anchor
stringlengths 10
388
| positive
stringlengths 8
386
|
---|---|
A Transforming Insurance Company and the 4 Types of Health Data Challenges that Arise: A Finnish Case Study | Research Commentary - The Digital Transformation of Healthcare: Current Status and the Road Ahead |
A Transforming Insurance Company and the 4 Types of Health Data Challenges that Arise: A Finnish Case Study | Bringing Big Data to Personalized Healthcare: A Patient-Centered Framework |
A Transforming Insurance Company and the 4 Types of Health Data Challenges that Arise: A Finnish Case Study | value of information systems and products : understanding the users ’ perspective and values . |
Human-level AI's Killer Application: Interactive Computer Games | Automated Intelligent Pilots for Combat Flight Simulation |
Human-level AI's Killer Application: Interactive Computer Games | The Cog Project : Building a Humanoid Robot |
Combining Misuse Cases with Attack Trees and Security Activity Models | Specifying reusable security requirements |
Combining Misuse Cases with Attack Trees and Security Activity Models | Eliciting security requirements with misuse cases |
Combining Misuse Cases with Attack Trees and Security Activity Models | Using abuse case models for security requirements analysis |
Neural network based attack on a masked implementation of AES | A time series approach for profiling attack |
Neural network based attack on a masked implementation of AES | black - box side - channel attacks highlight the importance of countermeasures - an analysis of the xilinx virtex - 4 and virtex - 5 bitstream encryption mechanism . |
Neural network based attack on a masked implementation of AES | Electromagnetic Analysis: Concrete Results |
Self-Compassion and Psychological Well-Being in Older Adults | Relation of threatened egotism to violence and aggression: The dark side of high self-esteem. |
Self-Compassion and Psychological Well-Being in Older Adults | Self-compassion versus global self-esteem: Two different ways of relating to oneself |
Concept Transfer Learning for Adaptive Language Understanding | Neural Models for Sequence Chunking |
Concept Transfer Learning for Adaptive Language Understanding | Attention-Based Recurrent Neural Network Models for Joint Intent Detection and Slot Filling |
Concept Transfer Learning for Adaptive Language Understanding | Supervised Sequence Labelling with Recurrent Neural Networks |
Concept Transfer Learning for Adaptive Language Understanding | Sequential Convolutional Neural Networks for Slot Filling in Spoken Language Understanding |
Concept Transfer Learning for Adaptive Language Understanding | What is left to be understood in ATIS? |
A fast, universal algorithm to learn parametric nonlinear embeddings | Learning a Nonlinear Embedding by Preserving Class Neighbourhood Structure |
A fast, universal algorithm to learn parametric nonlinear embeddings | learning a parametric embedding by preserving local structure . |
Down will Come Baby, Cradle and All: Diagnostic and Therapeutic Implications of Chronic Trauma on Child Development | Developmental traumatology part II: brain development |
Down will Come Baby, Cradle and All: Diagnostic and Therapeutic Implications of Chronic Trauma on Child Development | Relationship of childhood abuse and household dysfunction to many of the leading causes of death in adults. The Adverse Childhood Experiences (ACE) Study. |
Down will Come Baby, Cradle and All: Diagnostic and Therapeutic Implications of Chronic Trauma on Child Development | Neurobiological Sequelae of Childhood Trauma: Post-traumatic Stress Disorders in Children |
A theory of self-calibration of a moving camera | Camera Self-Calibration: Theory and Experiments |
Virtual reality and information technology for archaeological site promotion | Archeoguide: first results of an augmented reality, mobile computing system in cultural heritage sites |
Virtual reality and information technology for archaeological site promotion | an fft - based technique for translation , rotation , and scale - invariant image registration . |
An empirical study of multifactorial PSO and multifactorial DE | Enhancing Differential Evolution Utilizing Eigenvector-Based Crossover Operator |
An empirical study of multifactorial PSO and multifactorial DE | Evolutionary computation: Comments on the history and current state |
An empirical study of multifactorial PSO and multifactorial DE | Learning with Whom to Share in Multi-task Feature Learning |
Solving Single-digit Sudoku Subproblems | Metaheuristics can Solve Sudoku Puzzles |
Solving Single-digit Sudoku Subproblems | Dynamic Programming Treatment of the Travelling Salesman Problem |
