anchor
stringlengths 10
388
| positive
stringlengths 8
386
|
---|---|
Throughput and delay analysis of IEEE 802.11 protocol | Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement |
Cause-Effect Relation Learning | yago : a core of semantic knowledge . |
Cause-Effect Relation Learning | Learning dictionaries for information extraction by multi-level bootstrapping |
Cause-Effect Relation Learning | Semantic Class Learning from the Web with Hyponym Pattern Linkage Graphs |
PURE-LET Image Deconvolution | A New SURE Approach to Image Denoising: Interscale Orthonormal Wavelet Thresholding |
PURE-LET Image Deconvolution | Bayesian-Based Iterative Method of Image Restoration* |
Approximate Inference via Weighted Rademacher Complexity | Probabilistic Graphical Models: Principles and Techniques |
Approximate Inference via Weighted Rademacher Complexity | A shortest augmenting path algorithm for dense and sparse linear assignment problems |
Approximate Inference via Weighted Rademacher Complexity | Understanding Machine Learning: From Theory to Algorithms |
A Novel Generalized Fuzzy Canonical Correlation Analysis Framework for Feature Fusion and Recognition | Statistical Pattern Recognition: A Review |
A Novel Generalized Fuzzy Canonical Correlation Analysis Framework for Feature Fusion and Recognition | Kernel Methods for Pattern Analysis |
Effect of mindfulness meditation on brain–computer interface performance | brain structures differ between musicians and non - musician . |
Effect of mindfulness meditation on brain–computer interface performance | Meditation, mindfulness and cognitive flexibility |
Effect of mindfulness meditation on brain–computer interface performance | Mindfulness meditation improves cognition: Evidence of brief mental training |
Effect of mindfulness meditation on brain–computer interface performance | Increased auditory cortical representation in musicians. |
Effect of mindfulness meditation on brain–computer interface performance | Music lessons enhance IQ |
#nowplaying the future billboard: mining music listening behaviors of twitter users for hit song prediction | A tutorial on support vector regression |
#nowplaying the future billboard: mining music listening behaviors of twitter users for hit song prediction | Want to be Retweeted? Large Scale Analytics on Factors Impacting Retweet in Twitter Network |
#nowplaying the future billboard: mining music listening behaviors of twitter users for hit song prediction | Predicting Billboard Success Using Data-Mining in P2P Networks |
Shape from periodic texture using the spectrogram | Computer Description of Textured Surfaces |
A radiomics model from joint FDG-PET and MRI texture features for the prediction of lung metastases in soft-tissue sarcomas of the extremities | Radiomics: Extracting more information from medical images using advanced feature analysis |
A radiomics model from joint FDG-PET and MRI texture features for the prediction of lung metastases in soft-tissue sarcomas of the extremities | Textural Features for Image Classification |
A radiomics model from joint FDG-PET and MRI texture features for the prediction of lung metastases in soft-tissue sarcomas of the extremities | decoding tumour phenotype by noninvasive imaging using a quantitative radiomics approach . |
Combining Computational Analyses and Interactive Visualization for Document Exploration and Sensemaking in Jigsaw | Visual opinion analysis of customer feedback data |
Combining Computational Analyses and Interactive Visualization for Document Exploration and Sensemaking in Jigsaw | FacetAtlas: Multifaceted Visualization for Rich Text Corpora |
Combining Computational Analyses and Interactive Visualization for Document Exploration and Sensemaking in Jigsaw | A Sentimental Education: Sentiment Analysis Using Subjectivity Summarization Based On Minimum Cuts |
DLibOS: Performance and Protection with a Network-on-Chip | FlexSC: Flexible System Call Scheduling with Exception-Less System Calls |
DLibOS: Performance and Protection with a Network-on-Chip | MICA: a holistic approach to fast in-memory key-value storage |
DLibOS: Performance and Protection with a Network-on-Chip | U-Net: A User-Level Network Interface for Parallel and Distributed Computing |
Very Deep Convolutional Networks for Natural Language Processing | Efficient Character-level Document Classification by Combining Convolution and Recurrent Layers |
Very Deep Convolutional Networks for Natural Language Processing | Convolutional Neural Networks for Sentence Classification |
Very Deep Convolutional Networks for Natural Language Processing | Identity Mappings in Deep Residual Networks |
Very Deep Convolutional Networks for Natural Language Processing | A unified architecture for natural language processing: deep neural networks with multitask learning |
Very Deep Convolutional Networks for Natural Language Processing | Sequence to Sequence Learning with Neural Networks |
Mapping ground surface deformation using temporarily coherent point SAR interferometry: Application to Los Angeles Basin | Nonlinear subsidence rate estimation using permanent scatterers in differential SAR interferometry |
Mapping ground surface deformation using temporarily coherent point SAR interferometry: Application to Los Angeles Basin | A small-baseline approach for investigating deformations on full-resolution differential SAR interferograms |
Overview of the EVS codec architecture | Subjective quality evaluation of the 3GPP EVS codec |
CALTRANSCENSE : A REAL-TIME SPEAKER IDENTIFICATION SYSTEM | An overview of text-independent speaker recognition: from features to supervectors |
CALTRANSCENSE : A REAL-TIME SPEAKER IDENTIFICATION SYSTEM | Speaker verification using adapted Gaussian mixture models |
Self-control and problematic mobile phone use in Chinese college students: the mediating role of mobile phone use patterns | Mobile phone addiction levels and negative emotions among Chinese young adults: The mediating role of interpersonal problems |
Self-control and problematic mobile phone use in Chinese college students: the mediating role of mobile phone use patterns | Internet Addiction: The Emergence of a New Clinical Disorder |
Self-control and problematic mobile phone use in Chinese college students: the mediating role of mobile phone use patterns | Leisure Boredom , Sensation Seeking , Self-esteem , Addiction Symptoms and Patterns of Mobile Phone Use |
On Two Parameters for Denoising With Non-Local Means | Bilateral filtering for gray and color images |
On Two Parameters for Denoising With Non-Local Means | a review of image denoising algorithms , with a new one . |
On Two Parameters for Denoising With Non-Local Means | image denoising using scale mixtures of gaussians in the wavelet domain . |
An Exploration of Style Transfer Using Deep Neural Networks | Automatic Portrait Segmentation for Image Stylization |
An Exploration of Style Transfer Using Deep Neural Networks | Instance Normalization: The Missing Ingredient for Fast Stylization |
An Exploration of Style Transfer Using Deep Neural Networks | nonlinear total variation based noise removal algorithms . |
An Exploration of Style Transfer Using Deep Neural Networks | Texture Networks: Feed-forward Synthesis of Textures and Stylized Images |
DeepNorm-A Deep Learning Approach to Text Normalization | Sequence to Sequence Learning with Neural Networks |
DeepNorm-A Deep Learning Approach to Text Normalization | A Broad-Coverage Normalization System for Social Media Language |
DeepNorm-A Deep Learning Approach to Text Normalization | Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation |
Enhancement of optic cup to disc ratio detection in glaucoma diagnosis | Optic disk feature extraction via modified deformable model technique for glaucoma analysis |
Enhancement of optic cup to disc ratio detection in glaucoma diagnosis | A model-based approach for automated feature extraction in fundus images |
Detecting sources of computer viruses in networks: theory and experiment | Emergence of scaling in random networks |
Detecting sources of computer viruses in networks: theory and experiment | Collective dynamics of ‘small-world’ networks |
Detecting sources of computer viruses in networks: theory and experiment | The effect of network topology on the spread of epidemics |
Feature-Rich Twitter Named Entity Recognition and Classification | Shared Tasks of the 2015 Workshop on Noisy User-generated Text: Twitter Lexical Normalization and Named Entity Recognition |
Feature-Rich Twitter Named Entity Recognition and Classification | Enhancing Named Entity Recognition in Twitter Messages Using Entity Linking |
Feature-Rich Twitter Named Entity Recognition and Classification | Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data |
Feature-Rich Twitter Named Entity Recognition and Classification | Labeled LDA: A supervised topic model for credit attribution in multi-labeled corpora |
Feature-Rich Twitter Named Entity Recognition and Classification | TwiNER: named entity recognition in targeted twitter stream |
Biohybrid robot powered by an antagonistic pair of skeletal muscle tissues | Biological Soft Robotics. |
Closing the AI Knowledge Gap | Microsoft COCO: Common Objects in Context |
Closing the AI Knowledge Gap | Human-level control through deep reinforcement learning |
Video Superresolution via Motion Compensation and Deep Residual Learning | A+: Adjusted Anchored Neighborhood Regression for Fast Super-Resolution |
Video Superresolution via Motion Compensation and Deep Residual Learning | Compression Artifacts Reduction by a Deep Convolutional Network |
Video Superresolution via Motion Compensation and Deep Residual Learning | Image and video upscaling from local self-examples |
Video Superresolution via Motion Compensation and Deep Residual Learning | Robust Single Image Super-Resolution via Deep Networks With Sparse Prior |
Mechanical Design of a Biomimetic Compliant Lower Limb Exoskeleton (BioComEx) | Robot assisted gait training with active leg exoskeleton (ALEX) |
Mechanical Design of a Biomimetic Compliant Lower Limb Exoskeleton (BioComEx) | Biomechanical design of the Berkeley lower extremity exoskeleton (BLEEX) |
Mechanical Design of a Biomimetic Compliant Lower Limb Exoskeleton (BioComEx) | Comparison of controllable transmission ratio type variable stiffness actuator with antagonistic and pre-tension type actuators for the joints exoskeleton robots |
Applications of Machine Learning to Support Dementia Care through Commercially Available Off-the-Shelf Sensing | ImageNet: A large-scale hierarchical image database |
Applications of Machine Learning to Support Dementia Care through Commercially Available Off-the-Shelf Sensing | The Kernel Least-Mean-Square Algorithm |
P3: Toward Privacy-Preserving Photo Sharing | Finding a Needle in Haystack: Facebook's Photo Storage |
P3: Toward Privacy-Preserving Photo Sharing | A fast MPEG video encryption algorithm |
P3: Toward Privacy-Preserving Photo Sharing | SPORC: Group Collaboration using Untrusted Cloud Resources |
COMP 322: Fundamentals of Parallel Programming Module 3: Locality and Distribution | CnC-CUDA: declarative programming for GPUs |
COMP 322: Fundamentals of Parallel Programming Module 3: Locality and Distribution | Scalable Parallel Programming with CUDA |
Part-level fully convolutional networks for pedestrian detection | Switchable Deep Network for Pedestrian Detection |
Part-level fully convolutional networks for pedestrian detection | selective search for object recognition . |
Part-level fully convolutional networks for pedestrian detection | Seeking the Strongest Rigid Detector |
Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution | Automated Whitebox Fuzz Testing |
Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution | CIVL: the concurrency intermediate verification language |
Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution | Compositional dynamic test generation |
Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution | Learning internal representations by error propagation |
Education Analytics: Challenges and Approaches | Predicting Grades |
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. | AEG: Automatic Exploit Generation |
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. | Valgrind: a framework for heavyweight dynamic binary instrumentation |
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. | Statically-directed dynamic automated test generation |
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. | BitBlaze: A new approach to computer security via binary analysis |
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. | KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs |
predicting one ' s own forgetting : the role of experience - based and theory - based processes . | Why People Fail to Recognize Their Own Incompetence |
Anomaly detection of Logo images in the mobile phone using convolutional autoencoder | A handwritten Chinese characters recognition method based on sample set expansion and CNN |
Anomaly detection of Logo images in the mobile phone using convolutional autoencoder | What is the best multi-stage architecture for object recognition? |
Anomaly detection of Logo images in the mobile phone using convolutional autoencoder | Improving neural networks by preventing co-adaptation of feature detectors |
Anomaly detection of Logo images in the mobile phone using convolutional autoencoder | Stacked convolutional auto-encoders for hierarchical feature extraction |
SimSensei demonstration: a perceptive virtual human interviewer for healthcare applications | Automatic nonverbal behavior indicators of depression and PTSD: the effect of gender |
SimSensei demonstration: a perceptive virtual human interviewer for healthcare applications | Establishing the computer-patient working alliance in automated health behavior change interventions |
SimSensei demonstration: a perceptive virtual human interviewer for healthcare applications | The Distress Analysis Interview Corpus of human and computer interviews |