anchor
stringlengths
10
388
positive
stringlengths
8
386
A Transforming Insurance Company and the 4 Types of Health Data Challenges that Arise: A Finnish Case Study
Research Commentary - The Digital Transformation of Healthcare: Current Status and the Road Ahead
A Transforming Insurance Company and the 4 Types of Health Data Challenges that Arise: A Finnish Case Study
Bringing Big Data to Personalized Healthcare: A Patient-Centered Framework
A Transforming Insurance Company and the 4 Types of Health Data Challenges that Arise: A Finnish Case Study
value of information systems and products : understanding the users ’ perspective and values .
Human-level AI's Killer Application: Interactive Computer Games
Automated Intelligent Pilots for Combat Flight Simulation
Human-level AI's Killer Application: Interactive Computer Games
The Cog Project : Building a Humanoid Robot
Combining Misuse Cases with Attack Trees and Security Activity Models
Specifying reusable security requirements
Combining Misuse Cases with Attack Trees and Security Activity Models
Eliciting security requirements with misuse cases
Combining Misuse Cases with Attack Trees and Security Activity Models
Using abuse case models for security requirements analysis
Neural network based attack on a masked implementation of AES
A time series approach for profiling attack
Neural network based attack on a masked implementation of AES
black - box side - channel attacks highlight the importance of countermeasures - an analysis of the xilinx virtex - 4 and virtex - 5 bitstream encryption mechanism .
Neural network based attack on a masked implementation of AES
Electromagnetic Analysis: Concrete Results
Self-Compassion and Psychological Well-Being in Older Adults
Relation of threatened egotism to violence and aggression: The dark side of high self-esteem.
Self-Compassion and Psychological Well-Being in Older Adults
Self-compassion versus global self-esteem: Two different ways of relating to oneself
Concept Transfer Learning for Adaptive Language Understanding
Neural Models for Sequence Chunking
Concept Transfer Learning for Adaptive Language Understanding
Attention-Based Recurrent Neural Network Models for Joint Intent Detection and Slot Filling
Concept Transfer Learning for Adaptive Language Understanding
Supervised Sequence Labelling with Recurrent Neural Networks
Concept Transfer Learning for Adaptive Language Understanding
Sequential Convolutional Neural Networks for Slot Filling in Spoken Language Understanding
Concept Transfer Learning for Adaptive Language Understanding
What is left to be understood in ATIS?
A fast, universal algorithm to learn parametric nonlinear embeddings
Learning a Nonlinear Embedding by Preserving Class Neighbourhood Structure
A fast, universal algorithm to learn parametric nonlinear embeddings
learning a parametric embedding by preserving local structure .
Down will Come Baby, Cradle and All: Diagnostic and Therapeutic Implications of Chronic Trauma on Child Development
Developmental traumatology part II: brain development
Down will Come Baby, Cradle and All: Diagnostic and Therapeutic Implications of Chronic Trauma on Child Development
Relationship of childhood abuse and household dysfunction to many of the leading causes of death in adults. The Adverse Childhood Experiences (ACE) Study.
Down will Come Baby, Cradle and All: Diagnostic and Therapeutic Implications of Chronic Trauma on Child Development
Neurobiological Sequelae of Childhood Trauma: Post-traumatic Stress Disorders in Children
A theory of self-calibration of a moving camera
Camera Self-Calibration: Theory and Experiments
Virtual reality and information technology for archaeological site promotion
Archeoguide: first results of an augmented reality, mobile computing system in cultural heritage sites
Virtual reality and information technology for archaeological site promotion
an fft - based technique for translation , rotation , and scale - invariant image registration .
An empirical study of multifactorial PSO and multifactorial DE
Enhancing Differential Evolution Utilizing Eigenvector-Based Crossover Operator
An empirical study of multifactorial PSO and multifactorial DE
Evolutionary computation: Comments on the history and current state
An empirical study of multifactorial PSO and multifactorial DE
Learning with Whom to Share in Multi-task Feature Learning
Solving Single-digit Sudoku Subproblems
Metaheuristics can Solve Sudoku Puzzles
Solving Single-digit Sudoku Subproblems
Dynamic Programming Treatment of the Travelling Salesman Problem
Solving Single-digit Sudoku Subproblems
Linear Systems, Sparse Solutions, and Sudoku
Detecting Integrity Attacks on SCADA Systems
Secure control against replay attacks
Detecting Integrity Attacks on SCADA Systems
Research Challenges for the Security of Control Systems
Detecting Integrity Attacks on SCADA Systems
A Plant-Wide Industrial Process Control Security Problem
PointerPhone: Using Mobile Phones for Direct Pointing Interactions with Remote Displays
the smart phone : a ubiquitous input device .