Solving Single-digit Sudoku Subproblems | Linear Systems, Sparse Solutions, and Sudoku |
Detecting Integrity Attacks on SCADA Systems | Secure control against replay attacks |
Detecting Integrity Attacks on SCADA Systems | Research Challenges for the Security of Control Systems |
Detecting Integrity Attacks on SCADA Systems | A Plant-Wide Industrial Process Control Security Problem |
PointerPhone: Using Mobile Phones for Direct Pointing Interactions with Remote Displays | the smart phone : a ubiquitous input device . |
PointerPhone: Using Mobile Phones for Direct Pointing Interactions with Remote Displays | Augmented surfaces: a spatially continuous work space for hybrid computing environments |
PointerPhone: Using Mobile Phones for Direct Pointing Interactions with Remote Displays | SpeckleSense: fast, precise, low-cost and compact motion sensing using laser speckle |
PointerPhone: Using Mobile Phones for Direct Pointing Interactions with Remote Displays | Avoiding interference: how people use spatial separation and partitioning in SDG workspaces |
Keep Calm and Study Memes | Memes in a Digital World: Reconciling with a Conceptual Troublemaker |
Automatic Language Identification fromWritten Texts An Overview | N-Gram Based Text Categorization |
Automatic Language Identification fromWritten Texts An Overview | Automatic Detection and Language Identification of Multilingual Documents |
Frontal to profile face verification in the wild | From Few to many: Illumination cone models for face recognition under variable lighting and pose |
Frontal to profile face verification in the wild | Deeply learned face representations are sparse, selective, and robust |
Frontal to profile face verification in the wild | Face Description with Local Binary Patterns: Application to Face Recognition |
algorithm and technique on various edge detection : a survey . | A Computational Approach toEdgeDetection |
algorithm and technique on various edge detection : a survey . | Real-time Facial Expression Recognition Based on Adaptive Canny Operator Edge Detection |
Performance Optimization of Communication Subsystem in Scale-Out Distributed Storage | Performance Optimization for All Flash Scale-Out Storage |
Performance Optimization of Communication Subsystem in Scale-Out Distributed Storage | Ceph: a scalable, high-performance distributed file system |
A System for Automated Detection of Ampoule Injection Impurities | What is principal component analysis? |
A System for Automated Detection of Ampoule Injection Impurities | Particulate Matter in Injectable Drug Products |
A System for Automated Detection of Ampoule Injection Impurities | Extreme learning machine: Theory and applications |
Activity recognition and monitoring using multiple sensors on different body positions | Activity recognition from user-annotated acceleration data |
measuring user engagement . | The development and evaluation of a survey to measure user engagement |
measuring user engagement . | The Measurement of Web-Customer Satisfaction: An Expectation and Disconfirmation Approach |
measuring user engagement . | Theory and models for creating engaging and immersive ecommerce Websites |
measuring user engagement . | Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research |
Towards Open Set Deep Networks | Distance-Based Image Classification: Generalizing to New Classes at Near-Zero Cost |
Towards Open Set Deep Networks | Zero-Shot Learning Through Cross-Modal Transfer |
Towards Open Set Deep Networks | Fast, Accurate Detection of 100,000 Object Classes on a Single Machine |
Towards Open Set Deep Networks | Is object localization for free? - Weakly-supervised learning with convolutional neural networks |
Beyond Traditional DTN Routing: Social Networks for Opportunistic Communication | Epidemic Routing for Partially-Connected Ad Hoc Networks |
Beyond Traditional DTN Routing: Social Networks for Opportunistic Communication | Efficient routing in intermittently connected mobile networks: the multiple-copy case |
Beyond Traditional DTN Routing: Social Networks for Opportunistic Communication | MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks |
Intent Generation for Goal-Oriented Dialogue Systems based on Schema.org Annotations | Learning End-to-End Goal-Oriented Dialog |
Intent Generation for Goal-Oriented Dialogue Systems based on Schema.org Annotations | Verb Semantics And Lexical Selection |
Intent Generation for Goal-Oriented Dialogue Systems based on Schema.org Annotations | Efficient Estimation of Word Representations in Vector Space |
