doc_id
stringlengths
40
40
corpus_id
uint64
32
252M
title
stringlengths
8
300
abstract
stringlengths
1
10k
authors
sequence
cited_by
sequence
references
sequence
year
int32
1.94k
2.02k
0003aa77bdefc1c75f9d2ba732635c132fc0c863
1,417,926
Pelvic Girdle Pain during or after Pregnancy: a review of recent evidence and a clinical care path proposal
PROBLEM STATEMENT Pelvic girdle pain (PGP) is a common condition during or after pregnancy with pain and disability as most important symptoms. These symptoms have a wide range of clinical presentation. Most doctors perceive pregnancy related pelvic girdle pain (PPGP) as 'physiologic' or 'expected during pregnancy', where no treatment is needed. As such women with PPGP mostly experience little recognition. However, many scientific literature describes PPGP as being severe with considerable levels of pain and disability and socio-economic consequences in about 20% of the cases. OBJECTIVES We aimed to (1) inform the gynecologist/obstetrician about the etiology, diagnosis, risk factors, and treatment options of PPGP and (2) to make a proposition for an adequate clinical care path. METHODS A systematic search of electronic databases and a check of reference lists for recent researches about the diagnosis, etiology, risk factors and treatment of PPGP. RESULTS Adequate treatment is based on classification in subgroups according to the different etiologic factors. The various diagnostic tests can help to make a differentiation in the several pelvic girdle pain syndromes and possibly reveal the underlying biomechanical problem. This classification can guide appropriate multidimensional and multidisciplinary management. A proposal for a clinical care path starts with recognition of gynecologist and midwife for this disorder. Both care takers can make a preliminary diagnosis of PPGP and should refer to a physiatrist, who can make a definite diagnosis. Together with a physiotherapist, the latter can determine an individual tailored exercise program based on the influencing bio-psycho-social factors.
[ "40572137", "3675075", "48815127" ]
[]
[ "420604a2d0161cd5b5d2df75dd6252f224c8b055", "e78149afc38dac0f78bad1b8020f24cf08dcb5f7", "b613facdfc71d82c1a78b5b652b239aed9be42ff", "c9c4cb05b9e69907544c59c7fe431860195c9f1c", "5b5a6f447e000fe70eadc505a746a9b2b396a401", "6e70287fc5b78938a78abaae9e4f3c7f7b343560", "ee1bd624aa3df264a5b71f81528f8fe64d05471d", "0137dcff4d46e31f4bdcf1ce1a0ee2ba1f80abff", "58d712de2f8ed57ebd4697eb49c341c1fc113287", "5620994a1e6420d9119002a26e5792f6043b87f4" ]
2,013
0007181efc556fd1fcda2642e9bd85dd0f0c32d6
207,574,370
Packet Classification Using Tuple Space Search
Routers must perform packet classification at high speeds to efficiently implement functions such as firewalls and QoS routing. Packet classification requires matching each packet against a database of filters (or rules), and forwarding the packet according to the highest priority filter. Existing filter schemes with fast lookup time do not scale to large filter databases. Other more scalable schemes work for 2-dimensional filters, but their lookup times degrade quickly with each additional dimension. While there exist good hardware solutions, our new schemes are geared towards software implementation.We introduce a generic packet classification algorithm, called Tuple Space Search (TSS). Because real databases typically use only a small number of distinct field lengths, by mapping filters to tuples even a simple linear search of the tuple space can provide significant speedup over naive linear search over the filters. Each tuple is maintained as a hash table that can be searched in one memory access. We then introduce techniques for further refining the search of the tuple space, and demonstrate their effectiveness on some firewall databases. For example, a real database of 278 filters had a tuple space of 41 which our algorithm prunes to 11 tuples. Even as we increased the filter database size from 1K to 100K (using a random two-dimensional filter generation model), the number of tuples grew from 53 to only 186, and the pruned tuples only grew from 1 to 4. Our Pruned Tuple Space search is also the only scheme known to us that allows fast updates and fast search times. We also show a lower bound on the general tuple space search problem, and describe an optimal algorithm, called Rectangle Search, for two-dimensional filters.
[ "23633340", "1688025", "1746289" ]
[]
[ "0e541308cc7c5ce8574bab03c090b6a0c5c6355b", "1a182552903238035425bb3546359d148d56dace", "7f1176c89d04ac537d9bc8021b5bcc00883d16d8", "d41a7565694c3c3bb566531acb787fcdf4824a2c", "e0f6779e71f8c2d1415c63191587f2c03c51cc5a", "16e30f35191bdae1514a1cc82ea9653830befd45", "130837dd07ee272cd390280cd43178591f45b5a0", "0ab7f239a4784492779437ac54ae0917b5dd6730" ]
1,999
000c009765a276d166fc67595e107a9bc44f230d
206,797,074
Bayesian Compressive Sensing
The data of interest are assumed to be represented as N-dimensional real vectors, and these vectors are compressible in some linear basis B, implying that the signal can be reconstructed accurately using only a small number M Lt N of basis-function coefficients associated with B. Compressive sensing is a framework whereby one does not measure one of the aforementioned N-dimensional signals directly, but rather a set of related measurements, with the new measurements a linear combination of the original underlying N-dimensional signal. The number of required compressive-sensing measurements is typically much smaller than N, offering the potential to simplify the sensing system. Let f denote the unknown underlying N-dimensional signal, and g a vector of compressive-sensing measurements, then one may approximate f accurately by utilizing knowledge of the (under-determined) linear relationship between f and g, in addition to knowledge of the fact that f is compressible in B. In this paper we employ a Bayesian formalism for estimating the underlying signal f based on compressive-sensing measurements g. The proposed framework has the following properties: i) in addition to estimating the underlying signal f, "error bars" are also estimated, these giving a measure of confidence in the inverted signal; ii) using knowledge of the error bars, a principled means is provided for determining when a sufficient number of compressive-sensing measurements have been performed; iii) this setting lends itself naturally to a framework whereby the compressive sensing measurements are optimized adaptively and hence not determined randomly; and iv) the framework accounts for additive noise in the compressive-sensing measurements and provides an estimate of the noise variance. In this paper we present the underlying theory, an associated algorithm, example results, and provide comparisons to other compressive-sensing inversion algorithms in the literature.
[ "1869497", "3143096", "1746676" ]
[]
[ "d68725804eadecf83d707d89e12c5132bf376187", "57bdb4350bd36b56d4aaafb5d30f6618e5ba2b72", "b6a1617f0e341205b684a84002a720495c017c88", "9af121fbed84c3484ab86df8f17f1f198ed790a0", "1b4c906704cd125adf5c9a974e16c56e49925bf3", "11f4d997de8e35a1daf8b115439345d9994cfb69", "3d8359c257c6c2dd5f170d4ff22d213af011940e", "25783dde78a862e735df8f008d7e3bc2f154adde", "93f75219cf6f5431db450601429b299a303e9443", "0ca26f9a98dda0abb737692f72ffa682df14cb2f" ]
2,008
000f90380d768a85e2316225854fc377c079b5c4
1,873,339
Full-Resolution Residual Networks for Semantic Segmentation in Street Scenes
Semantic image segmentation is an essential component of modern autonomous driving systems, as an accurate understanding of the surrounding scene is crucial to navigation and action planning. Current state-of-the-art approaches in semantic image segmentation rely on pre-trained networks that were initially developed for classifying images as a whole. While these networks exhibit outstanding recognition performance (i.e., what is visible?), they lack localization accuracy (i.e., where precisely is something located?). Therefore, additional processing steps have to be performed in order to obtain pixel-accurate segmentation masks at the full image resolution. To alleviate this problem we propose a novel ResNet-like architecture that exhibits strong localization and recognition performance. We combine multi-scale context with pixel-level accuracy by using two processing streams within our network: One stream carries information at the full image resolution, enabling precise adherence to segment boundaries. The other stream undergoes a sequence of pooling operations to obtain robust features for recognition. The two streams are coupled at the full image resolution using residuals. Without additional processing steps and without pre-training, our approach achieves an intersection-over-union score of 71.8% on the Cityscapes dataset.
[ "3408089", "36665147", "11983029", "1789756" ]
[]
[ "981fef7155742608b8b6673f4a9566158b76cd67", "942deb7d865b7782c03176d95e3a0d56cb71009e", "2c03df8b48bf3fa39054345bafabfeff15bfd11d", "74875368649f52f74bfc4355689b85a724c3db47", "052b1d8ce63b07fec3de9dbb583772d860b7c769", "39d187585d7df69c330e2bdd5f9c0c41ad99eba0", "3f5e8f884e71310d7d5571bd98e5a049b8175075", "51c765b8d872c206f6dd781ab26bd5a8c2feb81e", "9201bf6f8222c2335913002e13fbac640fc0f4ec", "39978ba7c83333475d6825d0ff897692933895fc" ]
2,017
00111610254bfb8ec16428501c2ca68dcf817474
9,912,528
Learning from Bullying Traces in Social Media
We introduce the social study of bullying to the NLP community. Bullying, in both physical and cyber worlds (the latter known as cyberbullying), has been recognized as a serious national health issue among adolescents. However, previous social studies of bullying are handicapped by data scarcity, while the few computational studies narrowly restrict themselves to cyberbullying which accounts for only a small fraction of all bullying episodes. Our main contribution is to present evidence that social media, with appropriate natural language processing techniques, can be a valuable and abundant data source for the study of bullying in both worlds. We identify several key problems in using such data sources and formulate them as NLP tasks, including text classification, role labeling, sentiment analysis, and topic modeling. Since this is an introductory paper, we present baseline results on these tasks using off-the-shelf NLP solutions, and encourage the NLP community to contribute better models in the future.
[ "1729642", "2610963", "1832364", "3009549" ]
[]
[ "639c1ec9edcbca7aa80ab56a52487def431aed5e", "8992d36f95f61c6665262b0ba1245e6d2e4b8426", "b4f5511e4a1239fbebdecf816601854e4e4f3fd1", "1c1911d551553aa17c048ec1fecd1cd0f66edac3", "1b792e93e03f5a9a5d06469e230d7aabe696f9ec", "ecbd467eacde24de43f43bc703c891df447ff389", "0e9e34d7f82114e5ab2682f04a0b1190b40b6b23", "4f410ab5c8b12b34b38421241366ee456bbebab9", "1a090df137014acab572aa5dc23449b270db64b4", "812183caa91bab9c2729de916ee3789b68023f39" ]
2,012
0015fa48e4ab633985df789920ef1e0c75d4b7a8
2,845,602
Training Support Vector Machines: an Application to Face Detection
Detection (To appear in the Proceedings of CVPR'97, June 17-19, 1997, Puerto Rico.) Edgar Osunay? Robert Freund? Federico Girosiy yCenter for Biological and Computational Learning and ?Operations Research Center Massachusetts Institute of Technology Cambridge, MA, 02139, U.S.A. Abstract We investigate the application of Support Vector Machines (SVMs) in computer vision. SVM is a learning technique developed by V. Vapnik and his team (AT&T Bell Labs.) that can be seen as a new method for training polynomial, neural network, or Radial Basis Functions classi ers. The decision surfaces are found by solving a linearly constrained quadratic programming problem. This optimization problem is challenging because the quadratic form is completely dense and the memory requirements grow with the square of the number of data points. We present a decomposition algorithm that guarantees global optimality, and can be used to train SVM's over very large data sets. The main idea behind the decomposition is the iterative solution of sub-problems and the evaluation of optimality conditions which are used both to generate improved iterative values, and also establish the stopping criteria for the algorithm. We present experimental results of our implementation of SVM, and demonstrate the feasibility of our approach on a face detection problem that involves a data set of 50,000 data points.
[ "40559323", "49192393", "1804489" ]
[]
[ "ed5a3c87e41c0be7397dc2f6a9b65847fbb1a2ba", "1061ff8a216a8d00f5f189d7ea593c6f0703b771", "105c247afaffe0ca4b2538eea0077a80782470e3", "1cdb510aed4f8b04b73240287da954f9eff39318", "c9c9b50b51dc677ff83f58f1a5433b2a41321ec3", "a36fce4e10fcc038b21d13a806761ad0b12945e8", "0d53aefe73741d33dbde8c73afb650d318582332", "088eb2d102c6bb486f5270d0b2adff76961994cf", "0df4c89652efbfcc00c444041b3991b86efffd88", "2599131a4bc2fa957338732a37c744cfe3e17b24" ]
1,997
001719ac5585722d14bf4f2d807383a368504a4a
12,913,041
Pedestrian detection in low resolution videos
Pedestrian detection in low resolution videos can be challenging. In outdoor surveillance scenarios, the size of pedestrians in the images is often very small (around 20 pixels tall). The most common and successful approaches for single frame pedestrian detection use gradient-based features and a support vector machine classifier. We propose an extension of these ideas, and develop a new algorithm that extracts gradient features from a spatiotemporal volume, consisting of a short sequence of images (about one second in duration). The additional information provided by the motion of the person compensates for the loss of resolution. On standard datasets (PETS2001, VIRAT) we show a significant improvement in performance over single-frame detection.
[ "40557043", "2363412" ]
[]
[ "5a00e8b88d1012001c96f49dd18308132102bfb3", "f72f6a45ee240cc99296a287ff725aaa7e7ebb35", "ef0f952fc369b91b06de18488a11871ea01bdfae", "dfde720655248f59fdabd32a83ff19002fdec481", "6b2e3c9b32e92dbbdd094d2bd88eb60a80c3083d", "a7d8e52f96c0d8061d611f6750bbabd50f4fba17", "f2b4a31ae8b11a0582645f48a2176e5f9c33af41", "0c4867f11c9758014d591381d8b397a1d38b04a7", "df27aac8f222eb0c6b73784102e37dccffa55ceb", "1bd65302bca0c1a593490088a0ce85988f3cc90a" ]
2,014
0018a0b35ede8900badee90f4c44385205baf2e5
20,773,035
Implementation of PID controller and pre-filter to control non-linear ball and plate system
In this paper, the authors try to make PID controller with Pre-filter that is implemented at ball and plate system. Ball and plate system will control the position of ball's axis in pixels value by using servo motor as its actuator and webcam as its sensor of position. PID controller with Pre-filter will have a better response than conventional PID controller. Eventhough the response of PID with Pre-filter is slower than conventional PID, the effect of Pre-filter in the system will give the less overshoot response.
[ "31344068", "9205581" ]
[]
[ "cabfe3cb7897608e4306438344c15e6e5b1c4e0f", "77212f6c59d99fb9e750e2dadf18b5e632a768b2", "8f3caea78a3f41cad633b6a2f97c313215445d69" ]
2,016
00196e5b8a22296c3d2062839c65ed54294fa362
2,872,715
Multi-Dimensional Range Query over Encrypted Data
We design an encryption scheme called multi-dimensional range query over encrypted data (MRQED), to address the privacy concerns related to the sharing of network audit logs and various other applications. Our scheme allows a network gateway to encrypt summaries of network flows before submitting them to an untrusted repository. When network intrusions are suspected, an authority can release a key to an auditor, allowing the auditor to decrypt flows whose attributes (e.g., source and destination addresses, port numbers, etc.) fall within specific ranges. However, the privacy of all irrelevant flows are still preserved. We formally define the security for MRQED and prove the security of our construction under the decision bilinear Diffie-Hellman and decision linear assumptions in certain bilinear groups. We study the practical performance of our construction in the context of network audit logs. Apart from network audit logs, our scheme also has interesting applications for financial audit logs, medical privacy, untrusted remote storage, etc. In particular, we show that MRQED implies a solution to its dual problem, which enables investors to trade stocks through a broker in a privacy-preserving manner.
[ "1726246", "2598536", "1800379", "1723931", "1688974" ]
[]
[ "99bae74d39a74766b3a8d755eb692cd6cf0b3343", "e15a98e87cc7be6e6d739b38b8cac6c23c445a59", "181b781f68e29f764421c50f0095dbc3f6f48907", "ae42ec431f0f4c912889f033b6ce1481a41042e6", "15f5ce559c8f3ea14a59cf49bacead181545dfb0", "0b277244b78a172394d3cbb68cc068fb1ebbd745", "ad9ba8acaa7e0fec6db845967dc657f4fed38c34", "125e1337639a01bfb80eeb148b68bc560df36e94", "15bf3563d8d8d16632c2c8b7463c2a4a573d5731", "782319f0f32c9b0b897c0d6ca46ec65ff337a69b" ]
2,007
001a9612cfcb36fb9241eca16a120680fbbf8cad
4,900,304
Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors
Smartphones are equipped with a set of sensors that describe the environment (e.g., GPS, noise, etc.) and their current status and usage (e.g., battery consumption, accelerometer readings, etc.). Several works have already addressed how to leverage such data for user-in-a-context continuous authentication, i.e., determining if the porting user is the authorized one and resides in his regular physical environment. This can be useful for an early reaction against robbery or impersonation. However, most previous works depend on assisted sensors, i.e., they rely upon immutable elements (e.g., cell towers, satellites, magnetism), thus being ineffective in their absence. Moreover, they focus on accuracy aspects, neglecting usability ones. For this purpose, in this paper, we explore the use of four non-assisted sensors, namely battery, transmitted data, ambient light and noise. Our approach leverages data stream mining techniques and offers a tunable security-usability trade-off. We assess the accuracy, immediacy, usability and readiness of the proposal. Results on 50 users over 24 months show that battery readings alone achieve 97.05% of accuracy and 81.35% for audio, light and battery all together. Moreover, when usability is at stake, robbery is detected in 100 s for the case of battery and in 250 s when audio, light and battery are applied. Remarkably, these figures are obtained with moderate training and storage needs, thus making the approach suitable for current devices.
[ "35424788", "2122637", "1784376" ]
[]
[ "35a940734cc7f8085cb7b7694fd56c0aaa2fc181", "9998dc0b30c69215bb339196dfb48d727413d33b", "55afc2d63fd410a719c3bbe9772d9bbc6bc565a6", "5367d509d76c2efb144a681efd442ddbf3b25f4a", "925c975214ae3194f5a6e8f3b47431aa4dab73cb", "2dd84aac383b26c0295c6baf20ae3de3d00c3627", "6d337579fa90c4e0298b02589101cefb73c8f895", "665f78c2bc3ea200570db7f22785f7985950a75d", "ff37161528017f03d78537540cd9618e787e751f", "34b136f767f9045433ff5eab77783d030afb332a" ]
2,018
001be2c9a96a82c1e380970e8460827ecce1cb97
12,941,434
Physician well-being: A powerful way to improve the patient experience.
Improving the patient experience—or the patientcenteredness of care—is a key focus of health care organizations. With a shift to reimbursement models that reward higher patient experience scores, increased competition for market share, and cost constraints emphasizing the importance of patient loyalty, many health care organizations consider optimizing the patient experience to be a key strategy for sustaining financial viability. A survey conducted by The Beryl Institute, which supports research on the patient experience, found that hospital executives ranked patient experience as a clear top priority, falling a close second behind quality and safety.1 According to the institute, engagement with employees, including physicians, is the most effective way to improve the patient experience, as more engaged, satisfied staffers provide better service and care to patients.2 Data on physician satisfaction support this supposition: Research has shown that physician career satisfaction closely correlates with patient satisfaction within a geographic region.3 Given the importance of physician satisfaction to the patient experience, it is concerning that dissatisfaction and burnout are on the rise among physicians. In a 2012 online poll of more than 24,000 physicians across the country, only 54 percent would choose medicine again as a career, down from 69 percent in 2011.4 Almost half of the more than 7,000 physicians responding to a recent online survey reported at least one symptom of burnout.5 Physician dissatisfaction and burnout have a profound negative effect on the patient experience of care. Physician leaders can take steps within their organizations to foster physician well-being, improving the care experience for physicians and patients while strengthening the sustainability of their organizations.
[ "46709531" ]
[]
[ "33f438a3caf2c53bc666b65f19b2de2564c42bb3", "8e5d59b16e88854243c1334aaf60eac7e7526523", "61756fb8566821d131bfef5cb86f1314d69e992a", "2a9b75af3dd2838c1a9527b33d651f3481661c2a", "3e93e5c01a303c9bcb3b9e98a8ac9f3f3e702dea", "5ad7934a61c0fe68ce6b437887ff5e35ec7513c1", "a419ac49806bd18a5c585217ef9fa8b86f79ed59", "45bb763d991d84edf13f16107af6ca5a9510aeee", "f636b4a89822d2530563d3bca66e666d055b7e40", "13ec0f2ba5a21fff34bff3221c4a9ad4df47bbec" ]
2,013
001ffbeb63dfa6d52e9379dae46e68aea2d9407e
9,627,597
The Measurement of Web-Customer Satisfaction: An Expectation and Disconfirmation Approach
null
[ "2605012", "2360943", "1712444" ]
[]
[ "d313be8f4d762932d65a86c9bd074c7f03f98fef", "cd83dca9107ba76b3db5fe687c7e83d3aca79f44", "be5725d6f0476337f98fca4c168add0db6594dab", "c0421a5825d8d9346c4c6f54018a1aa0102f31b3", "2a87edf2a19d28a595606b694b32d62ca2c353a1", "3969e582e68e418a2b79c604cd35d5d81de9b35d", "1c3b9f667e98f110c40be3ffa871cc3434277092", "a04145f1ca06c61f5985ab22a2346b788f343392", "d1b5898bdec59732b578d5dd038dc002574985f7", "072852ee3f122945669fa309fb2ddade37ce40ef" ]
2,002
0021150934ac5e73a917e9e633fc992f9402b43d
14,563,218
A review on 3 D micro-additive manufacturing technologies
New microproducts need the utilization of a diversity of materials and have complicated three-dimensional (3D) microstructures with high aspect ratios. To date, many micromanufacturing processes have been developed but specific class of such processes are applicable for fabrication of functional and true 3D microcomponents/assemblies. The aptitude to process a broad range of materials and the ability to fabricate functional and geometrically complicated 3D microstructures provides the additive manufacturing (AM) processes some profits over traditional methods, such as lithography-based or micromachining approaches investigated widely in the past. In this paper, 3D micro-AM processes have been classified into three main groups, including scalable micro-AM systems, 3D direct writing, and hybrid processes, and the key processes have been reviewed comprehensively. Principle and recent progress of each 3D micro-AM process has been described, and the advantages and disadvantages of each process have been presented.
[ "47876972", "39387078", "2397276" ]
[]
[ "6baa9e33307563189312a88c7b997a1c9af7e022", "75f1c2ec98ea6ed5c03d01ae50e57f1480802c16", "0275fe865413410810cd4197fd1b214757ade4a7", "80658a60baf6c79229994f52cca78e5d7d1c443c", "cfd59c42e9491fa33d590f503f3e767c3f563e7e", "22c6e3dc61b64d6e0447b7c63b465641c4879833", "18168b537b5468f2882da335770e69d98d45de7d", "b0f50faef403fd5a1e8975543dd7139ca7d4fd08", "76ba942cb4b94480ad0e8471031de2490c5e69bb", "1d47517490ed48d610e0e01022bbd4542c2c5a27" ]
2,013
0024559c0758fd680a5ab777348f4a740b8c7323
1,834,227
Persistent Point Feature Histograms for 3 D Point Clouds
This paper proposes a novel way of characterizing the local geometry of 3D points, using persistent feature histograms. The relationships between the neighbors of a point are analyzed and the resulted values are stored in a 16-bin histogram. The histograms are pose and point cloud density invariant and cope well with noisy datasets. We show that geometric primitives have unique signatures in this feature space, preserved even in the presence of additive noise. To extract a compact subset of points which characterizes a point cloud dataset, we perform an in-depth analysis of all point feature histograms using different distance metrics. Preliminary results show that point clouds can be roughly segmented based on the uniqueness of geometric primitives feature histograms. We validate our approach on datasets acquired from laser sensors in indoor (kitchen) environments.
[ "2689311", "49029633", "1810221" ]
[]
[ "ff6a1a0447250c65099def4e9b2e245b825de7f4", "fac3a79db1d70c649e724c5e26662d5ed50fc83b", "617294408da21693521adb2686209b04311703c6", "adb904634a44aa59545771cc7a06481196309b38", "30c3e410f689516983efcd780b9bea02531c387d", "226e9f36bc0da559921e9270576fddc12cfb1c7d", "27f4ecd7c2691ac8d5a36949e5d7c13265a1a2d2", "faddd17d68faffa3aa3e69b2467c76ed6303df42", "9e7016e0b6dbaa74ff7e275ac2612c3fc9a26525", "11db6159a62b88dca21a39562fbc6863273af41b" ]
2,008
0025b963134b1c0b64c1389af19610d038ab7072
2,711,002
Learning to Order Things
There are many applications in which it is desirable to order rather than classify instances. Here we consider the problem of learning how to order, given feedback in the form of preference judgments, i.e., statements to the effect that one instance should be ranked ahead of another. We outline a two-stage approach in which one first learns by conventional means a preference function, of the form PREF , which indicates whether it is advisable to rank before . New instances are then ordered so as to maximize agreements with the learned preference function. We show that the problem of finding the ordering that agrees best with a preference function is NP-complete, even under very restrictive assumptions. Nevertheless, we describe a simple greedy algorithm that is guaranteed to find a good approximation. We then discuss an on-line learning algorithm, based on the “Hedge” algorithm, for finding a good linear combination of ranking “experts.” We use the ordering algorithm combined with the on-line learning algorithm to find a combination of “search experts,” each of which is a domain-specific query expansion strategy for a WWW search engine, and present experimental results that demonstrate the merits of our approach.
[ "1702241", "1716301", "1740765" ]
[]
[ "3cf9932e54bb71efa7549923aa72594ab771f0c7", "46925ba21f89cc531b23134552207fbb32ce4df6", "aa68a55094bdf277615823404987384fa021a016", "4ba566223e426677d12a9a18418c023a4deec77e", "e867dda06c66df2cd599ad67775aee37a2b5eda9", "fdcba4991128968b19d5ad02fac48960c0a885b7" ]
1,997
00265f2c37a81856dd36b42ccf9e317f93d8c592
3,941,626
Ranking-based classification of heterogeneous information networks
It has been recently recognized that heterogeneous information networks composed of multiple types of nodes and links are prevalent in the real world. Both classification and ranking of the nodes (or data objects) in such networks are essential for network analysis. However, so far these approaches have generally been performed separately. In this paper, we combine ranking and classification in order to perform more accurate analysis of a heterogeneous information network. Our intuition is that highly ranked objects within a class should play more important roles in classification. On the other hand, class membership information is important for determining a quality ranking over a dataset. We believe it is therefore beneficial to integrate classification and ranking in a simultaneous, mutually enhancing process, and to this end, propose a novel ranking-based iterative classification framework, called RankClass. Specifically, we build a graph-based ranking model to iteratively compute the ranking distribution of the objects within each class. At each iteration, according to the current ranking results, the graph structure used in the ranking algorithm is adjusted so that the sub-network corresponding to the specific class is emphasized, while the rest of the network is weakened. As our experiments show, integrating ranking with classification not only generates more accurate classes than the state-of-art classification methods on networked data, but also provides meaningful ranking of objects within each class, serving as a more informative view of the data than traditional classification.
[ "49126176", "1722175", "1994333" ]
[]
[ "784220a5a2ad452282f8af006a6cb5715d54d0ed", "74d8d8c6abb522241033c60c937878d0d9858258", "14ef5a2cab928865ca02c6366ea7cb75c35fb698", "373969a82cc31a9f166f9a53f4871fbf4e761c46", "7ac763ba70466928689cd29a0a76608bad942d9a", "30bfc350410a99d73a94a1d70f93c9d1ec30ba98", "3a0f1ecaced354bd374f11a88889829527f416cc", "0e984fb78f7f4e6eaa5eea76ed8aa0f9594887c5", "1b1056bf0afc7f00fff645a433455e52cac151b3", "d15aef555481ed5cd59474e9e2efbc1ee37d5e94" ]
2,011
0026db1f03eb3ee5631071d445c889a192a3e965
1,679,013
Perceptual learning in speech
This study demonstrates that listeners use lexical knowledge in perceptual learning of speech sounds. Dutch listeners first made lexical decisions on Dutch words and nonwords. The final fricative of 20 critical words had been replaced by an ambiguous sound, between [f] and [s]. One group of listeners heard ambiguous [f]-final words (e.g., [WItlo?], from witlof, chicory) and unambiguous [s]-final words (e.g., naaldbos, pine forest). Another group heard the reverse (e.g., ambiguous [na:ldbo?], unambiguous witlof). Listeners who had heard [?] in [f]-final words were subsequently more likely to categorize ambiguous sounds on an [f]-[s] continuum as [f] than those who heard [?] in [s]-final words. Control conditions ruled out alternative explanations based on selective adaptation and contrast. Lexical information can thus be used to train categorization of speech. This use of lexical information differs from the on-line lexical feedback embodied in interactive models of speech perception. In contrast to on-line feedback, lexical feedback for learning is of benefit to spoken word recognition (e.g., in adapting to a newly encountered dialect).
[ "2864697", "1804428", "1806921" ]
[]
[ "82fe0be443b2915567817a2eb09f6bb449c61d14", "1600b7e2f654e42260d8a70b93befbc7b0fa6354", "107c298c1caf597ad0afd4915e3266bd9f58d70d", "9394406dda238641b15b76d86d767b098b995aa6", "1cf5dcb9c870c05761e490e667ff023edad129e7", "a0a7f26f9b8d0ff12107cd8d6d5b53060106c452", "399e4d658889e0c230ddb344b66dbafc5932e112", "78564caed6444ff1ac7b4cf011a44b0e43feda12", "09c7a07a182ca9440bbb5cfd8b55d6dda5351cde", "4df0289f3013e3d43fe7a248ffbb23846ce03609" ]
2,003
0029244f210e2cb4fffb415e68907c6294a5c514
17,120,461
Enterprise Resource Planning (ERP): a review of the literature
This article is a review of work published in various journals on the topics of Enterprise Resource Planning (ERP) between January 2000 and May 2006. A total of 313 articles from 79 journals are reviewed. The article intends to serve three goals. First, it will be useful to researchers who are interested in understanding what kinds of questions have been addressed in the area of ERP. Second, the article will be a useful resource for searching for research topics. Third, it will serve as a comprehensive bibliography of the articles published during the period. The literature is analysed under six major themes and nine sub-themes.
[ "2731067" ]
[]
[ "0dac7228c6fe2bec407df1be3165bae2b6d29af2", "46361e4e971139caa4a3f57342630697f05cda0e", "0633ad8857469599f63268102febb550b30e7c42", "599e5524627960570d4c739432429ff31b3fee07", "c10d5fe1767a3dd6d6c4d83a26b106ee1cadea17", "1258796cca33145589055d90fe81ab0144277dab", "4e9cd80fdf3654c6919e7ab18bb7e5be5329f52b", "3ebab4b41ea82f6f75d072d026ea33bf66c6c1fe", "fd2f7e9edc31a6ce7f00022c7f0e9716a6bd7b3f", "e4337690de533d69899d6f58740fa439491b9f1d" ]
2,007
002a36359ab0680fac3dd492a113475b5e782ae0
15,588,516
Cytoscape: a software environment for integrated models of biomolecular interaction networks.
Cytoscape is an open source software project for integrating biomolecular interaction networks with high-throughput expression data and other molecular states into a unified conceptual framework. Although applicable to any system of molecular components and interactions, Cytoscape is most powerful when used in conjunction with large databases of protein-protein, protein-DNA, and genetic interactions that are increasingly available for humans and model organisms. Cytoscape's software Core provides basic functionality to layout and query the network; to visually integrate the network with expression profiles, phenotypes, and other molecular states; and to link the network to databases of functional annotations. The Core is extensible through a straightforward plug-in architecture, allowing rapid development of additional computational analyses and features. Several case studies of Cytoscape plug-ins are surveyed, including a search for interaction pathways correlating with changes in gene expression, a study of protein complexes involved in cellular recovery to DNA damage, inference of a combined physical/functional interaction network for Halobacterium, and an interface to detailed stochastic/kinetic gene regulatory models.
[ "31690715", "49371985", "3043633", "1753105", "38612147", "1878835", "2447047", "1776520", "48933353" ]
[]
[ "682972c6d2932136eae9da88916439014c7d29bd", "b2856abde519dc8abc00ea41d802be8b96653440", "c97c526b13b55518040678d15085a057580f0604", "5c0cec8aab747100dacb103c28af2fe46fbf1bd3", "01459aae8238d8d84ec0668d999fa1790d335e57", "1b06cdf06bb350d75a191e7033c2306878d2fd99", "8107c775a841219df95d3dbf0dc6d4fe6619d3b1", "b37d1e07de30b7061be39f766fec1dd8c73de7be", "db3a261581521f007af8d6aa267b5dfcf73591e2", "8573bbb55112c1f06c43211daedacc1578e69a92" ]
2,003
002a8b9ef513d46dc8dcce85c04a87ae6a221b4c
207,673,395
New Support Vector Algorithms
We propose a new class of support vector algorithms for regression and classification. In these algorithms, a parameter lets one effectively control the number of support vectors. While this can be useful in its own right, the parameterization has the additional benefit of enabling us to eliminate one of the other free parameters of the algorithm: the accuracy parameter in the regression case, and the regularization constant C in the classification case. We describe the algorithms, give some theoretical results concerning the meaning and the choice of , and report experimental results.
[ "1707625", "1691629", "40099056", "1745169" ]
[]
[ "2599131a4bc2fa957338732a37c744cfe3e17b24", "d2f53b756f052c938293050a87edfd9bc9399646", "0328e860e482fce305720ea84bf85596c4d7759f", "508db892b1f34149f5a5931d74449d87552bf3a3", "466d91cd6c31a389cce0db80a82dbf71e6b916dd", "14a37faa9c33b279b27128a465ebae50cd320202", "27e9c6f7e179c0a0a309037ca0b95e3331d17509", "474da985f55406f91e7c9335f992cdf68f99ddb2", "4d2c09b57132c8edd710dbf7d3b758574793b792", "26b7d17825e41c426ba05b54fe735104fa6fb643" ]
2,000
002aaf4412f91d0828b79511f35c0863a1a32c47
1,154,755
A real-time face tracker
We present a real-time face tracker in this paper The system has achieved a rate of 30% frameshecond using an HP-9000 workstation with a framegrabber and a Canon VC-CI camera. It can track a person 'sface while the person moves freely (e.g., walks, jumps, sits down and stands up) in a room. Three types of models have been employed in developing the system. First, we present a stochastic model to characterize skin-color distributions of human faces. The information provided by the model is sufJicient for tracking a human face in various poses and views. This model is adaptable to different people and different lighting conditions in real-time. Second, a motion model e's used to estimate image motion and to predict search window. Third, a camera model is used toprediet and to compensate for camera motion. The system can be applied to tele-conferencing and many HCI applications including lip-reading and gaze tracking. The principle in developing this system can be extended to other tracking problems such as tracking the human hand.
[ "38497166", "1724972" ]
[]
[ "e0d1c98db36dcf03eedd9cd3a81366d86bf75161", "44c7823cfd73dcc2a03f47b1d543714c83d0a753", "00cef15c34ac9854f194c006f8705772f4359cfd", "2d80d1d363a2dabd3cdcf2b42dd0831366c4831c", "71b4a23a405209187d3b2297c92ee8d5e400b094", "e182225eb0c1e90f09cc3a0f69abb7ac0e9b3dba", "286e4bad908518853555f1022f7fb995e55922fb", "0a11cd64f46b34fee230840684dae3cc8e1905a8", "f9a87ed350c6c7bd35bb77370cdcc91783e7b60d", "c6939b99b18104c810893307007562f861c8401c" ]
1,996
002c3339df17101b1b8f56d534ba4de2437f7a22
3,462,278
Evolving boxes for fast vehicle detection
We perform fast vehicle detection from traffic surveillance cameras. A novel deep learning framework, namely Evolving Boxes, is developed that proposes and refines the object boxes under different feature representations. Specifically, our framework is embedded with a light-weight proposal network to generate initial anchor boxes as well as to early discard unlikely regions; a fine-turning network produces detailed features for these candidate boxes. We show intriguingly that by applying different feature fusion techniques, the initial boxes can be refined for both localization and recognition. We evaluate our network on the recent DETRAC benchmark and obtain a significant improvement over the state-of-the-art Faster RCNN by 9.5% mAP. Further, our network achieves 9–13 FPS detection speed on a moderate commercial GPU.
[ "48169566", "1803391", "49528487", "3015119", "1743864", "1713721" ]
[]
[ "b2cd92d930ed9b8d3f9dfcfff733f8384aa93de8", "009fba8df6bbca155d9e070a9bd8d0959bc693c2", "2725a68be6bc677bd435c19664569ecd45c52d7a", "12a376e621d690f3e94bce14cd03c2798a626a38", "1606b1475e125bba1b2d87bcf1e33b06f42c5f0d", "c3bd3b9782dc504ee4f2b8a12bd9c562a5c0d7ad", "1a54a8b0c7b3fc5a21c6d33656690585c46ca08b", "1827de6fa9c9c1b3d647a9d707042e89cf94abf0", "8ade5d29ae9eac7b0980bc6bc1b873d0dd12a486", "20a78d3145279dcd799cd7a856ae2714f4863a16" ]
2,017
002e80d4abd9cba7377d33d53bf583ccd6adea70
3,155,014
Learning Structured Inference Neural Networks with Label Relations
Images of scenes have various objects as well as abundant attributes, and diverse levels of visual categorization are possible. A natural image could be assigned with fine-grained labels that describe major components, coarse-grained labels that depict high level abstraction, or a set of labels that reveal attributes. Such categorization at different concept layers can be modeled with label graphs encoding label information. In this paper, we exploit this rich information with a state-of-art deep learning framework, and propose a generic structured model that leverages diverse label relations to improve image classification performance. Our approach employs a novel stacked label prediction neural network, capturing both inter-level and intra-level label semantics. We evaluate our method on benchmark image datasets, and empirical results illustrate the efficacy of our model.
[ "2804000", "2057809", "47640964", "2928799", "10771328" ]
[]
[ "33da83b54410af11d0cd18fd07c74e1a99f67e84", "8af5ccb16d6f7f83b31844a08a67ce19659a9f31", "224f31a02eac15e3ec6b7a37136726aff5d0d4d3", "0104063400e6d69294edc95fb14c7e8fac347f6a", "4b8089bc9b49f84de43acc2eb8900035f7d492b2", "1d827e24143e5fdfe709d33b7b13a9a24d402efd", "061356704ec86334dbbc073985375fe13cd39088", "3b049d8cfea6c3bed377090e0e7fa677d282a361", "722fcc35def20cfcca3ada76c8dd7a585d6de386", "8a09bfe4e16bd20850a7a5ebe465e76ebb8f9d19" ]
2,016
002f47f4b4e5a78fac785099f5b42f55c196676c
15,404,062
A Short History of Computational Complexity
It all started with a machine. In 1936, Turing developed his theoretical computational model. He based his model on how he perceived mathematicians think. As digital computers were developed in the 40’s and 50’s, the Turing machine proved itself as the right theoretical model for computation. Quickly though we discovered that the basic Turing machine model fails to account for the amount of time or memory needed by a computer, a critical issue today but even more so in those early days of computing. The key idea to measure time and space as a function of the length of the input came in the early 1960’s by Hartmanis and Stearns. And thus computational complexity was born. In the early days of complexity, researchers just tried understanding these new measures and how they related to each other. We saw the first notion of efficient computation by using time polynomial in the input size. This led to complexity’s most important concept, NP-completeness, and its most fundamental question, whether P = NP. The work of Cook and Karp in the early 70’s showed a large number of combinatorial and logical problems were NP-complete, i.e., as hard as any problem computable in nondeterministic polynomial time. The P = NP question is equivalent to an efficient solution of any of these problems. In the thirty years hence this problem has become one of the outstanding open questions in computer science and indeed all of mathematics. In the 70’s we saw the growth of complexity classes as researchers tried to encompass different models of computations. One of those models, probabilistic computation, started with a probabilistic test for primality, led to probabilistic complexity classes and a new kind of interactive proof system that itself led to hardness results for approximating certain NP-complete problems. We have also seen strong evidence that we can remove the randomness from computations and most recently a deterministic algorithm for the original primality problem. In the 80’s we saw the rise of finite models like circuits that capture computation in an inherently different way. A new approach to problems like P = NP arose from these circuits and though they have had limited success in separating complexity classes, this approach brought combinatorial techniques into the area and led to a much better understanding of the limits of these devices. ∗URL: http://www.neci.nj.nec.com/homepages/fortnow. Email: fortnow@research.nj.nec.com. †URL: http://www.cs.bu.edu/faculty/homer. Email: homer@cs.bu.edu. Supported in part by the NSF under grant NSF-CCR-998310 and by the ARO under grant DAAD19-02-1-0058.
[ "1691447", "2459218" ]
[]
[ "f29d639869fb39bdbf6fffab4b6dc6c6f2b35a44", "fec6812b7b395d2cdfc075dfbcc0ebed936e5a4d", "0352893287ea6c7d6a65946706b1b75cbe598798", "ef62850f0cd7ea488b3ee36a60c8dd6e7e94aa9f", "c8a139653be0e2a01a9952e11c27c4129cf1c704", "ba380cc7ea71dc6876a83cf0ba2ce469452b79f2", "bd96d99c253ac4a27235d651d2370fd1b1eff0d5", "997df4e2a661aed97b2ad782531aa2ce122cab4d", "3ea11e4ee041e42142b7b038137881410d7a53dd", "41aa637de382bf89f70244d8978f31709416a341" ]
2,003
003000c999f12997d7cb7d317a13c54b0092da9f
31,260,292
Metasurfaces for general transformations of electromagnetic fields.
