[ 0, 0, 0, 1, 4, 4 ]
[ 0.8055999875068665, 0.8055999875068665, 0.41670000553131104, 0.583299994468689, 0.3889000117778778, 0.583299994468689 ]
train_0955
[ "There has been a flowering of scholarly interest in the literature review as a research method in the information systems discipline.", "We feel privileged to contribute to this conversation and introduce the work of the authors represented in this special issue.", "Some of the highlights include three new methods for conducting literature analysis and guidelines, tutorials, and approaches for coping with some of the challenges involved in carrying out a literature review.", "Of the three “new method” papers, one (ontological meta-analysis and synthesis) is entirely new, and two (stylized facts and critical discourse analysis) are novel in the information systems context.", "The other four paper address more general issues: the challenges of effective search strategies when confronted with the burgeoning volume of research available, a detailed tool-supported approach for conducting a rigorous review, a detailed tutorial for conducting a qualitative literature review, and a discussion of quality issues.", "Collectively, the papers place emphasis beyond the traditional “narrative synthesis” on the importance of selecting the appropriate approach for the research context and the importance of attention to quality and transparency at all stages of the process, regardless of which approach is adopted." ]
[ 0, 0, 0, 1, 1, 4 ]
[ 1, 0.800000011920929, 0.6000000238418579, 1, 0.800000011920929, 0.4000000059604645 ]
train_0956
[ "A genetic algorithm-based clustering technique, called GA-clustering, is proposed in this article.", "The searching capability of genetic algorithms is exploited in order to search for appropriate cluster centres in the feature space such that a similarity metric of the resulting clusters is optimized.", "The chromosomes, which are represented as strings of real numbers, encode the centres of a \"xed number of clusters.", "The superiority of the GA-clustering algorithm over the commonly used K-means algorithm is extensively demonstrated for four arti\"cial and three real-life data sets.", "( 2000 Pattern Recognition Society.", "Published by Elsevier Science Ltd.", "All rights reserved." ]
[ 0, 0, 0, 1, 1, 1, 4 ]
[ 0.6111000180244446, 0.8055999875068665, 0.6111000180244446, 0.8055999875068665, 0.41670000553131104, 0.41670000553131104, 0.41670000553131104 ]
train_0957
[ "This paper presents a large-scale system for the recognition and semantic disambiguation of named entities based on information extracted from a large encyclopedic collection and Web search results.", "It describes in detail the disambiguation paradigm employed and the information extraction process from Wikipedia.", "Through a process of maximizing the agreement between the contextual information extracted from Wikipedia and the context of a document, as well as the agreement among the category tags associated with the candidate entities, the implemented system shows high disambiguation accuracy on both news stories and Wikipedia articles." ]
[ 1, 1, 1 ]
[ 0.4000000059604645, 0.800000011920929, 1 ]
train_0958
[ "This paper introduces the Multi-Genre Natural Language Inference (MultiNLI) corpus, a dataset designed for use in the development and evaluation of machine learning models for sentence understanding.", "At 433k examples, this resource is one of the largest corpora available for natural language inference (a.k.a. recognizing textual entailment), improving upon available resources in both its coverage and difficulty.", "MultiNLI accomplishes this by offering data from ten distinct genres of written and spoken English, making it possible to evaluate systems on nearly the full complexity of the language, while supplying an explicit setting for evaluating cross-genre domain adaptation.", "In addition, an evaluation using existing machine learning models designed for the Stanford NLI corpus shows that it represents a substantially more difficult task than does that corpus, despite the two showing similar levels of inter-annotator agreement." ]
[ 0, 0, 1, 4 ]
[ 0.40310001373291016, 0.40310001373291016, 0.5968999862670898, 1 ]
train_0959
[ "In ATM cash replenishment banks want to use less resources (e.g., cash kept in ATMs, trucks for loading cash) for meeting fluctuated customer demands.", "Traditionally, forecasting procedures such as exponentially weighted moving average are applied to daily cash withdraws for individual ATMs.", "Then, the forecasted results are provided to optimization models for deciding the amount of cash and the trucking logistics schedules for replenishing cash to all ATMs.", "For some situations where individual ATM withdraws have so much variations (e.g., data collected from Istanbul ATMs) the traditional approaches do not work well.", "This article proposes grouping ATMs into nearby-location clusters and also optimizing the aggregates of daily cash withdraws (e.g., replenish every week instead of every day) in the forecasting process.", "Example studies show that this integrated forecasting and optimization procedure performs better for an objective in minimizing costs of replenishing cash, cash-interest charge and potential customer" ]
[ 0, 0, 0, 4, 2, 4 ]
[ 0.5881999731063843, 0.7646999955177307, 0.5881999731063843, 0.6765000224113464, 0.6176000237464905, 0.5881999731063843 ]
train_0960
[ "This paper gives a basic review and a summary of recent developments for leaky-wave antennas (LWAs).", "An LWA uses a guiding structure that supports wave propagation along the length of the structure, with the wave radiating or “leaking” continuously along the structure.", "Such antennas may be uniform, quasi-uniform, or periodic.", "After reviewing the basic physics and operating principles, a summary of some recent advances for these types of structures is given.", "Recent advances include structures that can scan to endfire, structures that can scan through broadside, structures that are conformal to surfaces, and structures that incorporate power recycling or include active elements.", "Some of these novel structures are inspired by recent advances in the metamaterials area." ]
[ 0, 0, 0, 1, 1, 1 ]
[ 0.5758000016212463, 0.7576000094413757, 0.7576000094413757, 0.3939000070095062, 0.5758000016212463, 0.42419999837875366 ]
train_0961
[ "Model checking is an automatic verification technique for hardware and software systems that are finite state or have finite state abstractions.", "It has been used successfully to verify computer hardware, and it is beginning to be used to verify computer software as well.", "As the number of state variables in the system increases, the size of the system state space grows exponentially.", "This is called the “state explosion problem”.", "Much of the research in model checking over the past 30 years has involved developing techniques for dealing with this problem.", "In these lecture notes, we will explain how the basic model checking algorithms work and describe some recent approaches to the state explosion problem, with an emphasis on Bounded Model Checking." ]
[ 0, 0, 0, 0, 0, 1 ]
[ 0.7949000000953674, 0.6154000163078308, 0.6154000163078308, 0.6154000163078308, 0.41029998660087585, 0.5896999835968018 ]
train_0962
[ "In this letter, we develop a gaussian process model for clustering.", "The variances of predictive values in gaussian processes learned from a training data are shown to comprise an estimate of the support of a probability density function.", "The constructed variance function is then applied to construct a set of contours that enclose the data points, which correspond to cluster boundaries.", "To perform clustering tasks of the data points, an associated dynamical system is built, and its topological invariant property is investigated.", "The experimental results show that the proposed method works successfully for clustering problems with arbitrary shapes." ]
[ 0, 1, 1, 1, 4 ]
[ 0.6000000238418579, 0.628600001335144, 0.771399974822998, 0.771399974822998, 0.771399974822998 ]
train_0963
[ "Distributed Denial of Service (DDoS) attacks grow rapidly and become one of the fatal threats to the Internet.", "Automatically detecting DDoS attack packets is one of the main defense mechanisms.", "Conventional solutions monitor network traffic and identify attack activities from legitimate network traffic based on statistical divergence.", "Machine learning is another method to improve identifying performance based on statistical features.", "However, conventional machine learning techniques are limited by the shallow representation models.", "In this paper, we propose a deep learning based DDoS attack detection approach (DeepDefense).", "Deep learning approach can automatically extract high-level features from low-level ones and gain powerful representation and inference.", "We design a recurrent deep neural network to learn patterns from sequences of network traffic and trace network attack activities.", "The experimental results demonstrate a better performance of our model compared with conventional machine learning models.", "We reduce the error rate from 7.517% to 2.103% compared with conventional machine learning method in the larger data set." ]
[ 0, 0, 0, 0, 1, 2, 1, 4, 4, 4 ]
[ 1, 0.833299994468689, 0.44440001249313354, 0.44440001249313354, 0.5555999875068665, 0.3889000117778778, 0.3889000117778778, 0.22220000624656677, 1, 0.6111000180244446 ]
train_0964
[ "The use of machine learning algorithms frequently involves careful tuning of learning parameters and model hyperparameters.", "Unfortunately, this tuning is often a “black art” requiring expert experience, rules of thumb, or sometimes bruteforce search.", "There is therefore great appeal for automatic approaches that can optimize the performance of any given learning algorithm to the problem at hand.", "In this work, we consider this problem through the framework of Bayesian optimization, in which a learning algorithm’s generalization performance is modeled as a sample from a Gaussian process (GP).", "We show that certain choices for the nature of the GP, such as the type of kernel and the treatment of its hyperparameters, can play a crucial role in obtaining a good optimizer that can achieve expertlevel performance.", "We describe new algorithms that take into account the variable cost (duration) of learning algorithm experiments and that can leverage the presence of multiple cores for parallel experimentation.", "We show that these proposed algorithms improve on previous automatic procedures and can reach or surpass human expert-level optimization for many algorithms including latent Dirichlet allocation, structured SVMs and convolutional neural networks." ]
[ 0, 0, 0, 2, 1, 4, 4 ]
[ 0.6061000227928162, 0.6061000227928162, 0.42419999837875366, 0.42419999837875366, 0.8181999921798706, 0.6061000227928162, 0.3635999858379364 ]
train_0965
[ "In this paper, we examine and compare De Morgan-, Kleene-, and Boolean-disjunctive and conjunctive normal forms and consider their role in fuzzy settings.", "In particular, we show that there are normal forms and truth tables for classical fuzzy propositional logic and interval-valued fuzzy propositional logic that are completely analogous to those for Boolean propositional logic.", "Thus, determining logical equivalence of two expressions in fuzzy propositional logic is a <nite problem, and similarly for the interval-valued case.", "Turksen’s work on interval-valued fuzzy sets is examined in light of these results.", "c © 2002 Elsevier B.V.", "All rights reserved." ]
[ 0, 0, 2, 4, 3, 3 ]
[ 0.6061000227928162, 0.6061000227928162, 0.42419999837875366, 0.3939000070095062, 0.8181999921798706, 0.8181999921798706 ]
train_0966
[ "We present a system that complements virtual reality experiences with passive props, yet still allows modifying the virtual world at runtime.", "The main contribution of our system is that it does not require any actuators; instead, our system employs the user to reconfigure and actuate otherwise passive props.", "We demonstrate a foldable prop that users reconfigure to represent a suitcase, fuse cabinet, railing, and a seat.", "A second prop, suspended from a long pendulum, not only stands in for inanimate objects, but also for objects that move and demonstrate proactive behavior, such as a group of flying droids that physically attack the user.", "Our approach conveys a sense of a living, animate world, when in reality the user is the only animate entity present in the system, complemented with only one or two physical props.", "In our study, participants rated their experience as more enjoyable and realistic than a corresponding no-haptics condition." ]
[ 0, 0, 4, 1, 1, 4 ]
[ 0.8108000159263611, 0.5946000218391418, 0.40540000796318054, 0.8108000159263611, 1, 0.7838000059127808 ]
train_0967
[ "The Internet of Things (IoT) paradigm comprises a heterogenous mix of connected devices connected to the Internet.", "This promises a a wealth of opportunity for a large collection of distributed applications and services.", "However, the IoT introduces significant changes to the Internet model, largely in the form of billions to trillions of embedded devices that most likely will not be able to be managed centrally by cloud services due to lack of scalability.", "We suggest that the natural direction for IoT devices is to manage themselves, both in terms of their software/hardware configuration and their resource utilization.", "In this work, we describe the underlying framework for self-managing devices, comprising measurement-based learning and adaptation to changing system context and application demands.", "In addition, we describe several upcoming research challenges in order to realize this self-management vision." ]
[ 0, 0, 0, 2, 1, 1 ]
[ 1, 1, 1, 0.39469999074935913, 0.6053000092506409, 0.6053000092506409 ]
train_0968