Intent Generation for Goal-Oriented Dialogue Systems based on Schema.org Annotations | An End-to-End Goal-Oriented Dialog System with a Generative Natural Language Response Generation |
two step credit risk assesment model for retail bank loan applications using decision tree data mining technique . | DATA MINING SYSTEM AND APPLICATIONS: A REVIEW |
two step credit risk assesment model for retail bank loan applications using decision tree data mining technique . | data preprocessing for supervised leaning . |
Lightweight Asynchronous Snapshots for Distributed Dataflows | TimeStream: reliable stream computation in the cloud |
3-D Road Boundary Extraction From Mobile Laser Scanning Data via Supervoxels and Graph Cuts | Using Mobile LiDAR Data for Rapidly Updating Road Markings |
3-D Road Boundary Extraction From Mobile Laser Scanning Data via Supervoxels and Graph Cuts | The 3D Hough Transform for plane detection in point clouds: A review and a new accumulator design |
A survey of domain adaptation for statistical machine translation | HMM-Based Word Alignment in Statistical Translation |
A survey of domain adaptation for statistical machine translation | A Statistical Approach to Machine Translation |
Advanced Low-Voltage Power MOSFET Technology for Power Supply in Package Applications | NexFET generation 2, new way to power |
Advanced Low-Voltage Power MOSFET Technology for Power Supply in Package Applications | Lateral power MOSFET for megahertz-frequency, high-density DC/DC converters |
Advanced Low-Voltage Power MOSFET Technology for Power Supply in Package Applications | Design considerations on low voltage synchronous power MOSFETs with monolithically integrated gate voltage pull-down circuitry |
Variational inference for Dirichlet process mixtures | a variational baysian framework for graphical models . |
Variational inference for Dirichlet process mixtures | Latent Dirichlet Allocation |
Variational inference for Dirichlet process mixtures | A Bayesian Analysis of Some Nonparametric Problems |
Variational inference for Dirichlet process mixtures | Gibbs Sampling Methods for Stick-Breaking Priors |
RNN Encoder Decoder 3 D Skeleton Converter 2 D Pose Sequence Generator Input Image 2 D Pose Heatmaps 3 D Skeleton Hourglass network | Articulated Human Detection with Flexible Mixtures of Parts |
RNN Encoder Decoder 3 D Skeleton Converter 2 D Pose Sequence Generator Input Image 2 D Pose Heatmaps 3 D Skeleton Hourglass network | Weakly-supervised Disentangling with Recurrent Transformations for 3D View Synthesis |
RNN Encoder Decoder 3 D Skeleton Converter 2 D Pose Sequence Generator Input Image 2 D Pose Heatmaps 3 D Skeleton Hourglass network | Marker-Less 3D Human Motion Capture with Monocular Image Sequence and Height-Maps |
Multiview Image Completion with Space Structure Propagation | Image-based rendering in the gradient domain |
Multiview Image Completion with Space Structure Propagation | Photo tourism: exploring photo collections in 3D |
Multiview Image Completion with Space Structure Propagation | Image inpainting |
Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things | Securing communication in 6LoWPAN with compressed IPsec |
Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things | A cooperative intrusion detection system for ad hoc networks |
Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things | Intrusion detection techniques in mobile ad hoc and wireless sensor networks |
Beyond Behaviorism : On the Automaticity of Higher Mental Processes | The Neural Network House: An Environment that Adapts to its Inhabitants |
Beyond Behaviorism : On the Automaticity of Higher Mental Processes | The Trouble of Thinking Activation and Application of Stereotypic Beliefs |
Beyond Behaviorism : On the Automaticity of Higher Mental Processes | flocks , herds , and schools : a distributed behavioral model . |
Beyond Behaviorism : On the Automaticity of Higher Mental Processes | COGNITIVE NEUROSCIENCE OF HUMAN MEMORY |
raiden11@IECSIL-FIRE-2018 : Named Entity Recognition for Indian Languages | Learning Word Vectors for 157 Languages |
raiden11@IECSIL-FIRE-2018 : Named Entity Recognition for Indian Languages | Named Entity Recognition and Classification in Kannada Language |
raiden11@IECSIL-FIRE-2018 : Named Entity Recognition for Indian Languages | Named Entity Recognition in Bengali: A Conditional Random Field Approach |
Phased Array for UAV Communications at 5.5 GHz | Substrate-Integrated Cavity-Backed Patch Arrays: A Low-Cost Approach for Bandwidth Enhancement |
L2P2: Location-aware location privacy protection for location-based services | Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking |