abstract_id
stringlengths 10
10
| sentences
list | labels
list | confs
list |
---|---|---|---|
train_1600 | [
"In this study, we assess the causal impact of stakeholder orientation on innovation.",
"To obtain exogenous variation in stakeholder orientation, we exploit the enactment of state-level constituency statutes, which allow directors to consider stakeholders’ interests when making business decisions.",
"Using a difference-indifferences methodology, we find that the enactment of constituency statutes leads to a significant increase in the number of patents and citations per patent.",
"We further assess the mechanisms through which stakeholder orientation fosters innovation.",
"In particular, we argue that stakeholder orientation sparks innovation by promoting a secure work environment and enhancing the satisfaction of various stakeholders, including employees and customers.",
"Consistent with this argument, we find that the positive impact of stakeholder orientation on innovation is greater in industries with lower job security as well as industries and firms with lower stakeholder satisfaction."
] | [
2,
2,
1,
1,
1,
4
] | [
0.6111000180244446,
0.6111000180244446,
0.833299994468689,
0.6111000180244446,
0.3889000117778778,
0.6388999819755554
] |
train_1601 | [
"Cryptocurrencies, such as Bitcoin and 250 similar alt-coins, embody at their core a blockchain protocol --- a mechanism for a distributed network of computational nodes to periodically agree on a set of new transactions.",
"Designing a secure blockchain protocol relies on an open challenge in security, that of designing a highly-scalable agreement protocol open to manipulation by byzantine or arbitrarily malicious nodes.",
"Bitcoin's blockchain agreement protocol exhibits security, but does not scale: it processes 3--7 transactions per second at present, irrespective of the available computation capacity at hand.",
"In this paper, we propose a new distributed agreement protocol for permission-less blockchains called ELASTICO.",
"ELASTICO scales transaction rates almost linearly with available computation for mining: the more the computation power in the network, the higher the number of transaction blocks selected per unit time.",
"ELASTICO is efficient in its network messages and tolerates byzantine adversaries of up to one-fourth of the total computational power.",
"Technically, ELASTICO uniformly partitions or parallelizes the mining network (securely) into smaller committees, each of which processes a disjoint set of transactions (or \"shards\").",
"While sharding is common in non-byzantine settings, ELASTICO is the first candidate for a secure sharding protocol with presence of byzantine adversaries.",
"Our scalability experiments on Amazon EC2 with up to $1, 600$ nodes confirm ELASTICO's theoretical scaling properties."
] | [
0,
0,
0,
2,
1,
2,
1,
1,
4
] | [
1,
0.8285999894142151,
0.8285999894142151,
0.6571000218391418,
0.571399986743927,
0.4000000059604645,
0.571399986743927,
0.4000000059604645,
0.800000011920929
] |
train_1602 | [
"This paper describes a real-time online prototype driver-fatigue monitor.",
"It uses remotely located charge-coupled-device cameras equipped with active infrared illuminators to acquire video images of the driver.",
"Various visual cues that typically characterize the level of alertness of a person are extracted in real time and systematically combined to infer the fatigue level of the driver.",
"The visual cues employed characterize eyelid movement, gaze movement, head movement, and facial expression.",
"A probabilistic model is developed to model human fatigue and to predict fatigue based on the visual cues obtained.",
"The simultaneous use of multiple visual cues and their systematic combination yields a much more robust and accurate fatigue characterization than using a single visual cue.",
"This system was validated under real-life fatigue conditions with human subjects of different ethnic backgrounds, genders, and ages; with/without glasses; and under different illumination conditions.",
"It was found to be reasonably robust, reliable, and accurate in fatigue characterization."
] | [
0,
2,
1,
1,
1,
1,
1,
4
] | [
0.6000000238418579,
0.4000000059604645,
0.800000011920929,
0.800000011920929,
1,
1,
0.6000000238418579,
1
] |
train_1603 | [
"Existing single view, 3D face reconstruction methods can produce beautifully detailed 3D results, but typically only for near frontal, unobstructed viewpoints.",
"We describe a system designed to provide detailed 3D reconstructions of faces viewed under extreme conditions, out of plane rotations, and occlusions.",
"Motivated by the concept of bump mapping, we propose a layered approach which decouples estimation of a global shape from its mid-level details (e.g., wrinkles).",
"We estimate a coarse 3D face shape which acts as a foundation and then separately layer this foundation with details represented by a bump map.",
"We show how a deep convolutional encoder-decoder can be used to estimate such bump maps.",
"We further show how this approach naturally extends to generate plausible details for occluded facial regions.",
"We test our approach and its components extensively, quantitatively demonstrating the invariance of our estimated facial details.",
"We further provide numerous qualitative examples showing that our method produces detailed 3D face shapes in viewing conditions where existing state of the art often break down."
] | [
0,
0,
2,
2,
1,
1,
1,
1
] | [
0.8648999929428101,
0.7838000059127808,
0.6485999822616577,
0.4323999881744385,
0.5676000118255615,
0.4323999881744385,
0.4323999881744385,
0.5676000118255615
] |
train_1604 | [
"With an upsurge in financial accounting fraud in the current economic scenario experienced, financial accounting fraud detection (FAFD) has become an emerging topic of great importance for academic, research and industries.",
"The failure of internal auditing system of the organization in identifying the accounting frauds has lead to use of specialized procedures to detect financial accounting fraud, collective known as forensic accounting.",
"Data mining techniques are providing great aid in financial accounting fraud detection, since dealing with the large data volumes and complexities of financial data are big challenges for forensic accounting.",
"This paper presents a comprehensive review of the literature on the application of data mining techniques for the detection of financial accounting fraud and proposes a framework for data mining techniques based accounting fraud detection.",
"The systematic and comprehensive literature review of the data mining techniques applicable to financial accounting fraud detection may provide a foundation to future research in this field.",
"The findings of this review show that data mining techniques like logistic models, neural networks, Bayesian belief network, and decision trees have been applied most extensively to provide primary solutions to the problems inherent in the detection and classification of fraudulent data."
] | [
0,
0,
1,
1,
1,
4
] | [
1,
0.7838000059127808,
0.5946000218391418,
0.5946000218391418,
0.7240999937057495,
0.5171999931335449
] |
train_1605 | [
"Sentiment analysis from text consists of extracting information about opinions, sentiments, and even emotions conveyed by writers towards topics of interest.",
"It is often equated to opinion mining, but it should also encompass emotion mining.",
"Opinion mining involves the use of natural language processing and machine learning to determine the attitude of a writer towards a subject.",
"Emotion mining is also using similar technologies but is concerned with detecting and classifying writers emotions toward events or topics.",
"Textual emotion-mining methods have various applications, including gaining information about customer satisfaction, helping in selecting teaching materials in e-learning, recommending products based on users emotions, and even predicting mental-health disorders.",
"In surveys on sentiment analysis, which are often old or incomplete, the strong link between opinion mining and emotion mining is understated.",
"This motivates the need for a different and new perspective on the literature on sentiment analysis, with a focus on emotion mining.",
"We present the state-of-the-art methods and propose the following contributions: (1) a taxonomy of sentiment analysis; (2) a survey on polarity classification methods and resources, especially those related to emotion mining; (3) a complete survey on emotion theories and emotion-mining research; and (4) some useful resources, including lexicons and datasets."
] | [
0,
0,
1,
1,
1,
4,
4,
1
] | [
0.8378000259399414,
0.8378000259399414,
0.5676000118255615,
0.7838000059127808,
0.5676000118255615,
0.3783999979496002,
0.21619999408721924,
0.5676000118255615
] |
train_1606 | [
"Tracking by detection based object tracking methods encounter numerous complications including object appearance changes, size and shape deformations, partial and full occlusions, which make online adaptation of classifiers and object models a substantial challenge.",
"In this paper, we employ an object proposal network that generates a small yet refined set of bounding box candidates to mitigate the this object model refitting problem by concentrating on hard negatives when we update the classifier.",
"This helps improving the discriminative power as hard negatives are likely to be due to background and other distractions.",
"Another intuition is that, in each frame, applying the classifier only on the refined set of object-like candidates would be sufficient to eliminate most of the false positives.",
"Incorporating an object proposal makes the tracker robust against shape deformations since they are handled naturally by the proposal stage.",
"We demonstrate evaluations on the PETS 2016 dataset and compare with the state-of-theart trackers.",
"Our method provides the superior results."
] | [
0,
2,
2,
1,
1,
4,
4
] | [
1,
0.428600013256073,
0.6000000238418579,
0.771399974822998,
0.771399974822998,
0.6000000238418579,
1
] |
train_1607 | [
"HE TECHNIQUE described in this paper has been deT veloped to correct frequency offset errors in digital communications systems employing orthogonal frequency division multiplexing (OFDM) as the method of modulation.",
"The aim of the paper is twofold; to show the effect offset errors have on the signal-to-noise ratio of the OFDM carriers and to present an algorithm to estimate offset so that it may be removed prior to demodulhhn.",
"OFDM is a bandwidth efficient signalling scheme for digital communications that was first proposed by Chang [l].",
"The main difference bepeen frequency division multiplexing (FDM) and OFDM, is that in OFDM the spectrum of the individual carriers mutually overlap, giving therefore an optimun spectrum efficiency (asymptotically Q b/Hz for 2Q-ary modulation of each carrier).",
"Nevertheless, the OFDM carriers exhibit orthogonality on a symbol interval if synthesized such that they are spaced in frequency exactly at the reciprocal of the symbol interval.",
"Fortunately, this synthesis can be accomplished perfectly, in principle, utilizing the discrete Fourier ttansform (dft) as first described by Darlington [2] and later, for data modems, by Weinstein and Ebert [3].",
"With the recent evolution of integrated circuit digital signal processing (dsp) chips, OFDM has become practical to implement and"
] | [
0,
2,
1,
1,
1,
0,
4
] | [
0.41670000553131104,
0.583299994468689,
0.8611000180244446,
0.6388999819755554,
0.6388999819755554,
0.3610999882221222,
0.6388999819755554
] |
train_1608 | [
"Grasping and manipulating uncooperative objects in space is an emerging challenge for robotic systems.",
"Many traditional robotic grasping techniques used on Earth are infeasible in space.",
"Vacuum grippers require an atmosphere, sticky attachments fail in the harsh environment of space, and handlike opposed grippers are not suited for large, smooth space debris.",
"We present a robotic gripper that can gently grasp, manipulate, and release both flat and curved uncooperative objects as large as a meter in diameter while in microgravity.",
"This is enabled by (i) space-qualified gecko-inspired dry adhesives that are selectively turned on and off by the application of shear forces, (ii) a load-sharing system that scales small patches of these adhesives to large areas, and (iii) a nonlinear passive wrist that is stiff during manipulation yet compliant when overloaded.",
"We also introduce and experimentally verify a model for determining the force and moment limits of such an adhesive system.",
"Tests in microgravity show that robotic grippers based on dry adhesion are a viable option for eliminating space debris in low Earth orbit and for enhancing missions in space."
] | [
0,
0,
0,
1,
1,
1,
4
] | [
0.8108000159263611,
0.8108000159263611,
0.8108000159263611,
0.5946000218391418,
0.6215999722480774,
1,
0.8108000159263611
] |
train_1609 | [
"Source code plagiarism is an easy to do task, but very difficult to detect without proper tool support.",
"Various source code similarity detection systems have been developed to help detect source code plagiarism.",
"Those systems need to recognize a number of lexical and structural source code modifications.",
"For example, by some structural modifications (e.g. modification of control structures, modification of data structures or structural redesign of source code) the source code can be changed in such a way that it almost looks genuine.",
"Most of the existing source code similarity detection systems can be confused when these structural modifications have been applied to the original source code.",
"To be considered effective, a source code similarity detection system must address these issues.",
"To address them, we designed and developed the source code similarity system for plagiarism detection.",
"To demonstrate that the proposed system has the desired effectiveness, we performed a well-known conformism test.",
"The proposed system showed promising results as compared with the JPlag system in detecting source code similarity when various lexical or structural modifications are applied to plagiarized code.",
"As a confirmation of these results, an independent samples t-test revealed that there was a statistically significant difference between average values of F -measures for the test sets that we used and for the experiments that we have done in the practically usable range of cut-off threshold values of 35–70%."
] | [
0,
0,
0,
0,
0,
1,
1,
1,
4,
4
] | [
0.800000011920929,
0.6000000238418579,
1,
0.4571000039577484,
0.428600013256073,
0.571399986743927,
1,
0.571399986743927,
0.37139999866485596,
0.6000000238418579
] |
train_1610 | [
"We present a mobile robot navigation system guided by a novel vision-based road recognition approach.",
"The system represents the road as a set of lines extrapolated from the detected image contour segments.",
"These lines enable the robot to maintain its heading by centering the vanishing point in its field of view, and to correct the long term drift from its original lateral position.",
"We integrate odometry and our visual road recognition system into a grid-based local map that estimates the robot pose as well as its surroundings to generate a movement path.",
"Our road recognition system is able to estimate the road center on a standard dataset with 25,076 images to within 11.42 cm (with respect to roads at least 3 m wide).",
"It outperforms three other state-of-the-art systems.",
"In addition, we extensively test our navigation system in four busy college campus environments using a wheeled robot.",
"Our tests cover more than 5 km of autonomous driving without failure.",
"This demonstrates robustness of the proposed approach against challenges that include occlusion by pedestrians, non-standard complex road markings and shapes, shadows, and miscellaneous obstacle objects."
] | [
0,
1,
1,
1,
4,
4,
4,
4,
4
] | [
0.5946000218391418,
0.6215999722480774,
0.6215999722480774,
0.8108000159263611,
0.4323999881744385,
0.4323999881744385,
0.4323999881744385,
0.6215999722480774,
0.8108000159263611
] |
train_1611 | [
"Understanding land use land cover change (LULCC) is a prerequisite for urban planning and environment management.",
"For LULCC studies in urban/suburban environments, the abundance and spatial distributions of bare soil are essential due to its biophysically different properties when compared to anthropologic materials.",
"Soil, however, is very difficult to be identified using remote sensing technologies majorly due to its complex physical and chemical compositions, as well as the lack of a direct relationship between soil abundance and its spectral signatures.",
"This paper presents an empirical approach to enhance soil information through developing the ratio normalized difference soil index (RNDSI).",
"The first step involves the generation of random samples of three major land cover types, namely soil, impervious surface areas (ISAs), and vegetation.",
"With spectral signatures of these samples, a normalized difference soil index (NDSI) was proposed using the combination of bands 7 and 2 of Landsat Thematic Mapper Image.",
"Finally, a ratio index was developed to further highlight soil covers through dividing the NDSI by the first component of tasseled cap transformation (TC1).",
"Qualitative (e.g., frequency histogram and box charts) and quantitative analyses (e.g., spectral discrimination index and classification accuracy) were adopted to examine the performance of the developed RNDSI.",
"Analyses of results and comparative analyses with two other relevant indices, biophysical composition index (BCI) and enhanced built-up and bareness Index (EBBI), indicate that RNDSI is promising in separating soil from ISAs and vegetation, and can serve as an input to LULCC models.",
"© 2015 Elsevier B.V."
] | [
2,
0,
0,
2,
1,
1,
1,
4,
4,
3
] | [
0.5896999835968018,
0.8205000162124634,
1,
0.7949000000953674,
1,
0.7949000000953674,
1,
0.3846000134944916,
1,
0.7949000000953674
] |
train_1612 | [
"3D Mask face spoofing attack becomes new challenge and attracts more research interests in recent years.",
"However, due to the deficiency number and limited variations of database, there are few methods be proposed to aim on it.",
"Meanwhile, most of existing databases only concentrate on the anti-spoofing of different kinds of attacks and ignore the environmental changes in real world applications.",
"In this paper, we build a new 3D mask anti-spoofing database with more variations to simulate the real world scenario.",
"The proposed database contains 12 masks from two companies with different appearance quality.",
"7 Cameras from the stationary and mobile devices and 6 lighting settings that cover typical illumination conditions are also included.",
"Therefore, each subject contains 42 (7 cameras * 6 lightings) genuine and 42 mask sequences and the total size is 1008 videos.",
"Through the benchmark experiments, directions of the future study are pointed out.",
"We plan to release the database as an platform to evaluate methods under different variations."
] | [
0,
0,
0,
0,
1,
1,
1,
4,
4
] | [
1,
0.8108000159263611,
0.8108000159263611,
0.40540000796318054,
0.40540000796318054,
0.8108000159263611,
0.8108000159263611,
0.40540000796318054,
0.6215999722480774
] |
train_1613 | [
"The emergence of synchronization in a network of coupled oscillators is a fascinating subject of multidisciplinary research.",
"This survey reviews the vast literature on the theory and the applications of complex oscillator networks.",
"We focus on phase oscillator models that are widespread in real-world synchronization phenomena, that generalize the celebrated Kuramoto model, and that feature a rich phenomenology.",
"We review the history and the countless applications of this model throughout science and engineering.",
"We justify the importance of the widespread coupled oscillator model as a locally canonical model and describe some selected applications relevant to control scientists, including vehicle coordination, electric power networks, and clock synchronization.",
"We introduce the reader to several synchronization notions and performance estimates.",
"We propose analysis approaches to phase and frequency synchronization, phase balancing, pattern formation, and partial synchronization.",
"We present the sharpest known results about synchronization in networks of homogeneous and heterogeneous oscillators, with complete or sparse interconnection topologies, and in finite-dimensional and infinitedimensional settings.",
"We conclude by summarizing the limitations of existing analysis methods and by highlighting some directions for future research.",
"© 2014 Elsevier Ltd."
] | [
0,
0,
2,
2,
4,
1,
1,
1,
4,
3
] | [
1,
0.6111000180244446,
0.583299994468689,
0.6111000180244446,
0.3889000117778778,
0.6111000180244446,
0.6111000180244446,
0.41670000553131104,
1,
0.7778000235557556
] |
train_1614 | [
"The internet provides information media and social media for online consumers to seek information on the websites and opinions from other consumers.",
"This study examined how the three dimensions of interactivity (control, communication direction, and synchronicity) affected users’ online information seeking process.",
"Particularly, this study assessed how cognitive involvement and perceived social presence mediated the effects of interactivity onto satisfaction of websites, purchase intention and spreading word-of-mouth.",
"Moreover, we also investigated how users’ opinion leadership moderated the effects of interactivity.",
"This study recruited 511 respondents to participate in the survey.",
"The results showed that control and synchronicity positively influenced consumers’ involvement, which further mediated the effects of these two dimensions of interactivity onto user satisfaction of the website, purchase intention and spreading word-of-mouth.",
"On the other hand, communication direction and synchronicity positively affected their social presence, which only mediated the effect of synchronicity onto those three dependent variables.",
"Lastly, users’ opinion leadership moderated the effects of communication direction and synchronicity on social presence, but did not moderate the effects of control and synchronicity on involvement."
] | [
0,
2,
2,
1,
1,
4,
4,
4
] | [
0.8108000159263611,
0.3783999979496002,
0.3783999979496002,
0.40540000796318054,
0.4323999881744385,
1,
0.5946000218391418,
0.5946000218391418
] |
train_1615 | [
"A wide variety of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services.",
"The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user and no one else.",
"Examples of such applications include secure access to buildings, computer systems, laptops, cellular phones, and ATMs.",
"In the absence of robust personal recognition schemes, these systems are vulnerable to the wiles of an impostor.",
"Biometric recognition, or, simply, biometrics, refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics.",
"By using biometrics, it is possible to confirm or establish an individual's identity based on \"who she is\", rather than by \"what she possesses\" (e.g., an ID card) or \"what she remembers\" (e.g., a password).",
"We give a brief overview of the field of biometrics and summarize some of its advantages, disadvantages, strengths, limitations, and related privacy concerns."
] | [
0,
2,
1,
1,
1,
4,
4
] | [
0.8108000159263611,
0.8108000159263611,
1,
0.5946000218391418,
0.5946000218391418,
0.40540000796318054,
0.8108000159263611
] |
train_1616 | [
"This paper discusses modularization as a mechanism for improving the flexibility and comprehensibility of a system while allowing the shortening of its development time.",
"The effectiveness of a “modularization” is dependent upon the criteria used in dividing the system into modules.",
"A system design problem is presented and both a conventional and unconventional decomposition are described.",
"It is shown that the unconventional decompositions have distinct advantages for the goals outlined.",
"The criteria used in arriving at the decompositions are discussed.",
"The unconventional decomposition, if implemented with the conventional assumption that a module consists of one or more subroutines, will be less efficient in most cases.",
"An alternative approach to implementation which does not have this effect is sketched."
] | [
2,
1,
1,
1,
1,
1,
1
] | [
0.5946000218391418,
0.40540000796318054,
0.5946000218391418,
0.5946000218391418,
0.5946000218391418,
0.5676000118255615,
0.7838000059127808
] |
train_1617 | [
"Machine learning (ML) and pattern matching (PM) are powerful computer science techniques which can derive knowledge from big data, and provide prediction and matching.",
"Since nanometer VLSI design and manufacturing have extremely high complexity and gigantic data, there has been a surge recently in applying and adapting machine learning and pattern matching techniques in VLSI physical design (including physical verification), e.g., lithography hotspot detection and data/pattern-driven physical design, as ML and PM can raise the level of abstraction from detailed physics-based simulations and provide reasonably good quality-of-result.",
"In this paper, we will discuss key techniques and recent results of machine learning and pattern matching, with their applications in physical design."
] | [
0,
1,
1
] | [
0.7949000000953674,
0.41029998660087585,
0.5896999835968018
] |
train_1618 | [
"The task of colorizing black and white images has previously been explored for natural images.",
"In this paper we look at the task of colorization on a different domain: webtoons.",
"To our knowledge this type of dataset hasn't been used before.",
"Webtoons are usually produced in color thus they make a good dataset for analyzing different colorization models.",
"Comics like webtoons also present some additional challenges over natural images, such as occlusion by speech bubbles and text.",
"First we look at some of the previously introduced models' performance on this task and suggest modifications to address their problems.",
"We propose a new model composed of two networks; one network generates sparse color information and a second network uses this generated color information as input to apply color to the whole image.",
"These two networks are trained end-to-end.",
"Our proposed model solves some of the problems observed with other architectures, resulting in better colorizations."
] | [
0,
0,
0,
0,
0,
1,
1,
4,
4
] | [
1,
0.41670000553131104,
0.8055999875068665,
0.8055999875068665,
0.6111000180244446,
1,
0.8055999875068665,
0.3889000117778778,
0.583299994468689
] |
train_1619 | [
"Visual understanding of complex urban street scenes is an enabling factor for a wide range of applications.",
"Object detection has benefited enormously from large-scale datasets, especially in the context of deep learning.",
"For semantic urban scene understanding, however, no current dataset adequately captures the complexity of real-world urban scenes.",
"To address this, we introduce Cityscapes, a benchmark suite and large-scale dataset to train and test approaches for pixel-level and instance-level semantic labeling.",
"Cityscapes is comprised of a large, diverse set of stereo video sequences recorded in streets from 50 different cities.",
"5000 of these images have high quality pixel-level annotations, 20 000 additional images have coarse annotations to enable methods that leverage large volumes of weakly-labeled data.",
"Crucially, our effort exceeds previous attempts in terms of dataset size, annotation richness, scene variability, and complexity.",
"Our accompanying empirical study provides an in-depth analysis of the dataset characteristics, as well as a performance evaluation of several state-of-the-art approaches based on our benchmark."
] | [
0,
0,
0,
2,
1,
1,
4,
4
] | [
0.6061000227928162,
0.6061000227928162,
0.6061000227928162,
0.3939000070095062,
0.6061000227928162,
0.8181999921798706,
0.6363999843597412,
0.6363999843597412
] |
train_1620 | [
"Texting has been shown to be cognitively distracting for students in lecture settings, but few have done empirical work, or looked at moderating effects between texting and academic outcomes.",
"This experimental study compared the proportion of correct answers on a lecture quiz between students who were randomly assigned to text message during a pre-recorded lecture and those who were not, while investigating possible moderators.",
"The participants who text messaged throughout the lecture scored significantly lower in percent of correct responses (t(95) = 4.6, p < .001, d = .93).",
"No moderating effects were found, including: perceived distraction, perceived texting ability, number of text messages sent and received during the lecture, age, and gender.",
"Published by Elsevier Ltd."
] | [
0,
0,
4,
4,
3
] | [
1,
0.807699978351593,
0.39419999718666077,
0.4327000081539154,
0.625
] |
train_1621 | [
"Deep learning has proven itself as a successful set of models for learning useful semantic representations of data.",
"These, however, are mostly implicitly learned as part of a classification task.",
"In this paper we propose the triplet network model, which aims to learn useful representations by distance comparisons.",
"A similar model was defined by Wang et al. (2014), tailor made for learning a ranking for image information retrieval.",
"Here we demonstrate using various datasets that our model learns a better representation than that of its immediate competitor, the Siamese network.",
"We also discuss future possible usage as a framework for unsupervised learning."
] | [
0,
0,
2,
1,
4,
4
] | [
0.7949000000953674,
0.7949000000953674,
0.6154000163078308,
0.3846000134944916,
0.6154000163078308,
0.5896999835968018
] |
train_1622 | [
"Rapid development of information technology (IT) has brought with it many new applications such as e-commerce and global business.",
"The past few years have seen activities in the legislative arena covering issues such as digital signatures, the international recognition of electronic documents and privacy and data protection.",
"Both the developed and developing countries have exhibited keenness to embrace the IT environment.",
"Securing this electronic environment from intrusion, however, continues to be problematic.",
"A particular favorite form of computer crime would be ‘hacking’.",
"As more computer systems move on to on-line processing and improved telecommunications, computer hackers are now a real threat.",
"Legislation criminalizing intrusion and destruction activities directed at computers are needed.",
"Malaysia joined the list of countries with computer-specific legislation with the enactment of its Computer Crime Act 1997 (CCA).",
"This paper focuses on hacking as a criminal act, and compares the Malaysian CCA with legislation from other countries.",
"The current computer crime situation in Malaysia is looked at and exposes the difficulties and obstacles Malaysia faces in enforcing the Act."
] | [
0,
0,
0,
0,
0,
0,
4,
4,
4,
0
] | [
0.7813000082969666,
0.625,
0.5313000082969666,
0.5313000082969666,
0.7813000082969666,
1,
0.46880000829696655,
0.46880000829696655,
0.46880000829696655,
0.625
] |
train_1623 | [
"Depression is one of the most common mental disorder that at its worst can lead to suicide.",
"Diagnosing depression in the early curable stage is very important.",
"In this paper we study performance of different classification techniques for classifying depression patients from normal subjects.",
"For this aim, power spectrum of three frequency band (alpha, beta, theta) and the whole bands of EEG are used as features.",
"We have shown that Support Vector Machine (SVM) classifier using Genetic algorithm for feature selection can achieve accuracy of 88.6% on classifying depression patients."
] | [
0,
2,
2,
1,
4
] | [
0.7695000171661377,
0.4609000086784363,
0.5390999913215637,
0.6049000024795532,
0.7695000171661377
] |
train_1624 | [
"Behavioral logs are traces of human behavior seen through the lenses of sensors that capture and record user activity.",
"They include behavior ranging from low-level keystrokes to rich audio and video recordings.",
"Traces of behavior have been gathered in psychology studies since the 1930s (Skinner, 1938 ), and with the advent of computerbased applications it became common practice to capture a variety of interaction behaviors and save them to log fi les for later analysis.",
"In recent years, the rise of centralized, web-based computing has made it possible to capture human interactions with web services on a scale previously unimaginable.",
"Largescale log data has enabled HCI researchers to observe how information diffuses through social networks in near real-time during crisis situations (Starbird & Palen, 2010 ), characterize how people revisit web pages over time (Adar, Teevan, & Dumais, 2008 ), and compare how different interfaces for supporting email organization infl uence initial uptake and sustained use (Dumais, Cutrell, Cadiz, Jancke, Sarin, & Robbins, 2003 ; Rodden & Leggett, 2010 ).",
"In this chapter we provide an overview of behavioral log use in HCI.",
"We highlight what can be learned from logs that capture people’s interactions with existing computer systems and from experiments that compare new, alternative systems.",
"We describe how to design and analyze web experiments, and how to collect, clean and use log data responsibly.",
"The goal of this chapter is to enable the reader to design log studies and to understand results from log studies that they read about.",
"Understanding User Behavior Through Log Data and Analysis"
] | [
0,
0,
0,
0,
0,
2,
2,
1,
2,
2
] | [
1,
1,
1,
1,
0.7949000000953674,
0.5896999835968018,
0.5896999835968018,
0.6154000163078308,
0.5896999835968018,
0.41029998660087585
] |
train_1625 | [
"This paper introduces an extended set of Haarlike features beyond the standard vertically and horizontally aligned Haar-like features [Viola and Jones, 2001a; 2001b] and the 45 twisted Haar-like features [Lienhart and Maydt, 2002; Lienhart et al., 2003a; 2003b].",
"The extended rotated Haar-like features are based on the standard Haar-like features that have been rotated based on whole integer pixel based rotations.",
"These rotated feature values can also be calculated using rotated integral images which means that they can be fast and efficiently calculated with just 8 operations irrespective of the feature size.",
"In general each feature requires another 8 operations based on an identity integral image so that appropriate scaling corrections can be applied.",
"These scaling corrections are needed due to the rounding errors associated with scaling the features.",
"The errors introduced by these rotated features on natural images are small enough to allow rotated classifiers to be implemented using a classifier trained on only vertically aligned images.",
"This is a significant improvement in training time for a classifier that is invariant to the rotations represented in the parallel classifier.",
"Figure 1.",
"Standard Haar-like features."
] | [
0,
0,
0,
1,
0,
0,
0,
3,
3
] | [
0.7838000059127808,
0.7838000059127808,
0.5171999931335449,
0.5676000118255615,
0.7838000059127808,
0.6215999722480774,
0.4323999881744385,
0.733299970626831,
0.7838000059127808
] |
train_1626 | [
"We present a tutorial on Bayesian optimization, a method of finding the maximum of expensive cost functions.",
"Bayesian optimization employs the Bayesian technique of setting a prior over the objective function and combining it with evidence to get a posterior function.",
"This permits a utility-based selection of the next observation to make on the objective function, which must take into account both exploration (sampling from areas of high uncertainty) and exploitation (sampling areas likely to offer improvement over the current best observation).",
"We also present two detailed extensions of Bayesian optimization, with experiments—active user modelling with preferences, and hierarchical reinforcement learning— and a discussion of the pros and cons of Bayesian optimization based on our experiences."
] | [
1,
1,
1,
1
] | [
0.583299994468689,
0.666700005531311,
0.8611000180244446,
0.6388999819755554
] |
train_1627 | [
"SYM-ILDL is a numerical software package that computes incomplete LDLT (ILDL) factorizations of symmetric indefinite and real skew-symmetric matrices.",
"The core of the algorithm is a Crout variant of incomplete LU (ILU), originally introduced and implemented for symmetric matrices by Li and Saad [2005].",
"Our code is economical in terms of storage, and it deals with real skew-symmetric matrices as well as symmetric ones.",
"The package is written in C++ and is templated, is open source, and includes a Matlab™ interface.",
"The code includes built-in RCM and AMD reordering, two equilibration strategies, threshold Bunch-Kaufman pivoting, and rook pivoting, as well as a wrapper to MC64, a popular matching-based equilibration and reordering algorithm.",
"We also include two built-in iterative solvers: SQMR, preconditioned with ILDL, and MINRES, preconditioned with a symmetric positive definite preconditioner based on the ILDL factorization."
] | [
0,
0,
0,
0,
0,
4
] | [
0.7878999710083008,
0.6363999843597412,
1,
0.5758000016212463,
0.5385000109672546,
0.42419999837875366
] |
train_1628 | [
"A user study was conducted to investigate how people deal with the flow of information in their workspaces.",
"Subjects reported that, in an attempt to quickly and informally manage their information, they created piles of documents.",
"Piles were seen as complementary to the folder filing system, which was used for more formal archiving.",
"A new desktop interface element–the pile– was developed and prototyped through an iterative process.",
"The design includes direct manipulation techniques and support for browsing, and goes beyond physical world functionality by providing system assistance for automatic pile construction and reorganization.",
"Preliminary user tests indicate the design is promising and raise issues that will be addressed in future work."
] | [
0,
4,
0,
1,
4,
4
] | [
0.7894999980926514,
0.421099990606308,
0.39469999074935913,
0.5788999795913696,
0.6053000092506409,
0.7894999980926514
] |
train_1629 | [
"Behavioral and neurophysiological effects of word imageability and concreteness remain a topic of central interest in cognitive neuroscience and could provide essential clues for understanding how the brain processes conceptual knowledge.",
"We examined these effects using event-related functional magnetic resonance imaging while participants identified concrete and abstract words.",
"Relative to nonwords, concrete and abstract words both activated a left-lateralized network of multimodal association areas previously linked with verbal semantic processing.",
"Areas in the left lateral temporal lobe were equally activated by both word types, whereas bilateral regions including the angular gyrus and the dorsal prefrontal cortex were more strongly engaged by concrete words.",
"Relative to concrete words, abstract words activated left inferior frontal regions previously linked with phonological and verbal working memory processes.",
"The results show overlapping but partly distinct neural systems for processing concrete and abstract concepts, with greater involvement of bilateral association areas during concrete word processing, and processing of abstract concepts almost exclusively by the left hemisphere."
] | [
0,
1,
4,
4,
4,
4
] | [
1,
0.40540000796318054,
0.40540000796318054,
0.40540000796318054,
0.40540000796318054,
0.8108000159263611
] |
train_1630 | [
"Recent work linking deep neural networks and dynamical systems opened up new avenues to analyze deep learning.",
"In particular, it is observed that new insights can be obtained by recasting deep learning as an optimal control problem on difference or differential equations.",
"However, the mathematical aspects of such a formulation have not been systematically explored.",
"This paper introduces the mathematical formulation of the population risk minimization problem in deep learning as a mean-field optimal control problem.",
"Mirroring the development of classical optimal control, we state and prove optimality conditions of both the Hamilton-Jacobi-Bellman type and the Pontryagin type.",
"These mean-field results reflect the probabilistic nature of the learning problem.",
"In addition, by appealing to the mean-field Pontryagin’s maximum principle, we establish some quantitative relationships between population and empirical learning problems.",
"This serves to establish a mathematical foundation for investigating the algorithmic and theoretical connections between optimal control and deep learning."
] | [
0,
0,
0,
2,
1,
4,
4,
4
] | [
1,
1,
1,
0.3824000060558319,
1,
0.6176000237464905,
0.6176000237464905,
0.8529000282287598
] |
train_1631 | [
"Managing project success is an ongoing concern in both research and practice.",
"The existing literature suggests theoretical frameworks for defining project success; however there is a lack of studies exploring how to apply these frameworks into a particular organisation.",
"Additionally, there is a lack of practical processes for managing project success.",
"Furthermore, the extant literature does not pay adequate attention to value assessment in public sector projects.",
"This research addresses the aforementioned deficiencies through an exploratory case study with a public sector organisation in South Australia.",
"A conceptual framework for defining project success and a practical model for managing project success across the lifecycle were developed and some preliminary validation provided within the context of this organisation.",
"The present study offers both theoretical and practical contributions towards managing IT projects to deliver business value."
] | [
0,
0,
0,
0,
2,
1,
4
] | [
0.800000011920929,
0.800000011920929,
0.800000011920929,
0.6571000218391418,
0.4571000039577484,
0.800000011920929,
0.800000011920929
] |
train_1632 | [
"Over the last couple of decades, there have been a large variety of approaches towards modeling student knowledge within intelligent tutoring systems.",
"With the booming development of deep learning and large-scale artificial neural networks, there have been empirical successes in a number of machine learning and data mining applications, including student knowledge modeling.",
"Deep Knowledge Tracing (DKT), a pioneer algorithm that utilizes recurrent neural networks to model student learning, reports substantial improvements in prediction performance.",
"To help the EDM community better understand the promising techniques of deep learning, we examine DKT alongside two well-studied models for knowledge modeling, PFA and BKT.",
"In addition to sharing a primer on the internal computational structures of DKT, we also report on potential issues that arise from data formatting.",
"We take steps to reproduce the experiments of Deep Knowledge Tracing by implementing a DKT algorithm using Google’s TensorFlow framework; we also reproduce similar results on new datasets.",
"We determine that the DKT findings don't hold an overall edge when compared to the PFA model, when applied to properly prepared datasets that are limited to main (i.e. nonscaffolding) questions.",
"More importantly, during the investigation of DKT, we not only discovered a data quality issue in a public available data set, but we also detected a vulnerability of DKT at how it handles multiple skill sequences."
] | [
0,
0,
0,
2,
1,
2,
4,
4
] | [
0.833299994468689,
0.833299994468689,
0.666700005531311,
0.44440001249313354,
0.3889000117778778,
0.22220000624656677,
0.5555999875068665,
0.7778000235557556
] |
train_1633 | [
"This paper presents a set of segmentation methods for various types of 3D point clouds.",
"Segmentation of dense 3D data (e.g. Riegl scans) is optimised via a simple yet efficient voxelisation of the space.",
"Prior ground extraction is empirically shown to significantly improve segmentation performance.",
"Segmentation of sparse 3D data (e.g. Velodyne scans) is addressed using ground models of non-constant resolution either providing a continuous probabilistic surface or a terrain mesh built from the structure of a range image, both representations providing close to real-time performance.",
"All the algorithms are tested on several hand labeled data sets using two novel metrics for segmentation evaluation."
] | [
0,
0,
1,
1,
4
] | [
0.5881999731063843,
0.41179999709129333,
0.5881999731063843,
0.41179999709129333,
0.7940999865531921
] |
train_1634 | [
"Have you ever observed the following situation?",
"A computer system is built to satisfy well-specified requirements.",
"The requirements clearly describe the task to be supported, and the system satisfies them.",
"Despite all this care and attention, the system is universally condemned by management and users.",
"Why does this happen?",
"Surprisingly often, the task supported is not one that users actually perform.",
"More likely, the model of work underlying the computer system interferes with other tasks the user wants to perform."
] | [
3,
0,
0,
2,
3,
1,
4
] | [
0.5676000118255615,
0.5676000118255615,
0.40540000796318054,
0.21619999408721924,
0.5676000118255615,
0.4323999881744385,
0.6215999722480774
] |
train_1635 | [
"The aim of this paper is to investigate the rules and constraints of code-switching (CS) in Hindi-English mixed language data.",
"In this paper, we’ll discuss how we collected the mixed language corpus.",
"This corpus is primarily made up of student interview speech.",
"The speech was manually transcribed and verified by bilingual speakers of Hindi and English.",
"The code-switching cases in the corpus are discussed and the reasons for code-switching are explained."
] | [
2,
0,
0,
1,
1
] | [
0.7813000082969666,
0.34380000829696655,
0.34380000829696655,
0.4375,
0.4375
] |
train_1636 | [
"The enhancements being developed by the Time-Sensitive Networking Task Group as part of IEEE 802.1 emerge as the future of real-time communication over Ethernet networks for automotive and industrial application domains.",
"In particular IEEE 802.1Qbv is key to enabling timeliness guarantees via so-called time-aware shapers.",
"In this paper, we address the computation of fully deterministic schedules for 802.1Qbv-compliant multi-hop switched networks.",
"We identify and analyze key functional parameters affecting the deterministic behaviour of real-time communication under 802.1Qbv and, based on a generalized configuration of these parameters, derive the required constraints for computing offline schedules guaranteeing low and bounded jitter and deterministic end-to-end latency for critical communication flows.",
"Furthermore, we discuss several optimization directions and concrete configurations exposing trade-offs against the required computation time.",
"We also show the performance of our approach via synthetic network workloads on top of different network configurations."
] | [
0,
0,
2,
2,
1,
1
] | [
1,
1,
0.5946000218391418,
0.40540000796318054,
0.8108000159263611,
0.40540000796318054
] |
train_1637 | [
"In a document retrieval, or other pattern matching environment where stored entities (documents) are compared with each other or with incoming patterns (search requests), it appears that the best indexing (property) space is one where each entity lies as far away from the others as possible; in these circumstances the value of an indexing system may be expressible as a function of the density of the object space; in particular, retrieval performance may correlate inversely with space density.",
"An approach based on space density computations is used to choose an optimum indexing vocabulary for a collection of documents.",
"Typical evaluation results are shown, demonstating the usefulness of the model."
] | [
0,
1,
4
] | [
0.542900025844574,
0.8285999894142151,
0.8285999894142151
] |
train_1638 | [
"The ever growing traffic explosion in mobile communications has recently drawn increased attention to the large amount of underutilized spectrum in the millimeter-wave frequency bands as a potentially viable solution for achieving tens to hundreds of times more capacity compared to current 4G cellular networks.",
"Historically, mmWave bands were ruled out for cellular usage mainly due to concerns regarding short-range and non-line-of-sight coverage issues.",
"In this article, we present recent results from channel measurement campaigns and the development of advanced algorithms and a prototype, which clearly demonstrate that the mmWave band may indeed be a worthy candidate for next generation (5G) cellular systems.",
"The results of channel measurements carried out in both the United States and Korea are summarized along with the actual free space propagation measurements in an anechoic chamber.",
"Then a novel hybrid beamforming scheme and its link- and system-level simulation results are presented.",
"Finally, recent results from our mmWave prototyping efforts along with indoor and outdoor test results are described to assert the feasibility of mmWave bands for cellular usage."
] | [
0,
4,
4,
4,
4,
4
] | [
0.6053000092506409,
0.421099990606308,
0.21050000190734863,
0.631600022315979,
0.6053000092506409,
0.5788999795913696
] |
train_1639 | [
"The explosive growth in popularity of social networking leads to the problematic usage.",
"An increasing number of social network mental disorders (SNMDs), such as Cyber-Relationship Addiction, Information Overload, and Net Compulsion, have been recently noted.",
"Symptoms of these mental disorders are usually observed passively today, resulting in delayed clinical intervention.",
"In this paper, we argue that mining online social behavior provides an opportunity to actively identify SNMDs at an early stage.",
"It is challenging to detect SNMDs because the mental status cannot be directly observed from online social activity logs.",
"Our approach, new and innovative to the practice of SNMD detection, does not rely on self-revealing of those mental factors via questionnaires in Psychology.",
"Instead, we propose a machine learning framework, namely, Social Network Mental Disorder Detection (SNMDD), that exploits features extracted from social network data to accurately identify potential cases of SNMDs.",
"We also exploit multi-source learning in SNMDD and propose a new SNMD-based Tensor Model (STM) to improve the accuracy.",
"To increase the scalability of STM, we further improve the efficiency with performance guarantee.",
"Our framework is evaluated via a user study with 3,126 online social network users."
] | [
0,
0,
0,
2,
1,
1,
1,
1,
1,
1
] | [
1,
0.800000011920929,
0.800000011920929,
1,
0.542900025844574,
0.7142999768257141,
0.800000011920929,
0.800000011920929,
0.800000011920929,
1
] |
train_1640 | [
"At the dawn of the fourth industrial revolution, we are witnessing a fast and widespread adoption of artificial intelligence (AI) in our daily life, which contributes to accelerating the shift towards a more algorithmic society.",
"However, even with such unprecedented advancements, a key impediment to the use of AI-based systems is that they often lack transparency.",
"Indeed, the black-box nature of these systems allows powerful predictions, but it cannot be directly explained.",
"This issue has triggered a new debate on explainable AI (XAI).",
"A research field holds substantial promise for improving trust and transparency of AI-based systems.",
"It is recognized as the sine qua non for AI to continue making steady progress without disruption.",
"This survey provides an entry point for interested researchers and practitioners to learn key aspects of the young and rapidly growing body of research related to XAI.",
"Through the lens of the literature, we review the existing approaches regarding the topic, discuss trends surrounding its sphere, and present major research trajectories."
] | [
0,
0,
0,
4,
2,
4,
4,
4
] | [
0.6222000122070312,
0.4431999921798706,
0.2386000007390976,
0.37779998779296875,
0.4375,
0.7613999843597412,
0.4431999921798706,
0.8209999799728394
] |
train_1641 | [
"In this paper we provide a conceptual approach to modelling value propositions.",
"We argue that rigorous modelling in an ontological style could improve several aspects of business.",
"Modelling and mapping value propositions helps better understanding the value a company wants to offer its customers and makes it communicable between various stakeholders.",
"Using a common language (ontology) in defining a company's offering brings manager's mental models into a common form.",
"Further, conceptually seized value propositions are comparable to the value propositions of a firm's competitors because the follow a rigid framework and make it possible to identify the competitive position of a firm's value proposition."
] | [
0,
0,
1,
2,
4
] | [
0.7949000000953674,
0.5896999835968018,
0.5896999835968018,
0.41029998660087585,
0.5896999835968018
] |
train_1642 | [
"Traffic sign detection plays an important role in a number of practical applications, such as intelligent driver assistance and roadway inventory management.",
"In order to process the large amount of data from either real-time videos or large off-line databases, a high-throughput traffic sign detection system is required.",
"In this paper, we propose an FPGA-based hardware accelerator for traffic sign detection based on cascade classifiers.",
"To maximize the throughput and power efficiency, we propose several novel ideas, including: 1) rearranged numerical operations; 2) shared image storage; 3) adaptive workload distribution; and 4) fast image block integration.",
"The proposed design is evaluated on a Xilinx ZC706 board.",
"When processing high-definition (1080p) video, it achieves the throughput of 126 frames/s and the energy efficiency of 0.041 J/frame."
] | [
0,
0,
1,
1,
4,
4
] | [
1,
0.6215999722480774,
0.5946000218391418,
0.7838000059127808,
0.5946000218391418,
0.7838000059127808
] |
train_1643 | [
"We introduce the syntactic scaffold, an approach to incorporating syntactic information into semantic tasks.",
"Syntactic scaffolds avoid expensive syntactic processing at runtime, only making use of a treebank during training, through a multitask objective.",
"We improve over strong baselines on PropBank semantics, frame semantics, and coreference resolution, achieving competitive performance on all three tasks."
] | [
1,
1,
4
] | [
0.7949000000953674,
0.7949000000953674,
0.41029998660087585
] |
train_1644 | [
"Cyclic redundancy codes (CRCs) provide a first line of defense against data corruption in many networks.",
"Unfortunately, many commonly used CRC polynomials provide significantly less error detection capability than they might.",
"An exhaustive exploration reveals that most previously published CRC polynomials are either inferior to alternatives or are only good choices for particular message lengths.",
"Unfortunately these shortcomings and limitations often seem to be overlooked.",
"This paper describes a polynomial selection process for embedded network applications and proposes a set of good general-purpose polynomials.",
"A set of 35 new polynomials in addition to 13 previously published polynomials provides good performance for 3- to 16-bit CRCs for data word lengths up to 2048 bits."
] | [
0,
0,
1,
0,
2,
4
] | [
0.7894999980926514,
0.7894999980926514,
0.5160999894142151,
0.39469999074935913,
0.39469999074935913,
0.39469999074935913
] |
train_1645 | [
"The rise and fall of artificial neural networks is well documented in the scientific literature of both computer science and computational chemistry.",
"Yet almost two decades later, we are now seeing a resurgence of interest in deep learning, a machine learning algorithm based on multilayer neural networks.",
"Within the last few years, we have seen the transformative impact of deep learning in many domains, particularly in speech recognition and computer vision, to the extent that the majority of expert practitioners in those field are now regularly eschewing prior established models in favor of deep learning models.",
"In this review, we provide an introductory overview into the theory of deep neural networks and their unique properties that distinguish them from traditional machine learning algorithms used in cheminformatics.",
"By providing an overview of the variety of emerging applications of deep neural networks, we highlight its ubiquity and broad applicability to a wide range of challenges in the field, including quantitative structure activity relationship, virtual screening, protein structure prediction, quantum chemistry, materials design, and property prediction.",
"In reviewing the performance of deep neural networks, we observed a consistent outperformance against non-neural networks state-of-the-art models across disparate research topics, and deep neural network-based models often exceeded the \"glass ceiling\" expectations of their respective tasks.",
"Coupled with the maturity of GPU-accelerated computing for training deep neural networks and the exponential growth of chemical data on which to train these networks on, we anticipate that deep learning algorithms will be a valuable tool for computational chemistry.",
"© 2017 Wiley Periodicals, Inc."
] | [
0,
0,
0,
1,
1,
2,
4,
3
] | [
1,
0.6388999819755554,
0.8055999875068665,
0.5555999875068665,
0.3889000117778778,
0.22220000624656677,
0.3889000117778778,
0.833299994468689
] |
train_1646 | [
"Several opinion polls have found that many consumers resist making purchases via the Internet because of their concerns about the privacy of the personal information they provide to Internet merchants.",
"Using the theory of planned behavior as its basis, this study investigated the relationships among beliefs about Internet privacy and trustworthiness, along with beliefs about perceived behavioral control and the expectations of important others, and online purchasing behavior.",
"Data were collected from 193 college students.",
"Analysis of the data indicates that beliefs about trustworthiness positively affect attitudes toward buying online, which in turn positively affect purchasing behavior.",
"Beliefs about self-efficacy regarding purchasing positively affect perceived behavioral control, which in turn affects online purchasing behavior.",
"In short, respondents who believed in the trustworthiness of the Internet and in their own abilities to buy online were more likely to make Internet purchases than were those without such beliefs."
] | [
0,
0,
4,
4,
4,
4
] | [
1,
0.6111000180244446,
0.583299994468689,
0.3610999882221222,
0.22220000624656677,
0.583299994468689
] |
train_1647 | [
"Random forests have emerged as a versatile and highly accurate classification and regression methodology, requiring little tuning and providing interpretable outputs.",
"Here, we briefly outline the genesis of, and motivation for, the random forest paradigm as an outgrowth from earlier tree-structured techniques.",
"We elaborate on aspects of prediction error and attendant tuning parameter issues.",
"However, our emphasis is on extending the random forest schema to the multiple response setting.",
"We provide a simple illustrative example from ecology that showcases the improved fit and enhanced interpretation afforded by the random forest framework.",
"C © 2011 John Wiley & Sons, Inc. WIREs Data Mining Knowl Discov 2011 1 80–87 DOI: 10.1002/widm.12"
] | [
0,
0,
1,
2,
4,
3
] | [
0.8055999875068665,
0.41670000553131104,
0.8055999875068665,
0.6111000180244446,
0.6111000180244446,
0.8055999875068665
] |
train_1648 | [
"This paper extends previous work with Dyna a class of architectures for intelligent systems based on approximating dynamic program ming methods Dyna architectures integrate trial and error reinforcement learning and execution time planning into a single process operating alternately on the world and on a learned model of the world In this paper I present and show results for two Dyna archi tectures The Dyna PI architecture is based on dynamic programming s policy iteration method and can be related to existing AI ideas such as evaluation functions and uni versal plans reactive systems Using a nav igation task results are shown for a simple Dyna PI system that simultaneously learns by trial and error learns a world model and plans optimal routes using the evolving world model The Dyna Q architecture is based on Watkins s Q learning a new kind of rein forcement learning Dyna Q uses a less famil iar set of data structures than does Dyna PI but is arguably simpler to implement and use We show that Dyna Q architectures are easy to adapt for use in changing environments Introduction to Dyna How should a robot decide what to do The traditional answer in AI has been that it should deduce its best action in light of its current goals and world model i e that it should plan However it is now widely recognized that planning s usefulness is limited by its computational complexity and by its dependence on an accurate world model An alternative approach is to do the planning in advance and compile its result into a set of rapid reactions or situation action rules which are then used for real time decision making Yet a third approach is to learn a good set of reactions by trial and error this has the advantage of eliminating the dependence on a world model In this paper",
"I brie y introduce Dyna a class of simple architectures integrating and permitting tradeo s among these three approaches",
"Dyna architectures use machine learning algo rithms to approximate the conventional optimal con trol technique known as dynamic programming DP Bellman Ross DP itself is not a learn ing method but rather a computational method for determining optimal behavior given a complete model of the task to be solved",
"It is very similar to state space search but di ers in that it is more incremental and never considers actual action sequences explicitly only single actions at a time This makes DP more amenable to incremental planning at execution time and also makes it more suitable for stochastic or in completely modeled environments as it need not con sider the extremely large number of sequences possi ble in an uncertain environment Learned world mod els are likely to be stochastic and uncertain making DP approaches particularly promising for learning sys tems Dyna architectures are those that learn a world model online while using approximations to DP to learn and plan optimal behavior Intuitively Dyna is based on the old idea that planning is like trial and error learning from hypothet ical experience Craik Dennett",
"The theory of Dyna is based on the theory of DP e g Ross and on DP s relationship to reinforcement learning Watkins Barto Sutton Watkins to temporal di erence learning Sutton and to AI methods for planning and search Korf Werbos has previously argued for the general idea of building AI systems that approx imate dynamic programming and Whitehead and others Sutton Barto Sutton Pinette Rumelhart et",
"al have presented results for the speci c idea of augmenting a reinforcement learning system with a world model used for planning Dyna PI Dyna by Approximating Policy Iteration",
"I call the rst Dyna architecture Dyna PI because it is based on approximating a DP method known as pol icy iteration Howard The Dyna PI architec ture consists of four components interacting as shown in Figure The policy is simply the function formed by the current set of reactions it receives as input a description of the current state of the world and pro duces as output an action to be sent to the world The world represents the task to be solved prototypi cally it is the robot s external environment The world receives actions from the policy and produces a next state output and a reward output",
"The overall task is de ned as maximizing the long term average reward per time step cf Russell",
"The architecture also includes an explicit world model The world model is intended to mimic the one step input output behavior of the real world Finally the Dyna PI architecture in cludes an evaluation function that rapidly maps states to values much as the policy rapidly maps states to actions The evaluation function the policy and the world model are each updated by separate learning processes WORLD Action Reward (scalar)",
"Heuristic Reward (scalar) State EVALUATION FUNCTION"
] | [
0,
0,
3,
2,
2,
4,
1,
1,
1,
4
] | [
1,
0.5676000118255615,
0.2759000062942505,
0.21619999408721924,
0.21619999408721924,
0.5160999894142151,
0.5676000118255615,
0.40540000796318054,
0.4323999881744385,
0.6215999722480774
] |
train_1649 | [
"Levels are the space where a player explores the rules and mechanics of a game; as such, good level design is critical to the game design process.",
"While there are many broad design principles, level design is inherently genre-specific due to the wide variety of rules and types of challenge found between genres.",
"Determining genre-specific design principles requires an in-depth analysis of games within the genre.",
"We present such an analysis for the 2D platformer genre, examining level components and structure with a view to better understanding their level design.",
"We then use this analysis to present a model for platformer levels, specifically focusing on areas of challenge.",
"Our framework provides a common vocabulary for these items and provides level designers with a method for thinking about elements of platformers and how to compose them to create interesting and challenging levels."
