Dataset Viewer
Auto-converted to Parquet Duplicate
abstract
stringlengths
0
11.1k
authors
stringlengths
9
1.96k
title
stringlengths
4
353
__index_level_0__
int64
3
1,000k
In the field of automatic face recognition, transformations of facial features due to aging cause a problem. Due to small amounts of extracted features, the identity verification can be difficult. The feature-based methods that are present in the literature are still being developed, with unsatisfactory results caused ...
['Imad Mohamed Ouloul', 'Karim Afdel', 'Abdellah Amghar', 'Zakaria Moutakki']
Automatic face recognition with aging using the invariant features
920,519
Karyotyping, or visually examining and recording chromosomal abnormalities, is commonly used to diagnose and treat disease. Karyotypes are written in the International System for Human Cytogenetic Nomenclature (ISCN), a computationally non-readable language that precludes full analysis of these genomic data. In respons...
['Zachary Abrams', 'Andrea L. Peabody', 'Nyla A. Heerema', 'Philip R. O. Payne']
Text Mining and Data Modeling of Karyotypes to aid in Drug Repurposing Efforts.
795,517
Hardware implementation of conventional interval type-2 neuro-fuzzy systems with on-chip learning is essential for real time applications. However, existing implementations are resource consuming due to the complexity of their architectures and the use of iterative procedure for system output estimation. To overcome th...
['Manel Elloumi', 'Mohamed Krid', 'Dorra Sellami Masmoudi']
FPGA implementation of a new interval type-2 Beta neuro-fuzzy system with on-chip learning for image denoising application
824,474
['Reuven Bar-Yehuda', 'Gilad Kutiel', 'Dror Rawitz']
1.5-Approximation Algorithm for the 2-Convex Recoloring Problem
811,774
['Rajkumar Buyya']
A status report on IEEE Transactions on Cloud Computing
767,263
We adopt a previously developed model of deep syntactic and semantic processing to support question answering for Bahasa Indonesia, and extend it by adding a number of axioms designed to encode useful knowledge for answering questions, thus increasing the inferential power of the QA system. We believe this approach can...
['Rahmad Mahendra', 'Septina Dian Larasati', 'Ruli Manurung']
Extending an Indonesian Semantic Analysis-based Question Answering System with Linguistic and World Knowledge Axioms
458,853
In the original Gilbert model of random geometric graphs, nodes are placed according to a Poisson process, and links formed between those within a xed range. Motivated by wireless network applications \soft" or \probabilistic" connection models have recently been introduced, involving a \connection function" H(r) that ...
['Carl P. Dettmann', 'Orestis Georgiou']
Connectivity of networks with general connection functions
557,800
The University of Evora participation in QA@CLEF-2007 was based on the Senso question answer system. This system uses an ontology with semantic information to support some operations. The full text collection is indexed and for each question a search is performed for documents that may have one answer. There is an ad-h...
['José Saias', 'Paulo Quaresma']
The University of Évora's Participation in QA@CLEF-2007
555,787
This study aims to explore the use of technology in the classroom for teaching purposes in a university environment. The research provides evidence both on the use of the technological tool and the instructive task performed with it. Based on a survey of 112 professors, the tools were classified into items of mobile an...
['Albert Cubeles', 'David Riu']
Teachers' use of technology in the university classroom
955,566
This paper presents a novel technique for improving face recognition performance by predicting system failure, and, if necessary, perturbing eye coordinate inputs and repredicting failure as a means of selecting the optimal perturbation for correct classification. This relies on a method that can accurately identify pa...
['Terry P. Riopka', 'Terrance E. Boult']
Classification enhancement via biometric pattern perturbation
204,723
In smart building, services are stored as rules and achieved by rule analyzing and executing. However, the irrational contents of rules and conflicts between rules may bring confusion and maloperation in the rule system. In this paper, we propose a lightweight rule verification and resolution framework to solve the pro...
['Brandon Kyle Hamilton', 'M.R. Inggs', 'Hayden Kwok Hay So']
Scheduling Mixed-Architecture Processes in Tightly Coupled FPGA-CPU Reconfigurable Computers
214,556
We explore an optical network architecture which employs dense wavelength division multiplexing (WDM) technology and passive waveguide grating routers (WGRs) to establish a virtual topology based on lightpath communication. We examine the motivation and the technical challenges involved in this approach, propose and ex...
['Dhritiman Banerjee', 'Jeremy Frank', 'Biswanath Mukherjee']
Passive optical network architecture based on waveguide grating routing
127,803
One of the most famous algorithmic meta-theorems states that every graph property that can be defined by a sentence in counting monadic second order logic (CMSOL) can be checked in linear time for graphs of bounded treewidth, which is known as Courcelle's Theorem. These algorithms are constructed as finite state tree a...
['Lars Jaffke', 'Hans L. Bodlaender']
Definability equals recognizability for $k$-outerplanar graphs
591,672
We consider the problem of communication over a network containing a hidden and malicious adversary that can control a subset of network resources, and aims to disrupt communications. We focus on omniscient node-based adversary, i.e., the adversary can control a subset of nodes, and knows the message, network code and ...
['Peida Tian', 'Sidharth Jaggi', 'Mayank Bakshi', 'Oliver Kosut']
Arbitrarily varying networks: Capacity-achieving computationally efficient codes
723,553
A decimal notation satisfies many simple mathematical properties and it is a useful tool in the analysis of trees. A practical method is presented that compresses the decimal codes while maintaining the fast determination of relations (e.g. ancestor, descendant, brother, etc.). A special node, called a kernel node, inc...
['Jun-ichi Aoe']
An efficient algorithm of compressing decimal notations for tree structures
148,397
['Anneli Heimbürger', 'Jari Multisilta', 'Kai Ojansuu']
Time Contexts in Document-Driven Projects on the Web: From Time-Sensitive Links towards an Ontology of Time.
554,948
Human's judgment has been shown to be thin-sliced in nature, i.e., accurate perception can often be achieved for a short duration of exposure to expressive behaviors. In this work, we develop a mutual information-based framework to select the most emotion-rich 20% of local multimodal behavior segments within a 3-minute...
['Wei-Cheng Lin', 'Chi-Chun Lee']
A thin-slice perception of emotion? An information theoretic-based framework to identify locally emotion-rich behavior segments for global affect recognition
802,847
Environmental problems are complex in nature and are usually exacerbated by unsustainable trends that are driven by anthropogenic, economic and development factors. One of the key challenges of sustainability is the ability to examine the range of possible future paths of combined social and environmental conditions, u...
['Asmaa Mourhir', 'Tajjeeddine Rachidi', 'Mohammed Karim']
Employing Fuzzy Cognitive Maps to support environmental policy development
551,255
The purpose of this paper is to present a comparative study on the performance of altered fingerprint detection algorithms. Different algorithms from different institutions have been evaluated on two different datasets. Both datasets feature real alterations on fingers and the ground truth regarding the alteration is k...
['Rudolf Haraksim', 'Alexandre Anthonioz', 'Christophe Champod', 'Martin Olsen', 'John Ellingsgaard', 'Busch Christophe']
Altered fingerprint detection – algorithm performance evaluation
697,888
This research paper describes the design and prototyping of a simulation tool that provides a platform for studying how behavior of proteins in the cell membrane influences macro-level, emergent behaviors of cells. Whereas most current simulation tools model cells as homogeneous objects, this new tool is designed to mo...
['Terri Applewhite-Grosso', 'Nancy D. Griffeth', 'Elisa Lannon', 'Uchenna Unachukwu', 'Stephen Redenti', 'Naralys Batista']
A multi-scale, physics engine-based simulation of cellular migration
653,084
Efficient OFDM transmission has been limited by power amplifier (PA) non-linearity combined with OFDM's high peak-to-average power ratio (PAPR). We show that minimization of the PAPR of an OFDM signal, subject to constraints on allowable constellation error and out-of-band noise, can be formulated as a convex optimizat...
['Alok Aggarwal', 'Teresa H. Meng']
Minimizing the peak-to-average power ratio of OFDM signals via convex optimization
227,720
The design of variable fractional delay filter is investigated. First, the discrete Fourier transform (DFT) interpolation approach is described. Then, the Taylor series expansion and DFT interpolation formula are used to design the variable fractional delay filter which can be implemented by using Farrow structure. Fin...
['Chien-Cheng Tseng', 'Su-Ling Lee']
Closed-form design of variable fractional delay filter using discrete Fourier transform
251,128
['Fatemeh Raazaghi']
Auto-FAQ-Gen: Automatic Frequently Asked Questions Generation
621,578
In this paper, we consider a probabilistic model for real-time task systems with probabilistic worst-case execution times, probabilistic minimum inter-arrival times and probabilistic deadlines. We propose an analysis computing response time distributions of the tasks scheduled on one processor under a task-level fixed-...
['Dorin Maxim', 'Liliana Cucu-Grosjean']
Response Time Analysis for Fixed-Priority Tasks with Multiple Probabilistic Parameters
280,328
From September 21st to September 26th 2008, the Dagstuhl Seminar 08391 ``Social Web Communities'' was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented#R##N#their current research, and ongoing work and open problems were#R##N#discussed...
