anchor
stringlengths 10
388
| positive
stringlengths 8
386
|
---|---|
L2P2: Location-aware location privacy protection for location-based services | Location Privacy in Pervasive Computing |
L2P2: Location-aware location privacy protection for location-based services | Feeling-based location privacy protection for location-based services |
HashKV: enabling efficient updates in KV storage via hashing | Atlas: Baidu's key-value storage system for cloud data |
HashKV: enabling efficient updates in KV storage via hashing | Workload analysis of a large-scale key-value store |
HashKV: enabling efficient updates in KV storage via hashing | A Light-weight Compaction Tree to Reduce I / O Amplification toward Efficient Key-Value Stores |
HashKV: enabling efficient updates in KV storage via hashing | Efficient identification of hot data for flash memory storage systems |
Continuous space language models | A Neural Probabilistic Language Model |
Continuous space language models | SRILM -- An extensible language modeling toolkit |
Colocation Data Center Demand Response Using Nash Bargaining Theory | Renewable and cooling aware workload management for sustainable data centers |
Colocation Data Center Demand Response Using Nash Bargaining Theory | Greening geographical load balancing |
how deep is your bag of words ? . | Besting the Quiz Master: Crowdsourcing Incremental Classification Games |
how deep is your bag of words ? . | Recurrent Convolutional Neural Networks for Discourse Compositionality |
how deep is your bag of words ? . | A Structured Vector Space Model for Word Meaning in Context |
how deep is your bag of words ? . | Improving neural networks by preventing co-adaptation of feature detectors |
Chinese Spelling Check Evaluation at SIGHAN Bake-off 2013 | Context based spelling correction |
Design of Novel Shaftless Pump-Jet Propulsor for Multi-Purpose Long-Range and High-Speed Autonomous Underwater Vehicle | Design and Performance Analysis of Superconducting Rim-Driven Synchronous Motors for Marine Propulsion |
Design of Novel Shaftless Pump-Jet Propulsor for Multi-Purpose Long-Range and High-Speed Autonomous Underwater Vehicle | Integrated Design and Realization of a Hubless Rim-driven Thruster |
Design of Novel Shaftless Pump-Jet Propulsor for Multi-Purpose Long-Range and High-Speed Autonomous Underwater Vehicle | Optimal design and multifield coupling analysis of propelling motor used in a novel integrated motor propeller |
Leadership theory and research in the new millennium: Current theoretical trends and changing perspectives | The toxic triangle: Destructive leaders, susceptible followers, and conducive environments. |
Leadership theory and research in the new millennium: Current theoretical trends and changing perspectives | The role of leadership in shared mental model convergence and team performance improvement: An agent-based computational model |
Appearance-based person reidentification in camera networks: problem overview and current approaches | A Computational Approach toEdgeDetection |
Appearance-based person reidentification in camera networks: problem overview and current approaches | Watersheds in Digital Spaces: An Efficient Algorithm Based on Immersion Simulations |
Combating Online In-Auction Fraud: Clues, Techniques and Challenges | Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior |
Combating Online In-Auction Fraud: Clues, Techniques and Challenges | Reputation Systems |
Margin based permutation variable importance: A stable importance measure for random forest | Bias in random forest variable importance measures: Illustrations, sources and a solution |
Margin based permutation variable importance: A stable importance measure for random forest | Robust biomarker identification for cancer diagnosis with ensemble feature selection methods |
Margin based permutation variable importance: A stable importance measure for random forest | Permutation importance: a corrected feature importance measure |
Active Decision Boundary Annotation with Deep Generative Models | Adversarial Feature Learning |
Active Decision Boundary Annotation with Deep Generative Models | Discriminative batch mode active learning |
Active Decision Boundary Annotation with Deep Generative Models | Heterogenous Uncertainty Sampling for Supervised Learning |
Active Decision Boundary Annotation with Deep Generative Models | Generative Visual Manipulation on the Natural Image Manifold |
A multichannel convolutional neural network for cross-language dialog state tracking | Improving neural networks by preventing co-adaptation of feature detectors |
A multichannel convolutional neural network for cross-language dialog state tracking | Character-Aware Neural Language Models |
A multichannel convolutional neural network for cross-language dialog state tracking | Character-level Convolutional Networks for Text Classification |
A multichannel convolutional neural network for cross-language dialog state tracking | Sequence to Sequence Learning with Neural Networks |
A multichannel convolutional neural network for cross-language dialog state tracking | Error Analysis of Statistical Machine Translation Output |
Understanding dopamine and reinforcement learning: The dopamine reward prediction error hypothesis | Reinforcement learning: The Good, The Bad and The Ugly |
Understanding dopamine and reinforcement learning: The dopamine reward prediction error hypothesis | Temporal Difference Models and Reward-Related Learning in the Human Brain |
Understanding dopamine and reinforcement learning: The dopamine reward prediction error hypothesis | Theoretical Neuroscience : Computational and Mathematical Modeling of Neural Systems |
Understanding dopamine and reinforcement learning: The dopamine reward prediction error hypothesis | A framework for mesencephalic dopamine systems based on predictive Hebbian learning |
2.65 GHz 340 W dual internally matched FETs for compact doherty power amplifiers | The Doherty Power Amplifier: Review of Recent Solutions and Trends |
2.65 GHz 340 W dual internally matched FETs for compact doherty power amplifiers | 2.6 GHz 4 watt GaN-HEMT two-stage power amplifier MMIC for LTE small-cell applications |
2.65 GHz 340 W dual internally matched FETs for compact doherty power amplifiers | An X-band 250W solid-state power amplifier using GaN power HEMTs |
e-Commerce product classification: our participation at cDiscount 2015 challenge | Scikit-learn: Machine Learning in Python |
e-Commerce product classification: our participation at cDiscount 2015 challenge | Large-scale item categorization for e-commerce |
Emerging topic detection using dictionary learning | Online Learning for Matrix Factorization and Sparse Coding |
Emerging topic detection using dictionary learning | Streaming First Story Detection with application to Twitter |
Emerging topic detection using dictionary learning | Probabilistic Latent Semantic Analysis |
GraphCT: Multithreaded Algorithms for Massive Graph Analysis | Massive Social Network Analysis: Mining Twitter for Social Good |
GraphCT: Multithreaded Algorithms for Massive Graph Analysis | SNAP, Small-world Network Analysis and Partitioning: An open-source parallel graph framework for the exploration of large-scale networks |
GraphCT: Multithreaded Algorithms for Massive Graph Analysis | Collective dynamics of ‘small-world’ networks |
GraphCT: Multithreaded Algorithms for Massive Graph Analysis | Exploring Network Structure, Dynamics, and Function using NetworkX |
Decentralizing attribute-based encryption | Multi-Authority Attribute Based Encryption |
Decentralizing attribute-based encryption | Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption |
Decentralizing attribute-based encryption | Attribute-based encryption for fine-grained access control of encrypted data |
Decentralizing attribute-based encryption | Fuzzy Identity-Based Encryption |
Sketch-based Geometric Monitoring of Distributed Stream Queries | Model-Driven Data Acquisition in Sensor Networks |
Sketch-based Geometric Monitoring of Distributed Stream Queries | adaptive stream resource management using kalman filters . |
Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs | iPlane: an information plane for distributed services |
Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs | Internet traffic classification using bayesian analysis techniques |
Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs | On Inferring Application Protocol Behaviors in Encrypted Network Traffic |
TROPE R HCRAESE R PAID I 2 D FACE RECOGNITION : AN EXPERIMENTAL AND REPRODUCIBLE RESEARCH SURVEY | Null space approach of Fisher discriminant analysis for face recognition |
TROPE R HCRAESE R PAID I 2 D FACE RECOGNITION : AN EXPERIMENTAL AND REPRODUCIBLE RESEARCH SURVEY | SCface – surveillance cameras face database |
TROPE R HCRAESE R PAID I 2 D FACE RECOGNITION : AN EXPERIMENTAL AND REPRODUCIBLE RESEARCH SURVEY | Low-dimensional procedure for the characterization of human faces |
TROPE R HCRAESE R PAID I 2 D FACE RECOGNITION : AN EXPERIMENTAL AND REPRODUCIBLE RESEARCH SURVEY | Robust real-time object detection |
Emergent Translation in Multi-Agent Communication | Dual Learning for Machine Translation |
Emergent Translation in Multi-Agent Communication | On the difficulty of training Recurrent Neural Networks |
Emergent Translation in Multi-Agent Communication | Deep Canonical Correlation Analysis |
Emergent Translation in Multi-Agent Communication | Multimodal Pivots for Image Caption Translation |
MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing | Fast crash recovery in RAMCloud |
MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing | Workload analysis of a large-scale key-value store |
MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing | Cache craftiness for fast multicore key-value storage |
MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing | FlashStore: High Throughput Persistent Key-Value Store |
SmaRT Visualisation of Legal Rules for Compliance | Making Sense of Regulations with SBVR |
Blockchain Consensus | (Leader/Randomization/Signature)-free Byzantine Consensus for Consortium Blockchains |
Blockchain Consensus | Implementing fault-tolerant services using the state machine approach: a tutorial |
Blockchain Consensus | Asynchronous byzantine agreement protocols |
ATM: A distributed, collaborative, scalable system for automated machine learning | TPOT: A Tree-Based Pipeline Optimization Tool for Automating Machine Learning |
ATM: A distributed, collaborative, scalable system for automated machine learning | Practical Bayesian Optimization of Machine Learning Algorithms |
ATM: A distributed, collaborative, scalable system for automated machine learning | Metalearning: Applications to Data Mining |
Light fidelity (Li-Fi): towards all-optical networking | Visible light communication using OFDM |
Light fidelity (Li-Fi): towards all-optical networking | Information Rate of OFDM-Based Optical Wireless Communication Systems With Nonlinear Distortion |
Sentiment analysis of the Uri terror attack using Twitter | Baselines and Bigrams: Simple, Good Sentiment and Topic Classification |
Sentiment analysis of the Uri terror attack using Twitter | A predictive model for the temporal dynamics of information diffusion in online social networks |
Sentiment analysis of the Uri terror attack using Twitter | Bad Is Stronger Than Good |
Improving neural networks by preventing co-adaptation of feature detectors | Adaptive Mixtures of Local Experts |
Improving neural networks by preventing co-adaptation of feature detectors | Gradient-Based Learning Applied to Document Recognition |
Improving neural networks by preventing co-adaptation of feature detectors | The Importance of Encoding Versus Training with Sparse Coding and Vector Quantization |
Improving neural networks by preventing co-adaptation of feature detectors | Bagging Predictors |
Improving neural networks by preventing co-adaptation of feature detectors | Training Products of Experts by Minimizing Contrastive Divergence |
Evolution of evasive malwares: A survey | Barecloud: bare-metal analysis-based evasive malware detection |
Evolution of evasive malwares: A survey | Full System Emulation : Achieving Successful Automated Dynamic Analysis of Evasive Malware ! |
Evolution of evasive malwares: A survey | SubVirt: implementing malware with virtual machines |
On the huge benefit of decisive moves in Monte-Carlo Tree Search algorithms | Algorithms for Infinitely Many-Armed Bandits |
High-power density hybrid converter topologies for low-power Dc-Dc SMPS | Analysis and Optimization of Switched-Capacitor DC–DC Converters |
High-power density hybrid converter topologies for low-power Dc-Dc SMPS | Switched-capacitor DC-DC converters for low-power on-chip applications |
A compact printed monopole antenna with symmetrical i and rectangular shaped slots for bluetooth/WLAN/WIMAX applications | Compact Multiresonator-Loaded Planar Antenna for Multiband Operation |
A compact printed monopole antenna with symmetrical i and rectangular shaped slots for bluetooth/WLAN/WIMAX applications | Dual-Band Probe-Fed Stacked Patch Antenna for GNSS Applications |
A compact printed monopole antenna with symmetrical i and rectangular shaped slots for bluetooth/WLAN/WIMAX applications | Design of Compact F-Shaped Slot Triple-Band Antenna for WLAN/WiMAX Applications |
DLMS/COSEM security level enhancement to construct secure advanced metering infrastructure | Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities |