anchor
stringlengths
10
388
positive
stringlengths
8
386
Throughput and delay analysis of IEEE 802.11 protocol
Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement
Cause-Effect Relation Learning
yago : a core of semantic knowledge .
Cause-Effect Relation Learning
Learning dictionaries for information extraction by multi-level bootstrapping
Cause-Effect Relation Learning
Semantic Class Learning from the Web with Hyponym Pattern Linkage Graphs
PURE-LET Image Deconvolution
A New SURE Approach to Image Denoising: Interscale Orthonormal Wavelet Thresholding
PURE-LET Image Deconvolution
Bayesian-Based Iterative Method of Image Restoration*
Approximate Inference via Weighted Rademacher Complexity
Probabilistic Graphical Models: Principles and Techniques
Approximate Inference via Weighted Rademacher Complexity
A shortest augmenting path algorithm for dense and sparse linear assignment problems
Approximate Inference via Weighted Rademacher Complexity
Understanding Machine Learning: From Theory to Algorithms
A Novel Generalized Fuzzy Canonical Correlation Analysis Framework for Feature Fusion and Recognition
Statistical Pattern Recognition: A Review
A Novel Generalized Fuzzy Canonical Correlation Analysis Framework for Feature Fusion and Recognition
Kernel Methods for Pattern Analysis
Effect of mindfulness meditation on brain–computer interface performance
brain structures differ between musicians and non - musician .
Effect of mindfulness meditation on brain–computer interface performance
Meditation, mindfulness and cognitive flexibility
Effect of mindfulness meditation on brain–computer interface performance
Mindfulness meditation improves cognition: Evidence of brief mental training
Effect of mindfulness meditation on brain–computer interface performance
Increased auditory cortical representation in musicians.
Effect of mindfulness meditation on brain–computer interface performance
Music lessons enhance IQ
#nowplaying the future billboard: mining music listening behaviors of twitter users for hit song prediction
A tutorial on support vector regression
#nowplaying the future billboard: mining music listening behaviors of twitter users for hit song prediction
Want to be Retweeted? Large Scale Analytics on Factors Impacting Retweet in Twitter Network
#nowplaying the future billboard: mining music listening behaviors of twitter users for hit song prediction
Predicting Billboard Success Using Data-Mining in P2P Networks
Shape from periodic texture using the spectrogram
Computer Description of Textured Surfaces
A radiomics model from joint FDG-PET and MRI texture features for the prediction of lung metastases in soft-tissue sarcomas of the extremities
Radiomics: Extracting more information from medical images using advanced feature analysis
A radiomics model from joint FDG-PET and MRI texture features for the prediction of lung metastases in soft-tissue sarcomas of the extremities
Textural Features for Image Classification
A radiomics model from joint FDG-PET and MRI texture features for the prediction of lung metastases in soft-tissue sarcomas of the extremities
decoding tumour phenotype by noninvasive imaging using a quantitative radiomics approach .