[ "The ability to perform pixel-wise semantic segmentation in real-time is of paramount importance in mobile applications.", "Recent deep neural networks aimed at this task have the disadvantage of requiring a large number of floating point operations and have long run-times that hinder their usability.", "In this paper, we propose a novel deep neural network architecture named ENet (efficient neural network), created specifically for tasks requiring low latency operation.", "ENet is up to 18× faster, requires 75× less FLOPs, has 79× less parameters, and provides similar or better accuracy to existing models.", "We have tested it on CamVid, Cityscapes and SUN datasets and report on comparisons with existing state-of-the-art methods, and the trade-offs between accuracy and processing time of a network.", "We present performance measurements of the proposed architecture on embedded systems and suggest possible software improvements that could make ENet even faster." ]
[ 0, 0, 1, 1, 4, 4 ]
[ 0.5896999835968018, 0.5896999835968018, 0.5896999835968018, 0.7949000000953674, 0.5896999835968018, 0.5896999835968018 ]
train_0969
[ "This paper presents the development of several models of a deep convolutional auto-encoder in the Caffe deep learning framework and their experimental evaluation on the example of MNIST dataset.", "We have created five models of a convolutional auto-encoder which differ architecturally by the presence or absence of pooling and unpooling layers in the auto-encoder’s encoder and decoder parts.", "Our results show that the developed models provide very good results in dimensionality reduction and unsupervised clustering tasks, and small classification errors when we used the learned internal code as an input of a supervised linear classifier and multi-layer perceptron.", "The best results were provided by a model where the encoder part contains convolutional and pooling layers, followed by an analogous decoder part with deconvolution and unpooling layers without the use of switch variables in the decoder part.", "The paper also discusses practical details of the creation of a deep convolutional auto-encoder in the very popular Caffe deep learning framework.", "We believe that our approach and results presented in this paper could help other researchers to build efficient deep neural network architectures in the future." ]
[ 2, 1, 1, 4, 4, 4 ]
[ 0.37139999866485596, 0.542900025844574, 0.6000000238418579, 1, 0.542900025844574, 1 ]
train_0970
[ "Data embedding is used in many machine learning applications to create low-dimensional feature representations, which preserves the structure of data points in their original space.", "In this paper, we examine the scenario of a heterogeneous network with nodes and content of various types.", "Such networks are notoriously difficult to mine because of the bewildering combination of heterogeneous contents and structures.", "The creation of a multidimensional embedding of such data opens the door to the use of a wide variety of off-the-shelf mining techniques for multidimensional data.", "Despite the importance of this problem, limited efforts have been made on embedding a network of scalable, dynamic and heterogeneous data.", "In such cases, both the content and linkage structure provide important cues for creating a unified feature representation of the underlying network.", "In this paper, we design a deep embedding algorithm for networked data.", "A highly nonlinear multi-layered embedding function is used to capture the complex interactions between the heterogeneous data in a network.", "Our goal is to create a multi-resolution deep embedding function, that reflects both the local and global network structures, and makes the resulting embedding useful for a variety of data mining tasks.", "In particular, we demonstrate that the rich content and linkage information in a heterogeneous network can be captured by such an approach, so that similarities among cross-modal data can be measured directly in a common embedding space." ]
[ 0, 0, 0, 0, 0, 0, 1, 1, 2, 4 ]
[ 1, 0.7778000235557556, 0.7778000235557556, 0.5555999875068665, 0.7778000235557556, 0.5555999875068665, 0.3889000117778778, 0.6111000180244446, 0.7778000235557556, 0.5555999875068665 ]
train_0971
[ "In this paper, a new type of 3D bin packing problem (BPP) is proposed, in which a number of cuboidshaped items must be put into a bin one by one orthogonally.", "The objective is to find a way to place these items that can minimize the surface area of the bin.", "This problem is based on the fact that there is no fixed-sized bin in many real business scenarios and the cost of a bin is proportional to its surface area.", "Our research shows that this problem is NP-hard.", "Based on previous research on 3D BPP, the surface area is determined by the sequence, spatial locations and orientations of items.", "Among these factors, the sequence of items plays a key role in minimizing the surface area.", "Inspired by recent achievements of deep reinforcement learning (DRL) techniques, especially Pointer Network, on combinatorial optimization problems such as TSP, a DRL-based method is applied to optimize the sequence of items to be packed into the bin.", "Numerical results show that the method proposed in this paper achieve about 5% improvement than heuristic method." ]
[ 0, 2, 1, 4, 4, 1, 4, 4 ]
[ 0.6111000180244446, 0.6111000180244446, 0.6111000180244446, 0.583299994468689, 0.3889000117778778, 0.3889000117778778, 0.6111000180244446, 1 ]
train_0972
[ "Two important classes of information systems, Workflow Management Systems (WfMSs) and Enterprise Resource Planning (ERP) systems, have been used to support e-business process redesign, integration, and management.", "While both technologies can help with business process automation, data transfer, and information sharing, the technological approach and features of solutions provided by WfMS and ERP are different.", "Currently, there is a lack of understanding of these two classes of information systems in the industry and academia, thus hindering their effective applications.", "In this paper, we present a comprehensive comparison between these two classes of systems.", "We discuss how the two types of systems can be used independently or together to develop intraand inter-organizational application solutions.", "In particular, we also explore the roles of WfMS and ERP in the next generation of IT architecture based on Web Services.", "Our findings should help businesses make better decisions in the adoption of both WfMS and ERP in their e-business strategies." ]
[ 1, 0, 0, 2, 2, 1, 4 ]
[ 0.5896999835968018, 0.7949000000953674, 0.7949000000953674, 0.6154000163078308, 0.5896999835968018, 0.5896999835968018, 0.41029998660087585 ]
train_0973
