anchor
stringlengths
10
388
positive
stringlengths
8
386
L2P2: Location-aware location privacy protection for location-based services
Location Privacy in Pervasive Computing
L2P2: Location-aware location privacy protection for location-based services
Feeling-based location privacy protection for location-based services
HashKV: enabling efficient updates in KV storage via hashing
Atlas: Baidu's key-value storage system for cloud data
HashKV: enabling efficient updates in KV storage via hashing
Workload analysis of a large-scale key-value store
HashKV: enabling efficient updates in KV storage via hashing
A Light-weight Compaction Tree to Reduce I / O Amplification toward Efficient Key-Value Stores
HashKV: enabling efficient updates in KV storage via hashing
Efficient identification of hot data for flash memory storage systems
Continuous space language models
A Neural Probabilistic Language Model
Continuous space language models
SRILM -- An extensible language modeling toolkit
Colocation Data Center Demand Response Using Nash Bargaining Theory
Renewable and cooling aware workload management for sustainable data centers
Colocation Data Center Demand Response Using Nash Bargaining Theory
Greening geographical load balancing
how deep is your bag of words ? .
Besting the Quiz Master: Crowdsourcing Incremental Classification Games
how deep is your bag of words ? .
Recurrent Convolutional Neural Networks for Discourse Compositionality
how deep is your bag of words ? .
A Structured Vector Space Model for Word Meaning in Context
how deep is your bag of words ? .
Improving neural networks by preventing co-adaptation of feature detectors
Chinese Spelling Check Evaluation at SIGHAN Bake-off 2013
Context based spelling correction
Design of Novel Shaftless Pump-Jet Propulsor for Multi-Purpose Long-Range and High-Speed Autonomous Underwater Vehicle
Design and Performance Analysis of Superconducting Rim-Driven Synchronous Motors for Marine Propulsion
Design of Novel Shaftless Pump-Jet Propulsor for Multi-Purpose Long-Range and High-Speed Autonomous Underwater Vehicle
Integrated Design and Realization of a Hubless Rim-driven Thruster
Design of Novel Shaftless Pump-Jet Propulsor for Multi-Purpose Long-Range and High-Speed Autonomous Underwater Vehicle
Optimal design and multifield coupling analysis of propelling motor used in a novel integrated motor propeller
Leadership theory and research in the new millennium: Current theoretical trends and changing perspectives
The toxic triangle: Destructive leaders, susceptible followers, and conducive environments.
Leadership theory and research in the new millennium: Current theoretical trends and changing perspectives
The role of leadership in shared mental model convergence and team performance improvement: An agent-based computational model
Appearance-based person reidentification in camera networks: problem overview and current approaches
A Computational Approach toEdgeDetection
Appearance-based person reidentification in camera networks: problem overview and current approaches
Watersheds in Digital Spaces: An Efficient Algorithm Based on Immersion Simulations
Combating Online In-Auction Fraud: Clues, Techniques and Challenges
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Combating Online In-Auction Fraud: Clues, Techniques and Challenges
Reputation Systems
Margin based permutation variable importance: A stable importance measure for random forest
Bias in random forest variable importance measures: Illustrations, sources and a solution
Margin based permutation variable importance: A stable importance measure for random forest
Robust biomarker identification for cancer diagnosis with ensemble feature selection methods
Margin based permutation variable importance: A stable importance measure for random forest
Permutation importance: a corrected feature importance measure
Active Decision Boundary Annotation with Deep Generative Models
Adversarial Feature Learning