] | [
0,
0,
2,
1,
1,
4
] | [
0.8055999875068665,
0.6388999819755554,
0.41670000553131104,
0.583299994468689,
0.5555999875068665,
0.6388999819755554
] |
train_1650 | [
"Previous research has shown a relationship between use of social networking sites and feelings of social capital.",
"However, most studies have relied on self-reports by college students.",
"The goals of the current study are to (1) validate the common self-report scale using empirical data from Facebook, (2) test whether previous findings generalize to older and international populations, and (3) delve into the specific activities linked to feelings of social capital and loneliness.",
"In particular, we investigate the role of directed interaction between pairs---such as wall posts, comments, and \"likes\" --- and consumption of friends' content, including status updates, photos, and friends' conversations with other friends.",
"We find that directed communication is associated with greater feelings of bonding social capital and lower loneliness, but has only a modest relationship with bridging social capital, which is primarily related to overall friend network size.",
"Surprisingly, users who consume greater levels of content report reduced bridging and bonding social capital and increased loneliness.",
"Implications for designs to support well-being are discussed."
] | [
0,
0,
2,
1,
4,
3,
4
] | [
1,
0.7975000143051147,
0.7975000143051147,
0.35440000891685486,
0.3840000033378601,
0.3797000050544739,
1
] |
train_1651 | [
"Many forensic computing practitioners work in a high workload and low resource environment.",
"With the move by the discipline to seek ISO 17025 laboratory accreditation, practitioners are finding it difficult to meet the demands of validation and verification of their tools and still meet the demands of the accreditation framework.",
"Many agencies are ill-equipped to reproduce tests conducted by organizations such as NIST since they cannot verify the results with their equipment and in many cases rely solely on an independent validation study of other peoples' equipment.",
"This creates the issue of tools in reality never being tested.",
"Studies have shown that independent validation and verification of complex forensic tools is expensive and time consuming, and many practitioners also use tools that were not originally designed for forensic purposes.",
"This paper explores the issues of validation and verification in the accreditation environment and proposes a paradigm that will reduce the time and expense required to validate and verify forensic software tools"
] | [
0,
0,
0,
0,
1,
4
] | [
1,
0.7894999980926514,
0.6053000092506409,
0.39469999074935913,
0.39469999074935913,
0.421099990606308
] |
train_1652 | [
"Imagine the following situation.",
"You’re in your car, listening to the radio and suddenly you hear a song that catches your attention.",
"It’s the best new song you have heard for a long time, but you missed the announcement and don’t recognize the artist.",
"Still, you would like to know more about this music.",
"What should you do?",
"You could call the radio station, but that’s too cumbersome.",
"Wouldn’t it be nice if you could push a few buttons on your mobile phone and a few seconds later the phone would respond with the name of the artist and the title of the music you’re listening to?",
"Perhaps even sending an email to your default email address with some supplemental information.",
"In this paper we present an audio fingerprinting system, which makes the above scenario possible.",
"By using the fingerprint of an unknown audio clip as a query on a fingerprint database, which contains the fingerprints of a large library of songs, the audio clip can be identified."
] | [
3,
0,
0,
0,
0,
0,
0,
1,
2,
1
] | [
0.6470999717712402,
0.5587999820709229,
0.44440001249313354,
0.5587999820709229,
0.41179999709129333,
0.41179999709129333,
0.41179999709129333,
0.3528999984264374,
0.6470999717712402,
0.6176000237464905
] |
train_1653 | [
"The following formalization is inspired from [2].",
"We first describe notations, assumptions, and meta-variables required for defining the abstract syntax and the semantics of the MultiDim model.",
"Next, we give the abstract syntax of the model that allows the translation from the graphical representation to the equivalent textual representation.",
"Finally, after describing the auxiliary functions, we define the semantics of the MultiDim model."
] | [
0,
1,
2,
4
] | [
0.3610999882221222,
0.5555999875068665,
0.44440001249313354,
0.6388999819755554
] |
train_1654 | [
"In recent years, social media are said to have an impact on the public discourse and communication in the society.",
"In particular, social media are increasingly used in political context.",
"More recently, microblogging services (e.g., Twitter) and social network sites (e.g., Facebook) are believed to have the potential for increasing political participation.",
"While Twitter is an ideal platform for users to spread not only information in general but also political opinions publicly through their networks, political institutions (e.g., politicians, political parties, political foundations, etc.) have also begun to use Facebook pages or groups for the purpose of entering into direct dialogs with citizens and encouraging more political discussions.",
"Previous studies have shown that from the perspective of political institutions, there is an emerging need to continuously collect, monitor, analyze, summarize, and visualize politically relevant information from social media.",
"These activities, which are subsumed under “social media analytics,” are considered difficult tasks due to a large numbers of different social media platforms as well as the large amount and complexity of information and data.",
"Systematic tracking and analysis approaches along with appropriate scientific methods and techniques in political domain are still lacking.",
"In this paper, we propose a methodological framework for social media analytics in political context.",
"More specifically, our framework summarizes most important politically relevant issues from the perspective of political institutions and corresponding methodologies from different scientific disciplines."
] | [
0,
0,
0,
0,
0,
1,
4,
1,
4
] | [
0.5313000082969666,
0.5313000082969666,
0.5313000082969666,
0.5625,
0.40630000829696655,
0.46880000829696655,
0.375,
0.46880000829696655,
0.4375
] |
train_1655 | [
"We present MILABOT: a deep reinforcement learning chatbot developed by the Montreal Institute for Learning Algorithms (MILA) for the Amazon Alexa Prize competition.",
"MILABOT is capable of conversing with humans on popular small talk topics through both speech and text.",
"The system consists of an ensemble of natural language generation and retrieval models, including template-based models, bag-of-words models, sequence-to-sequence neural network and latent variable neural network models.",
"By applying reinforcement learning to crowdsourced data and real-world user interactions, the system has been trained to select an appropriate response from the models in its ensemble.",
"The system has been evaluated through A/B testing with real-world users, where it performed significantly better than many competing systems.",
"Due to its machine learning architecture, the system is likely to improve with additional data."
] | [
0,
0,
1,
1,
4,
4
] | [
0.8055999875068665,
0.583299994468689,
0.583299994468689,
0.6111000180244446,
1,
0.583299994468689
] |
train_1656 | [
"We propose a training framework for sequence-to-sequence voice conversion (SVC).",
"A well-known problem regarding a conventional VC framework is that acoustic-feature sequences generated from a converter tend to be over-smoothed, resulting in buzzy-sounding speech.",
"This is because a particular form of similarity metric or distribution for parameter training of the acoustic model is assumed so that the generated feature sequence that averagely fits the training target example is considered optimal.",
"This over-smoothing occurs as long as a manually constructed similarity metric is used.",
"To overcome this limitation, our proposed SVC framework uses a similarity metric implicitly derived from a generative adversarial network, enabling the measurement of the distance in the high-level abstract space.",
"This would enable the model to mitigate the oversmoothing problem caused in the low-level data space.",
"Furthermore, we use convolutional neural networks to model the long-range context-dependencies.",
"This also enables the similarity metric to have a shift-invariant property; thus, making the model robust against misalignment errors involved in the parallel data.",
"We tested our framework on a non-native-to-native VC task.",
"The experimental results revealed that the use of the proposed framework had a certain effect in improving naturalness, clarity, and speaker individuality."
] | [
0,
0,
0,
0,
1,
1,
2,
1,
4,
4
] | [
0.6470999717712402,
0.8234999775886536,
0.5881999731063843,
0.44119998812675476,
0.5881999731063843,
0.2353000044822693,
0.41179999709129333,
0.41179999709129333,
0.42309999465942383,
0.8234999775886536
] |
train_1657 | [
"The development of Industry 4.0 will be accompanied by changing tasks and demands for the human in the factory.",
"As the most flexible entity in cyber-physical production systems, workers will be faced with a large variety of jobs ranging from specification and monitoring to verification of production strategies.",
"Through technological support it is guaranteed that workers can realize their full potential and adopt the role of strategic decision-makers and flexible problem-solvers.",
"The use of established interaction technologies and metaphors from the consumer goods market seems to be promising.",
"This paper demonstrates solutions for the technological assistance of workers, which implement the representation of a cyber-physical world and the therein occurring interactions in the form of intelligent user interfaces.",
"Besides technological means, the paper points out the requirement for adequate qualification strategies, which will create the required, inter-disciplinary understanding for Industry 4.0."
] | [
0,
0,
0,
1,
4,
4
] | [
1,
1,
0.583299994468689,
0.41670000553131104,
0.44440001249313354,
0.6388999819755554
] |
train_1658 | [
"This paper presents a novel vehicle detection approach for detecting vehicles from static images using color and edges.",
"Different from traditional methods which use motion features to detect vehicles, this method introduces a new color transform model to find important \"vehicle color\" from images for quickly locating possible vehicle candidates.",
"Since vehicles have different colors under different lighting conditions, there were seldom works proposed for detecting vehicles using colors.",
"This paper proves that the new color transform model has extreme abilities to identify vehicle pixels from backgrounds even though they are lighted under various illumination conditions.",
"Each detected pixel corresponds to a possible vehicle candidate.",
"Then, two important features including edge maps and coefficients of wavelet transform are used for constructing a multi-channel classifier to verify this candidate.",
"According to this classifier, we can perform an effective scan to detect all desired vehicles from static images.",
"Since the color feature is first used to filter out most background pixels, this scan can be extremely quickly achieved.",
"Experimental results show that the integrated scheme is very powerful in detecting vehicles from static images.",
"The average accuracy of vehicle detection is 94.5%."
] | [
2,
1,
1,
1,
1,
1,
1,
1,
4,
4
] | [
0.583299994468689,
0.8055999875068665,
0.44440001249313354,
0.666700005531311,
0.666700005531311,
0.666700005531311,
0.6388999819755554,
0.8611000180244446,
0.666700005531311,
0.8055999875068665
] |
train_1659 | [
"This paper presents a simple two-branch transmit diversity scheme.",
"Using two transmit antennas and one receive antenna the scheme provides the same diversity order as maximal-ratio receiver combining (MRRC) with one transmit antenna, and two receive antennas.",
"It is also shown that the scheme may easily be generalized to two transmit antennas and M receive antennas to provide a diversity order of 2M .",
"The new scheme does not require any bandwidth expansion any feedback from the receiver to the transmitter and its computation complexity is similar to MRRC."
] | [
0,
0,
1,
1
] | [
0.7778000235557556,
0.5555999875068665,
1,
0.6111000180244446
] |
train_1660 | [
"New product development is indeed very important for companies.",
"However, developing new products is a risky and uncertain process.",
"In order to reduce the risks and uncertainties, companies need to evaluate their new product initiatives carefully and make accurate decisions.",
"Although the outcome of a new product evaluation decision can be influenced by the environmental uncertainties that are beyond a company s control, companies can successfully improve the accuracy of their new product evaluation decisions.",
"This article presents an integrated framework for understanding how various factors affect decision making in new product evaluation and provides guidelines for reducing their negative impacts on new product decisions.",
"The results indicate that the quality of new product evaluation decisions is affected by four major sets of factors, namely the nature of the task, the type of individuals who are involved in the decisions, the way the individuals opinions are elicited and the way the opinions are aggregated.",
"2003 Elsevier B.V. All rights reserved."
] | [
0,
0,
4,
4,
4,
4,
3
] | [
1,
0.542900025844574,
0.628600001335144,
0.628600001335144,
0.4000000059604645,
1,
0.771399974822998
] |
train_1661 | [
"This paper introduces a new dimension to the alignment between business and information technology.",
"Besides alignment of strategies, objectives, and processes, the paper argues that modelling languages for the description of organizational domains during requirements engineering must be aligned with the organizational paradigm.",
"This paper examines five organizational paradigms and their ontologies.",
"Current conceptual modelling languages are shown to be poorly aligned with the paradigms, pointing to a need for further research into adapting or creating suitable languages."
] | [
0,
2,
1,
4
] | [
0.40540000796318054,
0.5946000218391418,
0.5946000218391418,
0.5676000118255615
] |
train_1662 | [
"The lack of a written representation for American sign language (ASL) makes it difficult to do something as commonplace as looking up an unknown word in a dictionary.",
"The majority of printed dictionaries organize ASL signs (represented in drawings or pictures) based on their nearest English translation; so unless one already knows the meaning of a sign, dictionary look-up is not a simple proposition.",
"In this paper we introduce the ASL lexicon video dataset, a large and expanding public dataset containing video sequences of thousands of distinct ASL signs, as well as annotations of those sequences, including start/end frames and class label of every sign.",
"This dataset is being created as part of a project to develop a computer vision system that allows users to look up the meaning of an ASL sign.",
"At the same time, the dataset can be useful for benchmarking a variety of computer vision and machine learning methods designed for learning and/or indexing a large number of visual classes, and especially approaches for analyzing gestures and human communication."
] | [
0,
0,
2,
2,
2
] | [
0.763700008392334,
0.763700008392334,
0.3840000033378601,
0.5864999890327454,
0.3840000033378601
] |
train_1663 | [
"The Spring Loaded Inverted Pendulum (SLIP) describes the dynamic walking of humans and animals in a simplified manner.",
"However, realizing such movements by means of a combination of typical articulated legs and linear actuators has some limitations.",
"This paper proposes a leg mechanism that accurately reflects the SLIP based on its mechanical constitution.",
"The SLIP design based leg is able to do decoupled swing motion and extension motion.",
"Also this study has focused on improving the straightness of extension motion."
] | [
0,
0,
2,
1,
1
] | [
0.7894999980926514,
0.5788999795913696,
0.5788999795913696,
0.631600022315979,
0.421099990606308
] |
train_1664 | [
"Production planning and control in printed wiring board (PWB) manufacturing is becoming more difficult as PWB's technology is developing and the production routings become more complex.",
"Simultaneously, the strategic importance of delivery accuracy, short delivery times, and production flexibility is increasing with the highly fluctuating demand and short product life cycles of end products.",
"New principles, that minimize throughput time while guaranteeing excellent customer service and adequate capacity utilization, are needed for production planning and control.",
"Simulation is needed in order to develop the new principles and test their superiority.",
"This paper presents an ongoing simulation project that aims at developing the production planning and control of a PWB manufacturer.",
"In the project, a discrete event simulation model is built of a pilot case factory.",
"The model is used for comparing the effect of scheduling, queuing rules, buffer policies, and lot sizes on customer service and cost efficiency."
] | [
0,
0,
0,
0,
2,
1,
1
] | [
1,
0.8611000180244446,
0.666700005531311,
0.44440001249313354,
0.583299994468689,
0.666700005531311,
0.583299994468689
] |
train_1665 | [
"In this paper, we propose a direction-of-arrival (DOA) estimation method by combining multiple signal classification (MUSIC) of two decomposed linear arrays for the corresponding coprime array signal processing.",
"The title “DECOM” means that, first, the nonlinear coprime array needs to be DECOMposed into two linear arrays, and second, Doa Estimation is obtained by COmbining the MUSIC results of the linear arrays, where the existence and uniqueness of the solution are proved.",
"To reduce the computational complexity of DECOM, we design a two-phase adaptive spectrum search scheme, which includes a coarse spectrum search phase and then a fine spectrum search phase.",
"Extensive simulations have been conducted and the results show that the DECOM can achieve accurate DOA estimation under different SNR conditions."
] | [
0,
2,
1,
4
] | [
0.6215999722480774,
0.40540000796318054,
1,
0.8378000259399414
] |
train_1666 | [
"We consider real-life smart parking systems where parking lot occupancy data are collected from field sensor devices and sent to backend servers for further processing and usage for applications.",
"Our objective is to make these data useful to end users, such as parking managers, and, ultimately, to citizens.",
"To this end, we concoct and validate an automated classification algorithm having two objectives: (1) outlier detection: to detect sensors with anomalous behavioral patterns, i.e., outliers; and (2) clustering: to group the parking sensors exhibiting similar patterns into distinct clusters.",
"We first analyze the statistics of real parking data, obtaining suitable simulation models for parking traces.",
"We then consider a simple classification algorithm based on the empirical complementary distribution function of occupancy times and show its limitations.",
"Hence, we design a more sophisticated algorithm exploiting unsupervised learning techniques (self-organizing maps).",
"These are tuned following a supervised approach using our trace generator and are compared against other clustering schemes, namely expectation maximization, k-means clustering and DBSCAN, considering six months of data from a real sensor deployment.",
"Our approach is found to be superior in terms of classification accuracy, while also being capable of identifying all of the outliers in the dataset."
] | [
0,
2,
1,
1,
1,
1,
1,
4
] | [
0.8158000111579895,
0.7894999980926514,
0.6053000092506409,
0.8158000111579895,
0.6053000092506409,
0.39469999074935913,
0.421099990606308,
0.7894999980926514
] |
train_1667 | [
"A fundamental objective of human–computer interaction research is to make systems more usable, more useful, and to provide users with experiences fitting their specific background knowledge and objectives.",
"The challenge in an information-rich world is not only to make information available to people at any time, at any place, and in any form, but specifically to say the “right” thing at the “right” time in the “right” way.",
"Designers of collaborative human–computer systems face the formidable task of writing software for millions of users (at design time) while making it work as if it were designed for each individual user (only known at use time).",
"User modeling research has attempted to address these issues.",
"In this article, I will first review the objectives, progress, and unfulfilled hopes that have occurred over the last ten years, and illustrate them with some interesting computational environments and their underlying conceptual frameworks.",
"A special emphasis is given to high-functionality applications and the impact of user modeling to make them more usable, useful, and learnable.",
"Finally, an assessment of the current state of the art followed by some future challenges is given."
] | [
2,
0,
2,
1,
1,
1,
4
] | [
0.41029998660087585,
0.41029998660087585,
0.41029998660087585,
0.6154000163078308,
0.41029998660087585,
0.6154000163078308,
0.8205000162124634
] |