['Harith Alani', 'Steffen Staab', 'Gerd Stumme']
08391 Abstracts Collection - Social Web Communities.
762,341
The workflow programming paradigm has had a representative growth in the last years. This model is useful to represent flows of control and facilitate the complexity management of processes that have multiple dependent tasks. With the emergence of e-Science, workflow is becoming a standard for management of scientific ...
['Luiz F. Bittencourt', 'Edmundo Roberto Mauro Madeira']
Fulfilling Task Dependence Gaps for Workflow Scheduling on Grids
398,143
['Laura Po']
Automatic Lexical Annotation Applied to the SCARLET Ontology Matcher (Extended Abstract).
765,790
Parasitic capacitance in test hardware can affect the performance of a test and lead to poor fault coverage and/or yield loss. In an ATE setup, characterizing the stray capacitance using external instruments is difficult for practical reasons. In this paper, we present a single probe technique that uses available teste...
['A. Haider', 'P. Variyam', 'Abhijit Chatterjee', 'J. Ridley']
Measuring stray capacitance on tester hardware
462,150
['Wei Yang', 'Jiarong Shi', 'Xiuyun Zheng', 'Yongfeng Pang']
Hesitant interval-valued intuitionistic fuzzy linguistic sets and their applications
953,300
In this paper, we consider Distributed Estimation (DES) in a Wireless Sensor Network (WSN) and assume that the number of sensors in the WSN is larger than the available number of transmission slots. With classic DES, the sensors independently transmit the sampled digitized data. However, the WSN is an uplink multiuser ...
['Antonios Argyriou', 'Ozgu Alay']
Distributed Estimation in Wireless Sensor Networks With an Interference Canceling Fusion Center
679,889
We apply novel utility-based scheduling schemes to uplink single carrier frequency division multiple access (SC-FDMA) systems. Two utility functions are used for managing two dimensional resources (time and frequency): user data rate for maximizing system capacity and logarithmic user data rate for proportional fairnes...
['Junsung Lim', 'Hyung G. Myung', 'Kyungjin Oh', 'David J. Goodman']
PRoportional Fair Scheduling of Uplink Single-Carrier FDMA Systems
241,377
['Chelsea C. White']
Review of "Dynamic Programming and Stochastic Control" by Dimitri P. Bertsekas.
764,304
['Yuan Kong', 'Xiaolong Shi', 'Jinbang Xu', 'Xinquan Huang']
Reversible Spiking Neural P Systems with Astrocytes.
785,945
Self-organizing network (SON) technology aims at autonomously deploying, optimizing and repairing radio access networks (RANs). SON algorithms typically use key performance indicators (KPIs) from the RAN. It is shown that in certain cases, it is essential to take into account the impact of the backhaul state in the des...
['Abdoulaye Tall', 'Zwi Altman', 'Eitan Altman']
Self-Optimizing Load Balancing With Backhaul-Constrained Radio Access Networks
582,914
In this paper, we present DeFer --- a fast, high-quality and nonstochastic fixed-outline floorplanning algorithm. DeFer generates a non-slicing floorplan by compacting a slicing floorplan. To find a good slicing floorplan, instead of searching through numerous slicing trees by simulated annealing as in traditional ...
['Jackey Z. Yan', 'Chris Chu']
DeFer: deferred decision making enabled fixed-outline floorplanner
239,062
['Adam Shwartz', 'Balakrishna J. Prabhu', 'Gregory Miller', 'Konstantin Avrachenkov', 'Eitan Altman', 'Ishai Menache']
Dynamic Discrete Power Control in Cellular Networks
593,961
One of the problems of the development of document indexing and retrieval applications is the usage of hierarchies. In this paper we describe a method of automatic hierarchical indexing using the traditional relational data model. The main idea is to assign continuous numbers to the words (grammatical forms of the word...
['Alexander F. Gelbukh', 'Grigori Sidorov', 'Adolfo Guzmán-Arenas']
Relational Data Model in Document Hierarchical Indexing
396,942
To provide students with the opportunity to synthesize the knowledge and skills acquired from their prior courses into one final project, IT capstone projects have become an essential part of the IT curriculum. This paper presents the successes and challenges from the student groups with post-project survey and student...
['Chi Zhang', 'Ju An Wang']
Effects of communication, leadership, and team performance on successful IT capstone projects: a case study
178,694
In this paper, we target at four specific recommendation tasks in the academic environment: the recommendation for author coauthorships, paper citation recommendation for authors, paper citation recommendation for papers, and publishing venue recommendation for author-paper pairs. Different from previous work which tac...
['Zaihan Yang', 'Dawei Yin', 'Brian D. Davison']
Recommendation in Academia: A joint multi-relational model
96,240
The calibration of the Soil Moisture and Ocean Salinity (SMOS) payload instrument, known as Microwave Imaging Radiometer by Aperture Synthesis (MIRAS), is based on characterization measurements which are performed initially on-ground prior to launch and, subsequently, in-flight. A good calibration is a prerequisite to ...
['M.A. Brown', 'F. Torres', 'Ignasi Corbella', 'Andreas Colliander']
SMOS Calibration
666,312
Fusion of the functional image with an anatomical image provides additional diagnostic information. It is widely used in diagnosis, treatment planning, and follow-up of oncology. Functional image is a low-resolution pseudo color image representing the uptake of radioactive tracer that gives the important metabolic info...
['Padma Ganasala', 'Vinod Kumar', 'A. D. Prasad']
Performance Evaluation of Color Models in the Fusion of Functional and Anatomical Images
697,018
The Choquet integral is a powerful aggregation operator which lists many well-known models as its special cases. We look at these special cases and provide their axiomatic analysis. In cases where an axiomatization has been previously given in the literature, we connect the existing results with the framework that we h...
['Mikhail Timonin']
Choquet integral in decision analysis - lessons from the axiomatization
948,394
Motivation: Microarrays are capable of determining the expression levels of thousands of genes simultaneously. In combination with classification methods, this technology can be useful to support clinical management decisions for individual patients, e.g. in oncology. The aim of this paper is to systematically benchmar...
['Nathalie Pochet', 'Frank De Smet', 'Johan A. K. Suykens', 'Bart De Moor']
Systematic benchmarking of microarray data classification: assessing the role of non-linearity and dimensionality reduction
278,200
Regrasping must be performed whenever a robot's grasp of an object is not compatible with the pick-and-place operation the robot must perform. This paper presents a new approach to the problem of regrasping for a robot arm equipped with a parallel-jaw end-effector. The method employs an evaluated breadth-first search i...
['Frank Röhrdanz', 'Friedrich M. Wahl']
Generating and evaluating regrasp operations
450,432
Solutions of least squares support vector machines (LS-SVMs) are typically nonsparse. The sparseness is imposed by subsequently omitting data that introduce the smallest training errors and retraining the remaining data. Iterative retraining requires more intensive computations than training a single nonsparse LS-SVM. ...
['Xiang-Yan Zeng', 'Xue-wen Chen']
SMO-based pruning methods for sparse least squares support vector machines
452,876
The proliferation of smartphones nowadays has enabled many crowd assisted applications including audio-based sensing. In such applications, detected sound sources are meaningless without location information. However, it is challenging to localize sound sources accurately in a crowd using only microphones integrated in...
['Duc V. Le', 'Jacob W. Kamminga', 'Hans Scholten', 'Paul J. M. Havinga']
Nondeterministic sound source localization with smartphones in crowdsensing
716,751
In this paper, we discuss the evaluation of blind audio source separation (BASS) algorithms. Depending on the exact application, different distortions can be allowed between an estimated source and the wanted true source. We consider four different sets of such allowed distortions, from time-invariant gains to time-var...
['Emmanuel Vincent', 'Rémi Gribonval', 'Cédric Févotte']
Performance measurement in blind audio source separation
99,256
['Lydie Edward', 'Domitile Lourdeaux', 'Jean-Paul A. Barthès']
Simulation de comportements d'agents autonomes : Une architecture cognitive intégrant des facteurs physiques, physiologiques et de personnalité.
792,273
Physical viability, in particular energy efficiency, is a key challenge in realizing the true potential of Deep Neural Networks (DNNs). In this paper, we aim to incorporate the energy dimension as a design parameter in the higher-level hierarchy of DNN training and execution to optimize for the energy resources and con...
['Bita Darvish Rouhani', 'Azalia Mirhoseini', 'Farinaz Koushanfar']
DeLight: Adding Energy Dimension To Deep Neural Networks
849,698
Software security has become more and more critical as we are increasingly depending on the Internet, an untrustworthy computing environment. Software functionality and security are tightly related to each other, vulnerabilities due to design errors, inconsistencies, incompleteness, and missing constraints in system sp...
['Omar El Ariss', 'Jianfei Wu', 'Dianxiang Xu']
Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts
523,103
Background#R##N#Detecting and visualizing nonlinear interaction effects of single nucleotide polymorphisms (SNPs) or epistatic interactions are important topics in bioinformatics since they play an important role in unraveling the mystery of “missing heritability”. However, related studies are almost limited to pairwis...
['Junliang Shang', 'Yingxia Sun', 'Jin-Xing Liu', 'Junfeng Xia', 'Junying Zhang', 'Chun-Hou Zheng']
CINOEDV: a co-information based method for detecting and visualizing n-order epistatic interactions.
805,457
We propose a novel mixtures of Gaussian processes model in which the gating function is interconnected with a probabilistic logical model, in our case Markov logic networks. In this way, the resulting mixed graphical model, called Markov logic mixtures of Gaussian processes (MLxGP), solves joint Bayesian non-parametric...
['Martin Schiegg', 'Marion Neumann', 'Kristian Kersting']
Markov Logic Mixtures of Gaussian Processes: Towards Machines Reading Regression Data
566,687
['Evelina Giacchi', 'Aurelio La Corte', 'Eleonora Di Pietro']
A Dynamic and Context-aware Model of Knowledge Transfer and Learning using a Decision Making Perspective
730,736
With the emergence of medical IoT devices, it becomes feasible to collect and analyze medical contexts to assess health conditions, i.e. personal healthcare services. Toilet is a common device which people use regularly almost every day. Hence, we develop a toilet-based personal healthcare system with medical IoT devic...
['Moon Kwon Kim', 'Han Ter Jung', 'Soo Dong Kim', 'Hyun Jung La']
A Personal Health Index System with IoT Devices
966,684
The Atlanta Fire Rescue Department (AFRD), like many municipal fire departments, actively works to reduce fire risk by inspecting commercial properties for potential hazards and fire code violations. However, AFRD's fire inspection practices relied on tradition and intuition, with no existing data-driven process for pr...
['Michael A. Madaio', 'Shang-Tse Chen', 'Oliver L. Haimson', 'Wenwen Zhang', 'Xiang Cheng', 'Matthew Hinds-Aldrich', 'Duen Horng Chau', 'Bistra N. Dilkina']
Firebird: Predicting Fire Risk and Prioritizing Fire Inspections in Atlanta
656,799
['Linas Laibinis', 'Elena Troubitsyna']
A Contract-Based Approach to Ensuring Component Interoperability in Event-B.
848,020
['Ioannis Caragiannis', 'Evi Papaioannou', 'Christos Kaklamanis']
Online Call Admission Control in Wireless Cellular Networks.
767,079
The authors report on the use of the codebook-excited linear-predictive (CELP) algorithm for 32 kb/s low-delay (LD-CELP) coding of wideband speech. The main problem associated with wideband coding, namely, spectral noise weighting, is discussed. The authors propose an enhanced noise weighting technique and demonstrate ...
['Erik Ordentlich', 'Yair Shoham']
Low-delay code-excited linear-predictive coding of wideband speech at 32 kbps
148,939
This paper investigates the joint source-channel coding problem of sending a memoryless source over a memoryless degraded broadcast channel. An inner bound and an outer bound on the achievable distortion region are derived, which respectively generalize and unify several existing bounds. Moreover, when specialized to G...
['Lei Yu', 'Houqiang Li', 'Weiping Li']
Distortion bounds for source broadcast over degraded channel
729,183
In this paper we present an ecient discretization method for the solution of the unsteady incompressible Navier-Stokes equations based on a high order (Hybrid) Discontinuous Galerkin formulation. The crucial component for the eciency of the discretization method is the disctinction between sti linear parts and less sti...
['Christoph Lehrenfeld', 'Joachim Schöberl']
High order exactly divergence-free Hybrid Discontinuous Galerkin Methods for unsteady incompressible flows
578,714
The physical constraints of smartwatches limit the range and complexity of tasks that can be completed. Despite interface improvements on smartwatches, the promise of enabling productive work remains largely unrealized. This paper presents WearWrite , a system that enables users to write documents from their smartwatc...
['Michael Nebeling', 'Alexandra To', 'Anhong Guo', 'Adrian A. de Freitas', 'Jaime Teevan', 'Steven P. Dow', 'Jeffrey P. Bigham']
WearWrite: Crowd-Assisted Writing from Smartwatches
739,384
Inductive Logic Programming (ILP) is a combination of inductive learning and first-order logic aiming to learn first-order hypotheses from training examples. ILP has a serious bottleneck in an intractably enormous hypothesis search space. Thismakes existing approaches perform poorly on large-scale real-world datasets. ...
['Cholwich Nattee', 'Sukree Sinthupinyo', 'Masayuki Numao', 'Takashi Okada']
Inductive Logic Programming for Structure-Activity Relationship Studies on Large Scale Data
458,075
Abstract#R##N##R##N#Web-based open source software development (OSSD) project communities provide interesting and unique opportunities for software process modeling and simulation. While most studies focus on analyzing processes in a single organization, we focus on modeling software development processes both within a...
['Chris Jensen', 'Walt Scacchi']
Process modeling across the web information infrastructure
216,462
In the internet of things IoT applications, cooperative spectrum sensing of cognitive radio sensor networks CRSN may use electronic objects or sensor nodes to cooperatively detect the spectrum of primary user. How to effectively fuse the local detection data and make a global decision is critical for CRSN. In order to ...
['Wenjing Yue', 'Cong Wu', 'Zhi Chen']
Cooperative spectrum sensing based on side information for cognitive radio sensor networks in internet of things applications
899,723
In traditional B2C, customers' stocks are usually controlled by themselves, while the supplier needs only to meet requests of customers by sending right commodity on time. The operation mode results in disadvantages of hindering saving of cost and improvement of efficiency. Being one of the key contents in vendor manag...
['Xie Binglei', 'An Shi', 'Wang Jian']
Stochastic inventory routing problem under B2C e-commerce
41,644
Behavior and strategy of computers(COM) have recently attracted considerable attention with regards to video games, with the development of hardware and the spread of entertainment on the Internet. Previous studies have reported strategy-acquisition schemes for board games and fighting games. However, there have been f...
['Nobuto Fujii', 'Mitsuyo Hashida', 'Haruhiro Katayose']
Strategy-acquisition system for video trading card game
483,190
A single-user state-dependent channel with mismatched decoding is considered. Several setups are studied, which differ by the manner in which the state information is available to the encoder (causally or non-causally), and by whether or not the decoder is cognizant of the state sequence. We present achievable rates fo...
['Yafit Feldman', 'Anelia Somekh-Baruch']
Channels with state information and mismatched decoding
921,445
In order to automatically generate high-quality game levels, one needs to be able to automatically verify that the levels are playable. The simulation-based approach to playability testing uses an artificial agent to play through the level, but building such an agent is not always an easy task and such an agent is not ...
['Mohammad Hassan Farshbaf Shaker', 'Noor Shaker', 'Julian Togelius']
Evolving playable content for cut the rope through a simulation-based approach
573,122
A Sun-like star undergoes magnetic cyclic reversal shown by field lines colored by the longitudinal magnetic field. Shifts in positive and negative polarity demonstrate large-scale polarity changes in the star. One such cycle is shown, and at the end of the visualization, the magnetic poles are reversed. Wreath-like ar...
['Carson Brownlee', 'Benjamin P. Brown', 'John Clyne', 'Chems Touati', 'Kelly P. Gaither', 'Charles D. Hansen']
Stellar magnetism
674,179
The paper explores a generalization of conditional random elds (CRFs) in which binary stochastic hidden units appear between the data and the labels. Hidden-unit CRFs are potentially more powerful than standard CRFs because they can represent nonlinear dependencies at each frame. The hidden units in these models also l...
['Laurens van der Maaten', 'Max Welling', 'Lawrence K. Saul']
Hidden-Unit Conditional Random Fields
558,497
We define a framework for search and retrieval tasks using cooperating autonomous agents. The significance of this work is our experimental demonstration that specialising the functionality of these agents can lead to increased efficiency, flexibility and scalability. We describe a model of cooperating autonomous agent...
['Randall Fletcher', 'Dan Corbett']
A framework for search and retrieval tasks using specialised cooperating autonomous agents
264,028
We describe a formal verification framework and tool implementation, based upon cyclic proofs, for certifying the safe termination of imperative pointer programs with recursive procedures. Our assertions are symbolic heaps in separation logic with user defined inductive predicates; we employ explicit approximations ...
['Reuben N. S. Rowe', 'James Brotherston']
Automatic cyclic termination proofs for recursive procedures in separation logic
963,277
In mobile computing the location information of the objects is an important factor in providing customized services to the users. The location-based service (LBS) is one of the technologies providing the services adoptively according to the changed user position. The existing filtering technology employed in the typica...
['Sun Wook Kim', 'Kyu Bong Cho', 'Seungwok Han', 'Hee Yong Youn']
Efficient and Dynamic Location-based Event Service for Mobile Computing Environments
260,421
This paper describes an experiment investigating interactions in a big forum in order to support students in learning English. Groups of collaborating users form communities that generate a lot of data that can be analyzed. We distinguish different phases of the self-regulated learning process and aim to identify them ...
['Zinayida Petrushyna', 'Milos Kravcik', 'Ralf Klamma']
Learning Analytics for Communities of Lifelong Learners: A Forum Case
390,553
Molecular volume and molecular surface are expressed as a function of topological degree in alkane graphs. This allows not only a straightforward approach to calculate such physicochemical magnitudes but also an interpretation of the role of the local vertex invariant (LOVI) or valence degree, 6, as well as the connect...