In this review paper I discuss electrically thin composite layers, designed to perform desired operations on applied electromagnetic fields. Starting from a historical overview and based on a general classification of metasurfaces, I give an overview of possible functionalities of the most general linear metasurfaces. The review is concluded with a short research outlook discussion.
[ "32846903" ]
[]
[ "9fd41c943b195fbe5be5cb71257a89a7d1063826", "0c2ee36114d64342da7a5967304083d5f54ff246", "7af7c05582fc1ca9a68b72679e25783a514e241d", "85122a8a0f1aeffe88d10473dbe3c4b510adc72a", "940fc73771ea8ebbb1369045e91b5527808df49e", "36e2d0ca25cbdfb623e9eb63758705c2d766b256", "b9b675275973d70998b076b00461e0c0f9c91620", "902df198d8905eb588decb40a7210ab36b949fd5", "c4e162566538762bcad445c00ea8f06ad4dbb856", "d0412fad0bb32106fa790574e784b860ce5a12fd" ]
2,015
0030a1a588a6c8772ba2d07ce8c1a4ac262c2e86
9,785,601
The ProM Framework: A New Era in Process Mining Tool Support
Under the umbrella of buzzwords such as “Business Activity Monitoring” (BAM) and “Business Process Intelligence” (BPI) both academic (e.g., EMiT, Little Thumb, InWoLvE, Process Miner, and MinSoN) and commercial tools (e.g., ARIS PPM, HP BPI, and ILOG JViews) have been developed. The goal of these tools is to extract knowledge from event logs (e.g., transaction logs in an ERP system or audit trails in a WFM system), i.e., to do process mining. Unfortunately, tools use different formats for reading/storing log files and present their results in different ways. This makes it difficult to use different tools on the same data sets and to compare the mining results. Furthermore, some of these tools implement concepts that can be very useful in the other tools but it is often difficult to combine tools. As a result, researchers working on new process mining techniques are forced to build a mining infrastructure from scratch or test their techniques in an isolated way, disconnected from any practical applications. To overcome these kind of problems, we have developed the ProM framework, i.e., an “plugable” environment for process mining. The framework is flexible with respect to the input and output format, and is also open enough to allow for the easy reuse of code during the implementation of new process mining ideas. This paper introduces the ProM framework and gives an overview of the plug-ins that have been developed.
[ "1687918", "38432366", "1734654", "2388889", "1744010" ]
[]
[ "917cd7f4930af353025b65dfb1af6e76f3c47357", "0fd4673b2cfe05f02bb5763b657593d629f5a5e0", "56ed879efab28f9714b68dd68f05363f02547841", "322beb11ceeacf72dfc9df8df8cb045efb46d67f", "1e2ed11638e47de0f8bcab9f4d47486b92f3fc96", "dede769cd3358ced9cf9628799cb10fba7211658", "67081ef72d2677ba68a0f6a484045c4ae7c3edc7", "998521cc2a887dc8f8ff994cad84b3f66880ccb7", "9151541a84d25e31a1101e82a4b345639223bbd8", "699645c9cd170ed0d1729f9a0415a70673641a45" ]
2,005
00311d4a5ed649f720589a580c38d4035bfc65ea
9,981,257
Citances : Citation Sentences for Semantic Analysis of Bioscience Text
We propose the use of the text of the sentences surrounding citations as an important tool for semantic interpretation of bioscience text. We hypothesize several different uses of citation sentences (which we call citances), including the creation of training and testing data for semantic analysis (especially for entity and relation recognition), synonym set creation, database curation, document summarization, and information retrieval generally. We illustrate some of these ideas, showing that citations to one document in particular align well with what a hand-built curator extracted. We also show preliminary results on the problem of normalizing the different ways that the same concepts are expressed within a set of citances, using and improving on existing techniques in automatic paraphrase generation.
[ "1683562" ]
[]
[ "56d36c2535c867613997688f649cf0461171dbe8", "1c389076642c4aa9c6a06233ac5bf9f3c7f2d469", "b4317b8a4490c84301907a61f5b8ebb26ab8828d", "b5a165a5a97c58c8f5f4610f66b6c0903671076a", "cd37536c61c254205141478cde72effeeb8d8f5a", "2455fd3a758b562e8502e3e59e70fb30632319cd", "10e105d91317a039e42ce6db0996ef5253d49255", "c655042ed712d95e0175c42921c2ef4698ee151a", "7fd21074d5612e0ec7a5b8db64236ac48be24dc6", "6feb388081f456f8967e1c975a26f15df56556e1" ]
2,004
003140e734f71c9601e756a2d131a44ebe3f63b2
42,088,830
Platforms rules : multi-sided platforms as regulators
In 1983, the videogame market in the USA collapsed, leading to bankruptcy for more than 90 percent of game developers, as well as Atari, manufacturer of the dominant game console at the time. The main reason was a ‘lemons’ market failure: because it had not developed a technology for locking out unauthorized games, Atari was unable to prevent the entry of opportunistic developers, who flooded the market with poor-quality games. At a time when consumers had few ways to distinguish good from bad games, bad games drove out good ones. The videogame market was resurrected six years later only when Nintendo entered with a set of draconian policies to regulate third-party developers more tightly. Central to Nintendo’s strategy was the use of a security chip designed to lock out any game not directly approved by Nintendo. Twenty-five years later, in the summer of 2008, Apple launched the iPhone store (a digital store of third-party applications for its immensely popular iPhone) at a time when lemons problems had become less of an issue, with widely available reviews and ratings available on the Internet. Even so, Apple reserved the right to verify and exclude any third-party application it did not deem appropriate. And it exerted that right swiftly by taking down an application named ‘I Am Rich’, which cost $999 (the maximum price allowed by Apple), while doing nothing more than presenting a glowing ruby on the buyer’s iPhone screen. Apple also kicked out Podcaster, an application that would allow users to download podcasts without going through iTunes store. The Atari, Nintendo and Apple examples illustrate instances in which non-price instruments were a critical part of strategy for multi-sided platforms (MSPs) – platforms that enable interactions between multiple groups of surrounding consumers and ‘complementors’.2 This chapter provides a general and basic conceptual framework for interpreting non-price instruments, which analogizes MSPs as private regulators; and
[ "3051490", "3347326" ]
[]
[ "41eabbb98546dc58e7dee1c2df2ab105ca61172a", "25395d80fd037b23cfcb8d72b2b549a2603d27ae", "af1d0d706141a2b865855840434afa4cba403851", "7d1cb309033b9d5a9d0888c0f6d2d56086c498b5", "56bf6903e3c5d88027add720b5012384822f5b0d", "23d7873dfd2da43a03d074eb8b60a758bbcc6454", "4994ceb6c2f16571f633271f46979ce32c86f77c", "c0c1a44399741e194fa058f63bf0cc812d37494c", "18c811efa4450214d8b35e33726f23a2f9e468ff", "7a037b1afc2feab1b8f9103658b28ba986f03488" ]
2,009
003159621eccf73715f7295758fb3e88f595b784
23,428
Empirical Findings in Agile Methods
In recent years, the use of, interest in, and controversy about Agile methodologies have realized dramatic growth. Anecdotal evidence is rising regarding the effectiveness of agile methodologies in certain environments and for specified projects. However, collection and analysis of empirical evidence of this effectiveness and classification of appropriate environments for Agile projects has not been conducted. Researchers from four institutions organized an eWorkshop to synchronously and virtually discuss and gather experiences and knowledge from eighteen Agile experts spread across the globe. These experts characterized Agile Methods and communicated experiences using these methods on small to very large teams. They discussed the importance of staffing Agile teams with highly skilled developers. They shared common success factors and identified warning signs of problems in Agile projects. These and other findings and heuristics gathered through this valuable exchange can be useful to researchers and to practitioners as they establish an experience base for better decision making. 1. The rise of Agile Methods Plan-driven methods are those in which work begins with the elicitation and documentation of a “complete” set of requirements, followed by architectural and high level-design development and inspection. Examples of plan-driven methods include various waterfall and iterative approaches, such as the Personal Software Process (PSP) [1]. Beginning in the mid-1990’s, some practitioners found these initial requirements documentation, and architecture and design development steps frustrating and, perhaps, impossible [2]. As Barry Boehm [3] suggests, these plan-driven methods may well start to pose difficulties when change rates are still relatively low. The In Proceedings of Extreme Programming and Agile Methods XP/Agile Universe 2002, pp. 197-207.
[ "1736314", "1678713", "1717395", "3054125", "3262309", "1723491", "2130942", "1725469", "1788542" ]
[]
[ "37fbed6af3f0bbdf0085bb8bd80c025c9b142825", "62355ea72376d92d5df8550b848483493a87ef74", "286d368d1e5b0b0847de3b107b7b589c0a37fb89", "91877b1e2019f1c660070312c61d6d665759c0a9", "5083c2a0079aab4135225d8bfd38d387faca4172", "d2189420c9261d960a12bcacf5824a9eed24d308", "25bc573a4c8b9ea9314f82797bbfafb2ffbd2d3a", "df0fa9c64d6f7bc985b226653027bc87d1b14b22", "25f287e9014cac14994e7563a0b51cd162aa0f3a", "95587f603098b5b30253b727cb9e0ddaac6ba164" ]
2,002
0033a0c1a842acbf89e5fa9b3b6b84d7e3545c6d
221,657,079
Gapped BLAST and PSI-BLAST: a new generation of protein database search programs.
The BLAST programs are widely used tools for searching protein and DNA databases for sequence similarities. For protein comparisons, a variety of definitional, algorithmic and statistical refinements described here permits the execution time of the BLAST programs to be decreased substantially while enhancing their sensitivity to weak similarities. A new criterion for triggering the extension of word hits, combined with a new heuristic for generating gapped alignments, yields a gapped BLAST program that runs at approximately three times the speed of the original. In addition, a method is introduced for automatically combining statistically significant alignments produced by BLAST into a position-specific score matrix, and searching the database using this matrix. The resulting Position-Specific Iterated BLAST (PSI-BLAST) program runs at approximately the same speed per iteration as gapped BLAST, but in many cases is much more sensitive to weak but biologically relevant sequence similarities. PSI-BLAST is used to uncover several new and interesting members of the BRCT superfamily.
[ "1805699", "34806045", "1783217", "2833549", "47294118", "4537110", "1816655" ]
[]
[ "ea74082c6c10b1abbb3e4b43636e33e372186c1e" ]
1,997
0034f4542269d165bc4c12925ce42b1d30d3b7ef
17,036,709
A Survey on Botnet Architectures, Detection and Defences
Botnets are known to be one of the most serious Internet security threats. In this survey, we review botnet architectures and their controlling mechanisms. Botnet infection behavior is explained. Then, known botnet models are outlined to study botnet design. Furthermore, Fast-Flux Service Networks (FFSN) are discussed in great details as they play an important role in facilitating botnet traffic. We classify botnets based on their architecture. Our classification criterion relies on the underlying C&C (Command and Control) protocol and thus botnets are classified as IRC (Internet Relay Chat), HTTP (HyperText Transfer Protocol), P2P (Peer-to-Peer), and POP3 (Post Office Protocol 3) botnets. In addition, newly emerging types of botnets are surveyed. This includes SMS & MMS mobile botnet and the botnets that abuse the online social networks. In term of detection methods, we categorize detection methods into three main groups, namely: (1) traffic behavior detection -in which we classify botnet traffic into; C&C traffic, bot generated traffic, and DNS traffic, (2) botmaster traceback detection, and (3) botnet detection using virtual machines. Finally, we summarize botnet defence measures that should be taken after detecting a botnet.
[ "26902581", "2158716", "2465649" ]
[]
[ "8d904b1fabefa774994ecf015c3df022ac14345c", "16e9d1d7c3f235c4bc64ae8059ef76ca1781cfc5", "34fb7a03092e8bb393a8d0fcfdd56f3c5a171c49", "b7186beefb317e667ff6424d15937f815fcbdb46", "43ffa2c1a06a76e58a333f2e7d0bd498b24365ca", "d63afcd012d42ae4b10c26b06989fda4d20bbfa7", "62000a21305e10bcf2492113656d8aff5741a62b", "2dbe2147f046a40451a25ed2299b00eef76afbf7", "5a74be8ec45c7abaf0785cf2bb33a5b80f6edaed", "41198815ae518fbe8057da18893df068f26cda06" ]
2,015
00357a417ce470a78f7a84d18ae2604330455d2a
195,345,934
Meta-Learning with Temporal Convolutions
Deep neural networks excel in regimes with large amounts of data, but tend to struggle when data is scarce or when they need to adapt quickly to changes in the task. Recent work in meta-learning seeks to overcome this shortcoming by training a meta-learner on a distribution of similar tasks; the goal is for the meta-learner to generalize to novel but related tasks by learning a high-level strategy that captures the essence of the problem it is asked to solve. However, most recent approaches to meta-learning are extensively hand-designed, either using architectures that are specialized to a particular application, or hard-coding algorithmic components that tell the meta-learner how to solve the task. We propose a class of simple and generic meta-learner architectures, based on temporal convolutions, that is domainagnostic and has no particular strategy or algorithm encoded into it. We validate our temporal-convolution-based meta-learner (TCML) through experiments pertaining to both supervised and reinforcement learning, and demonstrate that it outperforms state-of-the-art methods that are less general and more complex.
[ "3414570", "22222033", "49794866", "1689992" ]
[]
[ "ea099a4383bc481e427cf98b2210d82cda95a408", "db0d840bad86c4e6bfcc5d89ca28a196831d4b7a", "1e6bcda276bb1681125eb18ca4d62a44e94c25c9", "1827de6fa9c9c1b3d647a9d707042e89cf94abf0", "8e4ab54564fb492dcae9a1e862aedd3e52fb258b", "1029bb5c9f9cb7ab486eb0c2a2a1c59104820928", "2c03df8b48bf3fa39054345bafabfeff15bfd11d", "f3b27bfc020b7e68e2be0987b22be633381f8b6a", "14e257bd91af4366d79effac149f03b95f1eaf74", "272216c1f097706721096669d85b2843c23fa77d" ]
2,017
0035a7b8ac68cbe4a4cb34a09c3a97e68c48dc94
8,450,924
Learning to Extract Signature and Reply Lines from Email
We describe methods for automatically identifying signature blocks and reply lines in plaintext email messages. This analysis has many potential applications, such as preprocessing email for text-to-speech systems; anonymization of email corpora; improving automatic content-based mail classifiers; and email threading. Our method is based on applying machine learning methods to a sequential representation of an email message, in which each email is represented as a sequence of lines, and each line is represented as a set of features. We compare several state-of-the-art sequential and non-sequential machine learning algorithms on different feature sets, and present experimental results showing that the presence of a signature block in a message can be detected with accuracy higher than 97%; that signature block lines can be identified with accuracy higher than 99%; and that signature block and reply lines can be simultaneously identified with accuracy of higher than 98%.
[ "3602976", "1702241" ]
[]
[ "0c4a627815f65874e803f4334000245f38678d71", "3b8e7c8220d3883d54960d896a73045f3c70ac17", "167e21b3932ac9f18e49899b7c5b0347395fd9f9", "32f979945f00b34a6f052ee793388830dd663f38", "136e6f2592b42cc7d851dba85fdb637f2091973a", "3eeff93605ae2cb8d1dc524e14cab0d1ac03c79b", "0c7f52c753a65ceaf3755e20b906ffd0c05c994a", "886a63f0a5e5b8a062b090300a24ae416597ee7b", "3cb63a11b3eb3bf89c9f5678efb63c5dcf7600c5", "14e53403a0055dbe5faaf9f1f3be96ca0e692a4d" ]
2,004
00364f6e3734a71a519126968b18d0682f380358
27,687,035
KYPO Cyber Range: Design and Use Cases
The physical and cyber worlds are increasingly intertwined and exposed to cyber attacks. The KYPO cyber range provides complex cyber systems and networks in a virtualized, fully controlled and monitored environment. Time-efficient and cost-effective deployment is feasible using cloud resources instead of a dedicated hardware infrastructure. This paper describes the design decisions made during it’s development. We prepared a set of use cases to evaluate the proposed design decisions and to demonstrate the key features of the KYPO cyber range. It was especially cyber training sessions and exercises with hundreds of participants which provided invaluable feedback for KYPO platform development.
[ "2144790", "1713571", "2392456", "2903102", "2332116" ]
[]
[ "0b837d3d84f233fc7d33ed0e3ac9be3e3e9f1c30", "dd95b494a9e4712a763d0537f5c1b474e2772817", "f44ee3be36f0ae45b81ba343cedf4ef21f0f5f7e", "70b081fc63c84506a2ed53c06d172f653d380ba7", "3e161835dc44df9348f6cce2fc161cab36c88ce7", "f3bd245a9d2e8f174dba0a1a08d81b2ea20fdbd0", "05f5ce65e3684eeb3a05a950f2431fd68ed283d6", "7eaddfc00a43ce456590a0d7eb2dad31264205e8", "4d21799b7d543132f2c9ddfb9426b53b3ff0797c", "3718880c6d2411a778fe803403295711fbf37a8e" ]
2,017
003715e5bda2dfd2373c937ded390e469e8d84b1
221,538,240
Directed diffusion: a scalable and robust communication paradigm for sensor networks
Advances in processor, memory and radio technology will enable small and cheap nodes capable of sensing, communication and computation. Networks of such nodes can coordinate to perform distributed sensing of environmental phenomena. In this paper, we explore the directed diffusion paradigm for such coordination. Directed diffusion is datacentric in that all communication is for named data. All nodes in a directed diffusion-based network are application-aware. This enables diffusion to achieve energy savings by selecting empirically good paths and by caching and processing data in-network. We explore and evaluate the use of directed diffusion for a simple remote-surveillance sensor network.
[ "3113917", "1747970", "3734501" ]
[]
[ "9a62cd94003fa9b087915289fa26443c596879f9", "9615f81b11b3bc9bc5ffe55cc9c69e8235d3fded", "2b554ae834827462bc629fde348e239a18ee0ff9", "84fcbb5e8e0e11d7f38be13cb9b1b224244552f4", "f6e7a3ca0a3bee4140dea695524c404c610b9122", "006df3db364f2a6d7cc23f46d22cc63081dd70db", "53b85e4066944b1753aae8e3418028a67d9372e1", "3044a9e3bba3286c528239f5fb378e658516aa8c", "02ff8dcf7702defe7420378813d6fdb2b88b84c5", "8ef0114d980fad82917fc3b1b0643d5ef092272f" ]
2,000
00374f1e8db7db417283ae6736f4992c9400f734
33,285,559
Flat Luneburg Lens via Transformation Optics for Directive Antenna Applications
The great flexibility offered by transformation optics for controlling electromagnetic radiation by virtually re-shaping the electromagnetic space has inspired a myriad of dream-tailored electromagnetic devices. Here we show a 3D-transformed microwave Luneburg lens antenna which demonstrates high directivity, low side-lobe level, broadband response and steerable capabilities. A conventional Luneburg lens is redesigned accounting for dielectric materials that implement a coordinate transformation, modifying the lens geometry to accommodate its size and shape for easy integration with planar microwave antenna applications. An all dielectric lens is manufactured following a thorough holistic analysis of ceramic materials with different volume fractions of bi-modal distributed titanate fillers. Fabrication and measurements of a 3-D flat Luneburg lens antenna validate the design and confirm a high-directivity performance. A directivity of 17.96 dBi, low side-lobe levels for both main planes ~ -26 dB, excellent directivity performance within the X-band and beam-steering up to 34 ° were achieved.
[ "9909516", "49238676", "50270983", "33997147", "1777293" ]
[]
[ "3a0810d48284d3ab181ce59a1f7411156ce60bcf", "9f52386bba25d67f7173560534b77b993f6eca90", "615e70389ea0719b47f63901a49c7c3cb444a895", "9777eb9450611654bfe4f61009eddb2a37819762", "1f4416d1680635665c875ae5b7d19ae5fc3910da", "32fde349e701a713794007a001009449b840c2c9", "986d74a7f9ec0dee663339aab94fe1bdf2f2d93e", "b1a65ed77ee8e4b83bc68f397776784e64a0401b", "f77d3eea2d8a79cd468741a5934e0e79f7d0d69f", "ee17277008211379dbc6bab6642de0e0955ec233" ]
2,014
0037bf7ccc09f48236269fa421fa1fe5c6dab306
10,704,326
Locally Scale-Invariant Convolutional Neural Networks
Convolutional Neural Networks (ConvNets) have shown excellent results on many visual classification tasks. With the exception of ImageNet, these datasets are carefully crafted such that objects are well-aligned at similar scales. Naturally, the feature learning problem gets more challenging as the amount of variation in the data increases, as the models have to learn to be invariant to certain changes in appearance. Recent results on the ImageNet dataset show that given enough data, ConvNets can learn such invariances producing very discriminative features [1]. But could we do more: use less parameters, less data, learn more discriminative features, if certain invariances were built into the learning process? In this paper we present a simple model that allows ConvNets to learn features in a locally scale-invariant manner without increasing the number of model parameters. We show on a modified MNIST dataset that when faced with scale variation, building in scale-invariance allows ConvNets to learn more discriminative features with reduced chances of over-fitting.
[ "20615377", "1785252", "34734622" ]
[]
[ "243e681e23e7d1744defd2ee0c83643b05f003d3", "2239f2a97d80b63466815e2e2d6ee993d156813e", "05cc38e249a6f642363b5a5cbd71cda67cea5893", "8f7214bafbed6d4dfd397c35315c7275d5608f61", "86ab4cae682fbd49c5a5bedb630e5a40fa7529f6", "cbcd9f32b526397f88d18163875d04255e72137f", "9ab0de951cc9cdf16887b1f841f8da6affc9c0de", "013cd20c0eaffb9cab80875a43086e0c3224fe20", "096e07ced8d32fc9a3617ff1f725efe45507ede8", "38f35dd624cd1cf827416e31ac5e0e0454028eca" ]
2,014
00429aeb0dee2ef81b8850a0f8b98bb9a72020d6
27,361,687
Developer Behavior and Sentiment from Data Mining Open Source Repositories
Developer sentiment may wax and wane as a project progresses. Open-source projects that attract and retain developers tend to be successful. It may be possible to predict project success, in part, if one can measure developer behavior and sentiment -- projects with active, happy developers are more likely to succeed. We have analyzed GitHub.com projects in an attempt to model these concepts. We have data mined 124 projects from GitHub.com. The projects were automatically mined using sequence mining methods to derive a behavioral model of developer activities. The projects were also mined for developer sentiment. Finally, a regression model shows how sentiment varies with behavioral differences -- a change in behavior is correlated with a change in sentiment. The relationship between sentiment and success is not directly explored, herein. This research project is a preliminary step in a larger research project aimed at understanding and monitoring FLOSS projects using a process modeling approach.
[ "1695036", "1701916", "2857674" ]
[]
[ "8dd0407645722a9ab8508d860270bb08169bb9cc", "07cdc30cb084fefb5c797a4b7b0d92d6ef585d6c", "ed20ee826e0dffa88530080d3ae8d702ab380090", "a40ab5e02d9046ed12d4584162cc1cca8438eab1", "934e0e87df10ca51138e3fe857a2de216787cbef", "2f9619a071f728bb8c55fa368cac026f3ebedfd6", "5657c03a403f2f51022aeb845c8f3bab15ebc9b5", "10fe1adf25ee4bfc6acd93d1f978a57ceade86bc", "0873987e6d750974aaad14d36dba2ecbd7b909c0", "748b3e14ae631254a1e95b1cbcb0bd8c31276615" ]
2,016
00480d7af54eadd8f3bf1a765813038f55e37a15
1,108,797
How we know our own minds: the relationship between mindreading and metacognition.
Four different accounts of the relationship between third-person mindreading and first-person metacognition are compared and evaluated. While three of them endorse the existence of introspection for propositional attitudes, the fourth (defended here) claims that our knowledge of our own attitudes results from turning our mindreading capacities upon ourselves. Section 1 of this target article introduces the four accounts. Section 2 develops the "mindreading is prior" model in more detail, showing how it predicts introspection for perceptual and quasi-perceptual (e.g., imagistic) mental events while claiming that metacognitive access to our own attitudes always results from swift unconscious self-interpretation. This section also considers the model's relationship to the expression of attitudes in speech. Section 3 argues that the commonsense belief in the existence of introspection should be given no weight. Section 4 argues briefly that data from childhood development are of no help in resolving this debate. Section 5 considers the evolutionary claims to which the different accounts are committed, and argues that the three introspective views make predictions that are not borne out by the data. Section 6 examines the extensive evidence that people often confabulate when self-attributing attitudes. Section 7 considers "two systems" accounts of human thinking and reasoning, arguing that although there are introspectable events within System 2, there are no introspectable attitudes. Section 8 examines alleged evidence of "unsymbolized thinking". Section 9 considers the claim that schizophrenia exhibits a dissociation between mindreading and metacognition. Finally, section 10 evaluates the claim that autism presents a dissociation in the opposite direction, of metacognition without mindreading.
[ "2707375" ]
[]
[ "5e28ba8bd38995b7aea03589993d43028b362725", "0f8dd9f7a4becb244a720dae434b6a76f62dfd17", "7b3595d16373743b902338532a8a4602509ba7e7", "c063682a3915e1c208ae677787f31e92a48924f1", "1aca0588fb5cf8d512548b4b15d48f1c9de2396d", "f6b23bdb18b1f3c0e82c1661734c5e5f46f75d03", "5d6c8b43a7a2ab42ce6ce3c9d4ad468b922e934a", "229261c14b0013a00f7ddfbeb9f68605bf10bd38", "43ba27abf06e59a70c6f0539cfe55b91006e9cae", "fc81e4b3fd53436a9dd91138f70e995a1c659a29" ]
2,009
004888621a4e4cee56b6633338a89aa036cf5ae5
15,943,670
Wrappers for Feature Subset Selection
In the feature subset selection problem, a learning algorithm is faced with the problem of selecting a relevant subset of features upon which to focus its attention, while ignoring the rest. To achieve the best possible performance with a particular learning algorithm on a particular training set, a feature subset selection method should consider how the algorithm and the training set interact. We explore the relation between optimal feature subset selection and relevance. Our wrapper method searches for an optimal feature subset tailored to a particular algorithm and a domain. We study the strengths and weaknesses of the wrapper approach and show a series of improved designs. We compare the wrapper approach to induction without feature subset selection and to Relief, a filter approach to feature subset selection. Significant improvement in accuracy is achieved for some datasets for the two families of induction algorithms used: decision trees and Naive-Bayes. @ 1997 Elsevier Science B.V.
[ "1726733", "34929449" ]
[]
[ "7c74fe3fab1af1c2cd2ed3fb355c66134ceb5b0b", "fbc2a82c6fc734a17c95ddcd41ff194e07685dba", "cf7b33b33ef6a3fd87876a275ede6a3ca1dffe8f", "1a83dd0348994c9077f36b0094cd0841678f0913", "244b25c97bd53a235a1fca458c410a81c95f019d", "aa68a55094bdf277615823404987384fa021a016", "3db9f27b7021128b6522b42a9782a207451ca2d3", "b6119b3640c6a92badc16b1f254fd43408a47149", "2a532105580a3d4c528b74b1e02ab193459e8efc", "b9d98186442f762ab65b64c675fd2c7d938c415f" ]
1,997
004a894ca551b2454a0a2215920ac467e85418c8
2,989,164
Physics-motivated features for distinguishing photographic images and computer graphics
The increasing photorealism for computer graphics has made computer graphics a convincing form of image forgery. Therefore, classifying photographic images and photorealistic computer graphics has become an important problem for image forgery detection. In this paper, we propose a new geometry-based image model, motivated by the physical image generation process, to tackle the above-mentioned problem. The proposed model reveals certain physical differences between the two image categories, such as the gamma correction in photographic images and the sharp structures in computer graphics. For the problem of image forgery detection, we propose two levels of image authenticity definition, i.e., imaging-process authenticity and scene authenticity, and analyze our technique against these definitions. Such definition is important for making the concept of image authenticity computable. Apart from offering physical insights, our technique with a classification accuracy of 83.5% outperforms those in the prior work, i.e., wavelet features at 80.3% and cartoon features at 71.0%. We also consider a recapturing attack scenario and propose a counter-attack measure. In addition, we constructed a publicly available benchmark dataset with images of diverse content and computer graphics of high photorealism.
[ "2475944", "9546964", "5648211", "33650938", "46243746" ]
[]
[ "097e157201da1c6abd06eb92c80de5e6762994d8", "05393361e6d9e56ee7dbabb1e5ef6c1c212fc34d", "1189d969dbba1a46296cf100bf3448d9a3be60dd", "0f4107df9063c1a22cc39c464e8e2fc1d384de6d", "1f2cfb7b4e72081968b7b91bcc35d747338f3204", "5a38f633ba1241882ea9745cd175af0b1de7c942", "dee94842bf86b8ab987c0f3053e8265d6cd6aa4a", "25f862404925390572724bba9293e8f87825d03b", "d1a9d14a37d70599111971aa1de6dbc7e99a89f6", "02cfcfe6c86d444c2ee41000662b6265623a347f" ]
2,005
004aa2cb4b68850ee006af8a6807b3c1a6a198f0
14,888,659
Deep Classifiers from Image Tags in the Wild
This paper proposes direct learning of image classification from image tags in the wild, without filtering. Each wild tag is supplied by the user who shared the image online. Enormous numbers of these tags are freely available, and they give insight about the image categories important to users and to image classification. Our main contribution is an analysis of the Flickr 100 Million Image dataset, including several useful observations about the statistics of these tags. We introduce a large-scale robust classification algorithm, in order to handle the inherent noise in these tags, and a calibration procedure to better predict objective annotations. We show that freely available, wild tag can obtain similar or superior results to large databases of costly manual annotations.
[ "2992579", "2537592", "2270286", "28552618", "1747779" ]
[]
[ "0bb4401b9a1b064c513bda3001f43f8f2f3e28de", "b9ed0bb4aae5d89c48ce2ce372f2891c228fe0f8", "24496e4acfb8840616b2960b0e2c80cc4c9e5a87", "0e2af97f07625cb3cf5e30f1c9d807124cbbc850", "6178c72e3e3050f0d11a299617dc540425e70801", "75996937696cce0804b5ac835443f5e28a3b7bdd", "4343fd5edb47bf39ed0dca8085a22097584ed597", "1d827e24143e5fdfe709d33b7b13a9a24d402efd", "86d2add9aa90014a6330e3eb59277562adaeeda4", "4c7f38b537cf440d895b80b5b0b296d841161015" ]
2,015
00514b5cd341ef128d216e86f2a795f218ef83db
14,498,348
Design and development of a heart rate measuring device using fingertip
In this paper, we presented the design and development of a new integrated device for measuring heart rate using fingertip to improve estimating the heart rate. As heart related diseases are increasing day by day, the need for an accurate and affordable heart rate measuring device or heart monitor is essential to ensure quality of health. However, most heart rate measuring tools and environments are expensive and do not follow ergonomics. Our proposed Heart Rate Measuring (HRM) device is economical and user friendly and uses optical technology to detect the flow of blood through index finger. Three phases are used to detect pulses on the fingertip that include pulse detection, signal extraction, and pulse amplification. Qualitative and quantitative performance evaluation of the device on real signals shows accuracy in heart rate estimation, even under intense of physical activity. We compared the performance of HRM device with Electrocardiogram reports and manual pulse measurement of heartbeat of 90 human subjects of different ages. The results showed that the error rate of the device is negligible.
[ "31928951", "35219726", "1835096", "39939518" ]
[]
[ "ae29562e1254305381d6d4000cbf1eff16638a18", "982a3df37893d5e89e4b5ec5f59e4c7f978a944a", "7eaa246590a95adfa0ab3db026a9857ba76760f5", "6422e1ae53f5a2cd4cd55adf28f4588e41d7893f", "358cca71405dc3e0156c665b5b98e0db0ca5badb" ]
2,010
0052c9768f873bebf4b1788cc94bb8b0b3526be7
7,362,504
Interaction control of an UAV endowed with a manipulator
In this paper, we present the design, simulation and experimental validation of a control architecture for an unmanned aerial vehicle endowed with a manipulation system and interacting with a remote environment. The goal of this work is to show that the interaction control allows the manipulator to track a desired force, normal to a vertical wall, while still maintaining the possibility of moving on the wall. The control strategy has been implemented and validated in simulations and experiments on the manipulator standalone, i.e., attached to a fixed base, and on the manipulator attached to the aerial vehicle.
[ "39222011", "47474115", "1711747", "1770216" ]
[]
[ "db5fad57f5b1ebedd519d4618ecf351ccd001eb4", "22b1bdfa938c09fef732cb6ae95489b23d4e34e7", "c40cb399c2deebfc6a373f59481c63c74eaf505e", "7cfca3cb47d4a610fe9216f566ff76aa0b43d2f0", "06e412233335db135546ec29a223e2da65185303", "1856721fc1356f16d979c81073a8febb955b1294", "9c218855f88b83ae3ea2a5b9d9fbe08f55c45e85", "c2fcff678eb7b3251bd487308875f2f80fc0f14a", "f5f8a6aa4adc13070224c2bd43a255c4e0844c15" ]
2,013
00552e6063098c233090719259b6be0abc9a2e9e
18,806,869
CLASSIFICATION OF TWEETS VIA CLUSTERING OF HASHTAGS
We present two techniques to aid in the retrieval of information from Twitter. First we present a technique to cluster hashtags in meaningful topic groups using a combination of co-occurrence frequency, graph clustering and textual similarity. Second, we present a technique to classify a tweet in terms of these topic groups based on their word content using a combination of PCA dimensionality reduction and a variety of multi-class classification algorithms. We examine the relationship between the clustering step and the classification step to evaluate the performance of each.
[ "11205681" ]
[]
[ "827ebb407a7aac34dfe3d43cd056a829ff4ad9c7", "0e3e3c3d8ae5cb7c4636870d69967c197484d3bb", "5c895fcb26d3fad65858cd2ce5f01c6d868e1d69", "771636b26260fac6d215df5e76c9ce72c346ba88", "61bad001868aaf56c5ea69a1ece963342ea7281a", "8c282f7d2a63c2d77c45af12ebd5b4867c96a4e6", "17fcbc6cb84e2e5a0847d705a541c1a19fb8b886", "7045807c553bff07dd5ff96ef775cdd3379eb290", "22c74d8be071084ce8812af19548e7bf2bf0c8b6" ]
2,011
005866aaabcff09663aee7f8bd14a0ffa1d574c2
11,749,269
Training a Feedback Loop for Hand Pose Estimation
We propose an entirely data-driven approach to estimating the 3D pose of a hand given a depth image. We show that we can correct the mistakes made by a Convolutional Neural Network trained to predict an estimate of the 3D pose by using a feedback loop. The components of this feedback loop are also Deep Networks, optimized using training data. They remove the need for fitting a 3D model to the input data, which requires both a carefully designed fitting function and algorithm. We show that our approach outperforms state-of-the-art methods, and is efficient as our implementation runs at over 400 fps on a single GPU.
[ "2650133", "3202367", "1689738" ]
[]
[ "3c5475414e37f902a1ae8a46a8a7150cd88f1e40", "a2d9ccc023c97b495027a904b0d3371422588452", "2fccaa0c8ad0c727f1f7ec948ba9256092c2a64d", "afbd6dbf502004ad2be091afc084580d02a56a2e", "6d5e12ee5d75d5f8c04a196dd94173f96dc8603f", "0ca6cccbfcf3df972a470c7fe18f7eaed9420cd6", "2c3365f2520a938df54a8e0c9f63a0a5fb9db272", "49609ea8946d5c4d8fad96553b10e2b07f4e2485", "5005372eb78f141d45d50071ecb5e3b0d71c2a18", "8283cc4fd5218e2a818324214c79682bc684626d" ]
2,015
0058c41f797d48aa8544894b75a26a26602a8152
9,289,088
Missing value imputation for gene expression data: computational techniques to recover missing data from available information
Microarray gene expression data generally suffers from missing value problem due to a variety of experimental reasons. Since the missing data points can adversely affect downstream analysis, many algorithms have been proposed to impute missing values. In this survey, we provide a comprehensive review of existing missing value imputation algorithms, focusing on their underlying algorithmic techniques and how they utilize local or global information from within the data, or their use of domain knowledge during imputation. In addition, we describe how the imputation results can be validated and the different ways to assess the performance of different imputation algorithms, as well as a discussion on some possible future research directions. It is hoped that this review will give the readers a good understanding of the current development in this field and inspire them to come up with the next generation of imputation algorithms.
[ "1733300", "40657474", "50017602" ]
[]
[ "7cb128cd776e5bb78a6c3b1c9ee9f49711158ff2", "6bbe596559638cf435921d699a5e93221936052b", "e01fc3c7bd66e17096e78b6a67f8d528f23b7d3f", "01df600d21341f4baacd3530a3bff8eb5a9b924a", "04d113fd87f9ba0669e1987b4dcaccf14a903f72", "0a7f15a0bf16e21a743c2b53e139e0941800b78f", "790dabe572bcacba60f9c4506fa042a276c06fc5", "347e9860872889937b367c89759ce71896b91ef0", "2f059a371f05ad4a1503885110c5d39206995a49", "1017e6049188e10b8f5da646a47adf1320ce509b" ]
2,011
0059d304639d83f6e514f187f5dcd2d59f09617a
40,513,312
Matlab/Simulink Model of Space Vector PWM for Three-Phase Voltage Source Inverter
Variable voltage and frequency supply to AC drives is invariably obtained from a three-phase voltage source inverter (VSI). A number of pulse width modulation (PWM) schemes are used to obtain variable voltage and frequency supply. The most widely used PWM schemes for three-phase VSI are carrier-based sinusoidal PWM and space vector PWM (SVPWM). There is an increasing trend of using space vector PWM (SVPWM) because of their easier digital realisation and better dc bus utilisation. This paper focuses on step by step development of MATLAB/SIMULINK model of SVPWM. Firstly model of a three-phase VSI is discussed based on space vector representation. Next simulation model of SVPWM is obtained using MATLAB/SIMULINK. Simulation results are also provided.
[ "35457185", "47486609", "30620294", "47312937" ]
[]
[ "b1f0abc711a62dfe330f2bebe26f20b8ff3eba2b" ]
2,006
005a08524e309ef170161fd7f072d10c6c692efe
7,723,766
IMPROVING WEB SERVICE CLUSTERING THROUGH POST FILTERING TO BOOTSTRAP THE SERVICE DISCOVERY
Web service clustering is one of a very efficient approach to discover Web services efficiently. Current approaches use similarity-distance measurement methods such as string-based, corpus-based, knowledge-based and hybrid methods. These approaches have problems that include discovering semantic characteristics, loss of semantic information, shortage of high-quality ontologies and encoding fine-grained information. Thus, the approaches couldn’t identify the correct clusters for some services and placed them in wrong clusters. As a result of this, cluster performance is reduced. This paper proposes post-filtering approach to increase the performance of clusters by rearranging services incorrectly clustered. Our approach uses context aware similarity method that learns domain context by machine learning to produce models of context for terms retrieved from the Web in the filtering process to calculate the service similarity. We applied post filtering approach to hybrid term similarity based clustering approach that we proposed in our previous work. Experimental results show that our post-filtering approach works efficiently.
[ "1714346", "2526308", "1692487" ]
[]
[ "e49289263d1eb6261b833c619a911ee89a9ad038", "73042247cd1090190f0e73ed4147cd4d2eabb1d4", "471a56b9541b369ece013f6f62c074cfadfb0028", "c717527b3da8de2f9febcd3a575f4b9f38899705", "1819ccb5f656b53cd6ba9cbdbcc0e4517ab2938c", "b0bde44985952b2733f1f3349a703c2c51e9d65f", "04c9295d63821ea488d7f7d0795ef81226030c72", "fbfbb5d5f4b424c3e4ea960bf7adb5176e0dffbd", "d6f8a959d9649794b8424d6aefdf6d6da0562813", "0860ec7b445499bfabb5e660e56521e49ef7a82a" ]
2,014
005aea80a403da18f95fcb9944236a976d83580e
7,033,413
Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information
This paper considers the model problem of reconstructing an object from incomplete frequency samples. Consider a discrete-time signal f/spl isin/C/sup N/ and a randomly chosen set of frequencies /spl Omega/. Is it possible to reconstruct f from the partial knowledge of its Fourier coefficients on the set /spl Omega/? A typical result of this paper is as follows. Suppose that f is a superposition of |T| spikes f(t)=/spl sigma//sub /spl tau//spl isin/T/f(/spl tau/)/spl delta/(t-/spl tau/) obeying |T|/spl les/C/sub M//spl middot/(log N)/sup -1/ /spl middot/ |/spl Omega/| for some constant C/sub M/>0. We do not know the locations of the spikes nor their amplitudes. Then with probability at least 1-O(N/sup -M/), f can be reconstructed exactly as the solution to the /spl lscr//sub 1/ minimization problem. In short, exact recovery may be obtained by solving a convex optimization problem. We give numerical values for C/sub M/ which depend on the desired probability of success. Our result may be interpreted as a novel kind of nonlinear sampling theorem. In effect, it says that any signal made out of |T| spikes may be recovered by convex programming from almost every set of frequencies of size O(|T|/spl middot/logN). Moreover, this is nearly optimal in the sense that any method succeeding with probability 1-O(N/sup -M/) would in general require a number of frequency samples at least proportional to |T|/spl middot/logN. The methodology extends to a variety of other situations and higher dimensions. For example, we show how one can reconstruct a piecewise constant (one- or two-dimensional) object from incomplete frequency samples - provided that the number of jumps (discontinuities) obeys the condition above - by minimizing other convex functionals such as the total variation of f.
[ "2006869", "1735291", "36488566" ]
[]
[ "f690671cc46c6ab1ff2d6e285fbe16c402fcc6c0", "10e70e16e5a68d52fa2c9d0a452db9ed2f9403aa", "09c6891c7e49a93f67e1b74ede1b7597a0b733bc", "6cf9b027aa09d042dd13fd9ae848d902240b3d34", "3f713dbee2597844b3ca552ecb8530cd1974e77e", "4fa50317b49524ca7acc94afb4e04f669b68f65f", "19af5d27fecb65b2365ae32a663025eccc688c48", "aad63721fb4651346c3a6114c01cc148d634aa4d", "2d19175bd0bcd7c7a8bda66eb2a7a14f9d40ffa1", "6edd13f395315c5ac532a20bbedd9a30afe1e76a" ]
2,006
005b078a8ea9346839b7ef19013e4ce6c251bab3
216,008,848
Toward Meta-cognitive Tutoring: A Model of Help Seeking with a Cognitive Tutor
The research reported in this paper focuses on the hypothesis that an intelligent tutoring system that provides guidance with respect to students' meta-cognitive abilities can help them to become better learners. Our strategy is to extend a Cognitive Tutor (Anderson, Corbett, Koedinger, & Pelletier, 1995) so that it not only helps students acquire domain-specific skills, but also develop better general help-seeking strategies. In developing the Help Tutor, we used the same Cognitive Tutor technology at the metacognitive level that has been proven to be very effective at the cognitive level. A key challenge is to develop a model of how students should use a Cognitive Tutor's help facilities. We created a preliminary model, implemented by 57 production rules that capture both effective and ineffective help-seeking behavior. As a first test of the model's efficacy, we used it off-line to evaluate students' help-seeking behavior in an existing data set of student-tutor interactions. We then refined the model based on the results of this analysis. Finally, we conducted a pilot study with the Help Tutor involving four students. During one session, we saw a statistically significant reduction in students' meta-cognitive error rate, as determined by the Help Tutor's model. These preliminary results inspire confidence as we gear up for a larger-scale controlled experiment to evaluate whether tutoring on help seeking has a positive effect on students' learning outcomes.
[ "1779915", "1706869", "3130238", "1718810" ]
[]
[ "dab5c7c8f63eebf685d1342341e9ae16787c4ba6", "3cf20c79345dd9a524039b5312ed9bf62428f615", "bf82b47aee059f3b29c81ac3d48e9ca389c50ee2", "cf91c0b09f56b7f1ddf8e976d14bcdccf0f5ecb1", "8173c5546e50ee6495b191a090f364f6826412a0", "a83eaacdb4bdddddc0de24daaf0fb4d9905de58c", "65531d9f2930b32cae64da012943cc52128a9e57", "77a2ad7611f2a6a7d2d3680daf15f948b3374061", "75e8b5285575092baa92b9b2a35a701c2b724517", "c8bb33e1d0df8e5beb18ba1596a93d707acd6394" ]
2,006
005b12da7075264fb784c9ca1eb8115c4cce196e
15,970,841
Automatic fire detection based on soft computing techniques: review from 2000 to 2010
Automatic fire detection system is a system that is capable of assessing environmental factors and their effects on the environment as well as predicting the occurrence of fire in the early stages and even before the outbreak. There are two perspectives in fire detection: fire detection in forests or jungles and fire detection in occupied or residential areas. Automatic fire detection has attracted increased attention due to its importance in decreasing fire damage. There are many studies that have considered appropriate techniques for early fire detection. In recent years researches have been studying technical developments in this field aimed at exploiting wireless communications networks, detection systems and fire prediction systems design. In this paper the automatic fire detection researches using intelligent techniques from 2000 to 2010 is reviewed. We could classify researches to four categories: fire detectors, reduce false alarms systems, fire data analysis and fire predictors. We also classify the intelligent techniques outlined in the researches for each category.
[ "2930960", "3007522" ]
[]
[ "1c02ef60503023ae47e287a6873e90eb929f7e45", "6d38658be4c12303701fdbbec6d5ffd3dade5b30", "96771dad3dc67b48c0c1eb941393fba6bf9a4944", "d4a9788dcc7d3fbf3414fec009d3c5ce8cbea932", "511921e775ab05a1ab0770a63e57c93da51c8526", "c11c40b0ab3fd1d9fe97cf543f3b12c6420efebb", "4766af1511f9d75ceb7786b87cee31f5049ed94b", "1516ab1f01d4697851798c55cf1f9802a581a813", "15e56281a225db1604c709dd25fd31d7478e1c88", "71d7d5a9ff9e2d2d33931da902554eb7ec760629" ]
2,012
005b965c545ef1d67c462756b77d8ef7d812e944
10,177,813
An active volumetric model for 3D reconstruction
In this paper, we present an active volumetric model (AVM) for 3D reconstruction from multiple calibrated images of a scene. The AVM is a physically motivated 3D deformable model which shrinks actively under the influence of multiple simulated forces towards the real scene by throwing away some of its voxels. It provides a computational framework to integrate several constraints in an intelligible way. In the current work, we use three forces derived respectively from the smooth constraint, the compulsory silhouette constraint, and the color consistency constraint. Based on the composition of the 3 forces, our algorithm can significantly restrain holes and floating voxels, which plague voxel coloring algorithms, and produce precise and smooth models. We test our algorithm by experiments based on both synthetic and real data.
[ "46522348", "1720100", "1710220", "1698902" ]
[]
[ "ad695519aa31c61b47050e4c27e7c9f78754906f", "d10cdbde5ff106d7614674c5a9544520e0424ed8", "23e36033ff57ece1a56226e1db3ad7804353555b", "f8657a841c8838b2ee2a2f8336cb6a0bc04fe654", "44924fd2edcfb53e3381b104065355cce0ee176f", "96bc9d00828794a0f1c99131d55f9ea545f26eed", "31361806d61a038d2d3f43b6cfcf3210660080e4", "5d5165e1059c9595eb68d8b3ac66d2d2993216fd", "45c911ffca5da80fff69361072cb347511582822", "0bcd318d8d09019731f4137c9a4c123bb077af55" ]
2,005
005d92543a3ebf303d2b8e16c7c6a32d52c6618f
207,227,714
MultiSE: multi-path symbolic execution using value summaries
Dynamic symbolic execution (DSE) has been proposed to effectively generate test inputs for real-world programs. Unfortunately, DSE techniques do not scale well for large realistic programs, because often the number of feasible execution paths of a program increases exponentially with the increase in the length of an execution path. In this paper, we propose MultiSE, a new technique for merging states incrementally during symbolic execution, without using auxiliary variables. The key idea of MultiSE is based on an alternative representation of the state, where we map each variable, including the program counter, to a set of guarded symbolic expressions called a value summary. MultiSE has several advantages over conventional DSE and conventional state merging techniques: value summaries enable sharing of symbolic expressions and path constraints along multiple paths and thus avoid redundant execution. MultiSE does not introduce auxiliary symbolic variables, which enables it to 1) make progress even when merging values not supported by the constraint solver, 2) avoid expensive constraint solver calls when resolving function calls and jumps, and 3) carry out most operations concretely. Moreover, MultiSE updates value summaries incrementally at every assignment instruction, which makes it unnecessary to identify the join points and to keep track of variables to merge at join points. We have implemented MultiSE for JavaScript programs in a publicly available open-source tool. Our evaluation of MultiSE on several programs shows that 1) value summaries are an eective technique to take advantage of the sharing of value along multiple execution path, that 2) MultiSE can run significantly faster than traditional dynamic symbolic execution and, 3) MultiSE saves a substantial number of state merges compared to conventional state-merging techniques.
[ "1727202", "1790411", "1841939", "1868261" ]
[]
[ "048ca00d80c5b58f8fac3e0d4c8847366f247641", "3763fcd60b0b27911380e76debc7b1ceaa7a1728", "35bcfd59e3f695a74919f6ddc8ae5a1c6222049d", "0b93657965e506dfbd56fbc1c1d4b9666b1d01c8", "61819919af096dc949ebd8eb36c41e303e26a87c", "18e97c2f513c024ffa714ae5942885a891fa3d3f", "2e87227b08cab7563f6cf30a890098e1f8b1cf17", "043376d0454c003b642463e37ac7ca99fd838819", "0d1d0900cf862f11d3d7812c01d28be27c71a6c7", "70696431430bab0d406cb23f503af5841961ba76" ]
2,015
005fea45547d08c2ddef7897d77ec73efc38e2e5
11,318,756
Nonlinear Modeling of the Self-Oscillating Fluxgate Current Sensor
An accurate mathematical model has been developed in order to describe electrical and geometrical factors affecting operation and DC transfer characteristics of the self-oscillating fluxgate current sensor. The mathematical description of the sensor circuit is based on a continuous function that approximates magnetization curve of the used transformer core. The circuit differential equation based on the adopted transformer model is analytically solved offering a fundamental basis for understanding factors that affect the operation of the sensor. All principle parameters affecting sensor operation are clearly demonstrated by using the proposed model, and good agreements with laboratory measurements has been obtained.
[ "40181049", "48263542" ]
[]
[ "02361c6e71512cb7dd8262386dfa00408b337fb5", "21353cef818f1bc07633ca63de1ee16d56c77363", "2c0429de18e516c5cd10612186d1356c5607df69", "4a85a9e5b3c7f6c40a976ccf2360c67c8dd2c84b", "95f4707e96b60c6621758b2386ee1c40ce32392a", "7537c9c66246e1a5962f3c5fc38df566626efaa4", "5d141a9458b8d10cff1d439782abd29161386d21" ]
2,007
0066426bc4e99bd3a57e34081bcfdebd3041e02c
6,552,475
The FF Planning System: Fast Plan Generation Through Heuristic Search
We describe and evaluate the algorithmic techniques that are used in the FF planning system Like the HSP system FF relies on forward state space search using a heuristic that estimates goal distances by ignoring delete lists Unlike HSP s heuristic our method does not assume facts to be independent We introduce a novel search strategy that combines hill climbing with systematic search and we show how other powerful heuristic informa tion can be extracted and used to prune the search space FF was the most successful automatic planner at the recent AIPS planning competition We review the results of the competition give data for other benchmark domains and investigate the reasons for the runtime performance of FF compared to HSP
[ "1751480", "2609566" ]
[]
[ "038be3179b2888d7a9b052369a93dff7fd636e06", "05ec7a7a8cdcb5d7a14b62e7e9a97438b75ccaa4", "141c77b1d82bcae04a293c972cea02502e181dba", "542cfc1c1baaddf0b50bb64132835ee90038b806", "4e497dadbd7c03e83cc1d84172c872f83bf3f53b", "5e64e50708996e5b68d461215db80e588ea6a8ce", "898c78eebe2d30e73af40579c593d74d91006fd0", "1feaa8ac047375bb58b51cfa3adf4d30a761052e", "3248ed8b69473c7ceb5170cd8cbb46ad8f7a258c", "bdc044acedd6717ad6aae1cf4574b270480d8c68" ]
2,001
006a2b9e5e53f5a4d5586425597b0a2fccfb6637
7,624,625
A stochastic neuronal model predicts random search behaviors at multiple spatial scales in C. elegans
Random search is a behavioral strategy used by organisms from bacteria to humans to locate food that is randomly distributed and undetectable at a distance. We investigated this behavior in the nematode Caenorhabditis elegans, an organism with a small, well-described nervous system. Here we formulate a mathematical model of random search abstracted from the C. elegans connectome and fit to a large-scale kinematic analysis of C. elegans behavior at submicron resolution. The model predicts behavioral effects of neuronal ablations and genetic perturbations, as well as unexpected aspects of wild type behavior. The predictive success of the model indicates that random search in C. elegans can be understood in terms of a neuronal flip-flop circuit involving reciprocal inhibition between two populations of stochastic neurons. Our findings establish a unified theoretical framework for understanding C. elegans locomotion and a testable neuronal model of random search that can be applied to other organisms.
[ "28542500", "5212562", "33693108", "4046519", "16991700", "2242649", "4875173", "34263365", "30636325", "39273435", "3912040", "3286081" ]
[]
[ "a032ea8b8cd9a56754be5d32616bf286ef6e8dd3", "802b6c68ca6b2ed6d22ac20436603257536ac429", "aecb64decf5068f6eda8f77846b95cf39db726a4", "f98e2eb29e768ec7d4fea209546a5f939249350d", "8840386a07e8ed4c440b3cb1b7168189b80a0ff1", "aa1eac47a1c0528bf50ef12b05706cfeffe30e1f", "b4eabad1481956224c5cdc0f43e0feb8eb46d60f", "2d311bbbac509a06b130a5999e35197d9a1c6340", "e89f21bfeec648e12170746ccc351aa1b6a7bc9a", "b43ad123af7ec46e48645004a19511cae93b9920" ]
2,016
006a9e55241b70f85822d3f0e7d04b80c8026583
45,917,377
Designing and implementing an integrated technological pedagogical science knowledge framework for science teachers professional development
This paper reports on the design and the implementation of the Technological Pedagogical Science Knowledge (TPASK), a new model for science teachers professional development built on an integrated framework determined by the Technological Pedagogical Content Knowledge (TPACK) model and the authentic learning approach. The TPASK curriculum dimensions and the related course sessions are also elaborated and applied in the context of a teacher trainers’ preparation program aiming at ICT integration in science classroom practice. A brief description of the project, its accomplishments, and perceptions of the participants, through the lens of TPASK professional development model, are presented. This is followed by the presentation of the evaluation results on the impact of the program which demonstrates that science teachers reported meaningful TPASK knowledge and increased willingness to adopt and apply this framework in their instruction. Finally, we draw on the need to expand TPACK by incorporating a fourth dimension, the Educational Context within Pedagogy, Content and Technology mutually interact, in order to address future policy models concerning teacher preparation to integrate ICT in education. 2010 Elsevier Ltd. All rights reserved.
[ "1808446" ]
[]
[ "fb979c1912ed52f758559f0dbe5b60bd511bf073", "0f66d72ff559fbe03bb5aa4cee76332fee27cb95", "a3efd837698f91885cf93309a234b75ee8b7a39d", "cdf546755c62d749b80169e17b3f32b510f39e45", "d5f3fad0bd6c50e8876d8fed5d8e660e188b2714", "15ee5bc2d53fe2de4a6b2ab3093f2a689c65e90a", "bfa306a7ca2381b21f9b21d67724756df828cf6c", "0c75949827bb5258a8c9cc1fa408db18e2c9f849", "317a649cdb63cb28eb7c3574ea522fd01fd800bd", "6c11648054bc2fa688933e4fc67e504c1b542c36" ]
2,010
006c843a29a3c77f232638bf7aea63fc8601a73a
13,627,790
Estimation of the Mathematical Parameters of Double-Exponential Pulses Using the Nelder–Mead Algorithm
Transient pulses for electromagnetic compatibility problems, such as the high-altitude electromagnetic pulse and ultrawideband pulses, are often described by a double-exponential pulse. Such a pulse shape is specified physically by the three characteristic parameters rise time tr, pulsewidth tfwhm (full-width at half-maximum), and maximum amplitude Emax. The mathematical description is a double-exponential function with the parameters α, β, and E0. In practice, it is often necessary to transform the two groups of parameters into each other. This paper shows a novel relationship between the physical parameters tr and tfwhm on the one hand and the mathematical parameters α and β on the other. It is shown that the least-squares method in combination with the Nelder-Mead simplex algorithm is appropriate to determine an approximate closed-form formula between these parameters. Therefore, the extensive analysis of double-exponential pulses is possible in a considerably shorter computation time. The overall approximation error is less than 3.8%.
[ "9160226", "2242320" ]
[]
[ "02a3f09ae40e575d4c2e8421c137c49c6250c42a", "5dff09afdcfc111834e137e74876b0e154be4f4a", "86a6c964d077d78111d0682272c801ac89818d21" ]
2,010
006cf360a7725f10528eaa7e9efe32aa4ace7f11
12,012,646
Sensor networks for emergency response: challenges and opportunities
Sensor networks, a new class of devices has the potential to revolutionize the capture, processing, and communication of critical data for use by first responders. CodeBlue integrates sensor nodes and other wireless devices into a disaster response setting and provides facilities for ad hoc network formation, resource naming and discovery, security, and in-network aggregation of sensor-produced data. We designed CodeBlue for rapidly changing, critical care environments. To test it, we developed two wireless vital sign monitors and a PDA-based triage application for first responders. Additionally, we developed MoteTrack, a robust radio frequency (RF)-based localization system, which lets rescuers determine their location within a building and track patients. Although much of our work on CodeBlue is preliminary, our initial experience with medical care sensor networks raised many exciting opportunities and challenges.
[ "13617393", "32729674", "49209861", "2846525", "32535102", "2541093", "2398772", "38801503", "1904973" ]
[]
[ "16ccb8d307d3f33ebb395b32db23279b409f1228", "15306e10ac4ab182a51dec0e2749aff943394f01", "ea0d54b82f1fd529178a778925bb2a3b479b1af7", "80b934ec5b3562b33b9eff257681c4fa681ab126" ]
2,004
006df3db364f2a6d7cc23f46d22cc63081dd70db
156,012,795
Dynamic source routing in ad hoc wireless networks
An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination, due to the limited range of each mobile host’s wireless transmissions. This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing. The protocol adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently. Based on results from a packet-level simulation of mobile hosts operating in an ad hoc network, the protocol performs well over a variety of environmental conditions such as host density and movement rates. For all but the highest rates of host movement simulated, the overhead of the protocol is quite low, falling to just 1% of total data packets transmitted for moderate movement rates in a network of 24 mobile hosts. In all cases, the difference in length between the routes used and the optimal route lengths is negligible, and in most cases, route lengths are on average within a factor of 1.01 of optimal.
[ "38219130", "6103581" ]
[]
[ "b4d0956667e5f0c223b596f1a345f98caa3b1406", "4d4e12023309f2239e46117f64065667d1e71ed6", "5f80863b2119a9066c4bdfaec59bae3fccf72fb1", "ca0aae51e12e13a7561d557ffe0b93656aeb5af1", "54d05de4e6837a8e355835839430cb6067214013", "0899fbf4a2dc805ff491bea4cedb6014ff15ca18", "a30546aaae5f1d9da7e961623d3a611fc6685786", "4ad9e87de2c8a10b9248e995570c1b3d673a41cd", "b91c4feb1a5b66801b9bc49d82d4094aa41e36c8", "8eec870d2e8ae0c3123c7c7375beded7543f8d98" ]
1,994
006e0ce2f2367b66b1e5da178e53216c3d01d97b
2,536,452
Discovering Hidden Factors of Variation in Deep Networks
Deep learning has enjoyed a great deal of success because of its ability to learn useful features for tasks such as classification. But there has been less exploration in learning the factors of variation apart from the classification signal. By augmenting autoencoders with simple regularization terms during training, we demonstrate that standard deep architectures can discover and explicitly represent factors of variation beyond those relevant for categorization. We introduce a cross-covariance penalty (XCov) as a method to disentangle factors like handwriting style for digits and subject identity in faces. We demonstrate this on the MNIST handwritten digit database, the Toronto Faces Database (TFD) and the Multi-PIE dataset by generating manipulated instances of the data. Furthermore, we demonstrate these deep networks can extrapolate ‘hidden’ variation in the supervised signal.
[ "1858166", "3245814", "1994518", "1708655" ]
[]
[ "26f5056c9fc4f2de37116af3cdfd6b5085883b59", "0dae7054df3d01f8cfa71588b1bfc915443d6144", "8493e4fb80ed7cbc495d4dca4daf0f5a43cbcfa5", "17aa78bd4331ef490f24bdd4d4cd21d22a18c09c", "dc52d1ede1b90bf9d296bc5b34c9310b7eaa99a2", "8ec543a9e6b4ae5b3c9f6f938ae5a9bdf77d82ac", "20f0357688876fa4662f806f985779dce6e24f3c", "6de2b1058c5b717878cce4e7e50d3a372cc4aaa6", "ad33d1fa8628cb55c32fb52feb537f65184c3b29", "58513e5043c8a8fb61dbe83ab58225e7f60575af" ]
2,014
00744ace45478609d427ed846393fc5447832568
2,417,501
Consistently faster and smaller compressed bitmaps with Roaring
Compressed bitmap indexes are used in databases and search engines. Many bitmap compression techniques have been proposed, almost all relying primarily on run-length encoding (RLE). However, on unsorted data, we can get superior performance with a hybrid compression technique that uses both uncompressed bitmaps and packed arrays inside a two-level tree. An instance of this technique, Roaring, has recently been proposed. Due to its good performance, it has been adopted by several production platforms (e.g., Apache Lucene, Apache Spark, Apache Kylin and Druid). Yet there are cases where run-length encoded bitmaps are smaller than the original Roaring bitmaps— typically when the data is sorted so that the bitmaps contain long compressible runs. To better handle these cases, we build a new Roaring hybrid that combines uncompressed bitmaps, packed arrays and RLE compressed segments. The result is a new Roaring format that compresses better. Overall, our new implementation of Roaring can be several times faster (up to two orders of magnitude) than the implementations of traditional RLE-based alternatives (WAH, Concise, EWAH) while compressing better. We review the design choices and optimizations that make these good results possible.
[ "1679918", "3366304", "1693538" ]
[]
[ "3799b287b536c6ef346f2b63cc084f66e3445096", "cbdefeefb19445705fe2c55649d195e754078482", "8fffddb7e900e9a6873903d306c264e8759fec7d", "2c3579d0ec6241572cb21405b710ed392024189e", "9452145ce6f17e05f81415fcc40f7d4eac41fb8a", "43d66433875cb5c4eee68c8575f7be9108682c4b", "51f53b98ccc60bf255ab653a11b1573ed3c5d815", "f2934796ceb5a4cdf555fc2820169d408645bb31", "d49aa6f4d77a2be9e6508db24a609bd9f7279a99", "d0e2461fb3927bb3594bf94db6a6253645c30ff9" ]
2,016
007524794d49bebca5845722054e459a86d8b785
1,824,573
User cooperation diversity. Part I. System description
Mobile users’ data rate and quality of service are limited by the fact that, within the duration of any given call, they experience severe variations in signal attenuation, thereby necessitating the use of some type of diversity. In this two-part paper, we propose a new form of spatial diversity, in which diversity gains are achieved via the cooperation of mobile users. Part I describes the user cooperation strategy, while Part II focuses on implementation issues and performance analysis. Results show that, even though the interuser channel is noisy, cooperation leads not only to an increase in capacity for both users but also to a more robust system, where users’ achievable rates are less susceptible to channel variations.
[ "2533110", "1766950", "1743325" ]
[]
[ "5559e32a7f309c234f02adb9419c17bcd138cba8", "d1fe9616799e65145dbda0a25b39fae3eee96b70", "ddc1471fe996fc030a51c37f7540b7481f052587", "29d75efc5ef6f227868c972316238968597281f0", "9ed0013a0a13539e2cf25ae0042d21a0b685b3ba", "0f97abe5fbf3357210e39e35ce3841a34cf4b762", "c7b83b1b6db310b652b65872e84d746959b7d33c", "81377d628be60a84c1ea0fe2c189346f4ece85c1", "f4a5714dc65092237648176bd5152f716d6e15d1", "54b1ca84fe4ce68ce3e92f684881d59b69e7e0c3" ]
2,003
00758573be71bb03267d15e95474e361978e9717
6,921,980
RMiner: a tool set for role mining
Recently, there are many approaches proposed for mining roles using automated technologies. However, it lacks a tool set that can be used to aid the application of role mining approaches and update role states. In this demonstration, we introduce a tool set, RMiner, which is based on the core of WEKA, an open source data mining tool. RMiner implements most of the classic and latest role mining algorithms and provides interactive tools for administrator to update role states. The running examples of RMiner are presented to demonstrate the effectiveness of the tool set.
[ "1773599", "1774423", "47824598", "1802100", "1793753" ]
[]
[ "01d2462849f5e07fc8762e101f017d033a1161bc", "bb1768c843f4ae7eb980be368661ec910fca7c8d", "37238c5bd4e6d99ee48db042c2fb521a7d2e507f", "1d99b3f896705bde2639b169463c1596ea60c549", "e95647e0d3ebae2683059e3c2c4a3bc10580374a", "cdb2c39563472d567e07595448021463eace99e5" ]
2,013
007c8811c5db9090a51473f0c301e204616cf610
2,033,445
A Study on the Current State of the Art in Tool-Supported UML-Based Static Reverse Engineering
Today, software-engineering research and industry alike recognize the need for practical tools to support reverseengineering activities. Most of the well-known CASE-tools nowadays support reverse engineering in some way. But although the Unified Modeling Language (UML) has emerged as the de facto standard for the abstract graphical representation of object-oriented software systems, there does not yet exist a standard scheme for representing the reverse engineered models of software systems. Due to the differences in understanding and application of the UML notation and the proprietary extensions that different tools adopt, it is often difficult to ensure that model semantics remains unambiguous when working with different tools at the same
[ "1763009", "1800358", "1719731", "1720203", "1687407" ]
[]
[ "34b56b49a0c3c49eae807160394e0ad97cc817ee", "68dcd9bf6a4b9b7a6bf0bd57c918fc9bab5fea61", "d6bd21fe240e7b1a459a8d343d7f67c254a757a7", "4300f137fe485abeb2e7188683720347ec97270f", "1053dc3829fb5d708974e99248e721eef3f08081", "868de87171d012170bdc619082e6bdb4ff744afd", "7d27985f235826c9118109a71737fb50d8bf7d35", "202bc19c7c97bb501d3d91d376b716166f803ece", "0da2189b06ba955c96b2615e8864a4390f871310", "994456d9b879290385cefc8764a92fbbfb040744" ]
2,002
007d73c91a1bf90d72eb59fbdd8791a4b009f363
10,546,515
Learning Feature Representations with K-Means
Many algorithms are available to learn deep hierarchies of features from unlabeled data, especially images. In many cases, these algorithms involve multi-layered networks of features (e.g., neural networks) that are sometimes tricky to train and tune and are difficult to scale up to many machines effectively. Recently, it has been found that K-means clustering can be used as a fast alternative training method. The main advantage of this approach is that it is very fast and easily implemented at large scale. On the other hand, employing this method in practice is not completely trivial: K-means has several limitations, and care must be taken to combine the right ingredients to get the system to work well. This chapter will summarize recent results and technical tricks that are needed to make effective use of K-means clustering for learning large-scale representations of images. We will also connect these results to other well-known algorithms to make clear when K-means can be most useful and convey intuitions about its behavior that are useful for debugging and engineering new systems.
[ "5574038", "1701538" ]
[]
[ "182015c5edff1956cbafbcb3e7bbe294aa54f9fc", "09f2af091f6bf5dfe25700c5a8c82f220fac5631", "398c296d0cc7f9d180f84969f8937e6d3a413796", "132e3d3b5cfc2f59db6ed69ac1eac4a1ee6dca71", "0b7c1bcd0289058b5dfc0d3ff114972712bc7f1a", "6f568d757d2c1ab42f2006faa25690b74c3d2d44", "2221ef8e7fa3f6805cb493543e983c76d233cc69", "9067db319ecb338312070a92b081341e6f03a6c6", "511fe09bb782b47b64a4a1dc9d0ca899ba0e64a9", "d063614e93a2d6b0fc08f1f7715c089436222a78" ]
2,012
007e86cb55f0ba0415a7764a1e9f9566c1e8784b
84,591
Adversarial Feature Learning
The ability of the Generative Adversarial Networks (GANs) framework to learn generative models mapping from simple latent distributions to arbitrarily complex data distributions has been demonstrated empirically, with compelling results showing that the latent space of such generators captures semantic variation in the data distribution. Intuitively, models trained to predict these semantic latent representations given data may serve as useful feature representations for auxiliary problems where semantics are relevant. However, in their existing form, GANs have no means of learning the inverse mapping – projecting data back into the latent space. We propose Bidirectional Generative Adversarial Networks (BiGANs) as a means of learning this inverse mapping, and demonstrate that the resulting learned feature representation is useful for auxiliary supervised discrimination tasks, competitive with contemporary approaches to unsupervised and self-supervised feature learning.
[ "7408951", "2562966", "1753210" ]
[]
[ "39dba6f22d72853561a4ed684be265e179a39e4f", "373f76633cc1f6c7a421e31c989842021a52fca4", "009fba8df6bbca155d9e070a9bd8d0959bc693c2", "289e3e6b84982eb65aea8e3a64f2f6916c98e87e", "14b5e8ba23860f440ea83ed4770e662b2a111119", "6de2b1058c5b717878cce4e7e50d3a372cc4aaa6", "1827de6fa9c9c1b3d647a9d707042e89cf94abf0", "cbcd9f32b526397f88d18163875d04255e72137f", "284b18d7196f608448ca3d9496bf220b1dfffcf5", "9201bf6f8222c2335913002e13fbac640fc0f4ec" ]
2,017
007ecca5236a84d26729a6677a2d987a98d50eaa
14,313,600
Design of S-curve Direct Landing Position Control System for Elevator Using Microcontroller Tou
— This paper discusses the design of the motion pattern generator used for elevator vertical movements. A typical S-Curve like pattern generator dedicated to be used on microcontroller-based system is proposed. Pattern can be easily optimized to various needs by changing the acceleration and jerk setting. It features in direct landing of the elevator cabin and precise position correction. The performance specification, uncertainties in the realistic case and constraints of designing an elevator motion controller when using microcontroller are also introduced. An elevator motion controller using a mid-end microcontroller is implemented using the discussed new pattern generator to verify the design. Simulation and experimental results have shown that the proposed pattern generator is robust to disturbance and can meet the specification.
[]
[]
[ "81e91a75f5834222f83e391823b42b13f85c571e", "0e0662d544877bd270a76d6a47dd15ed489d4dff", "f02175f48cb66f6755ac600a2f0380f91684f6b2" ]
null
007ee2559d4a2a8c661f4f5182899f03736682a7
3,753,439
CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus
The Controller-Area Network (CAN) bus protocol [1] is a bus protocol invented in 1986 by Robert Bosch GmbH, originally intended for automotive use. By now, the bus can be found in devices ranging from cars and trucks, over lightning setups to industrial looms. Due to its nature, it is a system very much focused on safety, i.e., reliability. Unfortunately, there is no build-in way to enforce security, such as encryption or authentication. In this paper, we investigate the problems associated with implementing a backward compatible message authentication protocol on the CAN bus. We show which constraints such a protocol has to meet and why this eliminates, to the best of our knowledge, all the authentication protocols published so far. Furthermore, we present a message authentication protocol, CANAuth, that meets all of the requirements set forth and does not violate any constraint of the CAN bus. Keywords—CAN bus, embedded networks, broadcast authentication, symmetric cryptography
[ "2276289", "2814783" ]
[]
[ "c668bf918e5cf75915c3b322645ea5895605a0ae", "5b745fbd4e21335ff707f85792711ba370f8db78", "1f479c9a84059925e0c4fb44d13aaf3d14035369", "d6842519d734d7e425341aa394a52ad359e4193f", "18f073c1d29a037a6b6792303dae6ea406450028", "a608bd857a131fe0d9e10c2219747b9fa03c5afc", "e8e2c3d884bba807bcf7fbfa2c27f864b20ceb80", "2a61ff2716b68672cbfeddb3ecd166dc856afe96", "4eb66fb901524eb3de2db27ecb60ae770e89e586", "a1f7e8c62397dfb02fc82afb8a74e4d18187a677" ]
2,011
0080118b0eb02af581ff32b85a1bb6aed7081f45
15,966,283
Sinkhorn Distances: Lightspeed Computation of Optimal Transport
Optimal transport distances are a fundamental family of dis tances for probability measures and histograms of features. Despite their appeali ng theoretical properties, excellent performance in retrieval tasks and intuiti ve formulation, their computation involves the resolution of a linear program whose c ost an quickly become prohibitive whenever the size of the support of these me asur s or the histograms’ dimension exceeds a few hundred. We propose in this work a new family of optimal transport distances that look at transport probl ems from a maximumentropy perspective. We smooth the classic optimal transpo rt pr blem with an entropic regularization term, and show that the resulting o ptimum is also a distance which can be computed through Sinkhorn’s matrix scali ng algorithm at a speed that is several orders of magnitude faster than that of transport solvers. We also show that this regularized distance improves upon clas si optimal transport distances on the MNIST classification problem.
[ "1711979" ]
[]
[ "27de66a320b393f93fb96da6bf77e34d17aadd7e", "448fd962a195c6ff196ca5962b3eb7afb896d9e3", "51037d62a6180ee29e660eec9ea213ee85e05943", "eef048d6f71e2c9c73af1a1fcfad9f2b28f26656", "9170992851c39dbe2f2d29525ef8dec65a72159b", "19b5899b6c13b967534059f40f21f437f20bea6b", "b86a671780f49004f865053d196801821e8cc915", "ccf80424210d23783dc56991f88a0c564454cf6b", "c9ec11f63ea9b890ac0db0247abc510d19fdaa16", "4db8723246a85eb2c7a0c3a6de842b16a71bfa44" ]
2,013
0080af3d5f643c0dd14526648b2a0932aadc9f1b
44,940,312
Do you "like" my photo? Facebook use maintains eating disorder risk.
OBJECTIVE Social media sites, such as Facebook, merge two factors that influence risk for eating disorders:media and peers. Previous work has identified cross-sectional and temporal associations between Facebook use and disordered eating. This study sought to replicate and extend these findings using an experimental design. METHOD In Study 1, 960 women completed self-report surveys regarding Facebook use and disordered eating. In Study 2, 84 women were randomly assigned to use Facebook or to use an alternate internet site for 20 min. RESULTS More frequent Facebook use was associated with greater disordered eating in a cross-sectional survey. Facebook use was associated with the maintenance of weight/shape concerns and state anxiety compared to an alternate internet activity. DISCUSSION Facebook use may contribute to disordered eating by maintaining risk for eating pathology. As such, targeting Facebook use may be helpful in intervention and prevention programs.
[ "12496946", "2085467", "5013699" ]
[]
[ "2f29b2a8558227d474dea760dff858179c171692", "8b9c7da4ff94094ca0bd0efe5ba709efafc499a1", "7afd5204d1a487f8535a2d2b45416b3797d8f999", "6012f8a340623a1730392bf9d1851b5d567e2a7a", "d02ee0719419e4c19c892b83ee3bc4232df77fe0", "aeec630b8e8044d7c2259504437144d66b03dfe5", "502cdacb9a9f7d571003ef47d672695dd7ab2d92", "3320319846a52e4f1c643d2d084d5a1cacdb0d20", "48c5a14d91f6790426dd0cde6b26f07ec081e852", "f499a7910d9f2cedb8eabc690f6a380af5122c8c" ]
2,014
008150576e5fa29fdf22d863605a261808800dc6
54,464,972
SMIT: Stochastic Multi-Label Image-to-Image Translation
Cross-domain mapping has been a very active topic in recent years. Given one image, its main purpose is to translate it to the desired target domain, or multiple domains in the case of multiple labels. This problem is highly challenging due to three main reasons: (i) unpaired datasets, (ii) multiple attributes, and (iii) the multimodality associated with the translation. Most of the existing state-of-theart has focused only on two reasons, i.e. producing disentangled representations from unpaired datasets in a one-toone domain translation or producing multiple unimodal attributes from unpaired datasets. In this work, we propose a joint framework of diversity and multi-mapping image-toimage translations, using a single generator to conditionally produce countless and unique fake images that hold the underlying characteristics of the source image. Extensive experiments over different datasets demonstrate the effectiveness of our proposed approach with comparisons to the state-of-the-art in both multi-label and multimodal problems. Additionally, our method is able to generalize under different scenarios: continuous style interpolation, continuous label interpolation, and multi-label mapping.
[ "5357071", "52169015", "51021550", "1732855" ]
[]
[ "784a83437b3dba49c0d7ccc10ac40497b84661a5", "99542f614d7e4146cad17196e76c997e57a69e4d", "af01709b02a567d92fac8779f943d3697d4ab940", "60bc358296ae11ac8f11286bba0a49ac7e797d26", "35756f711a97166df11202ebe46820a36704ae77", "9871aa511ca7e3c61c083c327063442bc2c411bf", "744fe47157477235032f7bb3777800f9f2f45e52", "325d145af5f38943e469da6369ab26883a3fd69e", "d604601e18cec3abae791f212feafa380773b362", "6424b69f3ff4d35249c0bb7ef912fbc2c86f4ff4" ]
2,018
00816b774f52031ea160c05181af3251a76220e6
8,158,801
Chrome Extensions: Threat Analysis and Countermeasures
The widely popular browser extensions now become one of the most commonly used malware attack vectors. The Google Chrome browser, which implements the principles of least privileges and privilege separation by design, offers a strong security mechanism to protect malicious websites from damaging the whole browser system via extensions. In this study, we however reveal that Chrome’s extension security model is not a panacea for all possible attacks with browser extensions. Through a series of practical bot-based attacks that can be performed even under typical settings, we demonstrate that malicious Chrome extensions pose serious threats, including both information dispersion and harvesting, to browsers. We further conduct an in-depth analysis of Chrome’s extension security model, and conclude that its vulnerabilities are rooted fro m the violation of the principles of least privileges and priv ilege separation. Following these principles, we propose a set of countermeasures that enforce the policies of microprivilege management and differentiating DOM elements. Using a prototype developed on the latest Chrome browser, we show that they can effectively mitigate the threats posed by malicious Chrome extensions with little effect on normal browsing experience.
[ "1703617", "7138023", "1782028", "1718660" ]
[]
[ "11e71c2706db53d7b2c3764dea9bd73930e13c7f", "6db044f35fff62f25710f3f9e4933ab9e3cab27c", "3479e0c6ebfeefb054bcc1aad1f13df5beab4e0c", "19d74776ad8065eb8967347b9eab408a944798d6", "21ed4f52274e284a85f8280283fe2140b6304027", "23635419a19a5ad1b317ed6ef0fba8f4e892167b", "f772807644f34094d1809d5df38040024bad0c64", "a4ebb757ea215851146b7a4f78b79278f6d42b33", "0252b465a94a44e626e44d8eea306183c08c2c0b", "431c2bbfb35f29eec1eff79dda1d67049605cddb" ]
2,012
0083e2483969d7679bd8b8340ea1172b148840d5
7,245,342
Fetal facial profile markers of Down syndrome in the second and third trimesters of pregnancy.
OBJECTIVES To investigate the use of the maxilla-nasion-mandible (MNM) angle and fetal profile (FP) line to assess the degree of midfacial hypoplasia in Down-syndrome fetuses in the second and third trimesters of pregnancy. METHODS The MNM angle and FP line were measured retrospectively in stored two-dimensional images or three-dimensional volumes of fetuses with Down syndrome. Data collected from January 2006 to July 2013 were retrieved from the digital databases of participating units. The MNM angle was expressed as a continuous variable (degrees) and the FP line as positive, negative or zero. Measurements were obtained from stored images in the midsagittal plane by two experienced examiners and compared with our previously reported normal ranges for euploid fetuses. A MNM angle below the 5(th) centile of the reference range and a positive or negative FP line were considered as abnormal. RESULTS A total of 133 fetuses with Down syndrome were available for analysis, eight of which were subsequently excluded because of inadequate images. The MNM angle was not influenced by gestational age (P = 0.48) and was significantly smaller in Down-syndrome fetuses than in euploid fetuses (mean, 12.90° vs 13.53°, respectively; P = 0.015). The MNM angle was below the 5th centile for euploid fetuses in 16.8% of fetuses with Down syndrome (P < 0.01). In the cohort of Down-syndrome fetuses, a positive FP line was present in 41.6% of cases (with a false-positive rate (FPR) of 6.3%) and was positively correlated with Down syndrome and gestational age (P < 0.01). There was no case with a negative FP line. In cases of Down syndrome, a positive FP line was correlated with a small MNM angle (P < 0.01). CONCLUSIONS A small MNM angle and a positive FP line can be regarded as novel markers for Down syndrome. The FP line is an easy marker to measure, has a low FPR, does not require knowledge of normal reference values and has the potential to differentiate between Down syndrome and trisomy 18, as, in the latter, the FP line is often negative.
[ "37747528", "5780445", "2047718", "1816582", "48472046", "6896234" ]
[]
[ "7b8c004063b3e92eb264deb7fc4c07f0f167f65a", "814cad2f4bcff1331ffd986351a32bf481f3b7c1", "308afdb2ddf8284028696d25327ecb897bf072c5", "eda252104802296a32e05d5ae7012900f60119f8", "1bd28204bdda201d7893509b9e80de13fd4a3e77", "c8d45606ecbc4a070e71e63ae544a45d0c233aeb", "69a6f4d8cfaa36255c94291c7f3a1be1dd6daae8", "bb69f0607e987a28978cc94e8d23aa2d253a7bff", "b0de6f268cbf3fdaa1ed7e1e052720e560477d54", "b5f2848b46d758736acb938d00fb3e29c726fed6" ]
2,015
00844516c86828a4cc81471b573cb1a1696fcde9
37,089,375
Spurious but systematic correlations in functional connectivity MRI networks arise from subject motion
Here, we demonstrate that subject motion produces substantial changes in the timecourses of resting state functional connectivity MRI (rs-fcMRI) data despite compensatory spatial registration and regression of motion estimates from the data. These changes cause systematic but spurious correlation structures throughout the brain. Specifically, many long-distance correlations are decreased by subject motion, whereas many short-distance correlations are increased. These changes in rs-fcMRI correlations do not arise from, nor are they adequately countered by, some common functional connectivity processing steps. Two indices of data quality are proposed, and a simple method to reduce motion-related effects in rs-fcMRI analyses is demonstrated that should be flexibly implementable across a variety of software platforms. We demonstrate how application of this technique impacts our own data, modifying previous conclusions about brain development. These results suggest the need for greater care in dealing with subject motion, and the need to critically revisit previous rs-fcMRI work that may not have adequately controlled for effects of transient subject movements.
[ "34677239", "38643667", "1878761", "2963284", "1878109" ]
[]
[ "86756e579c78889ca305a50897e2f9070363fe95", "0bd2d5ef36567fe5d60a14b9627a88b5e22b8e58", "b38a6ee957f3ce59a88e21d93d8f3e82d6da7909", "552e70066a823c780629ba0cf6df93f8f1d40746", "285ebcba34b03480fea056223d6d4f3d7ef31966", "9c38c19e382866587d825afe5336dd9c76cfa02f", "070ec1baa4d74fe63b7c6c450487e851e2523a36", "0e748f33400ecd7d81d8430535fd036456c46f09", "6c40bbb0e95b41eaa14e7b2642dbc4343013d646", "d17276895bcc64ae2ad217e558e152f8a91eac03" ]
2,012
0086ae349537bad560c8755aa2f0ece8f49b95cf
7,737,541
Walking on Water : Biolocomotion at the Interface
We consider the hydrodynamics of creatures capable of sustaining themselves on the water surface by means other than flotation. Particular attention is given to classifying water walkers according to their principal means of weight support and lateral propulsion. The various propulsion mechanisms are rationalized through consideration of energetics, hydrodynamic forces applied, or momentum transferred by the driving stroke. We review previous research in this area and suggest directions for future work. Special attention is given to introductory discussions of problems not previously treated in the fluid mechanics literature, with hopes of attracting physicists, applied mathematicians, and engineers to this relatively unexplored area of fluid mechanics. 339 A nn u. R ev . F lu id . M ec h. 2 00 6. 38 :3 39 -3 69 . D ow nl oa de d fr om a rj ou rn al s. an nu al re vi ew s. or g by Y al e U ni ve rs ity S O C IA L S C IE N C E L IB R A R Y o n 12 /1 7/ 05 . F or p er so na l u se o nl y. AR266-FL38-13 ARI 11 November 2005 20:7
[ "5388479", "2108003" ]
[]
[ "b7393dc65a6cc5a35ab4830eff953aaa91a9ede6", "004918dc3516e14f9eb1005ba217abe378fbc67e", "100f3899bbbedca42b6c700c772169564c1f21d5", "84c0a82900d6b42e3dd4e1ef7772d1e42c2cda05", "33b773fa05f7f7b4b8164866724d4eea58efb29b", "d56471a6e25b0fccc1cc2e58ded4758ac06e8edd", "8c4ad08067dbf23f716b8a13c3989c9c6d08d15a", "f148c5c31c35da652da13aa54c0c038a95c2a51b", "19b842927b2943504af31c18e689134d100fa505", "724115f32a64f8dbdaffa556053513891b9f3980" ]
2,005
008777caf23c9afaef51d4b6dd866e70eac0dedd
1,002,433
Engineering design thinking, teaching, and learning
This publication contains reprint articles for which IEEE does not hold copyright. You may purchase this article from the Ask*IEEE Document Delivery Service at http://www.ieee.org/services/askieee/
[ "30537021", "35580978", "1735659", "30916707", "47554658" ]
[]
[ "5b1aa9d9400192c1ca87db060e5c7cee62483024", "60dcda795815fc265682efd73f8cb4d896ec7785", "ec8d7ff1b3d3982d9d2cc79d0fbe0201034ac20f", "0e5c727c51b194f21f3bc4d28c4d74ac74889e7d", "073d820f3996b6785153e367ff3fe2d60630c7ea", "d009ae72a988620218b09bf91416c620acf90c2f", "dae7e5afbc02f9d8de5f60a17d1afc4c672d3c25", "79217d44239aacdb4b3a8460679a85840469901d", "ded97e79b03da336ead36f5f8e82bb32e2f96605", "c70858244ca8b030135e87dd33f751bf2b58650c" ]
2,006
0087d3ee3e66498483dbc9e799f2744f562a75b7
8,857,074
Hashtag Recommendation with Topical Attention-Based LSTM
Microblogging services allow users to create hashtags to categorize their posts. In recent years, the task of recommending hashtags for microblogs has been given increasing attention. However, most of existing methods depend on hand-crafted features. Motivated by the successful use of long short-term memory (LSTM) for many natural language processing tasks, in this paper, we adopt LSTM to learn the representation of a microblog post. Observing that hashtags indicate the primary topics of microblog posts, we propose a novel attention-based LSTM model which incorporates topic modeling into the LSTM architecture through an attention mechanism. We evaluate our model using a large real-world dataset. Experimental results show that our model significantly outperforms various competitive baseline methods. Furthermore, the incorporation of topical attention mechanism gives more than 7.4% improvement in F1 score compared with standard LSTM method.
[ "1678662", "40282288", "1746594", "48570713" ]
[]
[ "41c8ff7475225c9dfe9cedc25c038e9216345cc6", "5a8eb0f417c7c9aa50e0f5aa94accc8a3941e66c", "8258f5d658227b6d75cec18e888e19ed38cbd610", "75e1c335034e00983f00fce71ab401ebec90d778", "0da372e60d1c08e1687eccc27df0723cbbd66e54", "c5c6b807c1625c9616120b16da8799565496070c", "272216c1f097706721096669d85b2843c23fa77d", "149ef797ffbf0ffd9a6492196058be8a57c383dc", "c829b63a3ae72a47e1953e1295826c7b2f93bf50", "0097d7f528ebf4aa22b4307a7af8cc0b4f198007" ]
2,016
0088523c4bf74b35c2e7471e740d6758ab36f7b9
43,493,021
Detecting spammers on social networks
Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms (such as Facebook, MySpace, or Twitter), storing and sharing a wealth of personal information. This information, as well as the possibility of contacting thousands of users, also attracts the interest of cybercriminals. For example, cybercriminals might exploit the implicit trust relationships between users in order to lure victims to malicious websites. As another example, cybercriminals might find personal information valuable for identity theft or to drive targeted spam campaigns. In this paper, we analyze to which extent spam has entered social networks. More precisely, we analyze how spammers who target social networking sites operate. To collect the data about spamming activity, we created a large and diverse set of "honey-profiles" on three large social networking sites, and logged the kind of contacts and messages that they received. We then analyzed the collected data and identified anomalous behavior of users who contacted our profiles. Based on the analysis of this behavior, we developed techniques to detect spammers in social networks, and we aggregated their messages in large spam campaigns. Our results show that it is possible to automatically identify the accounts used by spammers, and our analysis was used for take-down efforts in a real-world social network. More precisely, during this study, we collaborated with Twitter and correctly detected and deleted 15,857 spam profiles.
[ "2350947", "1715189", "1711242" ]
[]
[ "85110a1d8855f7e7197475727748904085609a92", "3bd035584f164dd3b2e3e55543bc37ee4a26b21f", "13d4c2f76a7c1a4d0a71204e1d5d263a3f5a7986", "26aad3afefe147c2b30ba410b09de47da938f512", "838bb4a8d589dd728d97c7370ae47a79dcf8d0f4", "d2e47b04b4dd88397d5a19db27ba6a0aa5d1317e" ]
2,010
008b3fd9ea599a840d9e2eadccedaf2e4bf89099
1,944,606
A Latent Variable Recurrent Neural Network for Discourse-Driven Language Models
This paper presents a novel latent variable recurrent neural network architecture for jointly modeling sequences of words and (possibly latent) discourse relations between adjacent sentences. A recurrent neural network generates individual words, thus reaping the benefits of discriminatively-trained vector representations. The discourse relations are represented with a latent variable, which can be predicted or marginalized, depending on the task. The resulting model can therefore employ a training objective that includes not only discourse relation classification, but also word prediction. As a result, it outperforms state-ofthe-art alternatives for two tasks: implicit discourse relation classification in the Penn Discourse Treebank, and dialog act classification in the Switchboard corpus. Furthermore, by marginalizing over latent discourse relations at test time, we obtain a discourse informed language model, which improves over a strong LSTM baseline.
[ "40608686", "2561045", "1752524" ]
[]
[ "1510cf4b8abea80b9f352325ca4c132887de21a0", "2f78a34ffc326b9218376483f7f78d26a9f30368", "6cdeb52b735381f0aea720adc684b2763e177394", "55b81991fbb025038d98e8c71acf7dc2b78ee5e9", "213cef00995d473dc8252954a261f1ef1ea4207a", "28d6c0111ab3d1020aee3eb80fe67698a904012c", "f6fd84f9eb41bb8a4e4d2ae4fe1339258e271bc0", "857ae0aeab2eca1689980cbf299bde72140cc2b4", "4c15b129a8da55127e4e2fe47f54799d0a313367", "47a87c2cbdd928bb081974d308b3d9cf678d257e" ]
2,016
008b7fbda45b9cd63c89ee5ed3f8e6b2b6bf8457
17,682,114
Kinematics and the Implementation of an Elephant's Trunk Manipulator and Other Continuum Style Robots
Traditionally, robot manipulators have been a simple arrangement of a small number of serially connected links and actuated joints. Though these manipulators prove to be very effective for many tasks, they are not without their limitations, due mainly to their lack of maneuverability or total degrees of freedom. Continuum style (i.e., continuous "back-bone") robots, on the other hand, exhibit a wide range of maneuverability, and can have a large number of degrees of freedom. The motion of continuum style robots is generated through the bending of the robot over a given section; unlike traditional robots where the motion occurs in discrete locations, i.e., joints. The motion of continuum manipulators is often compared to that of biological manipulators such as trunks and tentacles. These continuum style robots can achieve motions that could only be obtainable by a conventionally designed robot with many more degrees of freedom. In this paper we present a detailed formulation and explanation of a novel kinematic model for continuum style robots. The design, construction, and implementation of our continuum style robot called the elephant trunk manipulator is presented. Experimental results are then provided to verify the legitimacy of our model when applied to our physical manipulator. We also provide a set of obstacle avoidance experiments that help to exhibit the practical implementation of both our manipulator and our kinematic model.
[ "38771608", "26607413" ]
[]
[ "f2bd0b4345e56a75fa0387c83f39f40f6134fc28", "c0539f9d19f4a2a873dfc99c687b17a0bf035fe2", "ec2c47757af47d7a559c6275d426182a773a9171", "a1ac86054fc6dc0358b5cafcdc1cc92e610d56b3", "de89734cce6e370d23b4de95b67bc57b8b2ebb58", "c118458f655ea37a2e7ab36e9a0e96276e518307", "eecfd3e68882a763db66b3e08f807be0fe2fdb3b", "d9879321c0976e16b62d6cc2333df471e2800230", "469642958687690e89df66865b20787638b68b45", "c446d623955e5edc307ac0cc2bc529a79f4ad72e" ]
2,003
008baae7037a47f69804c2eb8438d366a6e67486
2,851,132
3D Human Pose Estimation via Deep Learning from 2D Annotations
We propose a deep convolutional neural network for 3D human pose and camera estimation from monocular images that learns from 2D joint annotations. The proposed network follows the typical architecture, but contains an additional output layer which projects predicted 3D joints onto 2D, and enforces constraints on body part lengths in 3D. We further enforce pose constraints using an independently trained network that learns a prior distribution over 3D poses. We evaluate our approach on several benchmark datasets and compare against state-of-the-art approaches for 3D human pose estimation, achieving comparable performance. Additionally, we show that our approach significantly outperforms other methods in cases where 3D ground truth data is unavailable, and that our network exhibits good generalization properties.
[ "2048004", "38979767" ]
[]
[ "9201bf6f8222c2335913002e13fbac640fc0f4ec", "573c11e7e00389a033787984223ced536e15c904", "080ce01c304d3fd562c9aa17d1b234d5fc4b4555", "722fcc35def20cfcca3ada76c8dd7a585d6de386", "34f557dc85066384ecb5e76000f22f01100dec9c", "05ffc37ed1289c9dbd01f1cd96d5a5ae908b12cb", "1c686359a30e68183d1b23e069c56a7c0b1fdae3", "0edafa576c8c89035db8ad24a8a1af5d457b746b", "02a88a2f2765b17c9ea76fe13148b4b8a9050b95", "cdf064b482ff411e2d63285578250ac9154bac5d" ]
2,016
008c22c8b2997ba882f87a81b5cb3f85222879ea
14,921,840
CzEngVallex: a Bilingual Czech-English Valency Lexicon
This paper introduces a new bilingual Czech-English verbal valency lexicon (called CzEngVallex) representing a relatively large empirical database. It includes 20,835 aligned valency frame pairs (i.e., verb senses which are translations of each other) and their aligned arguments. This new lexicon uses data from the Prague Czech-English Dependency Treebank and also takes advantage of the existing valency lexicons for both languages: the PDT-Vallex for Czech and the EngVallex for English. The CzEngVallex is available for browsing as well as for download in the LINDAT/CLARIN repository. The CzEngVallex is meant to be used not only by traditional linguists, lexicographers, translators but also by computational linguists both for the purposes of enriching theoretical linguistic accounts of verbal valency from a cross-linguistic perspective and for an innovative use in various NLP tasks.
[ "3344673", "2478576", "2128073" ]
[]
[ "af10a7c98fc3de7b5f14c011db839b2ae774a34c", "06199bf520baaee40f8821bb6bc97a43b502664a", "308ba6a27e6a5252bab8d043f5251ab4469458b5", "14e531a9ec533e986d6d4ce299863de04f2ab279", "78f3f3b7e6fea5975c6890fe8c89a0c46ac57d53", "76fb3b6c33ec2165cb66c3d29508ad3d2839abb1", "0bb72e740d799752ac960896a9964942e5f60ed8", "f5aaf4f58e62024a0544bd28163eb29bdc85abb0", "837c2bf28887fc1a00e1b1148e5df748809da242", "ca6a8cc4a6cfb4f3723335dca76121cbcc9f7d96" ]
2,016
0094fa02f5942e1cd06eacd227fdf42983da3f2b
4,472,858
Quantifying and Testing Indirect Effects in Simple Mediation Models When the Constituent Paths Are Nonlinear.
Most treatments of indirect effects and mediation in the statistical methods literature and the corresponding methods used by behavioral scientists have assumed linear relationships between variables in the causal system. Here we describe and extend a method first introduced by Stolzenberg (1980) for estimating indirect effects in models of mediators and outcomes that are nonlinear functions but linear in their parameters. We introduce the concept of the instantaneous indirect effect of X on Y through M and illustrate its computation and describe a bootstrapping procedure for inference. Mplus code as well as SPSS and SAS macros are provided to facilitate the adoption of this approach and ease the computational burden on the researcher.
[ "23662196", "4528719" ]
[]
[ "d7f28ed327a389f7bd9ee85d50eafb1071b50256", "370b92e4a5a5a37beabc6a854329a184195e3975", "92c2bc3b4710f2a9b97f5751fc49d50324d851c8", "ca2af4c9828cdce2f17d5c6d8c0996b493db6b4a", "5a593dea708badbab6541fdea7daece2b921e4d7", "98878d8504d49742e0b1d27fd0e1d4ab701bd075", "de1f9f0ab871dffdab80f5c8ba16188e5194b243", "90b7c542814a55e97558b97d1c34129e2af67164", "8432aa15730df7432e1ca82ce48f0a90da2a86ec", "311a7a6785cf34dba1928ffef8232a9ea9de1e51" ]
2,010
0095c269e7d0c990249312687fc43521019809c4
7,250,091
Modelling Interaction of Sentence Pair with Coupled-LSTMs
Recently, there is rising interest in modelling the interactions of two sentences with deep neural networks. However, most of the existing methods encode two sequences with separate encoders, in which a sentence is encoded with little or no information from the other sentence. In this paper, we propose a deep architecture to model the strong interaction of sentence pair with two coupled-LSTMs. Specifically, we introduce two coupled ways to model the interdependences of two LSTMs, coupling the local contextualized interactions of two sentences. We then aggregate these interactions and use a dynamic pooling to select the most informative features. Experiments on two very large datasets demonstrate the efficacy of our proposed architecture and its superiority to state-ofthe-art methods.
[ "50500428", "1767521", "1799071", "3100431", "1790227" ]
[]
[ "0825788b9b5a18e3dfea5b0af123b5e939a4f564", "652d159bf64a70194127722d19841daa99a69b64", "4ca601a57b817cfe5a2fcf56ec005557fef627ae", "03ff3f8f4d5a700fbe8f3a3e63a39523c29bb60f", "50d53cc562225549457cbc782546bfbe1ac6f0cf", "167abf2c9eda9ce21907fcc188d2e41da37d9f0b", "07f3f736d90125cb2b04e7408782af411c67dd5a", "04b52c8230c3f9f4f4032b06458069d81c8f07b2", "0af737eae02032e66e035dfed7f853ccb095d6f5", "e1a81e9a1eb32becf157a49f158bf2cdee9d3954" ]
2,016
00960cb3f5a74d23eb5ded93f1aa717b9c6e6851
1,152,498
Input Warping for Bayesian Optimization of Non-stationary Functions
Bayesian optimization has proven to be a highly effective methodology for the global optimization of unknown, expensive and multimodal functions. The ability to accurately model distributions over functions is critical to the effectiveness of Bayesian optimization. Although Gaussian processes provide a flexible prior over functions, there are various classes of functions that remain difficult to model. One of the most frequently occurring of these is the class of non-stationary functions. The optimization of the hyperparameters of machine learning algorithms is a problem domain in which parameters are often manually transformed a priori, for example by optimizing in “log-space,” to mitigate the effects of spatially-varying length scale. We develop a methodology for automatically learning a wide family of bijective transformations or warpings of the input space using the Beta cumulative distribution function. We further extend the warping framework to multi-task Bayesian optimization so that multiple tasks can be warped into a jointly stationary space. On a set of challenging benchmark optimization tasks, we observe that the inclusion of warping greatly improves on the state-of-the-art, producing better results faster and more reliably.
[ "1714516", "1754860", "1804104", "1722180" ]
[]
[ "569237e740fdbdada1c7507159a7a31799a891a9", "ea57e9e2d557fa6e944b69bbe4420ef61c122e4c", "5d5d4f49d6443c8529a6f5ebef5c499d47a869da", "47598c6267a065ad0f9226c0a130728fedf18b81", "121888ad47647b07d48ecf3c8a275b0bdcb3c396", "1001c09821f6910b5b8038a3c5993456ba966946", "122c45495b725e1c999c4f2a65c3a380631262d5", "65c1e3748927bbb53c0e9a2f9c1132b96ba8f331" ]
2,014
00963166e0a7157cdde5cd42757bff776f5a5667
919,694
Methodological rigour within a qualitative framework.
AIM This paper discusses the literature on establishing rigour in research studies. It describes the methodological trinity of reliability, validity and generalization and explores some of the issues relating to establishing rigour in naturalistic inquiry. BACKGROUND Those working within the naturalistic paradigm have questioned the issue of using validity, reliability and generalizability to demonstrate robustness of qualitative research. Triangulation has been used to demonstrate confirmability and completeness and has been one means of ensuring acceptability across paradigms. Emerging criteria such as goodness and trustworthiness can be used to evaluate the robustness of naturalistic inquiry. DISCUSSION It is argued that the transference of terms across paradigms is inappropriate; however, if we reject the concepts of validity and reliability, we reject the concept of rigour. Rejection of rigour undermines acceptance of qualitative research as a systematic process that can contribute to the advancement of knowledge. Emerging criteria for demonstrating robustness in qualitative inquiry, such as authenticity, trustworthiness and goodness, need to be considered. Goodness, when not seen as a separate construct but as an integral and embedded component of the research process, should be useful in assuring quality of the entire study. Triangulation is a tried and tested means of offering completeness, particularly in mixed-method research. When multiple types of triangulation are used appropriately as the 'triangulation state of mind', they approach the concept of crystallization, which allows for infinite variety of angles of approach. CONCLUSION Qualitative researchers need to be explicit about how and why they choose specific legitimizing criteria in ensuring the robustness of their inquiries. A shift from a position of fundamentalism to a more pluralistic approach as a means of legitimizing naturalistic inquiry is advocated.
[ "31467748", "40302356" ]
[]
[ "9cde49cd569f449167adce330a6bee8e183ffd4d", "13200ec21a7a5fd2e98da41edc28e4e80087c04e", "15cb15625878c092f0397aefacd44bdb4302290f", "29abbac2efaf859bb5d007889b9c3c4961e3b266", "495875c4952ac29c5a9a568272cd47eeeb57a43c", "8a49058228df1ba143ad0b141d8781aa44bc6bee", "2b1c9121200d8c0d8e6caf8fe8bb7570a03b8f19", "e5b099fa3b5f6f46ad9169c95a5867cd9eab4cb6", "04cd2893eb7cb5be0d896253ae11787fa741d37d", "609ab78579f2f51e4677715c32d3370899bfd3a7" ]
2,004
009b98f3ec7c28f3c87acdcc60fb7a5f90e24f9c
1,011,111
A Hierarchical Thread Scheduler and Register File for Energy-Efficient Throughput Processors
Modern graphics processing units (GPUs) employ a large number of hardware threads to hide both function unit and memory access latency. Extreme multithreading requires a complex thread scheduler as well as a large register file, which is expensive to access both in terms of energy and latency. We present two complementary techniques for reducing energy on massively-threaded processors such as GPUs. First, we investigate a two-level thread scheduler that maintains a small set of active threads to hide ALU and local memory access latency and a larger set of pending threads to hide main memory latency. Reducing the number of threads that the scheduler must consider each cycle improves the scheduler’s energy efficiency. Second, we propose replacing the monolithic register file found on modern designs with a hierarchical register file. We explore various trade-offs for the hierarchy including the number of levels in the hierarchy and the number of entries at each level. We consider both a hardware-managed caching scheme and a software-managed scheme, where the compiler is responsible for orchestrating all data movement within the register file hierarchy. Combined with a hierarchical register file, our two-level thread scheduler provides a further reduction in energy by only allocating entries in the upper levels of the register file hierarchy for active threads. Averaging across a variety of real world graphics and compute workloads, the active thread count can be reduced by a factor of 4 with minimal impact on performance and our most efficient three-level software-managed register file hierarchy reduces register file energy by 54%.
[ "49309175", "26864738", "2924393", "1715863", "1696619", "2516040", "1735065" ]
[]
[ "d4f59859544799acb23895d95a033e5abc75bc1e", "0344b1b6ae33e11f9bd86db0d1edd5348fd00d6c", "03cc2cadc9d81379e3c069c96772c568db349717", "c6d2dbc0ccd4c94041cadaa96ba206b3cfa061c0", "23177452df15b652dd54a59324502b92c99687a7", "08c766010a11737aa71d9e621fad6697093e4ded", "466ff5d1f695c5472db9f6746ac29575f16de753", "4812625a9eb77f0ae736a52d186f9d48659faa8e", "4845474141b68b3b36e614b69c3682d064bc9a57", "811ac7541adbb0799a8d7cb7b93cb7c8c6f3e4e2" ]
2,012
009cb6f8e695cf49eefd29b4db44bc44ead4c260
22,292,956
Analysis of hyperbolic and circular positioning algorithms using stationary signal-strength-difference measurements in wireless communications
Referring received signal strength (RSS) to a signal propagation model to find user location is one of the most promising strategies in wireless communications. This paper develops a simple method based on relative signal-strength measurements, that is, the differences in stationary signal strength measured at the user location from multiple base transceiver stations (BTSs). The stationary signal strength is the averaged RSS and also is a stationary Gaussian process. In using this method, it is vitally important to confirm that some uncertain propagation parameters can be canceled out while a signal propagation model is merged into our method for locating users. In this way, the differences in stationary signal strength lead to two solutions: One is the distance difference between pairs of BTSs, and the other is the distances from the user location to the multiple BTSs. Consequently, the hyperbolic positioning algorithm due to the distance-difference solution and the circular positioning algorithm due to the distances solution can be presented, respectively. Afterward, some experimental results were drawn from a field trial in a real propagation environment. Results show that the hyperbolic and circular positioning algorithms can locate the user to within about 350 and 300 m in 67 percentile, respectively. Compared with the numerical result reported in the literature on existing methods based on RSS only, our method is superior. Despite the result not meeting Federal Communications Commission (FCC) requirements, this method proved to be sufficiently simple and efficient in terms of the computation at burden and network signaling load.
[ "2428856", "2070192", "40235182" ]
[]
[ "2c58a8b2e5578ce405c5957bb3b88f27f345c03b", "6f5b6b6e94dca127afe5c6effa62a4c6771640d8", "6fb0aeaff235c50a7b032ad3812a1eb7b3a4370d", "cf8afb574231bc5c4c741ac78d9dc584aa9f73fb", "38e6ddd0cf333a63afe2eb72a3d5c731f6f17863", "8d8df4a8d2dd9774e4f6cb2162a27b6f3a8ff541", "32038bd2691caa6847286abd9afe39619f499f46", "c7f5bbaca161f48d4e95a81471bf72a0c64601a4", "fc4caf1cbe55d737ebf97c321e003209e74049cb", "2f03ed07744072c6fee5259917e532ba2bc78f59" ]
2,006
009cd8ddda67ea8e29b0a41771e414f61c7c7c55
11,221,959
Complex-valued convolutional neural networks for real-valued image classification
In this paper, complex-valued convolutional neural networks are presented, by giving the full deduction of the gradient descent algorithm for training this type of networks. The performances of convolutional neural networks in the real-valued domain for image classification gave rise to the idea of extending them to the complex-valued domain, also. Real-valued image classification experiments done using the MNIST and CIFAR-10 datasets have shown an improvement in performance of complex-valued convolutional neural networks over their real-valued counterparts.
[ "2646035" ]
[]
[ "41f1f0ecb82454d78f1dfa294c4f048acc7b7e1a", "6ab07abe08116fa8df88a4d28a960f24995ac977", "0d67362a5630ec3b7562327acc278c1c996454b5", "bc322670541e1e5e4bef1ae95a7f83914d40096c", "7c5920c97f8bb1f91739b0d27746d655de95eedd", "5d90f06bb70a0a3dced62413346235c02b1aa086", "44740a72033161f57ffba70997459965b433523a", "7ecee5281f1f7c5d17125cf86426c39307bce5fd", "126df9f24e29feee6e49e135da102fbbd9154a48", "f1e92a6dbefee3e5719456d668a2dd1ac72c03d3" ]
2,017
009cfb3baeb60140569953656193b60fbf09ab14
2,148,964
A New Auto Exposure System to Detect High Dynamic Range Conditions Using CMOS Technology
This paper proposes a new auto-exposure algorithm that can accurately detect high-contrast lighting conditions and improve the dynamic range of output images for a camera system. The proposed method calculates the difference between the mean value and the median value of the brightness level of captured images to estimate lighting conditions. After that, a multiple exposure mechanism is carried out to improve the details of output pictures. Simulation results show that the system works well with CMOS sensors used in mobile phones and surveillance cameras. Besides, the proposed algorithm is fast and simple and therefore can be fitted in most CMOS platforms that have limited capabilities.
[ "9130099", "48850386", "2645954" ]
[]
[ "bd428efdbfddb570a06803b62d164874ffccc5c5", "f2879c316b9758a885adcd16ef22ed1fd3cb0ece", "0a11beb86667108d671acf3ccbb47020a0860eda", "a85f3523a161b8ff0bb11f1a4c70bd921461ba29", "2b3ceb0952d82a0fc7b3ad465491fa3fe4df55b9" ]
2,008
009d1cd15191b1a0b4b7fa8796c4265fbf771946
16,189,002
A stream function solver for liquid simulations
This paper presents a liquid simulation technique that enforces the incompressibility condition using a stream function solve instead of a pressure projection. Previous methods have used stream function techniques for the simulation of detailed single-phase flows, but a formulation for liquid simulation has proved elusive in part due to the free surface boundary conditions. In this paper, we introduce a stream function approach to liquid simulations with novel boundary conditions for free surfaces, solid obstacles, and solid-fluid coupling. Although our approach increases the dimension of the linear system necessary to enforce incompressibility, it provides interesting and surprising benefits. First, the resulting flow is guaranteed to be divergence-free regardless of the accuracy of the solve. Second, our free-surface boundary conditions guarantee divergence-free motion even in the un-simulated air phase, which enables two-phase flow simulation by only computing a single phase. We implemented this method using a variant of FLIP simulation which only samples particles within a narrow band of the liquid surface, and we illustrate the effectiveness of our method for detailed two-phase flow simulations with complex boundaries, detailed bubble interactions, and two-way solid-fluid coupling.
[ "3090970", "1786445", "1744056" ]
[]
[ "4f7756d804f7abbf76f2b3e546ba983eb95a570c", "a066197d22dddcd00c99c2b4c580e2622f0a7a4e", "185f242caf3a9f4c87770b159c79b24566fd35ae", "25d22324f2e08a00e3d5cbb8c96529597d01dd4a", "1e826c32f34245475071cb32f202e08f8619d03e", "52bb5bb02f5d26d371dd265c04a2ebe1e863dc87", "1be0250b82b9f41bb7434b9d19fb28c78d9c5013", "6d0c982eaa42ae265b94c5f959e441aefc2df85f", "f57c7bab3764644ce7a66c49562bcb2adb1f2818", "2ea632504c7cc03b12f813b3868bbe48208629c4" ]
2,015
009d2d73e40395dfa4d4c19f3dab0f0d911763ee
5,059,468
In-situ vehicular antenna integration and design aspects for vehicle-to-vehicle communications
Vehicle-to-vehicle (V2V) communications aim to enhance driver safety and traffic efficiency by using the recently designated frequency bands in the 5.9 GHz range in Europe. Due to the time-frequency selective fading behavior of the vehicular communication channel, multi-antenna techniques can provide enhanced link conditions by means of diversity processing. This paper highlights the integration of a four-element (N =4) linear array antenna into the roof-top compartment of a vehicle to conduct Multiple-Input Multiple-Output (MIMO) high-resolution mobile-to-mobile channel measurements.
[ "47475950", "1684773", "31239208", "2060730", "2226137", "1681697" ]
[]
[ "695a84dc3d39f20ac158dd0229e221af787369b7", "8fa8e7d367a6ec5311def4b9a2e390bc069952f9", "0b622cbe80f19fa932f98c94f90c8b162f9d15b5", "fddc92a13c3b1330885ea0e9f70ff95597232228", "112800c2ac9f72679521bd7205bcbddfe1df20b9" ]
2,010
009dbf3187862352aac542bf7d61e27bce6b27f5
5,704,492
SimRank: a measure of structural-context similarity
The problem of measuring "similarity" of objects arises in many applications, and many domain-specific measures have been developed, e.g., matching text across documents or computing overlap among item-sets. We propose a complementary approach, applicable in any domain with object-to-object relationships, that measures similarity of the structural context in which objects occur, based on their relationships with other objects. Effectively, we compute a measure that says "two objects are similar if they are related to similar objects:" This general similarity measure, called SimRank, is based on a simple and intuitive graph-theoretic model. For a given domain, SimRank can be combined with other domain-specific similarity measures. We suggest techniques for efficient computation of SimRank scores, and provide experimental results on two application domains showing the computational feasibility and effectiveness of our approach.
[ "3288683", "1737896" ]
[]
[ "409cfe9452261a45db6b4ca8a4d2ab86c6ea4213", "45c1cd883ba7cf99dbe30ef4d2635e955a302ee9", "0fcc45600283abca12ea2f422e3fb2575f4c7fc0", "74d8d8c6abb522241033c60c937878d0d9858258", "f0bc8d54a07caa7ff7d39e43f363accb35779f80", "59e914c920497dd931f1b5fe7151f071d80713de", "328af02c4db60dba12b93c2cbcc7592eb45a96c7", "2a622720d4021259a6f6d3c6298559d1b56e7e62", "f69cbc8cfbe648f6ca404ee1fe500b8619cb5e08", "0a8f4451609d1a705a98baa3b77b3efd25929b6e" ]
2,002
009f9eede36497240f79f4598258c6fb794e3860
11,768,405
LoRa for the Internet of Things
New transceiver technologies have emerged which enable power efficient communication over very long distances. Examples of such Low-Power Wide-Area Network (LPWAN) technologies are LoRa, Sigfox and Weightless. A typical application scenario for these technologies is city wide meter reading collection where devices send readings at very low frequency over a long distance to a data concentrator (one-hop networks). We argue that these transceivers are potentially very useful to construct more generic Internet of Things (IoT) networks incorporating multi-hop bidirectional communication enabling sensing and actuation. Furthermore, these transceivers have interesting features not available with more traditional transceivers used for IoT networks which enable construction of novel protocol elements. In this paper we present a performance and capability analysis of a currently available LoRa transceiver. We describe its features and then demonstrate how such transceiver can be put to use efficiently in a wide-area application scenario. In particular we demonstrate how unique features such as concurrent non-destructive transmissions and carrier detection can be employed. Our deployment experiment demonstrates that 6 LoRa nodes can form a network covering 1.5 ha in a built up environment, achieving a potential lifetime of 2 year on 2 AA batteries and delivering data within 5 s and reliability of 80%.
[ "35008259", "2549977", "1732802" ]
[]
[ "133e45bab04d6c17e67af3a8f18d9d8ea13b3b2c", "3ecf1bf2d527e1e993caad214974698e6e3206d8", "7ed50d966696adc720be0201c70d557e43a19cc9", "3944192cc9e019a730d4e456427712484124a959" ]
2,016
00a03ca06a6e94f232c6413f7d0297b48b97b338
221,563,235
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
Wireless distributed microsensor systems will enable the reliable monitoring of a variety of environments for both civil and military applications. In this paper, we look at communication protocols, which can have significant impact on the overall energy dissipation of these networks. Based on our findings that the conventional protocols of direct transmission, minimum-transmission-energy, multihop routing, and static clustering may not be optimal for sensor networks, we propose LEACH (Low-Energy Adap tive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster base stations (cluster-heads) to evenly distribute the energy load among the sensors in the network. LEACH uses localized coordination to enable scalability and robustness for dynamic networks, and incorporates data fusion into the routing protocol to reduce the amount of information that must be transmitted to the base station. Simulations show that LEACH can achieve as much as a factor of 8 reduction in energy dissipation compared with conventional routing protocols. In addition, LEACH is able to distribute energy dissipation evenly throughout the sensors, doubling the useful system lifetime for the networks we simulated.
[ "1683916", "1729656", "1712771" ]
[]
[ "00ef6f5d568daf8fdbf58cc47287d448b9c5c568", "18138dc222660e96a731f7813739f701a0ad2bd9", "d51a81a0d3d9ad0f33cd4242a76e844afc6581e1", "0e93b6d58619c0f14535cfcf5ab60876ccf2cd04", "c0e3d65d43d49a88148be0865c11cd281da790b9", "06df473b53a805bf4b08b846e7be4f0559f2460c", "d79cc85d8d7055b5484b74bad7c9864eabee05ac", "19002b1005e4a2d823b8b2d7b555645117693a5f", "ab47ddc8e98f9f7c818c8fd75fa4bec62c98f01c", "46c560333c80b2bfda331c1245e7a71a57feaa32" ]
2,000
00a07ef4e3b93b23b299c7bd343dae4554a73271
18,351,234
Effort-aware just-in-time defect prediction: simple unsupervised models could be better than supervised models
Unsupervised models do not require the defect data to build the prediction models and hence incur a low building cost and gain a wide application range. Consequently, it would be more desirable for practitioners to apply unsupervised models in effort-aware just-in-time (JIT) defect prediction if they can predict defect-inducing changes well. However, little is currently known on their prediction effectiveness in this context. We aim to investigate the predictive power of simple unsupervised models in effort-aware JIT defect prediction, especially compared with the state-of-the-art supervised models in the recent literature. We first use the most commonly used change metrics to build simple unsupervised models. Then, we compare these unsupervised models with the state-of-the-art supervised models under cross-validation, time-wise-cross-validation, and across-project prediction settings to determine whether they are of practical value. The experimental results, from open-source software systems, show that many simple unsupervised models perform better than the state-of-the-art supervised models in effort-aware JIT defect prediction.
[ "3290779", "7743656", "40478926", "1723270", "7182705", "49287724", "1710147", "2630157" ]
[]
[ "ce1f6b62e52139351685af0352a79841b319052b", "e0bba45ffcc03c1df1a46a97de4ff196ecbea59a", "268be1a8339965aa7cfaa5fe113ed34fe1b7be16", "2ca425f88e70241daff3a6d717313a470be0fabc", "bcf39cc6aeaba6489e10042bbb38cdd49110f984", "0b951a8374c6b2f337777b1e5f90b030fb661423", "66dd5cd049af3cc204c19efc334f3575cbce9b78", "6853973aa0db041566c5bd6322a70f2e6e2a05d5", "5fcdd1970bf75e6c00088d0cabd2e19538c97257", "1f85d4bc77b88e7f2ba6c3562355f9d49efe73ad" ]
2,016
00a28138c74869cfb8236a18a4dbe3a896f7a812
14,276,764
Better Word Representations with Recursive Neural Networks for Morphology
Vector-space word representations have been very successful in recent years at improving performance across a variety of NLP tasks. However, common to most existing work, words are regarded as independent entities without any explicit relationship among morphologically related words being modeled. As a result, rare and complex words are often poorly estimated, and all unknown words are represented in a rather crude way using only one or a few vectors. This paper addresses this shortcoming by proposing a novel model that is capable of building representations for morphologically complex words from their morphemes. We combine recursive neural networks (RNNs), where each morpheme is a basic unit, with neural language models (NLMs) to consider contextual information in learning morphologicallyaware word representations. Our learned models outperform existing word representations by a good margin on word similarity tasks across many datasets, including a new dataset we introduce focused on rare words to complement existing ones in an interesting way.
[ "1821711", "2166511", "1812612" ]
[]
[ "3bc9f8eb5ba303816fd5f642f2e7408f0752d3c4", "142f38642629b9d268999ad876af482177d36697", "5fa4b320ab6e45309e442e394692714a9b6104b4", "45372f73a0e40da428595597816ac4cae1469cec", "29c34a034f6f35915a141dac98cabf625bea2b3c", "27e38351e48fe4b7da2775bf94341738bc4da07e", "1cd2289bf1ea95ab0b316ba4aee927b6c1406c0f", "a1a7d4b660558a0880c7333d3851000e439f6af7", "47a87c2cbdd928bb081974d308b3d9cf678d257e", "6c05f3886399a1ea179fc188fa6d55e2a6e8d403" ]
2,013
00a403a0fe1e44510cc5096631ca9c585e69fc37
14,082,139
Predicting personality with social media
Social media is a place where users present themselves to the world, revealing personal details and insights into their lives. We are beginning to understand how some of this information can be utilized to improve the users' experiences with interfaces and with one another. In this paper, we are interested in the personality of users. Personality has been shown to be relevant to many types of interactions; it has been shown to be useful in predicting job satisfaction, professional and romantic relationship success, and even preference for different interfaces. Until now, to accurately gauge users' personalities, they needed to take a personality test. This made it impractical to use personality analysis in many social media domains. In this paper, we present a method by which a user's personality can be accurately predicted through the publicly available information on their Facebook profile. We will describe the type of data collected, our methods of analysis, and the results of predicting personality traits through machine learning. We then discuss the implications this has for social media design, interface design, and broader domains.
[ "1713898", "37238296", "21776264" ]
[]
[ "f095a82cf0aea9fa7c154baa1425f48f2cde595b", "6d8c9fcce8177d6f8d122d653c7d32d7624d6714", "27d675bc4570f0867079f044e678545322f5f4fc", "bbcc25ff101b263aab2e46dc2175b2ddae36cb76", "2c15f86a318c103eb3422423dec1b3eb494a6f8f", "a27e3a8fa727881b2a333aee0501714a3e839ef2", "e6d84c3b17ade98da650ffe25b1822966734809a", "fadc0059a2ef31e19a8f98e2516d3e28ed9c5975", "434720ab8ea28b1f9c808df651c07dc6ed627ac9", "1de5f21acc441ff6a7aa7f0bd2dfd05efa5db6a0" ]
2,011