PointerPhone: Using Mobile Phones for Direct Pointing Interactions with Remote Displays
Augmented surfaces: a spatially continuous work space for hybrid computing environments
PointerPhone: Using Mobile Phones for Direct Pointing Interactions with Remote Displays
SpeckleSense: fast, precise, low-cost and compact motion sensing using laser speckle
PointerPhone: Using Mobile Phones for Direct Pointing Interactions with Remote Displays
Avoiding interference: how people use spatial separation and partitioning in SDG workspaces
Keep Calm and Study Memes
Memes in a Digital World: Reconciling with a Conceptual Troublemaker
Automatic Language Identification fromWritten Texts An Overview
N-Gram Based Text Categorization
Automatic Language Identification fromWritten Texts An Overview
Automatic Detection and Language Identification of Multilingual Documents
Frontal to profile face verification in the wild
From Few to many: Illumination cone models for face recognition under variable lighting and pose
Frontal to profile face verification in the wild
Deeply learned face representations are sparse, selective, and robust
Frontal to profile face verification in the wild
Face Description with Local Binary Patterns: Application to Face Recognition
algorithm and technique on various edge detection : a survey .
A Computational Approach toEdgeDetection
algorithm and technique on various edge detection : a survey .
Real-time Facial Expression Recognition Based on Adaptive Canny Operator Edge Detection
Performance Optimization of Communication Subsystem in Scale-Out Distributed Storage
Performance Optimization for All Flash Scale-Out Storage
Performance Optimization of Communication Subsystem in Scale-Out Distributed Storage
Ceph: a scalable, high-performance distributed file system
A System for Automated Detection of Ampoule Injection Impurities
What is principal component analysis?
A System for Automated Detection of Ampoule Injection Impurities
Particulate Matter in Injectable Drug Products
A System for Automated Detection of Ampoule Injection Impurities
Extreme learning machine: Theory and applications
Activity recognition and monitoring using multiple sensors on different body positions
Activity recognition from user-annotated acceleration data
measuring user engagement .
The development and evaluation of a survey to measure user engagement
measuring user engagement .
The Measurement of Web-Customer Satisfaction: An Expectation and Disconfirmation Approach
measuring user engagement .
Theory and models for creating engaging and immersive ecommerce Websites
measuring user engagement .
Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research
Towards Open Set Deep Networks
Distance-Based Image Classification: Generalizing to New Classes at Near-Zero Cost
Towards Open Set Deep Networks
Zero-Shot Learning Through Cross-Modal Transfer
Towards Open Set Deep Networks
Fast, Accurate Detection of 100,000 Object Classes on a Single Machine
Towards Open Set Deep Networks
Is object localization for free? - Weakly-supervised learning with convolutional neural networks
Beyond Traditional DTN Routing: Social Networks for Opportunistic Communication
Epidemic Routing for Partially-Connected Ad Hoc Networks
Beyond Traditional DTN Routing: Social Networks for Opportunistic Communication
Efficient routing in intermittently connected mobile networks: the multiple-copy case
Beyond Traditional DTN Routing: Social Networks for Opportunistic Communication
MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks
Intent Generation for Goal-Oriented Dialogue Systems based on Schema.org Annotations
Learning End-to-End Goal-Oriented Dialog
Intent Generation for Goal-Oriented Dialogue Systems based on Schema.org Annotations
Verb Semantics And Lexical Selection
Intent Generation for Goal-Oriented Dialogue Systems based on Schema.org Annotations
Efficient Estimation of Word Representations in Vector Space
Intent Generation for Goal-Oriented Dialogue Systems based on Schema.org Annotations
An End-to-End Goal-Oriented Dialog System with a Generative Natural Language Response Generation
two step credit risk assesment model for retail bank loan applications using decision tree data mining technique .