['Jorge Galvez']
Prediction of molecular volume and surface of alkanes by molecular topology
576,641
RFID is one of the most prominent identification schemes in the field of pervasive systems. Nonline of sight capability makes RFID systems much better choice than its contended systems (such as barcode, magnetic tape, etc.). Since the RFID uses wireless channel for communication with its associated devices, there shoul...
['Umar Mujahid', 'Muhammad Najam-ul-Islam', 'Atif Raza Jafri', 'Qurat-ul-Ain', 'M. Ali Shami']
A new ultralightweight RFID mutual authentication protocol: SASI using recursive hash
646,875
The classic Costa's "writing on dirty paper" capacity result establishes that full state pre-cancellation can be attained in the Gel'fand-Pinsker channel with additive state and additive Gaussian noise. This result holds under the assumption that perfect channel knowledge is available at both transmitter and receiver: ...
['Stefano Rini', 'Shlomo Shamai']
On Capacity of the Writing onto Fast Fading Dirt Channel
832,766
['Carlos Ordonez', 'Yiqun Zhang']
Time Complexity and Parallel Speedup to Compute the Gamma Summarization Matrix.
995,553
Extraction-Transformation-Loading (ETL) tools are pieces of software responsible for the extraction of data from several sources, their cleansing, customization and insertion into a data warehouse. In previous line of research, we have presented a conceptual and a logical model for ETL processes. In this paper, we desc...
['Alkis Simitsis']
Mapping conceptual to logical models for ETL processes
495,660
Despite recent efforts in opening up government data, developing tools for taxpayers to make sense of extensive and multi-faceted budget data remains an open challenge. In this paper, we present BudgetMap, an issue-driven classification and navigation interface for the budgets of government programs. Our novel issue-dr...
['Nam Wook Kim', 'Jonghyuk Jung', 'Eun-Young Ko', 'Song-Yi Han', 'Chang Won Lee', 'Juho Kim', 'Jihee Kim']
BudgetMap: Engaging Taxpayers in the Issue-Driven Classification of a Government Budget
656,907
Steady state visual evoked potentials (SSVEPs) are the brain signals induced by gazing at a constantly flickering target. Frame-based frequency approximation methods can be implemented in order to realize a high number of visual stimuli for SSVEP-based Brain-Computer Interfaces (BCIs) on ordinary computer screens. In t...
['Felix Gembler', 'Piotr Stawicki', 'Ivan Volosyak']
Exploring the possibilities and limitations of multitarget SSVEP-based BCI applications
914,432
An unsupervised approach based on Information Bottleneck (IB) principle is proposed for detecting acoustic events from audio streams. In this paper, the IB principle is first concisely presented, and then the practical issues related to the application of IB principle to acoustic event detection are described in detail...
['Yanxiong Li', 'Qin Wang', 'Xianku Li', 'Xue Zhang', 'Yuhan Zhang', 'Aiwu Chen', 'Qianhua He', 'Qian Huang']
Unsupervised detection of acoustic events using information bottleneck principle
972,030
This paper presents the results obtained by AROMA for its participation to OAEI. AROMA is an ontology alignment method that makes use of the association paradigm and a statistical interestingness measure, the implication intensity. AROMA performs a post-processing step that includes a terminological matcher. This year ...
['Jérôme David']
AROMA results for OAEI 2011
755,787
['Fela Winkelmolen', 'Viviana Mascardi']
Statistical Language Identification of Short Texts.
756,591
This paper analyzes the significance of the representation and reusability of SRML when being used in simulation models as well as its drawbacks. The paper also discusses the ways to extend SRML schema based on DEVS. The emphasis is placed on the elaboration of mapping DEVS onto SRML schema to formulate SRML's basic sy...
['Chen Liu', 'Qun Li', 'Weiping Wang', 'Yifan Zhu']
Extend SRML schema based on DEVS: an executable DEVS language
152,368
Abstract#R##N#Effective nuclear charges of the main group elements from the second up to the fifth row have been developed for the one-electron part of the spin-orbit (SO) coupling Hamiltonian. These parameters, suitable to be used for SO calculations of large molecular systems, provide a useful and remarkably good app...
['Sandro Chiodo', 'Nino Russo']
One‐electron spin‐orbit contribution by effective nuclear charges
24,025
['Mushfiqul Alam', 'Pranita Patil', 'Martin T. Hagan', 'Damon M. Chandler']
A computational model for predicting local distortion visibility via convolutional neural network trainedon natural scenes
668,764
We introduce a framework for construction of non-separable multivariate splines that are geometrically tailored for general sampling lattices. Voronoi splines are B-spline-like elements that inherit the geometry of a sampling lattice from its Voronoi cell and generate a lattice-shift-invariant spline space for approxim...
['Mahsa Mirzargar', 'Alireza Entezari']
Voronoi Splines
668,525
It seems clear that online teaching will be a growing proportion of teaching overall, both in the form of completely online courses and blended courses with significantly reduced face-to-face interaction.
['Gregory W. Hislop']
The Inevitability of Teaching Online
262,090
['Carlos Morales', 'Takeshi Oishi', 'Katsushi Ikeuchi']
Turbidity-based aerial perspective rendering for mixed reality.
752,071
This paper concerns application of feedback in LT codes. The considered type of feedback is acknowledgments, where information on which symbols have been decoded is given to the transmitter. We identify an important adaptive mechanism in standard LT codes, which is crucial to their ability to perform well under any cha...
['Jesper Hemming Sørensen', 'Petar Popovski', 'Jan Østergaard']
On the Role of Feedback in LT Codes
48,521
As part of its many functions, the reference library is charged with developing both its collection and its user community. These two functions are sometimes pursued as separate initiatives (with separate funding) by library managers. In Australia, the State Library of Queensland (SLQ) is committed to an exciting polic...
['Jerry Watkins', 'Angelina Russo']
Developing communities and collections with new media and information literacy
839,240
Abstract HYPERchannel [1,3,5,7] is a local network configuration with random access to the global transmission medium and with ‘Carrier Sense’ techniques. Conflicts are resolved by a fixed priority scheduling of retransmissions. This paper presents a performance evaluation of HYPERchannel access protocols for differ...
['Otto Spaniol']
Analysis and performance evaluation of HYPERchannel access protocols
391,621
End users can create kinds of mashups which combine various data-intensive services to form new services. The challenging issue of data-intensive service mashup is how to find service from a great deal of candidate services while satisfying SLAs. In this paper, Service-Level Agreement (SLA) consists of two parts, which...
['Wanchun Yang', 'Chenxi Zhang', 'Bin Mu']
Data-intensive Service Mashup Based on Game Theory and Hybrid Fireworks Optimization Algorithm in the Cloud
600,521
An LMS closed-loop time-delay estimator is presented. It uses the error between two samples of the incoming signal (the difference between the delayed signal and the reference signal passed through a known delay) as a performance index for the estimator. The LMS algorithm adaptively controls the delay so as to minimize...
['Hagit Messer', 'Y. Bar-Ness']
Closed-loop least mean square time-delay estimator
434,513
Induction of predictive models is one of the most frequent data mining tasks. However, for several domains, the available data is unlabeled and the generation of a class label for each instance may have a high cost. An alternative to reduce this cost is the use of active learning, which selects instances according to a...
['Davi Pereira dos Santos', 'André Carlos Ponce Leon Ferreira de Carvalho']
Comparison of Active Learning Strategies and Proposal of a Multiclass Hypothesis Space Search
310,047
Pedestrian navigation systems (PNS) using foot-mounted MEMS inertial sensors use zero-velocity updates (ZUPTs) to reduce drift in navigation solutions and estimate inertial sensor errors. However, it is well known that ZUPTs cannot reduce all errors, especially as heading error is not observable. Hence, the position es...
['Muhammad Ilyas', 'Kuk Cho', 'Seung-Ho Baeg', 'Sangdeok Park']
Drift Reduction in Pedestrian Navigation System by Exploiting Motion Constraints and Magnetic Field
863,151
We propose a low hardware overhead mechanism for internal FPGA configuration check and repair. The approach is effective against soft errors in the configuration memory (i.e., the errors caused by high energy radiation also known as Single Event Upsets). The proposed recovery mechanism occupies less hardware resources ...
['Uros Legat', 'Anton Biasizzo', 'Franc Novak']
FPGA Soft Error Recovery Mechanism with Small Hardware Overhead
481,294
In this work, we propose a web personalization methodology by detecting the user navigation’s orientation. To this goal, we track user’s hits and define whether a user specializes or generalizes his navigation through semantics analysis of the pages in his session window. An algorithm of capturing user session orientat...
['John D. Garofalakis', 'Theodoula Giannakoudi', 'Danai Vergeti']
Capturing User Session Orientation Based on Semantic Analysis and Concept Taxonomy
483,016
['Francisco José García-Peñalvo', 'Ángel Fidalgo-Blanco', 'María Luisa Sein-Echaluce', 'Miguel Á. Conde']
Cooperative Micro Flip Teaching
845,816
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
24