Combining Computational Analyses and Interactive Visualization for Document Exploration and Sensemaking in Jigsaw
Visual opinion analysis of customer feedback data
Combining Computational Analyses and Interactive Visualization for Document Exploration and Sensemaking in Jigsaw
FacetAtlas: Multifaceted Visualization for Rich Text Corpora
Combining Computational Analyses and Interactive Visualization for Document Exploration and Sensemaking in Jigsaw
A Sentimental Education: Sentiment Analysis Using Subjectivity Summarization Based On Minimum Cuts
DLibOS: Performance and Protection with a Network-on-Chip
FlexSC: Flexible System Call Scheduling with Exception-Less System Calls
DLibOS: Performance and Protection with a Network-on-Chip
MICA: a holistic approach to fast in-memory key-value storage
DLibOS: Performance and Protection with a Network-on-Chip
U-Net: A User-Level Network Interface for Parallel and Distributed Computing
Very Deep Convolutional Networks for Natural Language Processing
Efficient Character-level Document Classification by Combining Convolution and Recurrent Layers
Very Deep Convolutional Networks for Natural Language Processing
Convolutional Neural Networks for Sentence Classification
Very Deep Convolutional Networks for Natural Language Processing
Identity Mappings in Deep Residual Networks
Very Deep Convolutional Networks for Natural Language Processing
A unified architecture for natural language processing: deep neural networks with multitask learning
Very Deep Convolutional Networks for Natural Language Processing
Sequence to Sequence Learning with Neural Networks
Mapping ground surface deformation using temporarily coherent point SAR interferometry: Application to Los Angeles Basin
Nonlinear subsidence rate estimation using permanent scatterers in differential SAR interferometry
Mapping ground surface deformation using temporarily coherent point SAR interferometry: Application to Los Angeles Basin
A small-baseline approach for investigating deformations on full-resolution differential SAR interferograms
Overview of the EVS codec architecture
Subjective quality evaluation of the 3GPP EVS codec
CALTRANSCENSE : A REAL-TIME SPEAKER IDENTIFICATION SYSTEM
An overview of text-independent speaker recognition: from features to supervectors
CALTRANSCENSE : A REAL-TIME SPEAKER IDENTIFICATION SYSTEM
Speaker verification using adapted Gaussian mixture models
Self-control and problematic mobile phone use in Chinese college students: the mediating role of mobile phone use patterns
Mobile phone addiction levels and negative emotions among Chinese young adults: The mediating role of interpersonal problems
Self-control and problematic mobile phone use in Chinese college students: the mediating role of mobile phone use patterns
Internet Addiction: The Emergence of a New Clinical Disorder
Self-control and problematic mobile phone use in Chinese college students: the mediating role of mobile phone use patterns
Leisure Boredom , Sensation Seeking , Self-esteem , Addiction Symptoms and Patterns of Mobile Phone Use
On Two Parameters for Denoising With Non-Local Means
Bilateral filtering for gray and color images
On Two Parameters for Denoising With Non-Local Means
a review of image denoising algorithms , with a new one .
On Two Parameters for Denoising With Non-Local Means
image denoising using scale mixtures of gaussians in the wavelet domain .
An Exploration of Style Transfer Using Deep Neural Networks
Automatic Portrait Segmentation for Image Stylization
An Exploration of Style Transfer Using Deep Neural Networks
Instance Normalization: The Missing Ingredient for Fast Stylization
An Exploration of Style Transfer Using Deep Neural Networks
nonlinear total variation based noise removal algorithms .
An Exploration of Style Transfer Using Deep Neural Networks
Texture Networks: Feed-forward Synthesis of Textures and Stylized Images
DeepNorm-A Deep Learning Approach to Text Normalization
Sequence to Sequence Learning with Neural Networks
DeepNorm-A Deep Learning Approach to Text Normalization
A Broad-Coverage Normalization System for Social Media Language
DeepNorm-A Deep Learning Approach to Text Normalization
Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation
Enhancement of optic cup to disc ratio detection in glaucoma diagnosis
Optic disk feature extraction via modified deformable model technique for glaucoma analysis
Enhancement of optic cup to disc ratio detection in glaucoma diagnosis
A model-based approach for automated feature extraction in fundus images
Detecting sources of computer viruses in networks: theory and experiment
Emergence of scaling in random networks
Detecting sources of computer viruses in networks: theory and experiment
Collective dynamics of ‘small-world’ networks
Detecting sources of computer viruses in networks: theory and experiment
The effect of network topology on the spread of epidemics
Feature-Rich Twitter Named Entity Recognition and Classification
Shared Tasks of the 2015 Workshop on Noisy User-generated Text: Twitter Lexical Normalization and Named Entity Recognition
Feature-Rich Twitter Named Entity Recognition and Classification
Enhancing Named Entity Recognition in Twitter Messages Using Entity Linking
Feature-Rich Twitter Named Entity Recognition and Classification
Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data
Feature-Rich Twitter Named Entity Recognition and Classification
Labeled LDA: A supervised topic model for credit attribution in multi-labeled corpora
Feature-Rich Twitter Named Entity Recognition and Classification
TwiNER: named entity recognition in targeted twitter stream
Biohybrid robot powered by an antagonistic pair of skeletal muscle tissues
Biological Soft Robotics.
Closing the AI Knowledge Gap
Microsoft COCO: Common Objects in Context
Closing the AI Knowledge Gap
Human-level control through deep reinforcement learning
Video Superresolution via Motion Compensation and Deep Residual Learning
A+: Adjusted Anchored Neighborhood Regression for Fast Super-Resolution
Video Superresolution via Motion Compensation and Deep Residual Learning
Compression Artifacts Reduction by a Deep Convolutional Network
Video Superresolution via Motion Compensation and Deep Residual Learning
Image and video upscaling from local self-examples
Video Superresolution via Motion Compensation and Deep Residual Learning
Robust Single Image Super-Resolution via Deep Networks With Sparse Prior
Mechanical Design of a Biomimetic Compliant Lower Limb Exoskeleton (BioComEx)
Robot assisted gait training with active leg exoskeleton (ALEX)
Mechanical Design of a Biomimetic Compliant Lower Limb Exoskeleton (BioComEx)
Biomechanical design of the Berkeley lower extremity exoskeleton (BLEEX)
Mechanical Design of a Biomimetic Compliant Lower Limb Exoskeleton (BioComEx)
Comparison of controllable transmission ratio type variable stiffness actuator with antagonistic and pre-tension type actuators for the joints exoskeleton robots
Applications of Machine Learning to Support Dementia Care through Commercially Available Off-the-Shelf Sensing
ImageNet: A large-scale hierarchical image database
Applications of Machine Learning to Support Dementia Care through Commercially Available Off-the-Shelf Sensing
The Kernel Least-Mean-Square Algorithm
P3: Toward Privacy-Preserving Photo Sharing
Finding a Needle in Haystack: Facebook's Photo Storage
P3: Toward Privacy-Preserving Photo Sharing
A fast MPEG video encryption algorithm
P3: Toward Privacy-Preserving Photo Sharing
SPORC: Group Collaboration using Untrusted Cloud Resources
COMP 322: Fundamentals of Parallel Programming Module 3: Locality and Distribution
CnC-CUDA: declarative programming for GPUs
COMP 322: Fundamentals of Parallel Programming Module 3: Locality and Distribution
Scalable Parallel Programming with CUDA
Part-level fully convolutional networks for pedestrian detection
Switchable Deep Network for Pedestrian Detection
Part-level fully convolutional networks for pedestrian detection
selective search for object recognition .
Part-level fully convolutional networks for pedestrian detection
Seeking the Strongest Rigid Detector
Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution
Automated Whitebox Fuzz Testing
Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution
CIVL: the concurrency intermediate verification language
Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution
Compositional dynamic test generation
Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution
Learning internal representations by error propagation
Education Analytics: Challenges and Approaches
Predicting Grades
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
AEG: Automatic Exploit Generation
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
Valgrind: a framework for heavyweight dynamic binary instrumentation
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
Statically-directed dynamic automated test generation
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
BitBlaze: A new approach to computer security via binary analysis
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs
predicting one ' s own forgetting : the role of experience - based and theory - based processes .
Why People Fail to Recognize Their Own Incompetence
Anomaly detection of Logo images in the mobile phone using convolutional autoencoder
A handwritten Chinese characters recognition method based on sample set expansion and CNN
Anomaly detection of Logo images in the mobile phone using convolutional autoencoder
What is the best multi-stage architecture for object recognition?
Anomaly detection of Logo images in the mobile phone using convolutional autoencoder
Improving neural networks by preventing co-adaptation of feature detectors
Anomaly detection of Logo images in the mobile phone using convolutional autoencoder
Stacked convolutional auto-encoders for hierarchical feature extraction
SimSensei demonstration: a perceptive virtual human interviewer for healthcare applications
Automatic nonverbal behavior indicators of depression and PTSD: the effect of gender
SimSensei demonstration: a perceptive virtual human interviewer for healthcare applications
Establishing the computer-patient working alliance in automated health behavior change interventions
SimSensei demonstration: a perceptive virtual human interviewer for healthcare applications
The Distress Analysis Interview Corpus of human and computer interviews