[ "The purpose of this study was to explore the impact of Digital storytelling (DST) on the academic achievement, critical thinking, and learning motivation of senior high school students learning English as a foreign language.", "The one-year study adopted a pretest and posttest quasi-experimental design involving 110 10th grade students in two English classes.", "The independent variable was information technology-integrated instruction (ITII) on two different levels – lecture-type ITII (comparison group) and DST (experimental group).", "Both quantitative and qualitative data were collected, including English achievement and critical thinking scores, questionnaire responses for learning motivation, as well as recordings of student and teacher interviews for evaluating the effectiveness of DST in learning.", "Descriptive analysis, analysis of covariance (ANCOVA), multivariate analysis of covariance (MANCOVA), and qualitative content analysis was used for evaluating the obtained data.", "Our findings indicate that DST participants performed significantly better than lecture-type ITII participants in terms of English achievement, critical thinking, and learning motivation.", "Interview results highlight the important educational value of DST, as both the instructor and students reported that DST increased students’ understanding of course content, willingness to explore, and ability to think critically, factors which are important in preparing students for an ever-changing 21st century.", "2012 Elsevier Ltd. All rights reserved." ]
[ 0, 1, 1, 1, 1, 1, 4, 3 ]
[ 0.7949000000953674, 0.41029998660087585, 0.41029998660087585, 0.6154000163078308, 0.41029998660087585, 0.41029998660087585, 1, 0.41029998660087585 ]
train_0974
[ "This work presents the use of click graphs in improving query intent classifiers, which are critical if vertical search and general-purpose search services are to be offered in a unified user interface.", "Previous works on query classification have primarily focused on improving feature representation of queries, e.g., by augmenting queries with search engine results.", "In this work, we investigate a completely orthogonal approach --- instead of enriching feature representation, we aim at drastically increasing the amounts of training data by semi-supervised learning with click graphs.", "Specifically, we infer class memberships of unlabeled queries from those of labeled ones according to their proximities in a click graph.", "Moreover, we regularize the learning with click graphs by content-based classification to avoid propagating erroneous labels.", "We demonstrate the effectiveness of our algorithms in two different applications, product intent and job intent classification.", "In both cases, we expand the training data with automatically labeled queries by over two orders of magnitude, leading to significant improvements in classification performance.", "An additional finding is that with a large amount of training data obtained in this fashion, classifiers using only query words/phrases as features can work remarkably well." ]
[ 2, 2, 2, 1, 1, 4, 4, 4 ]
[ 0.39469999074935913, 0.6053000092506409, 0.421099990606308, 0.5788999795913696, 0.7894999980926514, 0.421099990606308, 0.421099990606308, 0.5788999795913696 ]
train_0975
[ "We present a fractal technique for addressing geometric analogy problems from the Raven's Standard Progressive Matrices test of general intelligence.", "In this method, an image is represented fractally, capturing its inherent selfsimilarity.", "We apply these fractal representations to problems from the Raven's test, and show how these representations afford a new method for solving complex geometric analogy problems.", "We present results using the fractal algorithm on all 60 problems from the Standard Progressive Matrices version of the Raven's test." ]
[ 0, 0, 1, 1 ]
[ 0.567300021648407, 0.567300021648407, 0.6345999836921692, 0.625 ]
train_0976
[ "A broad range of well-structured problems--embracing forms of diagnosis, catalog selection, and skeletal planning--are solved in 'expert systems\" by the methods of heuristic classification.", "These programs have a characteristic inference structure that systematically relates data to a pre-enumerated set of solutions by abstraction, heuristic association, and refinement.", "In contrast with previous descriptions of classification reasoning, particularly in psychology, this analysis emphasizes the role of a heuristic in routine problem solving as a non-hierarchical, direct association between concepts.", "In contrast with other descriptions of expert systems, this analysis specifies the knowledge needed to solve a problem, independent of its representation in a particular computer language.", "The heuristic classification problem-solving model provides a useful framework for characterizing kinds of problems, for designing representation tools, and for understanding non-classification (constructive) problem-solving methods.", "To understand something as a specific instance of a more general case--which is what understanding a more fundamental principle or structure means-i s to have learned not only a specific thing but also a model for understanding other things like it that one may encounter.", "[13]" ]
[ 1, 0, 2, 4, 4, 4, 3 ]
[ 0.41670000553131104, 0.3889000117778778, 0.5555999875068665, 0.44440001249313354, 0.22220000624656677, 0.3889000117778778, 0.6388999819755554 ]
train_0977
[ "The next generation of music recommendation systems will be increasingly intelligent and likely take into account user behavior for more personalized recommendations.", "In this work we consider user behavior when making recommendations with features extracted from a user’s history of listening events.", "We investigate the impact of listener’s behavior by considering features such as play counts, “mainstreaminess”, and diversity in music taste on the performance of various music recommendation approaches.", "The underlying dataset has been collected by crawling social media (specifically Twitter) for listening events.", "Each user’s listening behavior is characterized into a three dimensional feature space consisting of play count, “mainstreaminess” (i.e. the degree to which the observed user listens to currently popular artists), and diversity (i.e. the diversity of genres the observed user listens to).", "Drawing subsets of the 28,000 users in our dataset, according to these three dimensions, we evaluate whether these dimensions influence figures of merit of various music recommendation approaches, in particular, collaborative filtering (CF) and CF enhanced by cultural information such as users located in the same city or country." ]
[ 0, 2, 1, 4, 1, 4 ]
[ 0.6000000238418579, 0.4000000059604645, 0.800000011920929, 0.800000011920929, 0.6000000238418579, 0.6000000238418579 ]
train_0978
[ "For Artificial Neural Networks (ANN) to become more widely used in power systems and the future smart grids, ANN based algorithms must be capable of scaling up as they try to identify and control larger and larger parts of a power system.", "This paper goes through the process of scaling up an ANN based identifier as it is driven to identify increasingly larger portions of a power system.", "Distributed and centralized approaches for scaling up are taken and the pros and cons of each are presented.", "The New England/New York 68-bus power network is used as the test bed for the studies.", "It is shown that while a fully-connected (centralized) ANNs is capable of identification of the system with appropriate accuracy, the increase in the training times required to obtain an acceptable set of weights becomes prohibitive as the system size is increased." ]
[ 0, 2, 1, 1, 4 ]
[ 0.8055999875068665, 0.833299994468689, 0.6111000180244446, 0.41670000553131104, 0.6388999819755554 ]
train_0979
[ "Merchants selling products on the Web often ask their customers to review the products that they have purchased and the associated services.", "As e-commerce is becoming more and more popular, the number of customer reviews that a product receives grows rapidly.", "For a popular product, the number of reviews can be in hundreds or even thousands.", "This makes it difficult for a potential customer to read them to make an informed decision on whether to purchase the product.", "It also makes it difficult for the manufacturer of the product to keep track and to manage customer opinions.", "For the manufacturer, there are additional difficulties because many merchant sites may sell the same product and the manufacturer normally produces many kinds of products.", "In this research, we aim to mine and to summarize all the customer reviews of a product.", "This summarization task is different from traditional text summarization because we only mine the features of the product on which the customers have expressed their opinions and whether the opinions are positive or negative.", "We do not summarize the reviews by selecting a subset or rewrite some of the original sentences from the reviews to capture the main points as in the classic text summarization.", "Our task is performed in three steps: (1) mining product features that have been commented on by customers; (2) identifying opinion sentences in each review and deciding whether each opinion sentence is positive or negative; (3) summarizing the results." ]
[ 0, 0, 0, 0, 0, 0, 2, 2, 1, 1 ]
[ 1, 1, 0.8108000159263611, 1, 1, 1, 0.8108000159263611, 0.40540000796318054, 0.3783999979496002, 0.8108000159263611 ]
train_0980
[ "Hate speech in the form of racist and sexist remarks are a common occurrence on social media.", "For that reason, many social media services address the problem of identifying hate speech, but the definition of hate speech varies markedly and is largely a manual effort (BBC, 2015; Lomas, 2015).", "We provide a list of criteria founded in critical race theory, and use them to annotate a publicly available corpus of more than 16k tweets.", "We analyze the impact of various extra-linguistic features in conjunction with character n-grams for hatespeech detection.", "We also present a dictionary based the most indicative words in our data." ]
[ 0, 2, 2, 4, 4 ]
[ 0.7949000000953674, 0.5896999835968018, 0.6154000163078308, 0.5896999835968018, 0.5896999835968018 ]
train_0981
[ "This article presents results from a Delphi study on the future impact of Enterprise Resource Planning (ERP) systems on Supply Chain Management (SCM).", "The Delphi study was conducted with 23 Dutch supply chain executives of European multinationals.", "Findings from this exploratory study were threefold.", "First, our executives have identified the following key SCM issues for the coming years: (1) further integration of activities between suppliers and customers across the entire supply chain; (2) on-going changes in supply chain needs and required flexibility from IT; (3) more mass customization of products and services leading to increasing assortments while decreasing cycle times and inventories; (4) the locus of the driver’s seat of the entire supply chain and (5) supply chains consisting of several independent enterprises.", "The second main finding is that the panel experts saw only a modest role for ERP in improving future supply chain effectiveness and a clear risk of ERP actually limiting progress in supply chain management.", "ERP was seen as offering a positive contribution to only four of the top 12 future supply chain issues: (1) more customization of products and services; (2) more standardized processes and information; (3) the need for worldwide IT systems; and (4) greater transparency of the marketplace.", "Implications for subsequent research and management practice are discussed.", "The following key limitations of current ERP systems in providing effective SCM support emerge as the third finding from this exploratory study: (1) their insufficient extended enterprise functionality in crossing organizational boundaries; (2) their inflexibility to ever-changing supply chain needs, (3) their lack of functionality beyond managing transactions, and (4) their closed and non-modular system architecture.", "These limitations stem from the fact that the first generation of ERP products has been designed to integrate the various operations of an individual firm.", "In modern supply chain management, however, the unit of analysis has become a network of organizations, rendering these ERP products inadequate in the new economy." ]
[ 0, 0, 4, 4, 4, 1, 0, 4, 0, 0 ]
[ 0.8108000159263611, 0.5946000218391418, 0.8108000159263611, 0.40540000796318054, 0.5946000218391418, 0.40540000796318054, 0.40540000796318054, 0.40540000796318054, 0.8108000159263611, 0.6215999722480774 ]
train_0982
[ "Since the rst shape-from-shading (SFS) technique was developed by Horn in the early 1970s, many di erent approaches have emerged.", "In this paper, six well-known SFS algorithms are implemented and compared.", "The performance of the algorithms was analyzed on synthetic images using mean and standard deviation of depth (Z) error, mean of surface gradient (p, q) error and CPU timing.", "Each algorithm works well for certain images, but performs poorly for others.", "In general, minimization approaches are more robust, while the other approaches are faster.", "The implementation of these algorithms in C, and images used in this paper, are available by anonymous ftp under the pub=tech paper=survey directory at eustis:cs:ucf:edu (132.170.108.42).", "These are also part of the electronic version of paper." ]
[ 0, 2, 1, 1, 4, 4, 4 ]
[ 1, 0.4323999881744385, 0.5946000218391418, 0.4323999881744385, 0.7838000059127808, 1, 0.6215999722480774 ]
train_0983
[ "0957-4174/$ see front matter 2011 Elsevier Ltd. A doi:10.1016/j.eswa.2011.09.058 ⇑ Tel.", ": +1 905 606 1175; fax: +1 905 286 4756.", "E-mail address: leo.guelman@rbc.com Gradient Boosting (GB) is an iterative algorithm that combines simple parameterized functions with ‘‘poor’’ performance (high prediction error) to produce a highly accurate prediction rule.", "In contrast to other statistical learning methods usually providing comparable accuracy (e.g., neural networks and support vector machines), GB gives interpretable results, while requiring little data preprocessing and tuning of the parameters.", "The method is highly robust to less than clean data and can be applied to classification or regression problems from a variety of response distributions (Gaussian, Bernoulli, Poisson, and Laplace).", "Complex interactions are modeled simply, missing values in the predictors are managed almost without loss of information, and feature selection is performed as an integral part of the procedure.", "These properties make GB a good candidate for insurance loss cost modeling.", "However, to the best of our knowledge, the application of this method to insurance pricing has not been fully documented to date.", "This paper presents the theory of GB and its application to the problem of predicting auto ‘‘at-fault’’ accident loss cost using data from a major Canadian insurer.", "The predictive accuracy of the model is compared against the conventional Generalized Linear Model (GLM) approach." ]
[ 0, 3, 0, 0, 3, 2, 3, 1, 1, 4 ]
[ 0.6330000162124634, 0.44040000438690186, 0.41280001401901245, 0.41280001401901245, 0.2824000120162964, 0.44040000438690186, 0.367000013589859, 0.41280001401901245, 0.41280001401901245, 0.41280001401901245 ]
train_0984
[ "Over one billion people live in the world’s 200,000 slums and informal settlements.", "We used data generated from mobile phones to better understand one of the largest slums, Kibera located in Nairobi, Kenya.", "Using call logs from June 2008 June 2009 and theories from human geography, economics, sociology, journalists, and anthropologists as a basis, we tested the validity of a few prominent theories.", "In particular, we focused our research on migration patterns out of Kibera, inferring places of work, and tribal affiliations." ]
[ 0, 4, 1, 4 ]
[ 0.6129000186920166, 0.3871000111103058, 0.6129000186920166, 0.6129000186920166 ]
train_0985
[ "Graph is an important data representation which appears in a wide diversity of real-world scenarios.", "Effective graph analytics provides users a deeper understanding of what is behind the data, and thus can benefit a lot of useful applications such as node classification, node recommendation, link prediction, etc.", "However, most graph analytics methods suffer the high computation and space cost.", "Graph embedding is an effective yet efficient way to solve the graph analytics problem.", "It converts the graph data into a low dimensional space in which the graph structural information and graph properties are maximumly preserved.", "In this survey, we conduct a comprehensive review of the literature in graph embedding.", "We first introduce the formal definition of graph embedding as well as the related concepts.", "After that, we propose two taxonomies of graph embedding which correspond to what challenges exist in different graph embedding problem settings and how the existing work addresses these challenges in their solutions.", "Finally, we summarize the applications that graph embedding enables and suggest four promising future research directions in terms of computation efficiency, problem settings, techniques, and application scenarios." ]
[ 0, 0, 0, 0, 1, 4, 4, 1, 4 ]
[ 0.8055999875068665, 0.6111000180244446, 0.6111000180244446, 0.41670000553131104, 0.41670000553131104, 0.3889000117778778, 0.6111000180244446, 0.41670000553131104, 0.583299994468689 ]
train_0986
[ "An Automated Teller Machine (ATM) is a safety-critical and real-time system that is highly complicated in design and implementation.", "This paper presents the formal design, specification, and modeling of the ATM system using a denotational mathematics known as Real-Time Process Algebra (RTPA).", "The conceptual model of the ATM system is introduced as the initial requirements for the system.", "The architectural model of the ATM system is created using RTPA architectural modeling methodologies and refined by a set of Unified Data Models (UDMs), which share a generic mathematical model of tuples.", "The static behaviors of the ATM system are specified and refined by a set of Unified Process Models (UPMs) for the ATM transition processing and system supporting processes.", "The dynamic behaviors of the ATM system are specified and refined by process priority allocation, process deployment, and process dispatch models.", "Based on the formal design models of the ATM system, code can be automatically generated using the RTPA Code Generator (RTPA-CG), or be seamlessly transformed into programs by programmers.", "The formal models of ATM may not only serve as a formal design paradigm of realtime software systems, but also a test bench for the expressive power and modeling capability of exiting formal methods in software engineering." ]
[ 0, 2, 1, 1, 1, 4, 1, 1 ]
[ 0.7838000059127808, 0.4323999881744385, 0.5676000118255615, 0.5946000218391418, 0.3783999979496002, 0.7838000059127808, 0.3783999979496002, 0.40540000796318054 ]
train_0987
[ "Data warehousing systems enable enterprise managers to acquire and integrate information from heterogeneous sources and to query very large databases efficiently.", "Building a data warehouse requires adopting design and implementation techniques completely different from those underlying information systems.", "In this paper we present a graphical conceptual model for data warehouses, called Dimensional Fact model, and propose a semi-automated methodology to build it from the pre-existing Entity/Relationship schemes describing a database.", "Our conceptual model consists of tree-structured fact schemes whose basic elements are facts, attributes, dimensions and hierarchies; other features which may be represented on fact schemes are the additivity of fact attributes along dimensions, the optionality of dimension attributes and the existence of non-dimension attributes.", "Compatible fact schemes may be overlapped in order to relate and compare data.", "Fact schemes may be integrated with information of the conjectured workload, expressed in terms of query patterns, to be used as the input of a design phase whose output are the logical and physical schemes of the data warehouse." ]
[ 0, 0, 0, 1, 1, 4 ]
[ 0.6215999722480774, 0.4323999881744385, 0.40540000796318054, 0.5946000218391418, 0.4323999881744385, 0.4323999881744385 ]
train_0988
[ "A variety of simple graphical filters are available to camera phone users to enhance their photos on the fly; these filters often stylize, saturate or age a photo.", "In this paper, we present a combination of large-scale data analysis and small scale in-depth interviews to understand filter-work.", "We look at producers’ practices of photo filtering and gain insights in the roles filters play in engaging photo consumers’ by driving their social interactions.", "We first interviewed 15 Flickr mobile app users (photo producers) to understand their use and perception of filters.", "Next, we analyzed how filters affect a photo’s engagement (consumers’ perspective) using a corpus of 7.6 million Flickr photos.", "We find two groups of serious and casual photographers among filter users.", "The serious see filters as correction tools and prefer milder effects.", "Casual photographers, by contrast, use filters to significantly transform their photos with bolder effects.", "We also find that filtered photos are 21% more likely to be viewed and 45% more likely to be commented on by consumers of photographs.", "Specifically, filters that increase warmth, exposure and contrast boost engagement the most." ]
[ 0, 0, 2, 1, 1, 1, 4, 4, 4, 4 ]
[ 1, 0.41029998660087585, 0.41029998660087585, 0.7949000000953674, 0.6154000163078308, 0.6154000163078308, 0.5896999835968018, 0.7949000000953674, 0.5896999835968018, 0.5896999835968018 ]
train_0989
[ "This paper proposes a person tracking framework using a scanning low-resolution thermal infrared (IR) sensor colocated with a wide-angle RGB camera.", "The low temporal and spatial resolution of the low-cost IR sensor make it unable to track moving people and prone to false detections of stationary people.", "Thus, IR-only tracking using only this sensor would be quite problematic.", "We demonstrate that despite the limited capabilities of this low-cost IR sensor, it can be used effectively to correct the errors of a real-time RGB camera-based tracker.", "We align the signals from the two sensors both spatially (by computing a pixel-to-pixel geometric correspondence between the two modalities) and temporally (by modeling the temporal dynamics of the scanning IR sensor), which enables multi-modal improvements based on judicious application of elementary reasoning.", "Our combined RGB+IR system improves upon the RGB camera-only tracking by: rejecting false positives, improving segmentation of tracked objects, and correcting false negatives (starting new tracks for people that were missed by the camera-only tracker).", "Since we combine RGB and thermal information at the level of RGB camera-based tracks, our method is not limited to the particular camera-based tracker that we used in our experiments.", "Our method could improve the results of any tracker that uses RGB camera input alone.", "We collect a new dataset and demonstrate the superiority of our method over RGB camera-only tracking." ]
[ 2, 1, 1, 1, 1, 1, 1, 1, 4 ]
[ 0.41029998660087585, 0.41029998660087585, 0.41029998660087585, 0.5896999835968018, 0.7949000000953674, 0.6154000163078308, 0.8205000162124634, 0.5896999835968018, 0.6154000163078308 ]
train_0990
[ "The debate about online privacy gives testimony of Web users’ concerns.", "Privacy concerns make consumers adopt data protection features, guide their appreciation for existing features, and can steer their consumption choices amongst competing businesses.", "However, approaches to measure privacy concern are fragmented and often ad-hoc, at the detriment of reliable results.", "The need for measurement instruments for privacy concern is twofold.", "First, attitudes and opinions about data protection cannot be established and compared without reliable mechanisms.", "Second, behavioural studies, notably in technology acceptance and the behavioural economics of privacy require measures for concern as a moderating factor.", "In its first part, this paper provides a comprehensive review of existing survey instruments for measuring privacy concerns.", "The second part focuses on revealed preferences that can be used for opportunistically measuring privacy concerns in the wild or for scale validation.", "Recommendations for scale selection and reuse are provided." ]
[ 0, 0, 0, 0, 1, 1, 4, 4, 4 ]
[ 1, 0.8055999875068665, 0.41670000553131104, 0.41670000553131104, 0.6111000180244446, 0.41670000553131104, 0.6111000180244446, 0.41670000553131104, 0.3889000117778778 ]
train_0991
[ "Most word embedding models typically represent each word using a single vector, which makes these models indiscriminative for ubiquitous homonymy and polysemy.", "In order to enhance discriminativeness, we employ latent topic models to assign topics for each word in the text corpus, and learn topical word embeddings (TWE) based on both words and their topics.", "In this way, contextual word embeddings can be flexibly obtained to measure contextual word similarity.", "We can also build document representations, which are more expressive than some widely-used document models such as latent topic models.", "In the experiments, we evaluate the TWE models on two tasks, contextual word similarity and text classification.", "The experimental results show that our models outperform typical word embedding models including the multi-prototype version on contextual word similarity, and also exceed latent topic models and other representative document models on text classification.", "The source code of this paper can be obtained from https://github.com/largelymfs/ topical word embeddings." ]
[ 0, 2, 1, 1, 1, 4, 4 ]
[ 0.800000011920929, 0.6000000238418579, 0.800000011920929, 0.6000000238418579, 0.6000000238418579, 0.800000011920929, 0.4000000059604645 ]
train_0992
[ "The article addresses the well-known Capacitated Vehicle Routing Problem (CVRP), in the special case where the demand of a customer consists of a certain number of two-dimensional weighted items.", "The problem calls for the minimization of the cost of transportation needed for the delivery of the goods demanded by the customers, and carried out by a fleet of vehicles based at a central depot.", "In order to accommodate all items on the vehicles, a feasibility check of the two-dimensional packing (2L) must be executed on each vehicle.", "The overall problem, denoted as 2L-CVRP, is NP-hard and particularly difficult to solve in practice.", "We propose a Tabu Search algorithm, in which the loading component of the problem is solved through heuristics, lower bounds and a truncated branch-and-bound procedure.", "The effectiveness of the algorithm is demonstrated through extensive computational experiments." ]
[ 0, 0, 0, 1, 1, 4 ]
[ 0.5896999835968018, 0.7949000000953674, 0.41029998660087585, 0.41029998660087585, 0.8205000162124634, 0.6154000163078308 ]
train_0993
[ "Currently there are many practical tools or theoretical methods to plan and dimension GSM or UMTS radio networks but overlooks the algorithms for core networks because of its complexity.", "This paper introduces an algorithm for traffic and throughput dimensioning for Nb, Mc and Nc interfaces in UMTS core network.", "The analysis is based on the traffic and throughput generated or absorbed in the interfaces of network entities in UMTS network.", "This paper is targeted at helping wireless carriers plan and dimensioning their UMTS core networks." ]
[ 0, 2, 1, 2 ]
[ 0.6111000180244446, 0.6111000180244446, 0.583299994468689, 0.41670000553131104 ]
train_0994
[ "We present a library that provides optimized implementations for deep learning primitives.", "Deep learning workloads are computationally intensive, and optimizing the kernels of deep learning workloads is difficult and time-consuming.", "As parallel architectures evolve, kernels must be reoptimized for new processors, which makes maintaining codebases difficult over time.", "Similar issues have long been addressed in the HPC community by libraries such as the Basic Linear Algebra Subroutines (BLAS) [2].", "However, there is no analogous library for deep learning.", "Without such a library, researchers implementing deep learning workloads on parallel processors must create and optimize their own implementations of the main computational kernels, and this work must be repeated as new parallel processors emerge.", "To address this problem, we have created a library similar in intent to BLAS, with optimized routines for deep learning workloads.", "Our implementation contains routines for GPUs, and similarly to the BLAS library, could be implemented for other platforms.", "The library is easy to integrate into existing frameworks, and provides optimized performance and memory usage.", "For example, integrating cuDNN into Caffe, a popular framework for convolutional networks, improves performance by 36% on a standard model while also reducing memory consumption." ]
[ 0, 0, 0, 0, 3, 0, 2, 1, 1, 4 ]
[ 0.8158000111579895, 0.7894999980926514, 1, 0.6053000092506409, 0.39469999074935913, 0.421099990606308, 0.39469999074935913, 0.6053000092506409, 0.6053000092506409, 0.421099990606308 ]
train_0995
[ "Market basket analysis (also known as association-rule mining) is a useful method of discovering customer purchasing patterns by extracting associations or co-occurrences from stores’ transactional databases.", "Because the information obtained from the analysis can be used in forming marketing, sales, service, and operation strategies, it has drawn increased research interest.", "The existing methods, however, may fail to discover important purchasing patterns in a multi-store environment, because of an implicit assumption that products under consideration are on shelf all the time across all stores.", "In this paper, we propose a new method to overcome this weakness.", "Our empirical evaluation shows that the proposed method is computationally efficient, and that it has advantage over the traditional method when stores are diverse in size, product mix changes rapidly over time, and larger numbers of stores and periods are considered.", "D 2004 Elsevier B.V. All rights reserved." ]
[ 0, 0, 0, 1, 4, 3 ]
[ 1, 1, 0.3939000070095062, 0.6061000227928162, 0.6363999843597412, 0.5758000016212463 ]
train_0996
[ "OBJECTIVES To provide an overview and tutorial of natural language processing (NLP) and modern NLP-system design.", "TARGET AUDIENCE", "This tutorial targets the medical informatics generalist who has limited acquaintance with the principles behind NLP and/or limited knowledge of the current state of the art.", "SCOPE We describe the historical evolution of NLP, and summarize common NLP sub-problems in this extensive field.", "We then provide a synopsis of selected highlights of medical NLP efforts.", "After providing a brief description of common machine-learning approaches that are being used for diverse NLP sub-problems, we discuss how modern NLP architectures are designed, with a summary of the Apache Foundation's Unstructured Information Management Architecture.", "We finally consider possible future directions for NLP, and reflect on the possible impact of IBM Watson on the medical field." ]
[ 2, 2, 1, 1, 1, 4, 4 ]
[ 1, 0.5896999835968018, 0.41029998660087585, 0.7949000000953674, 0.3846000134944916, 0.41029998660087585, 1 ]
train_0997
[ "Convolutional neural networks (CNNs) have been applied to visual tasks since the late 1980s.", "However, despite a few scattered applications, they were dormant until the mid-2000s when developments in computing power and the advent of large amounts of labeled data, supplemented by improved algorithms, contributed to their advancement and brought them to the forefront of a neural network renaissance that has seen rapid progression since 2012.", "In this review, which focuses on the application of CNNs to image classification tasks, we cover their development, from their predecessors up to recent state-of-the-art deep learning systems.", "Along the way, we analyze (1) their early successes, (2) their role in the deep learning renaissance, (3) selected symbolic works that have contributed to their recent popularity, and (4) several improvement attempts by reviewing contributions and challenges of over 300 publications.", "We also introduce some of their current trends and remaining challenges." ]
[ 0, 0, 2, 1, 1 ]
[ 0.7838000059127808, 0.7838000059127808, 0.4323999881744385, 0.8108000159263611, 0.5946000218391418 ]
train_0998
[ "Deep learning has allowed a paradigm shift in pattern recognition, from using hand-crafted features together with statistical classifiers to using general-purpose learning procedures for learning data-driven representations, features, and classifiers together.", "The application of this new paradigm has been particularly successful in computer vision, in which the development of deep learning methods for vision applications has become a hot research topic.", "Given that deep learning has already attracted the attention of the robot vision community, the main purpose of this survey is to address the use of deep learning in robot vision.", "To achieve this, a comprehensive overview of deep learning and its usage in computer vision is given, that includes a description of the most frequently used neural models and their main application areas.", "Then, the standard methodology and tools used for designing deep-learning based vision systems are presented.", "Afterwards, a review of the principal work using deep learning in robot vision is presented, as well as current and future trends related to the use of deep learning in robotics.", "This survey is intended to be a guide for the developers of robot vision systems." ]
[ 0, 1, 2, 1, 1, 1, 4 ]
[ 0.8181999921798706, 0.42419999837875366, 0.7576000094413757, 1, 1, 0.7878999710083008, 0.6061000227928162 ]
train_0999
[ "The grocery industry evolved from mom-and-pop stores to mega-markets to online grocery buying, with many different forms along the way.", "The global market for groceries in 2000 is over $2 trillion.", "The online grocery segment of the market is expected to reach $34 billion by 2002, a thirty-three fold increase from 1998.", "This tutorial examines the issues surrounding online groceries and looks closely at fourteen examples from the Americas, Europe, and Australia.", "The online market is currently one of growth, not profits.", "Two key components of profitability for online vendors are the ability to generate sufficient volume, while keeping delivery costs low.", "The Internet also impacts business-tobusiness relations among grocers.", "This tutorial describes key online grocery firms including Peapod, NetGrocer, Streamline, WebVan, Ruok@Net, Albert Heijn, Disco, Ykköshalli, Shoplink, Coles and Woolworths.", "Each of these companies represents different business models, with differing organizational structure and scope of operations.", "Each has its own set of strengths and" ]
[ 0, 0, 0, 1, 1, 4, 4, 4, 4, 4 ]
[ 0.8158000111579895, 0.6053000092506409, 0.6053000092506409, 0.39469999074935913, 0.631600022315979, 0.421099990606308, 0.39469999074935913, 0.421099990606308, 0.421099990606308, 0.421099990606308 ]