DATA MINING SYSTEM AND APPLICATIONS: A REVIEW
two step credit risk assesment model for retail bank loan applications using decision tree data mining technique .
data preprocessing for supervised leaning .
Lightweight Asynchronous Snapshots for Distributed Dataflows
TimeStream: reliable stream computation in the cloud
3-D Road Boundary Extraction From Mobile Laser Scanning Data via Supervoxels and Graph Cuts
Using Mobile LiDAR Data for Rapidly Updating Road Markings
3-D Road Boundary Extraction From Mobile Laser Scanning Data via Supervoxels and Graph Cuts
The 3D Hough Transform for plane detection in point clouds: A review and a new accumulator design
A survey of domain adaptation for statistical machine translation
HMM-Based Word Alignment in Statistical Translation
A survey of domain adaptation for statistical machine translation
A Statistical Approach to Machine Translation
Advanced Low-Voltage Power MOSFET Technology for Power Supply in Package Applications
NexFET generation 2, new way to power
Advanced Low-Voltage Power MOSFET Technology for Power Supply in Package Applications
Lateral power MOSFET for megahertz-frequency, high-density DC/DC converters
Advanced Low-Voltage Power MOSFET Technology for Power Supply in Package Applications
Design considerations on low voltage synchronous power MOSFETs with monolithically integrated gate voltage pull-down circuitry
Variational inference for Dirichlet process mixtures
a variational baysian framework for graphical models .
Variational inference for Dirichlet process mixtures
Latent Dirichlet Allocation
Variational inference for Dirichlet process mixtures
A Bayesian Analysis of Some Nonparametric Problems
Variational inference for Dirichlet process mixtures
Gibbs Sampling Methods for Stick-Breaking Priors
RNN Encoder Decoder 3 D Skeleton Converter 2 D Pose Sequence Generator Input Image 2 D Pose Heatmaps 3 D Skeleton Hourglass network
Articulated Human Detection with Flexible Mixtures of Parts
RNN Encoder Decoder 3 D Skeleton Converter 2 D Pose Sequence Generator Input Image 2 D Pose Heatmaps 3 D Skeleton Hourglass network
Weakly-supervised Disentangling with Recurrent Transformations for 3D View Synthesis
RNN Encoder Decoder 3 D Skeleton Converter 2 D Pose Sequence Generator Input Image 2 D Pose Heatmaps 3 D Skeleton Hourglass network
Marker-Less 3D Human Motion Capture with Monocular Image Sequence and Height-Maps
Multiview Image Completion with Space Structure Propagation
Image-based rendering in the gradient domain
Multiview Image Completion with Space Structure Propagation
Photo tourism: exploring photo collections in 3D
Multiview Image Completion with Space Structure Propagation
Image inpainting
Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things
Securing communication in 6LoWPAN with compressed IPsec
Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things
A cooperative intrusion detection system for ad hoc networks
Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
Beyond Behaviorism : On the Automaticity of Higher Mental Processes
The Neural Network House: An Environment that Adapts to its Inhabitants
Beyond Behaviorism : On the Automaticity of Higher Mental Processes
The Trouble of Thinking Activation and Application of Stereotypic Beliefs
Beyond Behaviorism : On the Automaticity of Higher Mental Processes
flocks , herds , and schools : a distributed behavioral model .
Beyond Behaviorism : On the Automaticity of Higher Mental Processes
COGNITIVE NEUROSCIENCE OF HUMAN MEMORY
raiden11@IECSIL-FIRE-2018 : Named Entity Recognition for Indian Languages
Learning Word Vectors for 157 Languages
raiden11@IECSIL-FIRE-2018 : Named Entity Recognition for Indian Languages
Named Entity Recognition and Classification in Kannada Language
raiden11@IECSIL-FIRE-2018 : Named Entity Recognition for Indian Languages
Named Entity Recognition in Bengali: A Conditional Random Field Approach
Phased Array for UAV Communications at 5.5 GHz
Substrate-Integrated Cavity-Backed Patch Arrays: A Low-Cost Approach for Bandwidth Enhancement
L2P2: Location-aware location privacy protection for location-based services
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking