anchor
stringlengths
10
388
positive
stringlengths
8
386
Intelligent DSS for talent management: a proposed architecture using knowledge discovery approach
Data mining to improve personnel selection and enhance human capital: A case study in high-technology industry
Intelligent DSS for talent management: a proposed architecture using knowledge discovery approach
Bankruptcy prediction in banks and firms via statistical and intelligent techniques - A review
Learning Semantic Hierarchies via Word Embeddings
Learning Syntactic Patterns for Automatic Hypernym Discovery
Learning Semantic Hierarchies via Word Embeddings
Exploiting Multiple Sources for Open-Domain Hypernym Discovery
Learning Semantic Hierarchies via Word Embeddings
A Neural Probabilistic Language Model
Learning Semantic Hierarchies via Word Embeddings
WORDNET: A Lexical Database For English
Using design thinking to improve psychological interventions: The case of the growth mindset during the transition to high school.
a social - cognitive approach to motivation and personality .
Using design thinking to improve psychological interventions: The case of the growth mindset during the transition to high school.
Self-theories and goals: their role in motivation, personality, and development.
Using design thinking to improve psychological interventions: The case of the growth mindset during the transition to high school.
Praise for intelligence can undermine children's motivation and performance.
Integration of ICT in Education: Key Challenges
Systematic Planning for ICT Integration in Topic Learning
Parallel Algorithms for Evaluating Centrality Indices in Real-world Networks
Network robustness and fragility: percolation on random graphs.
Parallel Algorithms for Evaluating Centrality Indices in Real-world Networks
Pajek - Program for Large Network Analysis
Assessing Test Suite E ↵ ectiveness Using Static Metrics
A Practical Model for Measuring Maintainability
Assessing Test Suite E ↵ ectiveness Using Static Metrics
The influence of size and coverage on test suite effectiveness
Concealed CFRP Vehicle Chassis Antenna Cavity
A vehicular rooftop, shark-fin, multiband antenna for the GPS/LTE/cellular/DSRC systems
Emotion Regulation in Adulthood: Timing Is Everything
The Emerging Field of Emotion Regulation: An Integrative Review
Emotion Regulation in Adulthood: Timing Is Everything
Immune neglect : A source of durability bias in affective forecasting
Emotion Regulation in Adulthood: Timing Is Everything
Antecedent- and Response-Focused Emotion Regulation: Divergent Consequences for Experience, Expression, and Physiology
Genre Classification using Machine Learning Techniques
Audio Spectrogram Representations for Processing with Convolutional Neural Networks
Genre Classification using Machine Learning Techniques
Musical genre classification of audio signals
Genre Classification using Machine Learning Techniques
On the Use of Zero-Crossing Rate for an Application of Classification of Percussive Sounds
Cross-lingual Entity Alignment via Joint Attribute-Preserving Embedding
Distributed Representations of Words and Phrases and their Compositionality
Cross-lingual Entity Alignment via Joint Attribute-Preserving Embedding
Type-Constrained Representation Learning in Knowledge Graphs
Cross-lingual Entity Alignment via Joint Attribute-Preserving Embedding
Knowledge representation learning with entities, attributes and relations
Cross-lingual Entity Alignment via Joint Attribute-Preserving Embedding
Knowledge graph embedding by translating on hyperplanes
Delta Voxel Cone Tracing
High-quality reflections, refractions, and caustics in Augmented Reality and their contribution to visual coherence
Delta Voxel Cone Tracing
Interactive Indirect Illumination Using Voxel Cone Tracing
gpu - based volume ray - casting with advanced illumination .
A practical model for subsurface light transport
Design of a compact wideband planar 180° Hybrid ring using the composite right/left-handed transmission line
A Broadband Planar Magic-T Using Microstrip–Slotline Transitions
Design of a compact wideband planar 180° Hybrid ring using the composite right/left-handed transmission line
A novel broad-band Chebyshev-response rat-race ring coupler
Electric Load Forecasting Using an Artificial Neural Network
Learning internal representations by error propagation
Bridging the Gap: From Research to Practical Advice
Belief & evidence in empirical software engineering
Bridging the Gap: From Research to Practical Advice
Grasping reality through illusion—interactive graphics serving science
Adapting Deep Network Features to Capture Psychological Representations
A nonparametric bayesian framework for constructing flexible feature representations
Adapting Deep Network Features to Capture Psychological Representations
Backpropagation Applied to Handwritten Zip Code Recognition
Adapting Deep Network Features to Capture Psychological Representations
Deep Supervised, but Not Unsupervised, Models May Explain IT Cortical Representation
Non-Intrusive Energy Disaggregation Using Non-negative Matrix Factorization with Sum-to-k Constraint
Unsupervised Disaggregation for Non-intrusive Load Monitoring
Non-Intrusive Energy Disaggregation Using Non-negative Matrix Factorization with Sum-to-k Constraint
Toward Non-Intrusive Load Monitoring via Multi-Label Classification
Non-Intrusive Energy Disaggregation Using Non-negative Matrix Factorization with Sum-to-k Constraint
Unsupervised Disaggregation of Low Frequency Power Measurements
Non-Intrusive Energy Disaggregation Using Non-negative Matrix Factorization with Sum-to-k Constraint
Real-Time Epileptic Seizure Detection from EEG Signals via Random Subspace Ensemble Learning
A Survey of Prevention/Mitigation against Memory Corruption Attacks
AddressSanitizer : A Fast Address Sanity Checker
An analytical model for multi-tier internet services and its applications
Performance Guarantees for Web Server End-Systems: A Control-Theoretical Approach
An analytical model for multi-tier internet services and its applications
Adaptive Overload Control for Busy Internet Servers
Exploiting SmartPhone USB Connectivity For Fun And Profit !
Google Android: A State-of-the-Art Review of Security Mechanisms
Exploiting SmartPhone USB Connectivity For Fun And Profit !
Google Android: A Comprehensive Security Assessment
Exploiting SmartPhone USB Connectivity For Fun And Profit !
Detecting energy-greedy anomalies and mobile malware variants
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains
detection of abrupt changes : theory and application 1 .
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains
Building a Dynamic Reputation System for DNS
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains
Measuring and Detecting Fast-Flux Service Networks
SMILES Enumeration as Data Augmentation for Neural Network Modeling of Molecules
Return of the Devil in the Details: Delving Deep into Convolutional Nets
SMILES Enumeration as Data Augmentation for Neural Network Modeling of Molecules
Deep Learning in Neural Networks: An Overview
SMILES Enumeration as Data Augmentation for Neural Network Modeling of Molecules
Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups
SMILES Enumeration as Data Augmentation for Neural Network Modeling of Molecules
Best practices for convolutional neural networks applied to visual document analysis
Deep Image Clustering Using Convolutional Autoencoder Embedding with Inception-Like Block
Graph Regularized Nonnegative Matrix Factorization for Data Representation
Deep Image Clustering Using Convolutional Autoencoder Embedding with Inception-Like Block
Agglomerative clustering using the concept of mutual nearest neighbourhood
Deep Image Clustering Using Convolutional Autoencoder Embedding with Inception-Like Block
A Tutorial on Spectral Clustering
Contrarian Investment, Extrapolation, and Risk
Noise Trader Risk in Financial Markets
Contrarian Investment, Extrapolation, and Risk
Returns to Buying Winners and Selling Losers : Implications for Stock Market Efficiency
The new face of violence tendency: Cyber bullying perpetrators and their victims
Cyberbullying: Another main type of bullying?
The new face of violence tendency: Cyber bullying perpetrators and their victims
Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition
The new face of violence tendency: Cyber bullying perpetrators and their victims
Relationships Between Bullying and Violence Among US Youth
The new face of violence tendency: Cyber bullying perpetrators and their victims
Human Aggression
Best practice recommendations for data screening
coefficient alpha and the internal structure of tests * a comparison of split - half formulas .
Best practice recommendations for data screening
Least Median of Squares Regression
Best practice recommendations for data screening
An evaluation of the consequences of using short measures of the Big Five personality traits.
Best practice recommendations for data screening
self - reports how the questions shape the answers .
Algorithms for large scale markov blanket discovery
Toward Optimal Feature Selection
Algorithms for large scale markov blanket discovery
Learning bayesian networks from data: An efficient approach based on information theory
Algorithms for large scale markov blanket discovery
Towards Principled Feature Selection: Relevancy, Filters and Wrappers
High-Throughput Parallel Architecture for H.265/HEVC Deblocking Filter
Overview of the High Efficiency Video Coding (HEVC) Standard
Optimizing EEG energy-based seizure detection using genetic algorithms
Spark: Cluster computing with working sets
Optimizing EEG energy-based seizure detection using genetic algorithms
Wavelet-based EEG processing for computer-aided seizure detection and epilepsy diagnosis
Optimizing EEG energy-based seizure detection using genetic algorithms
Application of Machine Learning To Epileptic Seizure Detection
Understanding the functional neuroanatomy of acquired prosopagnosia
The Fusiform Face Area is Part of a Network that Processes Faces at the Individual Level
Understanding the functional neuroanatomy of acquired prosopagnosia
The myth of the visual word form area
Augmented Reality Driving Using Semantic Geo-Registration
Distance transforms of sampled functions
Augmented Reality Driving Using Semantic Geo-Registration
orb - slam2 : an open - source slam system for monocular , stereo , and rgb - d cameras .
Augmented Reality Driving Using Semantic Geo-Registration
Initialization techniques for 3D SLAM: A survey on rotation estimation and its use in pose graph optimization
Further Meta-Evaluation of Machine Translation
Statistical Phrase-Based Translation
Further Meta-Evaluation of Machine Translation
Bleu: A Method For Automatic Evaluation Of Machine Translation
Further Meta-Evaluation of Machine Translation
Re-Evaluation The Role Of Bleu In Machine Translation Research
Yes, we GAN: Applying Adversarial Techniques for Autonomous Driving
Large Scale GAN Training for High Fidelity Natural Image Synthesis
Yes, we GAN: Applying Adversarial Techniques for Autonomous Driving
Learning to Drive from Simulation without Real World Labels
Yes, we GAN: Applying Adversarial Techniques for Autonomous Driving
auto - encoding variational bayes .
Yes, we GAN: Applying Adversarial Techniques for Autonomous Driving
Deep neural networks are easily fooled: High confidence predictions for unrecognizable images
A Framework for Feature Selection in Clustering
Algorithms for Non-negative Matrix Factorization
Sensitive and Efficient RF Harvesting Supply for Batteryless Backscatter Sensor Networks
E-WEHP: A Batteryless Embedded Sensor-Platform Wirelessly Powered From Ambient Digital-TV Signals
Sensitive and Efficient RF Harvesting Supply for Batteryless Backscatter Sensor Networks
Recycling ambient microwave energy with broad-band rectenna arrays
Sensitive and Efficient RF Harvesting Supply for Batteryless Backscatter Sensor Networks
Rectenna design and optimization using reciprocity theory and harmonic balance analysis for electromagnetic (EM) energy harvesting
Sensitive and Efficient RF Harvesting Supply for Batteryless Backscatter Sensor Networks
Low-Power Far-Field Wireless Powering for Wireless Sensors
student behavior in a web - based educational system : exit intent prediction .
A comparative analysis of machine learning techniques for student retention management
student behavior in a web - based educational system : exit intent prediction .
unsupervised and semi - supervised clustering : a brief survey ∗ .
On Generalization and Regularization in Deep Learning
Understanding deep learning requires rethinking generalization
Security in Automotive Networks: Lightweight Authentication and Authorization
Entropy-based anomaly detection for in-vehicle networks
Security in Automotive Networks: Lightweight Authentication and Authorization
LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks
Facial expression recognition for neonatal pain assessment
Facial Expression Recognition in Image Sequences Using Geometric Deformation Features and Support Vector Machines
Powers of Tensors and Fast Matrix Multiplication
Multiplying matrices faster than coppersmith-winograd
Powers of Tensors and Fast Matrix Multiplication
Faster Algorithms for Rectangular Matrix Multiplication
Multi-View Data Generation Without View Supervision
MVC: A Dataset for View-Invariant Clothing Retrieval and Attribute Prediction
Multi-View Data Generation Without View Supervision
InfoGAN: Interpretable Representation Learning by Information Maximizing Generative Adversarial Nets