Active Decision Boundary Annotation with Deep Generative Models
Discriminative batch mode active learning
Active Decision Boundary Annotation with Deep Generative Models
Heterogenous Uncertainty Sampling for Supervised Learning
Active Decision Boundary Annotation with Deep Generative Models
Generative Visual Manipulation on the Natural Image Manifold
A multichannel convolutional neural network for cross-language dialog state tracking
Improving neural networks by preventing co-adaptation of feature detectors
A multichannel convolutional neural network for cross-language dialog state tracking
Character-Aware Neural Language Models
A multichannel convolutional neural network for cross-language dialog state tracking
Character-level Convolutional Networks for Text Classification
A multichannel convolutional neural network for cross-language dialog state tracking
Sequence to Sequence Learning with Neural Networks
A multichannel convolutional neural network for cross-language dialog state tracking
Error Analysis of Statistical Machine Translation Output
Understanding dopamine and reinforcement learning: The dopamine reward prediction error hypothesis
Reinforcement learning: The Good, The Bad and The Ugly
Understanding dopamine and reinforcement learning: The dopamine reward prediction error hypothesis
Temporal Difference Models and Reward-Related Learning in the Human Brain
Understanding dopamine and reinforcement learning: The dopamine reward prediction error hypothesis
Theoretical Neuroscience : Computational and Mathematical Modeling of Neural Systems
Understanding dopamine and reinforcement learning: The dopamine reward prediction error hypothesis
A framework for mesencephalic dopamine systems based on predictive Hebbian learning
2.65 GHz 340 W dual internally matched FETs for compact doherty power amplifiers
The Doherty Power Amplifier: Review of Recent Solutions and Trends
2.65 GHz 340 W dual internally matched FETs for compact doherty power amplifiers
2.6 GHz 4 watt GaN-HEMT two-stage power amplifier MMIC for LTE small-cell applications
2.65 GHz 340 W dual internally matched FETs for compact doherty power amplifiers
An X-band 250W solid-state power amplifier using GaN power HEMTs
e-Commerce product classification: our participation at cDiscount 2015 challenge
Scikit-learn: Machine Learning in Python
e-Commerce product classification: our participation at cDiscount 2015 challenge
Large-scale item categorization for e-commerce
Emerging topic detection using dictionary learning
Online Learning for Matrix Factorization and Sparse Coding
Emerging topic detection using dictionary learning
Streaming First Story Detection with application to Twitter
Emerging topic detection using dictionary learning
Probabilistic Latent Semantic Analysis
GraphCT: Multithreaded Algorithms for Massive Graph Analysis
Massive Social Network Analysis: Mining Twitter for Social Good
GraphCT: Multithreaded Algorithms for Massive Graph Analysis
SNAP, Small-world Network Analysis and Partitioning: An open-source parallel graph framework for the exploration of large-scale networks
GraphCT: Multithreaded Algorithms for Massive Graph Analysis
Collective dynamics of ‘small-world’ networks
GraphCT: Multithreaded Algorithms for Massive Graph Analysis
Exploring Network Structure, Dynamics, and Function using NetworkX
Decentralizing attribute-based encryption
Multi-Authority Attribute Based Encryption
Decentralizing attribute-based encryption
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
Decentralizing attribute-based encryption
Attribute-based encryption for fine-grained access control of encrypted data
Decentralizing attribute-based encryption
Fuzzy Identity-Based Encryption
Sketch-based Geometric Monitoring of Distributed Stream Queries
Model-Driven Data Acquisition in Sensor Networks
Sketch-based Geometric Monitoring of Distributed Stream Queries
adaptive stream resource management using kalman filters .
Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs
iPlane: an information plane for distributed services
Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs
Internet traffic classification using bayesian analysis techniques
Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
TROPE R HCRAESE R PAID I 2 D FACE RECOGNITION : AN EXPERIMENTAL AND REPRODUCIBLE RESEARCH SURVEY
Null space approach of Fisher discriminant analysis for face recognition
TROPE R HCRAESE R PAID I 2 D FACE RECOGNITION : AN EXPERIMENTAL AND REPRODUCIBLE RESEARCH SURVEY
SCface – surveillance cameras face database
TROPE R HCRAESE R PAID I 2 D FACE RECOGNITION : AN EXPERIMENTAL AND REPRODUCIBLE RESEARCH SURVEY
Low-dimensional procedure for the characterization of human faces
TROPE R HCRAESE R PAID I 2 D FACE RECOGNITION : AN EXPERIMENTAL AND REPRODUCIBLE RESEARCH SURVEY
Robust real-time object detection
Emergent Translation in Multi-Agent Communication
Dual Learning for Machine Translation
Emergent Translation in Multi-Agent Communication
On the difficulty of training Recurrent Neural Networks
Emergent Translation in Multi-Agent Communication
Deep Canonical Correlation Analysis
Emergent Translation in Multi-Agent Communication
Multimodal Pivots for Image Caption Translation
MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing
Fast crash recovery in RAMCloud
MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing
Workload analysis of a large-scale key-value store
MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing
Cache craftiness for fast multicore key-value storage
MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing
FlashStore: High Throughput Persistent Key-Value Store
SmaRT Visualisation of Legal Rules for Compliance
Making Sense of Regulations with SBVR
Blockchain Consensus
(Leader/Randomization/Signature)-free Byzantine Consensus for Consortium Blockchains
Blockchain Consensus
Implementing fault-tolerant services using the state machine approach: a tutorial
Blockchain Consensus
Asynchronous byzantine agreement protocols
ATM: A distributed, collaborative, scalable system for automated machine learning
TPOT: A Tree-Based Pipeline Optimization Tool for Automating Machine Learning
ATM: A distributed, collaborative, scalable system for automated machine learning
Practical Bayesian Optimization of Machine Learning Algorithms
ATM: A distributed, collaborative, scalable system for automated machine learning
Metalearning: Applications to Data Mining
Light fidelity (Li-Fi): towards all-optical networking
Visible light communication using OFDM
Light fidelity (Li-Fi): towards all-optical networking
Information Rate of OFDM-Based Optical Wireless Communication Systems With Nonlinear Distortion
Sentiment analysis of the Uri terror attack using Twitter
Baselines and Bigrams: Simple, Good Sentiment and Topic Classification
Sentiment analysis of the Uri terror attack using Twitter
A predictive model for the temporal dynamics of information diffusion in online social networks
Sentiment analysis of the Uri terror attack using Twitter
Bad Is Stronger Than Good
Improving neural networks by preventing co-adaptation of feature detectors
Adaptive Mixtures of Local Experts
Improving neural networks by preventing co-adaptation of feature detectors
Gradient-Based Learning Applied to Document Recognition
Improving neural networks by preventing co-adaptation of feature detectors
The Importance of Encoding Versus Training with Sparse Coding and Vector Quantization
Improving neural networks by preventing co-adaptation of feature detectors
Bagging Predictors
Improving neural networks by preventing co-adaptation of feature detectors
Training Products of Experts by Minimizing Contrastive Divergence
Evolution of evasive malwares: A survey
Barecloud: bare-metal analysis-based evasive malware detection
Evolution of evasive malwares: A survey
Full System Emulation : Achieving Successful Automated Dynamic Analysis of Evasive Malware !
Evolution of evasive malwares: A survey
SubVirt: implementing malware with virtual machines
On the huge benefit of decisive moves in Monte-Carlo Tree Search algorithms
Algorithms for Infinitely Many-Armed Bandits
High-power density hybrid converter topologies for low-power Dc-Dc SMPS
Analysis and Optimization of Switched-Capacitor DC–DC Converters
High-power density hybrid converter topologies for low-power Dc-Dc SMPS
Switched-capacitor DC-DC converters for low-power on-chip applications
A compact printed monopole antenna with symmetrical i and rectangular shaped slots for bluetooth/WLAN/WIMAX applications
Compact Multiresonator-Loaded Planar Antenna for Multiband Operation
A compact printed monopole antenna with symmetrical i and rectangular shaped slots for bluetooth/WLAN/WIMAX applications
Dual-Band Probe-Fed Stacked Patch Antenna for GNSS Applications
A compact printed monopole antenna with symmetrical i and rectangular shaped slots for bluetooth/WLAN/WIMAX applications
Design of Compact F-Shaped Slot Triple-Band Antenna for WLAN/WiMAX Applications
DLMS/COSEM security level enhancement to construct secure advanced metering infrastructure
Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities