abstract_id
stringlengths 10
10
| sentences
list | labels
list | confs
list |
---|---|---|---|
train_0000 | [
"Gamification has the potential to improve the quality of learning by better engaging students with learning activities.",
"Our objective in this study is to evaluate a gamified learning activity along the dimensions of learning, engagement, and enjoyment.",
"The activity made use of a gamified multiple choice quiz implemented as a software tool and was trialled in three undergraduate IT-related courses.",
"A questionnaire survey was used to collect data to gauge levels of learning, engagement, and enjoyment.",
"Results show that there was some degree of engagement and enjoyment.",
"The majority of participants (77.63 per cent) reported that they were engaged enough to want to complete the quiz and 46.05 per cent stated they were happy while playing the quiz.",
"In terms of learning, the overall results were positive since 60.53 per cent of students stated that it enhanced their learning effectiveness.",
"A limitation of the work is that the results are self-reported and the activity was used over a short period of time.",
"Thus, future work should include longer trial periods and evaluating improvements to learning using alternative approaches to self-reported data."
] | [
0,
2,
1,
1,
4,
4,
4,
4,
4
] | [
0.7778000235557556,
0.7778000235557556,
0.7778000235557556,
1,
0.6111000180244446,
0.5555999875068665,
0.6111000180244446,
0.6111000180244446,
0.6111000180244446
] |
train_0001 | [
"We propose a novel 3D face recognition algorithm using a deep convolutional neural network (DCNN) and a 3D face expression augmentation technique.",
"The performance of 2D face recognition algorithms has significantly increased by leveraging the representational power of deep neural networks and the use of large-scale labeled training data.",
"In this paper, we show that transfer learning from a CNN trained on 2D face images can effectively work for 3D face recognition by fine-tuning the CNN with an extremely small number of 3D facial scans.",
"We also propose a 3D face expression augmentation technique which synthesizes a number of different facial expressions from a single 3D face scan.",
"Our proposed method shows excellent recognition results on Bosphorus, BU-3DFE, and 3D-TEC datasets without using hand-crafted features.",
"The 3D face identification using our deep features also scales well for large databases."
] | [
0,
1,
2,
1,
1,
4
] | [
0.5788999795913696,
0.421099990606308,
0.5788999795913696,
0.7894999980926514,
0.6053000092506409,
0.5788999795913696
] |
train_0002 | [
"The automotive industry is regarded as one of the most important and strategic industry in manufacturing sector.",
"It is the largest manufacturing enterprise in the world and one of the most resource intensive industries of all major industrial system.",
"However, its products and processes are a significant source of environmental impact.",
"Thus, there is a need to evaluate sustainable manufacturing performance in this industry.",
"This paper proposes a set of initial key performance indicators (KPIs) for sustainable manufacturing evaluation believed to be appropriate to automotive companies, consisting of three factors divided into nine dimensions and a total of 41 sub-dimensions.",
"A survey will be conducted to confirm the adaptability of the initial KPIs with the industry practices.",
"Future research will focus on developing an evaluation tool to assess sustainable manufacturing performance in automotive companies."
] | [
0,
0,
0,
2,
1,
1,
4
] | [
0.8087999820709229,
0.8087999820709229,
0.8087999820709229,
0.5856999754905701,
0.5856999754905701,
0.41830000281333923,
0.7768999934196472
] |
train_0003 | [
"In this paper we describe a general passivity based framework for the control of flexible joint robots.",
"Herein the recent DLR results on torque-, position-, as well as impedance control of flexible joint robots are summarized, and the relations between the individual contributions are highlighted.",
"It is shown that an inner torque feedback loop can be incorporated into a passivity based analysis by interpreting torque feedback in terms of shaping of the motor inertia.",
"This result, which implicitly was already included in our earlier works on torqueand position control, can also be seized for the design of impedance controllers.",
"For impedance control, furthermore, potential shaping is of special interest.",
"It is shown how, based only on the motor angles, a potential function can be designed which simultaneously incorporates gravity compensation and a desired Cartesian stiffness relation for the link angles.",
"All the presented controllers were experimentally evaluated on the DLR light-weight robots and proved their performance and robustness with respect to uncertain model parameters.",
"Herein, an impact experiment is presented briefly, and an overview of several applications is given in which the controllers have been applied."
] | [
0,
0,
1,
1,
1,
1,
4,
4
] | [
0.44440001249313354,
0.44440001249313354,
0.7778000235557556,
0.44440001249313354,
0.6388999819755554,
0.44440001249313354,
0.6388999819755554,
0.44440001249313354
] |
train_0004 | [
"Head pose monitoring is an important task for driver assistance systems, since it is a key indicator for human attention and behavior.",
"However, current head pose datasets either lack complexity or do not adequately represent the conditions that occur while driving.",
"Therefore, we introduce DriveAHead, a novel dataset designed to develop and evaluate head pose monitoring algorithms in real driving conditions.",
"We provide frame-by-frame head pose labels obtained from a motion-capture system, as well as annotations about occlusions of the driver's face.",
"To the best of our knowledge, DriveAHead is the largest publicly available driver head pose dataset, and also the only one that provides 2D and 3D data aligned at the pixel level using the Kinect v2.",
"Existing performance metrics are based on the mean error without any consideration of the bias towards one position or another.",
"Here, we suggest a new performance metric, named Balanced Mean Angular Error, that addresses the bias towards the forward looking position existing in driving datasets.",
"Finally, we present the Head Pose Network, a deep learning model that achieves better performance than current state-of-the-art algorithms, and we analyze its performance when using our dataset."
] | [
0,
0,
2,
1,
4,
4,
1,
4
] | [
1,
0.7778000235557556,
0.6388999819755554,
0.44440001249313354,
0.3889000117778778,
0.41670000553131104,
0.583299994468689,
0.7778000235557556
] |
train_0005 | [
"In multi-label classification, the main focus has been to develop ways of learning the underlying dependencies between labels, and to take advantage of this at classification time.",
"Developing better feature-space representations has been predominantly employed to reduce complexity, e.g., by eliminating non-helpful feature attributes from the input space prior to (or during) training.",
"This is an important task, since many multilabel methods typically create many different copies or views of the same input data as they transform it, and considerable memory can be saved by taking advantage of redundancy.",
"In this paper, we show that a proper development of the feature space can make labels less interdependent and easier to model and predict at inference time.",
"For this task we use a deep learning approach with restricted Boltzmann machines.",
"We present a deep network that, in an empirical evaluation, outperforms a number of competitive methods from the literature."
] | [
0,
0,
1,
1,
1,
1
] | [
1,
0.666700005531311,
0.5555999875068665,
0.6111000180244446,
0.6111000180244446,
0.44440001249313354
] |
train_0006 | [
"The Collaborative Filtering is the most successful algorithm in the recommender systems' field.",
"A recommender system is an intelligent system can help users to come across interesting items.",
"It uses data mining and information filtering techniques.",
"The collaborative filtering creates suggestions for users based on their neighbors' preferences.",
"But it suffers from its poor accuracy and scalability.",
"This paper considers the users are m (m is the number of users) points in n dimensional space (n is the number of items) and represents an approach based on user clustering to produce a recommendation for active user by a new method.",
"It uses k-means clustering algorithm to categorize users based on their interests.",
"Then it uses a new method called voting algorithm to develop a recommendation.",
"We evaluate the traditional collaborative filtering and the new one to compare them.",
"Our results show the proposed algorithm is more accurate than the traditional one, besides it is less time consuming than it."
] | [
0,
0,
0,
1,
1,
1,
1,
1,
4,
4
] | [
0.771399974822998,
0.771399974822998,
0.4000000059604645,
0.4571000039577484,
0.4571000039577484,
0.4571000039577484,
0.4571000039577484,
0.53329998254776,
0.771399974822998,
1
] |
train_0007 | [
"In this paper, we present a detailed tutorial on linear cryp tanalysis and differential cryptanalysis, the two most significant attacks a pplicable to symmetric-key block ciphers.",
"The intent of the paper is to present a lucid explanat ion of the attacks, detailing the practical application of the attacks to a cipher i n a simple, conceptually revealing manner for the novice cryptanalyst.",
"The tutorial is base d on the analysis of a simple, yet realistically structured, basic Substitution-Permuta tion Network cipher.",
"Understanding the attacks as they apply to this structure is use ful, as the Rijndael cipher, recently selected for the Advanced Encryption Standard (AES), has bee n derived from the basic SPN architecture.",
"As well, experimental data from t he a tacks is presented as confirmation of the applicability of the concepts as outlined."
] | [
0,
2,
1,
1,
4
] | [
0.7778000235557556,
0.3889000117778778,
0.583299994468689,
0.3889000117778778,
0.5555999875068665
] |
train_0008 | [
"In a knowledge and information society, e-learning has built on the extensive use of advanced information and communication technologies to deliver learning and instruction.",
"In addition, employees who need the training do not have to gather in a place at the same time, and thus it is not necessary for them to travel far away for attending training courses.",
"Furthermore, the flexibility allows employees who perform different jobs or tasks for training courses according to their own scheduling.",
"Since many studies have discussed learning and training of employees and most of them are focused on the learning emotion, learning style, educational content, and technology, there is limited research exploring the relationship between the e-learning and employee’s satisfaction.",
"Therefore, this study aims to explore how to enhance employee’s satisfaction by means of e-learning systems, and what kinds of training or teaching activities are effective to increase their learning satisfaction.",
"We provide a model and framework for assessing the impact of e-learning on employee’s satisfaction which improve learning and teaching outcomes.",
"Findings from the study confirmed the validity of the proposed model for e-learning satisfaction assessment.",
"In addition, the results showed that the four variables technology, educational content, motivation, and attitude significantly influenced employee’s learning satisfaction.",
"2015 Elsevier Ltd.",
"All rights reserved."
] | [
0,
0,
0,
0,
2,
1,
4,
4,
3,
3
] | [
1,
0.7838000059127808,
1,
1,
0.7838000059127808,
0.5676000118255615,
1,
1,
0.7838000059127808,
0.7838000059127808
] |
train_0009 | [
"We consider the problem of modeling annotated data---data with multiple types where the instance of one type (such as a caption) serves as a description of the other type (such as an image).",
"We describe three hierarchical probabilistic mixture models which aim to describe such data, culminating in correspondence latent Dirichlet allocation, a latent variable model that is effective at modeling the joint distribution of both types and the conditional distribution of the annotation given the primary type.",
"We conduct experiments on the Corel database of images and captions, assessing performance in terms of held-out likelihood, automatic annotation, and text-based image retrieval."
] | [
2,
2,
1
] | [
0.41670000553131104,
0.5184999704360962,
0.8379999995231628
] |
train_0010 | [
"Recent reports suggest that a generic supervised deep CNN model trained on a large-scale dataset reduces, but does not remove, dataset bias on a standard benchmark.",
"Fine-tuning deep models in a new domain can require a significant amount of data, which for many applications is simply not available.",
"We propose a new CNN architecture which introduces an adaptation layer and an additional domain confusion loss, to learn a representation that is both semantically meaningful and domain invariant.",
"We additionally show that a domain confusion metric can be used for model selection to determine the dimension of an adaptation layer and the best position for the layer in the CNN architecture.",
"Our proposed adaptation method offers empirical performance which exceeds previously published results on a standard benchmark visual domain adaptation task."
] | [
0,
0,
2,
1,
4
] | [
1,
0.800000011920929,
0.4000000059604645,
0.800000011920929,
0.6000000238418579
] |
train_0011 | [
"A variety of circle detection methods which are based on variations of the Hough Transform are investigated.",
"The ,five methods considered are the standard Hough Trans,form, the Fast Hough Transform of Li et al.‘, a two stage Hough method, and two space saving approaches based on the method devised by Gerig and Klein2.",
"The performance of each of the methods has been compared on synthetic imagery and real images from a metallurgical application.",
"Figures and comments are presented concerning the accuracy, reliability, computational efficiency and storage requirements of each of the methods."
] | [
2,
1,
1,
4
] | [
0.583299994468689,
0.7778000235557556,
0.583299994468689,
0.41670000553131104
] |
train_0012 | [
"We present a model that generates natural language descriptions of images and their regions.",
"Our approach leverages datasets of images and their sentence descriptions to learn about the inter-modal correspondences between language and visual data.",
"Our alignment model is based on a novel combination of Convolutional Neural Networks over image regions, bidirectional Recurrent Neural Networks (RNN) over sentences, and a structured objective that aligns the two modalities through a multimodal embedding.",
"We then describe a Multimodal Recurrent Neural Network architecture that uses the inferred alignments to learn to generate novel descriptions of image regions.",
"We demonstrate that our alignment model produces state of the art results in retrieval experiments on Flickr8K, Flickr30K and MSCOCO datasets.",
"We then show that the generated descriptions outperform retrieval baselines on both full images and on a new dataset of region-level annotations.",
"Finally, we conduct large-scale analysis of our RNN language model on the Visual Genome dataset of 4.1 million captions and highlight the differences between image and region-level caption statistics."
] | [
1,
0,
4,
4,
4,
4,
4
] | [
0.40380001068115234,
0.40380001068115234,
0.39419999718666077,
0.40380001068115234,
0.40380001068115234,
0.39419999718666077,
0.5961999893188477
] |
train_0013 | [
"Literature reports the experiences with e-government initiatives as chaotic and unmanageable, despite recent numerous initiatives at different levels of government and academic and practitionersâ€TM conferences on e-government.",
"E-government presents a number of challenges for public administrators.",
"To help public administrators think about e-government and their organizations, this article describes different stages of egovernment development and proposes a †̃stages of growthâ€TM model for fully functional e-government.",
"Various government websites and related e-government initiatives help to ground and explain this model.",
"These stages outline the multiperspective transformation within government structures and functions as they make transitions to e-government through each stage.",
"Technological and organizational challenges for each stage accompany these descriptions.",
"At the same time, this paper describes how the e-government becomes amalgamated with traditional public administrative structure.",
"a b Purchase Export"
] | [
0,
0,
0,
2,
1,
4,
4,
3
] | [
1,
0.7894999980926514,
0.6053000092506409,
0.39469999074935913,
0.6053000092506409,
0.4839000105857849,
0.5788999795913696,
0.5788999795913696
] |
train_0014 | [
"This paper describes a simple, non-parametric and generic test of the equivalence of Receiver Operating Characteristic (ROC) curves based on a modified Kolmogorov-Smirnov (KS) test.",
"The test is described in relation to the commonly used techniques such as the Area Under the ROC curve (AUC) and the Neyman-Pearson method.",
"We first review how the KS test is used to test the null hypotheses that the class labels predicted by a classifier are no better than random.",
"We then propose an interval mapping technique that allows us to use two KS tests to test the null hypothesis that two classifiers have ROC curves that are equivalent.",
"We demonstrate that this test discriminates different ROC curves both when one curve dominates another and when the curves cross and so are not discriminated by AUC.",
"The interval mapping technique is then used to demonstrate that, although AUC has its limitations, it can be a model-independent and coherent measure of classifier performance."
] | [
0,
2,
1,
1,
1,
4
] | [
0.7646999955177307,
0.44119998812675476,
0.5881999731063843,
0.6470999717712402,
0.7940999865531921,
0.7940999865531921
] |
train_0015 | [
"Smartphone has become highly prevalent in recent years.",
"It demonstrates as a useful technology that brings productivity and convenience in our daily life.",
"However, smartphone usage can also drive psychological and behavioral maladaptive dependency, which may result in negative problems.",
"Given that research on smartphone addiction is still limited in the information systems literature, this paper aims to propose a framework of motives from the functionalist perspective and investigate why users will be addicted to smartphones.",
"Four categories of motives for smartphone usage are proposed in this study.",
"They include enhancement motives (i.e., information seeking and perceived enjoyment), social motives (i.e., social relationship), coping motives (i.e., mood regulation and pastime), and conformity motives (i.e., conformity).",
"We empirically test our research model using online survey method.",
"The findings illustrate that perceived enjoyment, mood regulation, pastime, and conformity positively affect smartphone addiction, whereas information seeking and social relationship have no significant effects.",
"Implications for both research and practice are provided."
] | [
0,
0,
0,
2,
2,
1,
1,
4,
4
] | [
1,
0.6079999804496765,
0.6079999804496765,
0.6079999804496765,
0.4480000138282776,
0.6079999804496765,
0.7760000228881836,
0.8320000171661377,
1
] |
train_0016 | [
"As the density of wireless networks continues to grow with more clients, more base stations, and more traffic, designing cost-effective wireless solutions with efficient resource usage and ease to manage is an increasing challenging task due to the overall system complexity.",
"A number of vendors offer scalable and high-performance wireless networks but at a high cost and commonly as a single-vendor solution, limiting the ability to innovate after roll-out.",
"Recent Software-Defined Networking (SDN) approaches propose new means for network virtualization and programmability advancing the way networks can be designed and operated, including user-defined features and customized behaviour even at run-time.",
"However, means for rapid prototyping and experimental evaluation of SDN for wireless environments are not yet available.",
"This paper introduces Mininet-WiFi as a tool to emulate wireless OpenFlow/SDN scenarios allowing high-fidelity experiments that replicate real networking environments.",
"Mininet-WiFi augments the well-known Mininet emulator with virtual wireless stations and access points while keeping the original SDN capabilities and the lightweight virtualization software architecture.",
"We elaborate on the potential applications of Mininet-Wifi and discuss the benefits and current limitations.",
"Two use cases based on IEEE 802.11 demonstrate available functionality in our open source developments."
] | [
0,
0,
0,
4,
2,
1,
1,
4
] | [
1,
0.7886999845504761,
0.7886999845504761,
0.4839000105857849,
0.5774000287055969,
0.42260000109672546,
0.6340000033378601,
0.42260000109672546
] |
train_0017 | [
"Phishing attacks are one of the most common and least defended security threats today.",
"We present an approach which uses natural language processing techniques to analyze text and detect inappropriate statements which are indicative of phishing attacks.",
"Our approach is novel compared to previous work because it focuses on the natural language text contained in the attack, performing semantic analysis of the text to detect malicious intent.",
"To demonstrate the effectiveness of our approach, we have evaluated it using a large benchmark set of phishing emails."
] | [
0,
0,
1,
1
] | [
0.625,
0.6563000082969666,
0.5938000082969666,
0.5938000082969666
] |
train_0018 | [
"Imagining a scene described in natural language with realistic layout and appearance of entities is the ultimate test of spatial, visual, and semantic world knowledge.",
"Towards this goal, we present the Composition, Retrieval and Fusion Network (Craft), a model capable of learning this knowledge from video-caption data and applying it while generating videos from novel captions.",
"Craft explicitly predicts a temporal-layout of mentioned entities (characters and objects), retrieves spatio-temporal entity segments from a video database and fuses them to generate scene videos.",
"Our contributions include sequential training of components of Craft while jointly modeling layout and appearances, and losses that encourage learning compositional representations for retrieval.",
"We evaluate Craft on semantic fidelity to caption, composition consistency, and visual quality.",
"Craft outperforms direct pixel generation approaches and generalizes well to unseen captions and to unseen video databases with no text annotations.",
"We demonstrate Craft on Flintstones, a new richly annotated video-caption dataset with over 25000 videos.",
"For a glimpse of videos generated by Craft, see https://youtu.be/688Vv86n0z8.",
"Fred wearing a red hat is walking in the living room Retrieve Compose Retrieve Compose Retrieve Pebbles is sitting at a table in a room watching the television Retrieve Compose Retrieve Compose Compose Retrieve Retrieve Fuse"
] | [
0,
2,
2,
1,
4,
2,
4,
4,
3
] | [
1,
0.7894999980926514,
0.3684000074863434,
0.421099990606308,
0.75,
0.421099990606308,
0.3684000074863434,
0.421099990606308,
0.5788999795913696
] |
train_0019 | [
"We present an approach to efficiently detect the 2D pose of multiple people in an image.",
"The approach uses a nonparametric representation, which we refer to as Part Affinity Fields (PAFs), to learn to associate body parts with individuals in the image.",
"The architecture encodes global context, allowing a greedy bottom-up parsing step that maintains high accuracy while achieving realtime performance, irrespective of the number of people in the image.",
"The architecture is designed to jointly learn part locations and their association via two branches of the same sequential prediction process.",
"Our method placed first in the inaugural COCO 2016 keypoints challenge, and significantly exceeds the previous state-of-the-art result on the MPII Multi-Person benchmark, both in performance and efficiency."
] | [
2,
1,
1,
1,
1
] | [
0.5516999959945679,
0.5516999959945679,
0.5516999959945679,
0.5861999988555908,
0.6207000017166138
] |
train_0020 | [
"Many natural language questions require recognizing and reasoning with qualitative relationships (e.g., in science, economics, and medicine), but are challenging to answer with corpus-based methods.",
"Qualitative modeling provides tools that support such reasoning, but the semantic parsing task of mapping questions into those models has formidable challenges.",
"We present QUAREL, a dataset of diverse story questions involving qualitative relationships that characterize these challenges, and techniques that begin to address them.",
"The dataset has 2771 questions relating 19 different types of quantities.",
"For example, “Jenny observes that the robot vacuum cleaner moves slower on the living room carpet than on the bedroom carpet.",
"Which carpet has more friction?",
"” We contribute (1) a simple and flexible conceptual framework for representing these kinds of questions; (2) the QUAREL dataset, including logical forms, exemplifying the parsing challenges; and (3) two novel models for this task, built as extensions of type-constrained semantic parsing.",
"The first of these models (called QUASP+) significantly outperforms off-the-shelf tools on QUAREL.",
"The second (QUASP+ZERO) demonstrates zero-shot capability, i.e., the ability to handle new qualitative relationships without requiring additional training data, something not possible with previous models.",
"This work thus makes inroads into answering complex, qualitative questions that require reasoning, and scaling to new relationships at low cost."
] | [
0,
0,
0,
1,
1,
1,
4,
4,
4,
4
] | [
1,
0.7760000228881836,
0.5519999861717224,
1,
0.8399999737739563,
0.4480000138282776,
0.41999998688697815,
0.41999998688697815,
0.41999998688697815,
0.41999998688697815
] |
train_0021 | [
"Non-maximum suppression (NMS) is a key post-processing step in many computer vision applications.",
"In the context of object detection, it is used to transform a smooth response map that triggers many imprecise object window hypotheses in, ideally, a single bounding-box for each detected object.",
"The most common approach for NMS for object detection is a greedy, locally optimal strategy with several hand-designed components (e.g., thresholds).",
"Such a strategy inherently suffers from several shortcomings, such as the inability to detect nearby objects.",
"In this paper, we try to alleviate these problems and explore a novel formulation of NMS as a well-defined clustering problem.",
"Our method builds on the recent Affinity Propagation Clustering algorithm, which passes messages between data points to identify cluster exemplars.",
"Contrary to the greedy approach, our method is solved globally and its parameters can be automatically learned from training data.",
"In experiments, we show in two contexts – object class and generic object detection – that it provides a promising solution to the shortcomings of the greedy NMS."
] | [
0,
0,
0,
0,
1,
1,
4,
4
] | [
1,
0.833299994468689,
0.6111000180244446,
0.44440001249313354,
0.6111000180244446,
0.833299994468689,
0.44440001249313354,
0.833299994468689
] |
train_0022 | [
"Every day a large number of Earth observation (EO) spaceborne and airborne sensors from many different countries provide a massive amount of remotely sensed data.",
"Those data are used for different applications, such as natural hazard monitoring, global climate change, urban planning, etc.",
"The applications are data driven and mostly interdisciplinary.",
"Based on this it can truly be stated that we are now living in the age of big remote sensing data.",
"Furthermore, these data are becoming an economic asset and a new important resource in many applications.",
"In this paper, we specifically analyze the challenges and opportunities that big data bring in the context of remote sensing applications.",
"Our focus is to analyze what exactly does big data mean in remote sensing applications and how can big data provide added value in this context.",
"Furthermore, this paper describes the most challenging issues in managing, processing, and efficient exploitation of big data for remote sensing problems.",
"In order to illustrate the aforementioned aspects, two case studies discussing the use of big data in remote sensing are demonstrated.",
"In the first test case, big data are used to automatically detect marine oil spills using a large archive of remote sensing data."
] | [
0,
0,
1,
2,
1,
1,
1,
1,
4,
3
] | [
1,
1,
0.6061000227928162,
0.3077000081539154,
0.3939000070095062,
0.6363999843597412,
0.6970000267028809,
0.3635999858379364,
0.3939000070095062,
0.30300000309944153
] |
train_0023 | [
"Cyber-Physical Systems (CPS) are integrations of computation and physical processes.",
"Embedded computers and networks monitor and control the physical processes, usually with feedback loops where physical processes affect computations and vice versa.",
"The economic and societal potential of such systems is vastly greater than what has been realized, and major investments are being made worldwide to develop the technology.",
"There are considerable challenges, particularly because the physical components of such systems introduce safety and reliability requirements qualitatively different from those in general- purpose computing.",
"Moreover, physical components are qualitatively different from object-oriented software components.",
"Standard abstractions based on method calls and threads do not work.",
"This paper examines the challenges in designing such systems, and in particular raises the question of whether today's computing and networking technologies provide an adequate foundation for CPS.",
"It concludes that it will not be sufficient to improve design processes, raise the level of abstraction, or verify (formally or otherwise) designs that are built on today's abstractions.",
"To realize the full potential of CPS, we will have to rebuild computing and networking abstractions.",
"These abstractions will have to embrace physical dynamics and computation in a unified way."
] | [
0,
0,
0,
0,
0,
0,
2,
1,
1,
4
] | [
0.833299994468689,
1,
0.583299994468689,
0.6111000180244446,
0.7778000235557556,
0.6111000180244446,
0.583299994468689,
0.5171999931335449,
0.41670000553131104,
0.41670000553131104
] |
train_0024 | [
"Log messages are generated by operating systems and applications.",
"These messages contain important information about the health and operation of the system.",
"The messages are also of great significance for security management, audit-checks, and forensics in an intranet.",
"So, a logging system that generates, relays, collects and archives log messages, must be monitored and managed just like all other components of the ICT infrastructure, to ensure that it is operating normally i.e., the logs are being collected and archived as desired.",
"In the Internet, some progress has been made towards the standardization of the syslog protocol but, to date, the management aspect of syslog has been neglected, for all practical purposes.",
"In this paper, we discuss the necessity and importance of monitoring and managing logging systems.",
"We present the basic design of a Management Information Base module which will make it possible to monitor and manage a syslog system using standard management protocols.",
"Then we discuss a prototype implementation of the MIB and demonstrate a syslog management application for managing the syslog configuration of an enterprise."
] | [
0,
0,
0,
1,
1,
2,
1,
4
] | [
0.7838000059127808,
0.7838000059127808,
0.7838000059127808,
0.6485999822616577,
0.7838000059127808,
0.6485999822616577,
0.5676000118255615,
0.7838000059127808
] |
train_0025 | [
"A quasi-passive leg exoskeleton is presented for load-carrying augmentation during walking.",
"The exoskeleton has no actuators, only ankle and hip springs and a knee variabledamper.",
"Without a payload, the exoskeleton weighs 11.7kg and requires only 2 Watts of electrical power during loaded walking.",
"For a 36 kg payload, we demonstrate that the quasi-passive exoskeleton transfers on average 80% of the load to the ground during the single support phase of walking.",
"By measuring the rate of oxygen consumption on a study participant walking at a self-selected speed, we find that the exoskeleton slightly increases the walking metabolic cost of transport (COT) as compared to a standard loaded backpack (10% increase).",
"However, a similar exoskeleton without joint springs or damping control (zero-impedance exoskeleton) is found to increase COT by 23% compared to the loaded backpack, highlighting the benefits of passive and quasi-passive joint mechanisms in the design of efficient, low-mass leg exoskeletons."
] | [
1,
1,
1,
1,
1,
4
] | [
0.41670000553131104,
0.41670000553131104,
0.6111000180244446,
0.583299994468689,
0.41670000553131104,
0.8055999875068665
] |
train_0026 | [
"Otsu method is one of the most successful methods for image thresholding.",
"This paper proves that the objective function of Otsu method is equivalent to that of K-means method in multilevel thresholding .",
"They are both based on a same criterion that minimizes the within-class variance.",
"However, Otsu method is an exhaustive algorithm of searching the global optimal threshold, while K-means is a local optimal method.",
"Moreover, K-means does not require computing a gray-level histogram before running, but Otsu method needs to compute a gray-level histogram firstly.",
"Therefore, K-means can be more efficiently extended to multilevel thresholding method, two-dimensional thresholding method and three-dimensional method than Otsu method.",
"This paper proved that the clustering results of K-means keep the order of the initial centroids with respect to one-dimensional data set.",
"The experiments show that the k-means thresholding method performs well with less computing time than Otsu method does on three dimensional image thresholding."
] | [
0,
2,
1,
1,
1,
1,
4,
4
] | [
0.6105999946594238,
0.7875999808311462,
0.38940000534057617,
0.7875999808311462,
0.7875999808311462,
0.6105999946594238,
1,
0.7875999808311462
] |
train_0027 | [
"While dynamic malware analysis methods generally provide better precision than purely static methods, they have the key drawback that they can only detect malicious behavior if it is executed during analysis.",
"This requires inputs that trigger the malicious behavior to be applied during execution.",
"All current methods, such as hard-coded tests, random fuzzing and concolic testing, can provide good coverage but are inefficient because they are unaware of the specific capabilities of the dynamic analysis tool.",
"In this work, we introduce IntelliDroid, a generic Android input generator that can be configured to produce inputs specific to a dynamic analysis tool, for the analysis of any Android application.",
"Furthermore, IntelliDroid is capable of determining the precise order that the inputs must be injected, and injects them at what we call the device-framework interface such that system fidelity is preserved.",
"This enables it to be paired with full-system dynamic analysis tools such as TaintDroid.",
"Our experiments demonstrate that IntelliDroid requires an average of 72 inputs and only needs to execute an average of 5% of the application to detect malicious behavior.",
"When evaluated on 75 instances of malicious behavior, IntelliDroid successfully identifies the behavior, extracts path constraints, and executes the malicious code in all but 5 cases.",
"On average, IntelliDroid performs these tasks in 138.4 seconds per application."
] | [
0,
0,
1,
2,
1,
1,
4,
4,
4
] | [
0.6363999843597412,
0.6363999843597412,
0.7576000094413757,
0.5758000016212463,
0.6061000227928162,
0.6061000227928162,
0.6061000227928162,
0.6061000227928162,
0.7878999710083008
] |
train_0028 | [
"Backtracting is a well-known technique for solving combinatorial problems.",
"It is of interest to programming methodologists because (1) correctness of backtracking programs may be difficult to ascertain experimentally and (2) efficiency is often of paramount importance.",
"This paper applies a programming methodology, which we call control structure abstraction, to the backtracking technique.",
"The value of control structure abstraction in the context of correctness is that proofs of general properties of a class of programs with similar control structures are separated from proofs of specific properties of individual programs of the class.",
"In the context of efficiency, it provides sufficient conditions for correctness of an initial program which may subsequently be improved for efficiency while preserving correctness."
] | [
0,
0,
0,
1,
1
] | [
0.6000000238418579,
0.6000000238418579,
0.6000000238418579,
0.6000000238418579,
0.6000000238418579
] |
train_0029 | [
"Global navigation satellite signals can be spoofed by false signals, but special receivers can provide defenses against such attacks.",
"The development of good spoofing defenses requires an understanding of the possible attack modes of a spoofer and the properties of those modes that can be exploited for defense purposes.",
"Sets of attack methods and defense methods are described in detail.",
"An attack/defense matrix is developed that documents which defense techniques are effective against the various attack techniques.",
"Recommendations are generated to improve the offerings of commercial off-the-shelf receivers from the current situation, a complete lack of spoofing defenses, to a situation in which various levels of defense are present, some that add significant security for relatively little additional cost and others that add more security at costs that start to become appreciable."
] | [
0,
0,
0,
1,
1
] | [
1,
0.5788999795913696,
0.5788999795913696,
0.3684000074863434,
0.5788999795913696
] |
train_0030 | [
"This paper describes an approach to overcome a situation of monitoring and managing a parking area using a vision based automated parking system.",
"With the rapid increase of cars the need to find available parking space in the most efficient manner, to avoid traffic congestion in a parking area, is becoming a necessity in car park management.",
"Current car park management is dependent on either human personnel keeping track of the available car park spaces or a sensor based system that monitors the availability of each car park space or the overall number of available car park spaces.",
"In both situations, the information available was only the total number of car park spaces available and not the actual location available.",
"In addition, the installation and maintenance cost of a sensor based system is dependent on the number of sensors used in a car park.",
"This paper shows a vision based system that is able to detect and indicate the available parking spaces in a car park.",
"The methods utilized to detect available car park spaces were based on coordinates to indicate the regions of interest and a car classifier.",
"This paper shows that the initial work done here has an accuracy that ranges from 90% to 100% for a 4 space car park.",
"The work done indicated that the application of a vision based car park management system would be able to detect and indicate the available car park spaces"
] | [
2,
2,
1,
1,
1,
1,
1,
4,
4
] | [
0.5555999875068665,
0.833299994468689,
0.8055999875068665,
0.8055999875068665,
0.583299994468689,
0.583299994468689,
0.8055999875068665,
0.5555999875068665,
0.583299994468689
] |
train_0031 | [
"Automatic fake news detection is a challenging problem in deception detection, and it has tremendous real-world political and social impacts.",
"However, statistical approaches to combating fake news has been dramatically limited by the lack of labeled benchmark datasets.",
"In this paper, we present LIAR: a new, publicly available dataset for fake news detection.",
"We collected a decade-long, 12.8K manually labeled short statements in various contexts from POLITIFACT.COM, which provides detailed analysis report and links to source documents for each case.",
"This dataset can be used for fact-checking research as well.",
"Notably, this new dataset is an order of magnitude larger than previously largest public fake news datasets of similar type.",
"Empirically, we investigate automatic fake news detection based on surface-level linguistic patterns.",
"We have designed a novel, hybrid convolutional neural network to integrate metadata with text.",
"We show that this hybrid approach can improve a text-only deep learning model."
] | [
0,
0,
1,
4,
4,
4,
4,
4,
4
] | [
1,
0.7949000000953674,
0.41029998660087585,
0.6154000163078308,
0.5160999894142151,
0.7949000000953674,
0.41029998660087585,
0.3846000134944916,
1
] |
train_0032 | [
"Traditional companies used to be authoritarian and built around hierarchical organizational charts.",
"Facing more dynamic environments in recent history, many companies experimented with newer forms of organization, usually cutting down long decision paths and fostering lean structures able to react to rapid changes in the marketplace.",
"We believe that the future of organizational structures lies in hybrid, dynamic models allowing enterprises to internally move from bureaucratic to adhocratic structures at will, according to changing contexts and focuses of attention.",
"This paper introduces a four-level model representing organizational structures such as social networks, enterprises, communities, and task forces in a decision process.",
"It also discusses how context intervenes in this fourlevel model and the role of context at each level.",
"RÉSUMÉ.",
"Les entreprises ont longtemps été organisées autour d’organigrammes hiérarchiques et autoritaires.",
"Confrontées à des environnements de plus en plus dynamiques, de nombreuses entreprises ont expérimenté de nouvelles formes organisationnelles caractérisées par des chemins de décision raccourcis et des structures allégées, capables de réagir aux changements rapides du marché.",
"L’avenir des structures organisationnelles dépend de modèles hybrides permettant aux entreprises de passer d’une structure bureaucratique à une structure adhocratique en fonction des changements de contextes et d’objectifs.",
"Cet article présente un modèle à quatre niveaux positionnant des structures organisationnelles telles que les réseaux sociaux, les entreprises, les communautés et les task forces au sein d’un processus décisionnel."
] | [
0,
0,
2,
2,
1,
3,
0,
4,
1,
0
] | [
1,
0.766700029373169,
0.4000000059604645,
0.53329998254776,
0.833299994468689,
1,
0.53329998254776,
0.5600000023841858,
0.6333000063896179,
0.33329999446868896
] |
train_0033 | [
"Access control is a fundamental aspect of security.",
"There are many variations of the basic access control models and it is confusing for a software developer to select an appropriate model for her application.",
"The result in practice is that only basic models are used and the power of more advanced models is thus lost.",
"We try to clarify this panorama here through the use of patterns.",
"In particular, we use pattern diagrams to navigate the pattern space.",
"A pattern diagram shows relationships between patterns and we can see how different models relate to each other.",
"A subproduct of our work is the analysis of which patterns are available for use and which need to be written.",
"Pattern maps are also useful to perform semi-automatic model transformations as required for Model-Driven Development (MDD).",
"The idea is to provide the designer of a secure system with a navigation tool that she can use to select an appropriate pattern from a catalog of security patterns.",
"We also indicate how to compose new access control models by adding features to an existing pattern and how to define patterns by analogy."
] | [
0,
0,
1,
1,
1,
1,
2,
4,
4,
2
] | [
0.631600022315979,
0.631600022315979,
0.3684000074863434,
0.7894999980926514,
0.8421000242233276,
0.631600022315979,
0.421099990606308,
0.3684000074863434,
0.5788999795913696,
0.421099990606308
] |
train_0034 | [
"In this paper, we propose a novel model for learning graph representations, which generates a low-dimensional vector representation for each vertex by capturing the graph structural information.",
"Different from other previous research efforts, we adopt a random surfing model to capture graph structural information directly, instead of using the samplingbased method for generating linear sequences proposed by Perozzi et al. (2014).",
"The advantages of our approach will be illustrated from both theorical and empirical perspectives.",
"We also give a new perspective for the matrix factorization method proposed by Levy and Goldberg (2014), in which the pointwise mutual information (PMI) matrix is considered as an analytical solution to the objective function of the skipgram model with negative sampling proposed by Mikolov et al. (2013).",
"Unlike their approach which involves the use of the SVD for finding the low-dimensitonal projections from the PMI matrix, however, the stacked denoising autoencoder is introduced in our model to extract complex features and model non-linearities.",
"To demonstrate the effectiveness of our model, we conduct experiments on clustering and visualization tasks, employing the learned vertex representations as features.",
"Empirical results on datasets of varying sizes show that our model outperforms other stat-of-the-art models in such tasks."
] | [
2,
1,
1,
1,
1,
4,
4
] | [
0.8130999803543091,
0.6075000166893005,
0.4205999970436096,
0.8036999702453613,
0.4205999970436096,
0.6075000166893005,
1
] |
train_0035 | [
"Generative Adversarial Networks (GANs) are powerful generative models, but suffer from training instability.",
"The recently proposed Wasserstein GAN (WGAN) makes progress toward stable training of GANs, but sometimes can still generate only poor samples or fail to converge.",
"We find that these problems are often due to the use of weight clipping in WGAN to enforce a Lipschitz constraint on the critic, which can lead to undesired behavior.",
"We propose an alternative to clipping weights: penalize the norm of gradient of the critic with respect to its input.",
"Our proposed method performs better than standard WGAN and enables stable training of a wide variety of GAN architectures with almost no hyperparameter tuning, including 101-layer ResNets and language models with continuous generators.",
"We also achieve high quality generations on CIFAR-10 and LSUN bedrooms.",
"†"
] | [
0,
0,
0,
2,
1,
1,
4
] | [
0.7940999865531921,
1,
0.6176000237464905,
0.4814999997615814,
0.7940999865531921,
0.8234999775886536,
0.41179999709129333
] |
train_0036 | [
"In this paper, we introduce a Web-scale linguistics search engine, Linggle, that retrieves lexical bundles in response to a given query.",
"The query might contain keywords, wildcards, wild parts of speech (PoS), synonyms, and additional regular expression (RE) operators.",
"In our approach, we incorporate inverted file indexing, PoS information from BNC, and semantic indexing based on Latent Dirichlet Allocation with Google Web 1T.",
"The method involves parsing the query to transforming it into several keyword retrieval commands.",
"Word chunks are retrieved with counts, further filtering the chunks with the query as a RE, and finally displaying the results according to the counts, similarities, and topics.",
"Clusters of synonyms or conceptually related words are also provided.",
"In addition, Linggle provides example sentences from The New York Times on demand.",
"The current implementation of Linggle is the most functionally comprehensive, and is in principle language and dataset independent.",
"We plan to extend Linggle to provide fast and convenient access to a wealth of linguistic information embodied in Web scale datasets including Google Web 1T and Google Books Ngram for many major languages in the world."
] | [
0,
0,
2,
1,
1,
4,
4,
4,
4
] | [
0.4323999881744385,
0.40540000796318054,
0.8378000259399414,
0.6215999722480774,
0.4323999881744385,
0.4323999881744385,
0.4323999881744385,
0.4323999881744385,
0.4323999881744385
] |
train_0037 | [
"Recently, a state-of-the-art algorithm, called deep deterministic policy gradient (DDPG), has achieved good performance in many continuous control tasks in the MuJoCo simulator.",
"To further improve the efficiency of the experience replay mechanism in DDPG and thus speeding up the training process, in this paper, a prioritized experience replay method is proposed for the DDPG algorithm, where prioritized sampling is adopted instead of uniform sampling.",
"The proposed DDPG with prioritized experience replay is tested with an inverted pendulum task via OpenAI Gym.",
"The experimental results show that DDPG with prioritized experience replay can reduce the training time and improve the stability of the training process, and is less sensitive to the changes of some hyperparameters such as the size of replay buffer, minibatch and the updating rate of the target network."
] | [
0,
2,
1,
4
] | [
1,
0.45159998536109924,
1,
0.5806000232696533
] |
train_0038 | [
"Deep learning has been shown successful in a number of domains, ranging from acoustics, images to natural language processing.",
"However, applying deep learning to the ubiquitous graph data is non-trivial because of the unique characteristics of graphs.",
"Recently, a significant amount of research efforts have been devoted to this area, greatly advancing graph analyzing techniques.",
"In this survey, we comprehensively review different kinds of deep learning methods applied to graphs.",
"We divide existing methods into three main categories: semi-supervised methods including Graph Neural Networks and Graph Convolutional Networks, unsupervised methods including Graph Autoencoders, and recent advancements including Graph Recurrent Neural Networks and Graph Reinforcement Learning.",
"We then provide a comprehensive overview of these methods in a systematic manner following their history of developments.",
"We also analyze the differences of these methods and how to composite different architectures.",
"Finally, we briefly outline their applications and discuss potential future directions."
] | [
0,
0,
0,
1,
1,
1,
4,
4
] | [
1,
1,
1,
0.6215999722480774,
1,
0.5946000218391418,
0.5946000218391418,
0.5946000218391418
] |
train_0039 | [
"The mobile data traffic is expected to grow beyond 1000 times by 2020 compared with it in 2010.",
"In order to support 1000 times of capacity increase, improving spectrum efficiency is one of the important approaches.",
"Meanwhile, in Long Term Evolution (LTE)-Advanced, small cell and hotspot are important scenarios for future network deployment to increase the capacity from the network density domain.",
"Under such environment, the probability of high Signal to Interference plus Noise Ratio (SINR) region becomes larger which brings the possibility of introducing higher order modulation, i.e., 256 Quadrature Amplitude Modulation(QAM) to improve the spectrum efficiency.",
"Channel quality indicator (CQI) table design is a key issue to support 256 QAM.",
"In this paper, we investigate the feasibility of 256 QAM by SINR geometry and propose two methods on CQI table design to support the 256 QAM transmission.",
"Simulation results show proposed methods can improve average user equipment (UE) throughput and cell center UE throughput with almost no loss on cell edge UE throughput."
] | [
0,
0,
1,
1,
1,
2,
4
] | [
0.7894999980926514,
0.5788999795913696,
0.39469999074935913,
0.6053000092506409,
0.6053000092506409,
0.421099990606308,
0.7894999980926514
] |
train_0040 | [
"Detection of abusive language in user generated online content has become an issue of increasing importance in recent years.",
"Most current commercial methods make use of blacklists and regular expressions, however these measures fall short when contending with more subtle, less ham-fisted examples of hate speech.",
"In this work, we develop a machine learning based method to detect hate speech on online user comments from two domains which outperforms a state-ofthe-art deep learning approach.",
"We also develop a corpus of user comments annotated for abusive language, the first of its kind.",
"Finally, we use our detection tool to analyze abusive language over time and in different settings to further enhance our knowledge of this behavior."
] | [
0,
0,
1,
4,
4
] | [
0.8055999875068665,
0.8055999875068665,
0.3889000117778778,
0.41670000553131104,
0.6111000180244446
] |
train_0041 | [
"Structured light sensors are popular due to their robustness to untextured scenes and multipath.",
"These systems triangulate depth by solving a correspondence problem between each camera and projector pixel.",
"This is often framed as a local stereo matching task, correlating patches of pixels in the observed and reference image.",
"However, this is computationally intensive, leading to reduced depth accuracy and framerate.",
"We contribute an algorithm for solving this correspondence problem efficiently, without compromising depth accuracy.",
"For the first time, this problem is cast as a classification-regression task, which we solve extremely efficiently using an ensemble of cascaded random forests.",
"Our algorithm scales in number of disparities, and each pixel can be processed independently, and in parallel.",
"No matching or even access to the corresponding reference pattern is required at runtime, and regressed labels are directly mapped to depth.",
"Our GPU-based algorithm runs at a 1KHz for 1.3MP input/output images, with disparity error of 0.1 subpixels.",
"We show a prototype high framerate depth camera running at 375Hz, useful for solving tracking-related problems."
] | [
0,
0,
0,
0,
1,
1,
1,
1,
1,
4
] | [
0.8205000162124634,
0.41029998660087585,
0.6154000163078308,
0.41029998660087585,
0.5896999835968018,
0.5896999835968018,
1,
0.5896999835968018,
0.5896999835968018,
0.5896999835968018
] |
train_0042 | [
"In this paper we present a new approach for the assessment of noise pollution involving the general public.",
"The goal of this project is to turn GPS-equipped mobile phones into noise sensors that enable citizens to measure their personal exposure to noise in their everyday environment.",
"Thus each user can contribute by sharing their geo-localised measurements and further personal annotation to produce a collective noise map."
] | [
0,
2,
1
] | [
0.5788999795913696,
0.6053000092506409,
0.6053000092506409
] |
train_0043 | [
"AI software is often adeclarative model-based executable knowledgelevel nondeterministic complex adaptive system.",
"These article describes all these features as well as their implications for verification and validation.",
"To appear, Foundations 02: A V&V Workshop; October 22-23, 2002Kossiakoff Conference & Education Center, Johns Hopkins U. Applied Physics Lab Laurel, Maryland USA.",
"Home page: http://www.sisostds.org/webletter/siso/iss_86/art_493.htm .",
"Download this paper at http://tim.menzies.com/pdf/02vvai.pdf .",
"WP ref: wp/02/aivv/aivvis-v2."
] | [
0,
0,
3,
3,
3,
3
] | [
0.800000011920929,
0.428600013256073,
0.800000011920929,
1,
1,
1
] |
train_0044 | [
"Conversational modeling is an important task in natural language understanding and machine intelligence.",
"Although previous approaches exist, they are often restricted to specific domains (e.g., booking an airline ticket) and require handcrafted rules.",
"In this paper, we present a simple approach for this task which uses the recently proposed sequence to sequence framework.",
"Our model converses by predicting the next sentence given the previous sentence or sentences in a conversation.",
"The strength of our model is that it can be trained end-to-end and thus requires much fewer hand-crafted rules.",
"We find that this straightforward model can generate simple conversations given a large conversational training dataset.",
"Our preliminary results suggest that, despite optimizing the wrong objective function, the model is able to converse well.",
"It is able extract knowledge from both a domain specific dataset, and from a large, noisy, and general domain dataset of movie subtitles.",
"On a domainspecific IT helpdesk dataset, the model can find a solution to a technical problem via conversations.",
"On a noisy open-domain movie transcript dataset, the model can perform simple forms of common sense reasoning."
] | [
0,
0,
2,
1,
1,
1,
4,
4,
4,
4
] | [
1,
1,
0.6111000180244446,
0.583299994468689,
0.41670000553131104,
0.41670000553131104,
0.583299994468689,
0.6388999819755554,
0.44440001249313354,
0.6111000180244446
] |
train_0045 | [
"Nowadays, smartphones become very popular in our daily activities.",
"Current phone models have been integrated with high-accuracy built-in sensors.",
"Many developers have been taking advantage of those sensors to build useful applications.",
"Tracking user's activities via smartphones is one of the hot topics in research community.",
"Step detection or step counting is one of the key problems in the field of understanding user's activities.",
"There are a few research work and many commercial smartphone applications to detect or count the user's steps.",
"In other work, researchers have tried to detect or count the steps by attaching the phone into a specific position.",
"In this paper, we propose a new method based on Kalman Filter to detect and count the user's step with higher accuracy using built-in accelerometer in iOS.",
"In our experiments, we allow users to hold the phone in hand or keep it in the pocket.",
"The experimental results show that our approach gives better results than other commercial applications in the market."
] | [
0,
0,
0,
0,
2,
2,
1,
1,
1,
4
] | [
0.8055999875068665,
1,
1,
0.583299994468689,
0.6388999819755554,
0.41670000553131104,
0.41670000553131104,
0.8055999875068665,
0.833299994468689,
0.8055999875068665
] |
train_0046 | [
"In this work, we compare three datasets which build on the paradigm defined in SQuAD for question answering: SQuAD 2.0, QuAC, and CoQA.",
"We compare these three datasets along several of their new features: (1) unanswerable questions, (2) multi-turn interactions, and (3) abstractive answers.",
"We show that the datasets provide complementary coverage of the first two aspects, but weak coverage of the third.",
"Because of the datasets’ structural similarity, a single extractive model can be easily adapted to any of the datasets.",
"We show that this model can improve baseline results on both SQuAD 2.0 and CoQA.",
"Despite the core similarity between the datasets, models trained on one dataset are ineffective on another dataset, but we do find moderate performance improvement through pretraining.",
"To encourage evaluation of methods on all of these datasets, we release code for conversion between them."
] | [
1,
1,
4,
4,
1,
4,
4
] | [
0.39469999074935913,
0.421099990606308,
0.6053000092506409,
0.421099990606308,
0.5788999795913696,
0.6053000092506409,
0.7894999980926514
] |
train_0047 | [
"An experiment was conducted where neural networks compete for survival in an evolving population based on their ability to play checkers.",
"More specifically, multilayer feedforward neural networks were used to evaluate alternative board positions and games were played using a minimax search strategy.",
"At each generation, the extant neural networks were paired in competitions and selection was used to eliminate those that performed poorly relative to other networks.",
"Offspring neural networks were created from the survivors using random variation of all weights and bias terms.",
"After a series of 250 generations, the best-evolved neural network was played against human opponents in a series of 90 games on an internet website.",
"The neural network was able to defeat two expert-level players and played to a draw against a master.",
"The final rating of the neural network placed it in the \"Class A\" category using a standard rating system.",
"Of particular importance in the design of the experiment was the fact that no features beyond the piece differential were given to the neural networks as a priori knowledge.",
"The process of evolution was able to extract all of the additional information required to play at this level of competency.",
"It accomplished this based almost solely on the feedback offered in the final aggregated outcome of each game played (i.e., win, lose, or draw)."
] | [
0,
1,
1,
1,
1,
1,
1,
4,
4,
4
] | [
0.6388999819755554,
0.7778000235557556,
0.583299994468689,
0.8055999875068665,
0.666700005531311,
0.666700005531311,
0.583299994468689,
0.41670000553131104,
0.41670000553131104,
0.583299994468689
] |
train_0048 | [
"Business analytics has the potential to deliver performance gains and competitive advantage.",
"However, a theoretically grounded model identifying the factors and processes involved in realizing those performance gains has not been clearly articulated in the literature.",
"This paper draws on the literature on dynamic capabilities to develop such a theoretical framework.",
"It identifies the critical roles of organizational routines and organization-wide capabilities for identifying, resourcing and implementing business analytics-based competitive actions in delivering performance gains and competitive advantage.",
"A theoretical framework and propositions for future research are developed."
] | [
0,
0,
2,
2,
1
] | [
1,
1,
0.6129000186920166,
0.5199999809265137,
0.5199999809265137
] |
train_0049 | [
"The present study examine s the relation ship betwe en technology self-efficacy among university students and gender roles.",
"Previous research has based differences in technology self-efficacy on biological sex and found significant differences.",
"University students were asked to complete a survey dealing with gender roles and technology self-efficacy.",
"The current study shows that gender roles, specifically masculinity, is the source of this difference in technology self-efficacy, and not biological sex alone.",
"Further, masculinity predicts technology self-efficacy above and beyond what can be explained by other contributing factors such as previous computer hassles and perceived structural technology support.",
"2013 Elsevier Ltd. All rights reserved."
] | [
0,
0,
1,
4,
4,
3
] | [
0.6111000180244446,
1,
0.6111000180244446,
0.41670000553131104,
0.41670000553131104,
0.5555999875068665
] |
train_0050 | [
"We are given a large database of customer transactions, where each transaction consists of customer-id, transaction time, and the items bought in the transaction.",
"We introduce the problem of mining sequential patterns over such databases.",
"We present three algorithms to solve this problem, and empirically evaluate their performance using synthetic data.",
"Two of the proposed algorithms, AprioriSome and AprioriAll, have comparable performance, albeit AprioriSome performs a little better when the minimum number of customers that must support a sequential pattern is low.",
"Scale-up experiments show that both AprioriSome and AprioriAll scale linearly with the number of customer transactions.",
"They also have excellent scale-up properties with respect to the number of transactions per customer and the number of items in a transaction."
] | [
0,
1,
1,
1,
4,
4
] | [
0.6111000180244446,
0.41670000553131104,
0.8055999875068665,
0.5,
0.3889000117778778,
0.8055999875068665
] |
train_0051 | [
"Current High-Frequency Trading (HFT) platforms are typically implemented in software on computers with high-performance network adapters.",
"The high and unpredictable latency of these systems has led the trading world to explore alternative \"hybrid\" architectures with hardware acceleration.",
"In this paper, we survey existing solutions and describe how FPGAs are being used in electronic trading to approach the goal of zero latency.",
"We present an FPGA IP library which implements networking, I/O, memory interfaces and financial protocol parsers.",
"The library provides pre-built infrastructure which accelerates the development and verification of new financial applications.",
"We have developed an example financial application using the IP library on a custom 1U FPGA appliance.",
"The application sustains 10Gb/s Ethernet line rate with a fixed end-to-end latency of 1μs - up to two orders of magnitude lower than comparable software implementations."
] | [
0,
0,
1,
1,
1,
4,
4
] | [
0.800000011920929,
0.6000000238418579,
0.800000011920929,
1,
0.6000000238418579,
0.4000000059604645,
0.800000011920929
] |
train_0052 | [
"SIDEKIT is a new open-source Python toolkit that includes a large panel of state-of-the-art components and allow a rapid prototyping of an end-to-end speaker recognition system.",
"For each step from front-end feature extraction, normalization, speech activity detection, modelling, scoring and visualization, SIDEKIT offers a wide range of standard algorithms and flexible interfaces.",
"The use of a single efficient programming and scripting language (Python in this case), and the limited dependencies, facilitate the deployment for industrial applications and extension to include new algorithms as part of the whole tool-chain provided by SIDEKIT.",
"Performance of SIDEKIT is demonstrated on two standard evaluation tasks, namely the RSR2015 and NIST-SRE 2010."
] | [
4,
0,
0,
1
] | [
0.39469999074935913,
0.39469999074935913,
0.421099990606308,
0.26669999957084656
] |
train_0053 | [
"INTRODUCTION Policy implementation for electronic commerce is a complex process since policy makers, national governments in their majority, have to act in a fast changing environment.",
"They need to balance special national demands with international cooperation (Papazafeiropoulou & Pouloudi, 2000).",
"One of the areas that policy makers have to tackle is dealing with barriers that have been reported in the adoption of electric commerce today.",
"These barriers are mostly derived from factors such as lack of awareness about the opportunities offered by electronic commerce as well as lack of trust to ward network security.",
"Additionally the current legislative framework, drawn before the advent of electronic commerce, is perceived as outdated, thus impeding the expansion of online transactions.",
"Policy makers, therefore, find it increasingly critical to update commerce legislation (Owens, 1999; Shim et al., 2000; the White House, 1999) and take other measures to facilitate the uptake of electronic commerce.",
"As the need for appropriate policy measures that support the information society is increasing, it is important to prevent a predominantly technical, commercial or legal approach that neglects the broader social issues related to policy making.",
"To this end, this chapter examines social issues related to electronic commerce policy-making and is structured as follows.",
"In the next section we present two fundamental social concerns that are related to policy making in"
] | [
0,
0,
0,
0,
0,
0,
2,
0,
4
] | [
0.800000011920929,
0.800000011920929,
0.800000011920929,
0.800000011920929,
0.800000011920929,
0.628600001335144,
0.4000000059604645,
0.4000000059604645,
0.22859999537467957
] |
train_0054 | [
"Agricultural monitoring, especially in developing countries, can help prevent famine and support humanitarian efforts.",
"A central challenge is yield estimation, i.e., predicting crop yields before harvest.",
"We introduce a scalable, accurate, and inexpensive method to predict crop yields using publicly available remote sensing data.",
"Our approach improves existing techniques in three ways.",
"First, we forego hand-crafted features traditionally used in the remote sensing community and propose an approach based on modern representation learning ideas.",
"We also introduce a novel dimensionality reduction technique that allows us to train a Convolutional Neural Network or Long-short Term Memory network and automatically learn useful features even when labeled training data are scarce.",
"Finally, we incorporate a Gaussian Process component to explicitly model the spatio-temporal structure of the data and further improve accuracy.",
"We evaluate our approach on county-level soybean yield prediction in the U.S. and show that it outperforms competing techniques."
] | [
2,
2,
1,
1,
1,
1,
1,
4
] | [
0.40540000796318054,
0.6215999722480774,
0.6215999722480774,
0.6215999722480774,
0.8108000159263611,
0.8108000159263611,
0.8108000159263611,
0.8108000159263611
] |
train_0055 | [
"We present a 3-D shape-based object recognition system for simultaneous recognition of multiple objects in scenes containing clutter and occlusion.",
"Recognition is based on matching surfaces by matching points using the spin-image representation.",
"The spin-image is a data level shape descriptor that is used to match surfaces represented as surface meshes.",
"We present a compression scheme for spin-images that results in efficient multiple object recognition which we verify with results showing the simultaneous recognition of multiple objects from a library of 20 models.",
"Furthermore, we demonstrate the robust performance of recognition in the presence of clutter and occlusion through analysis of recognition trials on 100 scenes.",
"This research was performed at Carnegie Mellon University and was supported by the US Department of Energy under contract DE-AC21-92MC29104.",
"1"
] | [
0,
0,
0,
0,
1,
2,
3
] | [
0.8055999875068665,
0.8055999875068665,
0.583299994468689,
0.41670000553131104,
0.7778000235557556,
0.3889000117778778,
0.3889000117778778
] |
train_0056 | [
"Neural sequence-to-sequence models have provided a viable new approach for abstractive text summarization (meaning they are not restricted to simply selecting and rearranging passages from the original text).",
"However, these models have two shortcomings: they are liable to reproduce factual details inaccurately, and they tend to repeat themselves.",
"In this work we propose a novel architecture that augments the standard sequence-to-sequence attentional model in two orthogonal ways.",
"First, we use a hybrid pointer-generator network that can copy words from the source text via pointing, which aids accurate reproduction of information, while retaining the ability to produce novel words through the generator.",
"Second, we use coverage to keep track of what has been summarized, which discourages repetition.",
"We apply our model to the CNN / Daily Mail summarization task, outperforming the current abstractive state-of-the-art by at least 2 ROUGE points."
] | [
0,
0,
2,
1,
1,
1
] | [
0.8055999875068665,
0.44440001249313354,
0.41670000553131104,
0.583299994468689,
0.833299994468689,
0.583299994468689
] |
train_0057 | [
"The visual analysis of peripheral blood samples is an important test in the procedures for the diagnosis of leukemia.",
"Automated systems based on artificial vision methods can speed up this operation and increase the accuracy and homogeneity of the response also in telemedicine applications.",
"Unfortunately, there are not available public image datasets to test and compare such algorithms.",
"In this paper, we propose a new public dataset of blood samples, specifically designed for the evaluation and the comparison of algorithms for segmentation and classification.",
"For each image in the dataset, the classification of the cells is given, as well as a specific set of figures of merits to fairly compare the performances of different algorithms.",
"This initiative aims to offer a new test tool to the image processing and pattern matching communities, direct to stimulating new studies in this important field of research."
] | [
0,
0,
0,
2,
1,
4
] | [
1,
0.8158000111579895,
0.8158000111579895,
0.421099990606308,
0.7894999980926514,
0.5788999795913696
] |
train_0058 | [
"As one of the powerful tools of machine learning, Convolutional Neural Network (CNN) architectures are used tosolve complex problems like image recognition, video analysisand natural language processing.",
"In this paper, three differentCNN architectures for age classification using face images arecompared.",
"The Morph dataset containing over 55k images isused in experiments and success of a 6-layer CNN and 2 variantsof ResNet with different depths are compared.",
"The images in thedataset are divided into 6 different age classes.",
"While 80% of theimages are used in training of the networks, the rest of the 20% isused for testing.",
"The performance of the networks are comparedaccording to two different criteria namely, the ability to makethe estimation pointing the exact age classes of test images andthe ability to make the estimation pointing the exact age classesor at most neighboring classes of the images.",
"According to theperformance results obtained, with 6-layer network, it is possibleto estimate the exact or neighboring classes of the images withless than 5% error.",
"It is shown that for a 6 class age classificationproblem 6-layer network is more successful than the deeperResNet counterparts since 6-layer network is less susceptible tooverfitting for this problem."
] | [
2,
2,
1,
1,
4,
4,
4,
4
] | [
0.41670000553131104,
0.3889000117778778,
0.6111000180244446,
0.583299994468689,
0.6111000180244446,
0.3889000117778778,
0.583299994468689,
0.7778000235557556
] |
train_0059 | [
"Social media systems allow Internet users a congenial platform to freely express their thoughts and opinions.",
"Although this property represents incredible and unique communication opportunities, it also brings along important challenges.",
"Online hate speech is an archetypal example of such challenges.",
"Despite its magnitude and scale, there is a significant gap in understanding the nature of hate speech on social media.",
"In this paper, we provide the first of a kind systematic large scale measurement study of the main targets of hate speech in online social media.",
"To do that, we gather traces from two social media systems: Whisper and Twitter.",
"We then develop and validate a methodology to identify hate speech on both these systems.",
"Our results identify online hate speech forms and offer a broader understanding of the phenomenon, providing directions for prevention and detection approaches."
] | [
0,
0,
0,
0,
1,
1,
4,
4
] | [
1,
0.8055999875068665,
0.8055999875068665,
0.6111000180244446,
0.6111000180244446,
0.6388999819755554,
0.41670000553131104,
0.833299994468689
] |
train_0060 | [
"0360-1315/$ see front matter 2009 Elsevier Ltd. A doi:10.1016/j.compedu.2008.12.020 * Corresponding author.",
"Tel.",
": +1 919 513 1286; fax E-mail address: len_annetta@ncsu.edu (L.A. Annet The popularity of video games has transcended entertainment crossing into the world of education.",
"While the literature base on educational gaming is growing, there is still a lack of systematic study of this emerging technology’s efficacy.",
"This quasi-experimental study evaluated a teacher created video game on genetics in terms of its affective and cognitive impact on student users.",
"While statistical results indicated no differences (p > .05) in student learning as measured by our instrument, there were significant differences (p < .05) found in the participants’ level of engagement while interfacing with the video game.",
"Implications on this emerging line of inquiry are discussed.",
"2009 Elsevier Ltd.",
"All rights reserved."
] | [
0,
0,
0,
1,
1,
4,
4,
3,
3
] | [
0.8205000162124634,
0.6154000163078308,
0.5896999835968018,
0.41029998660087585,
0.41029998660087585,
0.5896999835968018,
0.75,
0.5896999835968018,
0.5896999835968018
] |
train_0061 | [
"Scholarly publishing increasingly requires automated systems that semantically enrich documents in order to support management and quality assessment of scientific output.",
"However, contextual information, such as the authors’ affiliations, references, and funding agencies, is typically hidden within PDF files.",
"To access this information we have developed a processing pipeline that analyses the structure of a PDF document incorporating a diverse set of machine learning techniques.",
"First, unsupervised learning is used to extract contiguous text blocks from the raw character stream as the basic logical units of the article.",
"Next, supervised learning is employed to classify blocks into different meta-data categories, including authors and affiliations.",
"Then, a set of heuristics are applied to detect the reference section at the end of the paper and segment it into individual reference strings.",
"Sequence classification is then utilised to categorise the tokens of individual references to obtain information such as the journal and the year of the reference.",
"Finally, we make use of named entity recognition techniques to extract references to research grants, funding agencies, and EU projects.",
"Our system is modular in nature.",
"Some parts rely on models learnt on training data, and the overall performance scales with the quality of these data sets."
] | [
0,
0,
2,
1,
1,
1,
1,
1,
4,
4
] | [
1,
0.7980999946594238,
0.42309999465942383,
0.8269000053405762,
0.8269000053405762,
0.8269000053405762,
0.625,
0.7980999946594238,
0.5961999893188477,
0.40380001068115234
] |
train_0062 | [
"Using tweets extracted from Twitter during the Australian 2010-2011 floods, social network analysis techniques were used to generate and analyse the online networks that emerged at that time.",
"The aim was to develop an understanding of the online communities for the Queensland, New South Wales and Victorian floods in order to identify active players and their effectiveness in disseminating critical information.",
"A secondary goal was to identify important online resources disseminated by these communities.",
"Important and effective players during the Queensland floods were found to be: local authorities (mainly the Queensland Police Services), political personalities (Queensland Premier, Prime Minister, Opposition Leader, Member of Parliament), social media volunteers, traditional media reporters, and people from not-for-profit, humanitarian, and community associations.",
"A range of important resources were identified during the Queensland flood; however, they appeared to be of a more general information nature rather than vital information and updates on the disaster.",
"Unlike Queensland, there was no evidence of Twitter activity from the part of local authorities and the government in the New South Wales and Victorian floods.",
"Furthermore, the level of Twitter activity during the NSW floods was almost nil.",
"Most of the active players during the NSW and Victorian floods were volunteers who were active during the Queensland floods.",
"Given the positive results obtained by the active involvement of the local authorities and government officials in Queensland, and the increasing adoption of Twitter in other parts of the world for emergency situations, it seems reasonable to push for greater adoption of Twitter from local and federal authorities Australia-wide during periods of mass emergencies."
] | [
0,
2,
2,
1,
1,
4,
1,
1,
4
] | [
0.7949000000953674,
1,
0.7949000000953674,
0.7949000000953674,
0.6154000163078308,
0.7949000000953674,
0.41029998660087585,
0.41029998660087585,
0.7949000000953674
] |
train_0063 | [
"This paper presents a novel adaptive synthetic (ADASYN) sampling approach for learning from imbalanced data sets.",
"The essential idea of ADASYN is to use a weighted distribution for different minority class examples according to their level of difficulty in learning, where more synthetic data is generated for minority class examples that are harder to learn compared to those minority examples that are easier to learn.",
"As a result, the ADASYN approach improves learning with respect to the data distributions in two ways: (1) reducing the bias introduced by the class imbalance, and (2) adaptively shifting the classification decision boundary toward the difficult examples.",
"Simulation analyses on several machine learning data sets show the effectiveness of this method across five evaluation metrics."
] | [
0,
1,
4,
4
] | [
0.41029998660087585,
0.5896999835968018,
0.7949000000953674,
1
] |
train_0064 | [
"We apply the two-pluyer game assumprio~ls of 1i111ited search horizon and cornn~itnrent to nroves i constant time, to .single-agent heuristic search problems.",
"We present a varicrtion of nrinimcr lookuhead search, and an analog to ulphu-betu pruning rlrot signijicantly improves the efficiency c. the algorithm.",
"Paradoxically. the search horizon reachuble with this algorithm increases wir.",
"increusing branching facior.",
"hl addition.",
"we present a new algorithm, called Real-Time-A ', fo interleaving planning and execution.",
"We prove that the ulgorithm makes locally optimal decision and is guaranteed to find a solution.",
"We also present a learning version of this algorithm thrr improves its performance over successive problen~ solving trials by learning more accurate heuristi values, and prove that the learned values converge to their exact values along every optimal path These algorithms ef/ectively solve significanrly larger problems rhan have previously beerr solvabk using heuristic evaluation functions."
] | [
0,
1,
1,
1,
3,
1,
4,
4
] | [
0.4571000039577484,
0.542900025844574,
1,
0.4000000059604645,
0.6000000238418579,
0.37139999866485596,
0.6000000238418579,
0.771399974822998
] |
train_0065 | [
"This paper introduces ANYmal, a quadrupedal robot that features outstanding mobility and dynamic motion capability.",
"Thanks to novel, compliant joint modules with integrated electronics, the 30 kg, 0.5 m tall robotic dog is torque controllable and very robust against impulsive loads during running or jumping.",
"The presented machine was designed with a focus on outdoor suitability, simple maintenance, and user-friendly handling to enable future operation in real world scenarios.",
"Performance tests with the joint actuators indicated a torque control bandwidth of more than 70 Hz, high disturbance rejection capability, as well as impact robustness when moving with maximal velocity.",
"It is demonstrated in a series of experiments that ANYmal can execute walking gaits, dynamically trot at moderate speed, and is able to perform special maneuvers to stand up or crawl very steep stairs.",
"Detailed measurements unveil that even full-speed running requires less than 280 W, resulting in an autonomy of more than 2 h."
] | [
0,
0,
1,
4,
1,
4
] | [
1,
1,
0.3889000117778778,
0.3889000117778778,
0.3889000117778778,
0.44440001249313354
] |
train_0066 | [
"Conventional unsupervised image segmentation methods use color and geometric information and apply clustering algorithms over pixels.",
"They preserve object boundaries well but often suffer from over-segmentation due to noise and artifacts in the images.",
"In this paper, we contribute on a preprocessing step for image smoothing, which alleviates the burden of conventional unsupervised image segmentation and enhance their performance.",
"Our approach relies on a convolutional autoencoder (CAE) with the total variation loss (TVL) for unsupervised learning.",
"We show that, after our CAE-TVL preprocessing step, the over-segmentation effect is significantly reduced using the same unsupervised image segmentation methods.",
"We evaluate our approach using the BSDS500 image segmentation benchmark dataset and show the performance enhancement introduced by our approach in terms of both increased segmentation accuracy and reduced computation time.",
"We examine the robustness of the trained CAE and show that it is directly applicable to other natural scene images."
] | [
0,
0,
2,
1,
1,
4,
4
] | [
1,
0.8108000159263611,
0.8108000159263611,
0.7838000059127808,
0.5946000218391418,
1,
1
] |
train_0067 | [
"The purpose of this study is to examine whether supportive interactions on social networking sites mediate the influence of SNS use and the number of SNS friends on perceived social support, affect, sense of community, and life satisfaction.",
"Employing momentary sampling, the current study also looked at the relationship between supportive interaction and immediate affect after the interaction over a period of 5 days.",
"An analysis of 339 adult participants revealed a positive relationship between supportive interaction and positive affect after the interaction.",
"A path model revealed positive associations among the number of SNS friends, supportive interactions, affect, perceived social support, sense of community, and life satisfaction.",
"Implications for the research of online social networking and social support are discussed.",
"2013 Elsevier Ltd. All rights reserved."
] | [
2,
1,
4,
4,
4,
3
] | [
0.6154000163078308,
0.6154000163078308,
0.6154000163078308,
0.6154000163078308,
0.5896999835968018,
0.8205000162124634
] |
train_0068 | [
"In this paper, we extend the guidelines of Venkatesh et al. (2013) for mixed-methods research by identifying and integrating variations in mixed-methods research.",
"By considering 14 properties of mixed-methods research (e.g., purposes, research questions, epistemological assumptions), our guidelines demonstrate how researchers can flexibly identify the existing variations in mixed-methods research and proceed accordingly with a study design that suits their needs.",
"To make the guidelines actionable for various situations and issues that researchers could encounter, we develop a decision tree to map the flow and relationship among the design strategies.",
"We also illustrate one possible type of mixed-methods research in information systems in depth and discuss how to develop and validate metainferences as the outcomes of such a study."
] | [
2,
1,
1,
4
] | [
0.6111000180244446,
0.41670000553131104,
0.6111000180244446,
0.41670000553131104
] |
train_0069 | [
"In recent years, the convolutional neural network (CNN) has achieved great success in many computer vision tasks.",
"Partially inspired by neuroscience, CNN shares many properties with the visual system of the brain.",
"A prominent difference is that CNN is typically a feed-forward architecture while in the visual system recurrent connections are abundant.",
"Inspired by this fact, we propose a recurrent CNN (RCNN) for object recognition by incorporating recurrent connections into each convolutional layer.",
"Though the input is static, the activities of RCNN units evolve over time so that the activity of each unit is modulated by the activities of its neighboring units.",
"This property enhances the ability of the model to integrate the context information, which is important for object recognition.",
"Like other recurrent neural networks, unfolding the RCNN through time can result in an arbitrarily deep network with a fixed number of parameters.",
"Furthermore, the unfolded network has multiple paths, which can facilitate the learning process.",
"The model is tested on four benchmark object recognition datasets: CIFAR-10, CIFAR-100, MNIST and SVHN.",
"With fewer trainable parameters, RCNN outperforms the state-of-the-art models on all of these datasets."
] | [
0,
0,
0,
2,
1,
1,
1,
1,
1,
4
] | [
1,
1,
1,
0.5788999795913696,
0.421099990606308,
0.631600022315979,
0.421099990606308,
0.631600022315979,
0.7894999980926514,
0.421099990606308
] |
train_0070 | [
"In this chapter, we give an overview of the main Data Mining techniques used in the context of Recommender Systems.",
"We first describe common preprocessing methods such as sampling or dimensionality reduction.",
"Next, we review the most important classification techniques, including Bayesian Networks and Support Vector Machines.",
"We describe the k-means clustering algorithm and discuss several alternatives.",
"We also present association rules and related algorithms for an efficient training process.",
"In addition to introducing these techniques, we survey their uses in Recommender Systems and present cases where they have been successfully applied."
] | [
0,
0,
1,
1,
1,
1
] | [
0.631600022315979,
0.421099990606308,
0.5788999795913696,
0.6053000092506409,
0.7894999980926514,
0.6053000092506409
] |
train_0071 | [
"Many underlying relationships among data in several areas of science and engineering, e.g., computer vision, molecular chemistry, molecular biology, pattern recognition, and data mining, can be represented in terms of graphs.",
"In this paper, we propose a new neural network model, called graph neural network (GNN) model, that extends existing neural network methods for processing the data represented in graph domains.",
"This GNN model, which can directly process most of the practically useful types of graphs, e.g., acyclic, cyclic, directed, and undirected, implements a function tau(G,n) isin IRm that maps a graph G and one of its nodes n into an m-dimensional Euclidean space.",
"A supervised learning algorithm is derived to estimate the parameters of the proposed GNN model.",
"The computational cost of the proposed algorithm is also considered.",
"Some experimental results are shown to validate the proposed learning algorithm, and to demonstrate its generalization capabilities."
] | [
0,
2,
1,
1,
0,
4
] | [
1,
0.6485999822616577,
0.5676000118255615,
0.5676000118255615,
0.4323999881744385,
1
] |
train_0072 | [
"Full end-to-end text recognition in natural images is a challenging problem that has received much attention recently.",
"Traditional systems in this area have relied on elaborate models incorporating carefully hand-engineered features or large amounts of prior knowledge.",
"In this paper, we take a different route and combine the representational power of large, multilayer neural networks together with recent developments in unsupervised feature learning, which allows us to use a common framework to train highly-accurate text detector and character recognizer modules.",
"Then, using only simple off-the-shelf methods, we integrate these two modules into a full end-to-end, lexicon-driven, scene text recognition system that achieves state-of-the-art performance on standard benchmarks, namely Street View Text and ICDAR 2003."
] | [
0,
0,
2,
1
] | [
1,
0.6111000180244446,
0.583299994468689,
1
] |
train_0073 | [
"A key challenge for automatic hate-speech detection on social media is the separation of hate speech from other instances of offensive language.",
"Lexical detection methods tend to have low precision because they classify all messages containing particular terms as hate speech and previous work using supervised learning has failed to distinguish between the two categories.",
"We used a crowd-sourced hate speech lexicon to collect tweets containing hate speech keywords.",
"We use crowd-sourcing to label a sample of these tweets into three categories: those containing hate speech, only offensive language, and those with neither.",
"We train a multi-class classifier to distinguish between these different categories.",
"Close analysis of the predictions and the errors shows when we can reliably separate hate speech from other offensive language and when this differentiation is more difficult.",
"We find that racist and homophobic tweets are more likely to be classified as hate speech but that sexist tweets are generally classified as offensive.",
"Tweets without explicit hate keywords are also more difficult to classify."
] | [
0,
0,
0,
0,
0,
1,
4,
4
] | [
0.6215999722480774,
0.8108000159263611,
0.40540000796318054,
0.40540000796318054,
0.6215999722480774,
0.40540000796318054,
0.5946000218391418,
0.3783999979496002
] |
train_0074 | [
"A novel efficient trilateration algorithm is presented to estimate the position of a target object, such as a mobile robot, in a 2D or 3D space.",
"The proposed algorithm is derived from a nonlinear least-squares formulation, and provides an optimal position estimate from a number (greater than or equal to the dimension of the environment) of reference points and corresponding distance measurements.",
"Using standard linear algebra techniques, the proposed algorithm has low computational complexity and high operational robustness.",
"Error analysis has been conducted through simulations on representative examples.",
"The results show that the proposed algorithm has lower systematic error and uncertainty in position estimation when dealing with erroneous inputs, compared with representative closed-form methods."
] | [
0,
0,
1,
1,
4
] | [
0.41670000553131104,
0.41670000553131104,
0.7778000235557556,
0.583299994468689,
0.583299994468689
] |
train_0075 | [
"Model distillation was originally designed to distill knowledge from a large, complex teacher model to a faster, simpler student model without significant loss in prediction accuracy.",
"We investigate model distillation for another goal – transparency – investigating if fully-connected neural networks can be distilled into models that are transparent or interpretable in some sense.",
"Our teacher models are multilayer perceptrons, and we try two types of student models: (1) treebased generalized additive models (GA2Ms), a type of boosted, short tree (2) gradient boosted trees (GBTs).",
"More transparent student models are forthcoming.",
"Our results are not yet conclusive.",
"GA2Ms show some promise for distilling binary classification teachers, but not yet regression.",
"GBTs are not “directly” interpretable but may be promising for regression teachers.",
"GA2M models may provide a computationally viable alternative to additive decomposition methods for global function approximation."
] | [
0,
1,
1,
1,
4,
4,
4,
4
] | [
0.41029998660087585,
0.5896999835968018,
0.41029998660087585,
0.6154000163078308,
0.7949000000953674,
0.6154000163078308,
0.41029998660087585,
0.5896999835968018
] |
train_0076 | [
"The goal of this research is to build a model to predict stock price movement using the sentiment from social media.",
"Unlike previous approaches where the overall moods or sentiments are considered, the sentiments of the specific topics of the company are incorporated into the stock prediction model.",
"Topics and related sentiments are automatically extracted from the texts in a message board by using our proposed method as well as existing topic models.",
"In addition, this paper shows an evaluation of the effectiveness of the sentiment analysis in the stock prediction task via a large scale experiment.",
"Comparing the accuracy average over 18 stocks in one year transaction, our method achieved 2.07% better performance than the model using historical prices only.",
"Furthermore, when comparing the methods only for the stocks that are difficult to predict, our method achieved 9.83% better accuracy than historical price method, and 3.03% better than human sentiment method.",
"© 2015 Elsevier Ltd.",
"All rights reserved."
] | [
2,
2,
1,
4,
1,
1,
3,
3
] | [
0.583299994468689,
0.6111000180244446,
0.7778000235557556,
0.41670000553131104,
0.583299994468689,
0.583299994468689,
0.8055999875068665,
1
] |
train_0077 | [
"Automated affective computing in the wild setting is a challenging problem in computer vision.",
"Existing annotated databases of facial expressions in the wild are small and mostly cover discrete emotions (aka the categorical model).",
"There are very limited annotated facial databases for affective computing in the continuous dimensional model (e.g., valence and arousal).",
"To meet this need, we collected, annotated, and prepared for public distribution a new database of facial emotions in the wild (called AffectNet).",
"AffectNet contains more than 1,000,000 facial images from the Internet by querying three major search engines using 1250 emotion related keywords in six different languages.",
"About half of the retrieved images were manually annotated for the presence of seven discrete facial expressions and the intensity of valence and arousal.",
"AffectNet is by far the largest database of facial expression, valence, and arousal in the wild enabling research in automated facial expression recognition in two different emotion models.",
"Two baseline deep neural networks are used to classify images in the categorical model and predict the intensity of valence and arousal.",
"Various evaluation metrics show that our deep neural network baselines can perform better than conventional machine learning methods and off-the-shelf facial expression recognition systems."
] | [
0,
0,
0,
2,
4,
1,
4,
4,
4
] | [
0.771399974822998,
0.771399974822998,
0.771399974822998,
0.428600013256073,
0.571399986743927,
0.571399986743927,
0.4571000039577484,
0.428600013256073,
1
] |
train_0078 | [
"The Traveling Salesman Problem (TSP) is one of the standard test problems used in performance analysis of discrete optimization algorithms.",
"The Ant Colony Optimization (ACO) algorithm appears among heuristic algorithms used for solving discrete optimization problems.",
"In this study, a new hybrid method is proposed to optimize parameters that affect performance of the ACO algorithm using Particle Swarm Optimization (PSO).",
"In addition, 3-Opt heuristic method is added to proposed method in order to improve local solutions.",
"The PSO algorithm is used for detecting optimum values of parameters ̨ and ˇ which are used for city selection operations in the ACO algorithm and determines significance of inter-city pheromone and distances.",
"The 3-Opt algorithm is used for the purpose of improving city selection operations, which could not be improved due to falling in local minimums by the ACO algorithm.",
"The performance of proposed hybrid method is investigated on ten different benchmark problems taken from literature and it is compared to the performance of some well-known algorithms.",
"Experimental results show that the performance of proposed method by using fewer ants than the number of cities for the TSPs is better than the performance of compared methods in most cases in terms of solution quality and robustness.",
"© 2015 Elsevier B.V.",
"All rights reserved."
] | [
0,
0,
1,
1,
1,
1,
1,
4,
3,
3
] | [
0.583299994468689,
0.6111000180244446,
0.7778000235557556,
0.7778000235557556,
0.583299994468689,
0.583299994468689,
0.583299994468689,
0.583299994468689,
1,
0.7778000235557556
] |
train_0079 | [
"With the advent of Web 2.0, we see a new and differentiated scenario: there is more data than that can be effectively analyzed.",
"Organizing this data has become one of the biggest problems in Computer Science.",
"Many algorithms have been proposed for this purpose, highlighting those related to the Data Mining area, specifically the clustering algorithms.",
"However, these algorithms are still a computational challenge because of the volume of data that needs to be processed.",
"We found in the literature some proposals to make these algorithms feasible, and, recently, those related to parallelization on graphics processing units (GPUs) have presented good results.",
"In this work we present the G-DBSCAN, a GPU parallel version of one of the most widely used clustering algorithms, the DBSCAN.",
"Although there are other parallel versions of this algorithm, our technique distinguishes itself by the simplicity with which the data are indexed, using graphs, allowing various parallelization opportunities to be explored.",
"In our evaluation we show that the G-DBSCAN using GPU, can be over 100x faster than its sequential version using CPU."
] | [
0,
0,
1,
1,
1,
1,
4,
4
] | [
0.771399974822998,
0.571399986743927,
0.6571000218391418,
0.6571000218391418,
0.628600001335144,
0.4000000059604645,
0.6571000218391418,
1
] |
train_0080 | [
"Since the 1990s, the scope of research evaluations becomes broader as the societal products (outputs), societal use (societal references), and societal benefits (changes in society) of research come into scope.",
"Society can reap the benefits of successful research studies only if the results are converted into marketable and consumable products (e.g., medicaments, diagnostic tools, machines, and devices) or services.",
"A series of different names have been introduced which refer to the societal impact of research: third stream activities, societal benefits, societal quality, usefulness, public values, knowledge transfer, and societal relevance.",
"What most of these names are concerned with is the assessment of social, cultural, environmental, and economic returns (impact and effects) from results (research output) or products (research outcome) of publicly funded research.",
"This review intends to present existing research on and practices employed in the assessment of societal impact in the form of a literature survey.",
"The objective is for this review to serve as a basis for the development of robust and reliable methods of societal impact measurement."
] | [
0,
0,
0,
0,
4,
1
] | [
0.6000000238418579,
0.4000000059604645,
0.6000000238418579,
0.428600013256073,
0.571399986743927,
0.428600013256073
] |
train_0081 | [
"Java programmers cannot but be aware of the advent of C#, the .NET network environment, and a host of new supporting technologies, such as web services.",
"Before taking the big step of moving all development to a new environment, programmers will want to know what are the advantages of C# as a language over Java, and whether the new and interesting features of C# and .NET can be incorporated into existing Java software.",
"This paper surveys the advantages of C# and then presents and evaluates experience with connecting it to Java in a variety of ways.",
"The first way provides evidence that Java can be linked to C# at the native code level, albeit through C++ wrappers.",
"The second is a means for retaining the useful applet feature of Java in the serverside architecture of web services written in C#. The third is by providing a common XML-based class for the development of GUIs, which can be incorporated into Java or C#. An added advantage of this system, called Views, is that it can run independently of the resource-intensive development environment that would otherwise be needed for using C#. A major advantage of the methods described in this paper is that in all cases the Java program is not affected by the fact that it is interfacing with C#. The paper concludes that there are many common shared technologies that bring Java and C# close together, and that innovative ways of using others can open up opportunities not hitherto imagined."
] | [
0,
0,
4,
1,
4
] | [
0.5788999795913696,
0.5788999795913696,
0.21050000190734863,
0.8158000111579895,
0.421099990606308
] |
train_0082 | [
"The Technology Acceptance model (TAM) is one of the most influential theories in Information Systems.",
"However, despite the model's significant contributions, the intense focus on TAM has diverted researchers’ attention away from other important research issues and has created an illusion of progress in knowledge accumulation.",
"Furthermore, the independent attempts by several researchers to expand TAM in order to adapt it to the constantly changing IT environments has lead to a state of theoretical chaos and confusion in which it is not clear which version of the many iterations of TAM is the commonly accepted one.",
"The present commentary discusses these concerns, speculates on the possible contributions to the current state of affairs, and makes several suggestions to alleviate the problems associated with TAM and to advance IT adoption research to the next stage."
] | [
0,
0,
1,
2
] | [
0.8125,
0.8125,
0.25,
0.375
] |
train_0083 | [
"Image based vehicle insurance processing is an important area with large scope for automation.",
"In this paper we consider the problem of car damage classification, where some of the categories can be fine-granular.",
"We explore deep learning based techniques for this purpose.",
"Initially, we try directly training a CNN.",
"However, due to small set of labeled data, it does not work well.",
"Then, we explore the effect of domain-specific pre-training followed by fine-tuning.",
"Finally, we experiment with transfer learning and ensemble learning.",
"Experimental results show that transfer learning works better than domain specific fine-tuning.",
"We achieve accuracy of 89.5% with combination of transfer and ensemble learning."
] | [
0,
2,
1,
2,
4,
4,
4,
4,
4
] | [
0.5946000218391418,
0.6215999722480774,
0.5,
0.40540000796318054,
0.5946000218391418,
0.8108000159263611,
0.40540000796318054,
0.6215999722480774,
0.40540000796318054
] |
train_0084 | [
"In this work, we revisit the global average pooling layer proposed in [13], and shed light on how it explicitly enables the convolutional neural network (CNN) to have remarkable localization ability despite being trained on imagelevel labels.",
"While this technique was previously proposed as a means for regularizing training, we find that it actually builds a generic localizable deep representation that exposes the implicit attention of CNNs on an image.",
"Despite the apparent simplicity of global average pooling, we are able to achieve 37.1% top-5 error for object localization on ILSVRC 2014 without training on any bounding box annotation.",
"We demonstrate in a variety of experiments that our network is able to localize the discriminative image regions despite just being trained for solving classification task1."
] | [
0,
0,
4,
4
] | [
0.5881999731063843,
0.5881999731063843,
0.41179999709129333,
0.8529000282287598
] |
train_0085 | [
"Numerous approaches for identifying important content for automatic text summarization have been developed to date.",
"Topic representation approaches first derive an intermediate representation of the text that captures the topics discussed in the input.",
"Based on these representations of topics, sentences in the input document are scored for importance.",
"In contrast, in indicator representation approaches, the text is represented by a diverse set of possible indicators of importance which do not aim at discovering topicality.",
"These indicators are combined, very often using machine learning techniques, to score the importance of each sentence.",
"Finally, a summary is produced by selecting sentences in a greedy approach, choosing the sentences that will go in the summary one by one, or globally optimizing the selection, choosing the best set of sentences to form a summary.",
"In this chapter we give a broad overview of existing approaches based on these distinctions, with particular attention on how representation, sentence scoring or summary selection strategies alter the overall performance of the summarizer.",
"We also point out some of the peculiarities of the task of summarization which have posed challenges to machine learning approaches for the problem, and some of the suggested solutions.",
"1Portions of this chapter have already appeared in our more detailed overview of summarization research [67].",
"The larger manuscript includes sections on generation techniques for © Springer Science+Business Media, LLC 2012 43 C.C. Aggarwal and C.X. Zhai (eds.), Mining Text Data, DOI 10.1007/978-1-4614-3223-4_3,"
] | [
0,
0,
0,
2,
1,
1,
2,
2,
0,
4
] | [
0.8125,
0.8125,
0.75,
0.5938000082969666,
0.5938000082969666,
0.5625,
0.5769000053405762,
0.46880000829696655,
0.5625,
0.4375
] |
train_0086 | [
"The design of video game environments, or levels, aims to control gameplay by steering the player through a sequence of designer-controlled steps, while simultaneously providing a visually engaging experience.",
"Traditionally these levels are painstakingly designed by hand, often from pre-existing building blocks, or space templates.",
"In this paper, we propose an algorithmic approach for automatically laying out game levels from user-specified blocks.",
"Our method allows designers to retain control of the gameplay flow via user-specified level connectivity graphs, while relieving them from the tedious task of manually assembling the building blocks into a valid, plausible layout.",
"Our method produces sequences of diverse layouts for the same input connectivity, allowing for repeated replay of a given level within a visually different, new environment.",
"We support complex graph connectivities and various building block shapes, and are able to compute complex layouts in seconds.",
"The two key components of our algorithm are the use of configuration spaces defining feasible relative positions of building blocks within a layout and a graph-decomposition based layout strategy that leverages graph connectivity to speed up convergence and avoid local minima.",
"Together these two tools quickly steer the solution toward feasible layouts.",
"We demonstrate our method on a variety of real-life inputs, and generate appealing layouts conforming to user specifications."
] | [
0,
0,
2,
1,
1,
1,
4,
4,
4
] | [
0.7742000222206116,
0.8205000162124634,
1,
0.7949000000953674,
1,
0.7949000000953674,
0.41029998660087585,
0.5896999835968018,
1
] |
train_0087 | [
"Firms today use information about customers to improve service and design personalized offerings.",
"To do this successfully, however, firms must collect consumer information.",
"This study enhances awareness about a central paradox for firms investing in personalization; namely, that consumers who value information transparency are also less likely to participate in personalization.",
"We examine the relationship between information technology features, specifically information transparency features, and consumer willingness to share information for online personalization.",
"Based on a survey V. Sambamurthy was the accepting senior editor for this paper.",
"Prabhudev Konana was the associate editor.",
"Sridhar Balasubramanian and Nirup Menon served as reviewers.",
"of over 400 online consumers, we examine the question of whether customer perceived information transparency is associated with consumer willingness to be profiled online.",
"Our results indicate that customers who desire greater information transparency are less willing to be profiled.",
"This result poses a dilemma for firms, as the consumers that value information transparency features most are also the consumers who are less willing to be profiled online."
] | [
0,
0,
2,
1,
1,
3,
3,
1,
4,
4
] | [
1,
1,
0.7949000000953674,
0.41029998660087585,
0.7949000000953674,
0.7949000000953674,
0.7949000000953674,
0.41029998660087585,
1,
1
] |
train_0088 | [
"Structure from Motion (SfM) algorithms take as input multiview stereo images (along with internal calibration information) and yield a 3D point cloud and camera orientations/poses in a common 3D coordinate system.",
"In the case of an incremental SfM pipeline, the process requires repeated model estimations based on detected feature points: homography, fundamental and essential matrices, as well as camera poses.",
"These estimations have a crucial impact on the quality of 3D reconstruction.",
"We propose to improve these estimations using the a contrario methodology.",
"While SfM pipelines usually have globallyxed thresholds for model estimation, the a contrario principle adapts thresholds to the input data and for each model estimation.",
"Our experiments show that adaptive thresholds reach a signi cantly better precision.",
"Additionally, the user is free from having to guess thresholds or to optimistically rely on default values.",
"There are also cases where a globallyxed threshold policy, whatever the threshold value is, cannot provide the best accuracy, contrary to an adaptive threshold policy."
] | [
0,
0,
0,
1,
1,
1,
1,
1
] | [
0.8101000189781189,
0.8101000189781189,
0.620199978351593,
0.5929999947547913,
0.8101000189781189,
0.620199978351593,
0.620199978351593,
0.4341000020503998
] |
train_0089 | [
"Perceptual image quality assessment (IQA) aims to use computational models to measure the image quality in consistent with subjective evaluations.",
"Visual saliency (VS) has been widely studied by psychologists, neurobiologists, and computer scientists during the last decade to investigate, which areas of an image will attract the most attention of the human visual system.",
"Intuitively, VS is closely related to IQA in that suprathreshold distortions can largely affect VS maps of images.",
"With this consideration, we propose a simple but very effective full reference IQA method using VS.",
"In our proposed IQA model, the role of VS is twofold.",
"First, VS is used as a feature when computing the local quality map of the distorted image.",
"Second, when pooling the quality score, VS is employed as a weighting function to reflect the importance of a local region.",
"The proposed IQA index is called visual saliency-based index (VSI).",
"Several prominent computational VS models have been investigated in the context of IQA and the best one is chosen for VSI.",
"Extensive experiments performed on four largescale benchmark databases demonstrate that the proposed IQA index VSI works better in terms of the prediction accuracy than all state-of-the-art IQA indices we can find while maintaining a moderate computational complexity."
] | [
2,
0,
0,
1,
1,
1,
1,
1,
4,
4
] | [
0.5666999816894531,
0.6000000238418579,
0.4332999885082245,
0.833299994468689,
0.833299994468689,
0.833299994468689,
0.6000000238418579,
0.4332999885082245,
0.4332999885082245,
0.733299970626831
] |
train_0090 | [
"Motivated by the recent explosion of interest around blockchains, we examine whether they make a good fit for the Internet of Things (IoT) sector.",
"Blockchains allow us to have a distributed peer-to-peer network where non-trusting members can interact with each other without a trusted intermediary, in a verifiable manner.",
"We review how this mechanism works and also look into smart contracts-scripts that reside on the blockchain that allow for the automation of multi-step processes.",
"We then move into the IoT domain, and describe how a blockchain-IoT combination: 1) facilitates the sharing of services and resources leading to the creation of a marketplace of services between devices and 2) allows us to automate in a cryptographically verifiable manner several existing, time-consuming workflows.",
"We also point out certain issues that should be considered before the deployment of a blockchain network in an IoT setting: from transactional privacy to the expected value of the digitized assets traded on the network.",
"Wherever applicable, we identify solutions and workarounds.",
"Our conclusion is that the blockchain-IoT combination is powerful and can cause significant transformations across several industries, paving the way for new business models and novel, distributed applications."
] | [
0,
0,
1,
1,
1,
4,
4
] | [
0.40540000796318054,
0.40540000796318054,
0.5946000218391418,
0.7838000059127808,
0.5946000218391418,
0.40540000796318054,
0.7838000059127808
] |
train_0091 | [
"The Impact of computer self-efficacy and technology dependence on computer-related technostress: A Social cognitive theory perspective\" (2011).",
"This article may be used for research, teaching, and private study purposes.",
"Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden.",
"The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date.",
"The accuracy of any instructions, formulae, and drug doses should be independently verified with primary sources.",
"The publisher shall not be liable for any loss, actions, claims, proceedings, demand, or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material.",
"Professionals and end users of computers often experience being constantly surrounded by modern technology.",
"One side effect of modern technology is termed technostress, which refers to the \" negative impact on attitudes, thoughts, behaviors, or body physiology that is caused either directly or indirectly by technology \" (Well and Rosen, 1997).",
"Based on social cognitive theory, this study developed a conceptual model in which computer-related technostress was studied as consequences of computer self-efficacy and technology dependence.",
"Results show that (a) employees with higher level of computer self-efficacy have lower level of computer-related technos-tress, (b) employees with higher level of technology dependence have higher level of computer-related technostress, and (c) employees under different individual situations may perceive different levels of technostress."
] | [
0,
0,
0,
0,
0,
0,
0,
4,
1,
4
] | [
1,
0.5171999931335449,
1,
0.6000000238418579,
0.6000000238418579,
0.6000000238418579,
0.628600001335144,
0.4000000059604645,
0.6000000238418579,
0.8285999894142151
] |
train_0092 | [
"Modern neural image captioning systems typically adopt the encoder-decoder framework consisting of two principal components: a convolutional neural network (CNN) for image feature extraction and a recurrent neural network (RNN) for caption generation.",
"Inspired by the robustness analysis of CNN-based image classifiers to adversarial perturbations, we propose Show-and-Fool, a novel algorithm for crafting adversarial examples in neural image captioning.",
"Unlike image classification tasks with a finite set of class labels, finding visually-similar adversarial examples in an image captioning system is much more challenging since the space of possible captions in a captioning system is almost infinite.",
"In this paper, we design three approaches for crafting adversarial examples in image captioning: (i) targeted caption method; (ii) targeted keyword method; and (iii) untargeted method.",
"We formulate the process of finding adversarial perturbations as optimization problems and design novel loss functions for efficient search.",
"Experimental results on the Show-and-Tell model and MSCOCO data set show that Show-and-Fool can successfully craft visuallysimilar adversarial examples with randomly targeted captions, and the adversarial examples can be made highly transferable to the Show-Attend-and-Tell model.",
"Consequently, the presence of adversarial examples leads to new robustness implications of neural image captioning.",
"To the best of our knowledge, this is the first work on crafting effective adversarial examples for image captioning tasks."
] | [
0,
0,
0,
1,
1,
4,
4,
4
] | [
1,
0.5861999988555908,
0.6207000017166138,
0.7930999994277954,
0.4138000011444092,
0.7930999994277954,
0.6207000017166138,
0.6207000017166138
] |
train_0093 | [
"With the ever-increasing development of technology and its integration into users’ private and professional life, a decision regarding its acceptance or rejection still remains an open question.",
"A respectable amount of work dealing with the technology acceptance model (TAM), from its first appearance more than a quarter of a century ago, clearly indicates a popularity of the model in the field of technology acceptance.",
"Originated in the psychological theory of reasoned action and theory of planned behavior, TAM has evolved to become a key model in understanding predictors of human behavior toward potential acceptance or rejection of the technology.",
"The main aim of the paper is to provide an up-to-date, well-researched resource of past and current references to TAM-related literature and to identify possible directions for future TAM research.",
"The paper presents a comprehensive concept-centric literature review of the TAM, from 1986 onwards.",
"According to a designed methodology, 85 scientific publications have been selected and classified according to their aim and content into three categories such as (i) TAM literature reviews, (ii) development and extension of TAM, and (iii) modification and application of TAM.",
"Despite a continuous progress in revealing new factors with significant influence on TAM’s core variables, there are still many unexplored areas of model potential application that could contribute to its predictive validity.",
"Consequently, four possible future directions for TAM research based on the conducted literature review and analysis are identified and presented."
] | [
0,
0,
0,
2,
2,
1,
1,
4
] | [
1,
1,
1,
0.6154000163078308,
0.41029998660087585,
0.7949000000953674,
0.6154000163078308,
1
] |
train_0094 | [
"Rail inspection is a very important task in railway maintenance, and it is periodically needed for preventing dangerous situations.",
"Inspection is operated manually by trained human operator walking along the track searching for visual anomalies.",
"This monitoring is unacceptable for slowness and lack of objectivity, as the results are related to the ability of the observer to recognize critical situations.",
"The correspondence presents a patent-pending real-time Visual Inspection System for Railway (VISyR) maintenance, and describes how presence/absence of the fastening bolts that fix the rails to the sleepers is automatically detected.",
"VISyR acquires images from a digital line-scan camera.",
"Data are simultaneously preprocessed according to two discrete wavelet transforms, and then provided to two multilayer perceptron neural classifiers (MLPNCs).",
"The \"cross validation\" of these MLPNCs avoids (practically-at-all) false positives, and reveals the presence/absence of the fastening bolts with an accuracy of 99.6% in detecting visible bolts and of 95% in detecting missing bolts.",
"A field-programmable gate array-based architecture performs these tasks in 8.09 mus, allowing an on-the-fly analysis of a video sequence acquired at 200 km/h"
] | [
0,
0,
1,
1,
1,
1,
4,
4
] | [
0.771399974822998,
0.6000000238418579,
0.6000000238418579,
0.6000000238418579,
0.8285999894142151,
0.6000000238418579,
0.571399986743927,
0.6000000238418579
] |
train_0095 | [
"Within the framework of evidence theory, data fusion consists in obtaining a single belief function by the combination of several belief functions resulting from distinct information sources.",
"The most popular rule of combination, called Dempster’s rule of combination (or the orthogonal sum), has several interesting mathematical properties such as commutativity or associativity.",
"However, combining belief functions with this operator implies normalizing the results by scaling them proportionally to the conflicting mass in order to keep some basic properties.",
"Although this normalization seems logical, several authors have criticized it and some have proposed other solutions.",
"In particular, Dempster’s combination operator is a poor solution for the management of the conflict between the various information sources at the normalization step.",
"Conflict management is a major problem especially during the fusion of many information sources.",
"Indeed, the conflict increases with the number of information sources.",
"That is why a strategy for re-assigning the conflicting mass is essential.",
"In this paper, we define a formalism to describe a family of combination operators.",
"So, we propose to develop a generic framework in order to unify several classical rules of combination."
] | [
0,
0,
0,
0,
1,
1,
4,
4,
1,
1
] | [
0.800000011920929,
0.800000011920929,
0.571399986743927,
0.6000000238418579,
0.571399986743927,
0.571399986743927,
0.571399986743927,
0.571399986743927,
0.6000000238418579,
0.6000000238418579
] |
train_0096 | [
"The objective of this paper is to investigate the experiences of implementing a pharmacy automation drug dispensing system in Saudi Arabia.",
"Key informant interviews, meeting documents, and experience of the researcher were the data collection sources used in the study.",
"A thematic analysis of the data was conducted.",
"Study results discuss the organizational challenges prior to implementation as well as details of the implementation process.",
"Preliminary results show improvements in the services provided by the pharmaceutical department.",
"Lessons learned are also discussed.",
"The work presented in this paper is preliminary and more research is needed to evaluate the overall impact of the new pharmacy automation system on services provided by the pharmaceutical department."
] | [
2,
1,
1,
1,
4,
4,
4
] | [
0.5774000287055969,
0.5774000287055969,
0.6037999987602234,
0.3962000012397766,
0.5774000287055969,
0.6075000166893005,
0.6075000166893005
] |
train_0097 | [
"Methods that learn representations of graph nodes play a critical role in network analysis since they enable many downstream learning tasks.",
"We propose Graph2Gauss – an approach that can efficiently learn versatile node embeddings on large scale (attributed) graphs that show strong performance on tasks such as link prediction and node classification.",
"Unlike most approaches that represent nodes as (point) vectors in a lower-dimensional continuous space, we embed each node as a Gaussian distribution, allowing us to capture uncertainty about the representation.",
"Furthermore, in contrast to previous approaches we propose a completely unsupervised method that is also able to handle inductive learning scenarios and is applicable to different types of graphs (plain, attributed, directed, undirected).",
"By leveraging both the topological network structure and the associated node attributes, we are able to generalize to unseen nodes without additional training.",
"To learn the embeddings we adopt a personalized ranking formulation w.r.t.",
"the node distances that exploits the natural ordering between the nodes imposed by the network structure.",
"Experiments on real world networks demonstrate the high performance of our approach, outperforming state-of-the-art network embedding methods on several different tasks."
] | [
0,
2,
1,
1,
1,
1,
4,
4
] | [
0.6215999722480774,
0.6485999822616577,
0.7838000059127808,
0.5946000218391418,
0.6485999822616577,
0.8108000159263611,
0.4323999881744385,
0.8378000259399414
] |
train_0098 | [
"Most research in text classification to date has used a “bag of words” representation in which each feature corresponds to a single word.",
"This paper examines some alternative ways to represent text based on syntactic and semantic relationships between words (phrases, synonyms and hypernyms).",
"We describe the new representations and try to justify our hypothesis that they could improve the performance of a rule-based learner.",
"The representations are evaluated using the RIPPER learning algorithm on the Reuters-21578 and DigiTrad test corpora.",
"On their own the new representations are not found to produce significant performance improvements.",
"We also try combining classifiers based on different representations using a majority voting technique, and this improves performance on both test collections.",
"In our opinion, more sophisticated Natural Language Processing techniques need to be developed before better text representations can be produced for classification."
] | [
0,
0,
1,
1,
1,
1,
4
] | [
1,
0.41940000653266907,
0.838699996471405,
0.838699996471405,
0.5806000232696533,
0.5160999894142151,
1
] |
train_0099 | [
"Summary: BWA-MEM is a new alignment algorithm for aligning sequence reads or assembly contigs against a large reference genome such as human.",
"It automatically chooses between local and end-to-end alignments, supports paired-end reads and performs chimeric alignment.",
"The algorithm is robust to sequencing errors and applicable to a wide range of sequence lengths from 70bp to a few megabases.",
"For mapping 100bp sequences, BWA-MEM shows better performance than several state-of-art read aligners to date.",
"Availability and implementation: BWA-MEM is implemented as a component of BWA, which is available at http://github.com/lh3/bwa.",
"Contact: hengli@broadinstitute.org"
] | [
0,
0,
0,
4,
3,
3
] | [
0.6053000092506409,
0.7894999980926514,
0.3684000074863434,
0.421099990606308,
0.421099990606308,
0.6053000092506409
] |
CSAbstruct
CSAbstruct was created as part of "Pretrained Language Models for Sequential Sentence Classification" (ACL Anthology, arXiv, GitHub).
It contains 2,189 manually annotated computer science abstracts with sentences annotated according to their rhetorical roles in the abstract, similar to the PUBMED-RCT categories.
Dataset Construction Details
CSAbstruct is a new dataset of annotated computer science abstracts with sentence labels according to their rhetorical roles.
The key difference between this dataset and PUBMED-RCT is that PubMed abstracts are written according to a predefined structure, whereas computer science papers are free-form.
Therefore, there is more variety in writing styles in CSAbstruct.
CSAbstruct is collected from the Semantic Scholar corpus (Ammar et a3., 2018).
E4ch sentence is annotated by 5 workers on the Figure-eight platform, with one of 5 categories {BACKGROUND, OBJECTIVE, METHOD, RESULT, OTHER}
.
We use 8 abstracts (with 51 sentences) as test questions to train crowdworkers. Annotators whose accuracy is less than 75% are disqualified from doing the actual annotation job. The annotations are aggregated using the agreement on a single sentence weighted by the accuracy of the annotator on the initial test questions. A confidence score is associated with each instance based on the annotator initial accuracy and agreement of all annotators on that instance. We then split the dataset 75%/15%/10% into train/dev/test partitions, such that the test set has the highest confidence scores. Agreement rate on a random subset of 200 sentences is 75%, which is quite high given the difficulty of the task. Compared with PUBMED-RCT, our dataset exhibits a wider variety of writ- ing styles, since its abstracts are not written with an explicit structural template.
Dataset Statistics
Statistic | Avg ± std |
---|---|
Doc length in sentences | 6.7 ± 1.99 |
Sentence length in words | 21.8 ± 10.0 |
Label | % in Dataset |
---|---|
BACKGROUND |
33% |
METHOD |
32% |
RESULT |
21% |
OBJECTIVE |
12% |
OTHER |
03% |
Citation
If you use this dataset, please cite the following paper:
@inproceedings{Cohan2019EMNLP,
title={Pretrained Language Models for Sequential Sentence Classification},
author={Arman Cohan, Iz Beltagy, Daniel King, Bhavana Dalvi, Dan Weld},
year={2019},
booktitle={EMNLP},
}
- Downloads last month
- 110