anchor
stringlengths 10
388
| positive
stringlengths 8
386
|
|---|---|
A Transforming Insurance Company and the 4 Types of Health Data Challenges that Arise: A Finnish Case Study
|
Research Commentary - The Digital Transformation of Healthcare: Current Status and the Road Ahead
|
A Transforming Insurance Company and the 4 Types of Health Data Challenges that Arise: A Finnish Case Study
|
Bringing Big Data to Personalized Healthcare: A Patient-Centered Framework
|
A Transforming Insurance Company and the 4 Types of Health Data Challenges that Arise: A Finnish Case Study
|
value of information systems and products : understanding the users β perspective and values .
|
Human-level AI's Killer Application: Interactive Computer Games
|
Automated Intelligent Pilots for Combat Flight Simulation
|
Human-level AI's Killer Application: Interactive Computer Games
|
The Cog Project : Building a Humanoid Robot
|
Combining Misuse Cases with Attack Trees and Security Activity Models
|
Specifying reusable security requirements
|
Combining Misuse Cases with Attack Trees and Security Activity Models
|
Eliciting security requirements with misuse cases
|
Combining Misuse Cases with Attack Trees and Security Activity Models
|
Using abuse case models for security requirements analysis
|
Neural network based attack on a masked implementation of AES
|
A time series approach for profiling attack
|
Neural network based attack on a masked implementation of AES
|
black - box side - channel attacks highlight the importance of countermeasures - an analysis of the xilinx virtex - 4 and virtex - 5 bitstream encryption mechanism .
|
Neural network based attack on a masked implementation of AES
|
Electromagnetic Analysis: Concrete Results
|
Self-Compassion and Psychological Well-Being in Older Adults
|
Relation of threatened egotism to violence and aggression: The dark side of high self-esteem.
|
Self-Compassion and Psychological Well-Being in Older Adults
|
Self-compassion versus global self-esteem: Two different ways of relating to oneself
|
Concept Transfer Learning for Adaptive Language Understanding
|
Neural Models for Sequence Chunking
|
Concept Transfer Learning for Adaptive Language Understanding
|
Attention-Based Recurrent Neural Network Models for Joint Intent Detection and Slot Filling
|
Concept Transfer Learning for Adaptive Language Understanding
|
Supervised Sequence Labelling with Recurrent Neural Networks
|
Concept Transfer Learning for Adaptive Language Understanding
|
Sequential Convolutional Neural Networks for Slot Filling in Spoken Language Understanding
|
Concept Transfer Learning for Adaptive Language Understanding
|
What is left to be understood in ATIS?
|
A fast, universal algorithm to learn parametric nonlinear embeddings
|
Learning a Nonlinear Embedding by Preserving Class Neighbourhood Structure
|
A fast, universal algorithm to learn parametric nonlinear embeddings
|
learning a parametric embedding by preserving local structure .
|
Down will Come Baby, Cradle and All: Diagnostic and Therapeutic Implications of Chronic Trauma on Child Development
|
Developmental traumatology part II: brain development
|
Down will Come Baby, Cradle and All: Diagnostic and Therapeutic Implications of Chronic Trauma on Child Development
|
Relationship of childhood abuse and household dysfunction to many of the leading causes of death in adults. The Adverse Childhood Experiences (ACE) Study.
|
Down will Come Baby, Cradle and All: Diagnostic and Therapeutic Implications of Chronic Trauma on Child Development
|
Neurobiological Sequelae of Childhood Trauma: Post-traumatic Stress Disorders in Children
|
A theory of self-calibration of a moving camera
|
Camera Self-Calibration: Theory and Experiments
|
Virtual reality and information technology for archaeological site promotion
|
Archeoguide: first results of an augmented reality, mobile computing system in cultural heritage sites
|
Virtual reality and information technology for archaeological site promotion
|
an fft - based technique for translation , rotation , and scale - invariant image registration .
|
An empirical study of multifactorial PSO and multifactorial DE
|
Enhancing Differential Evolution Utilizing Eigenvector-Based Crossover Operator
|
An empirical study of multifactorial PSO and multifactorial DE
|
Evolutionary computation: Comments on the history and current state
|
An empirical study of multifactorial PSO and multifactorial DE
|
Learning with Whom to Share in Multi-task Feature Learning
|
Solving Single-digit Sudoku Subproblems
|
Metaheuristics can Solve Sudoku Puzzles
|
Solving Single-digit Sudoku Subproblems
|
Dynamic Programming Treatment of the Travelling Salesman Problem
|
Solving Single-digit Sudoku Subproblems
|
Linear Systems, Sparse Solutions, and Sudoku
|
Detecting Integrity Attacks on SCADA Systems
|
Secure control against replay attacks
|
Detecting Integrity Attacks on SCADA Systems
|
Research Challenges for the Security of Control Systems
|
Detecting Integrity Attacks on SCADA Systems
|
A Plant-Wide Industrial Process Control Security Problem
|
PointerPhone: Using Mobile Phones for Direct Pointing Interactions with Remote Displays
|
the smart phone : a ubiquitous input device .
|
PointerPhone: Using Mobile Phones for Direct Pointing Interactions with Remote Displays
|
Augmented surfaces: a spatially continuous work space for hybrid computing environments
|
PointerPhone: Using Mobile Phones for Direct Pointing Interactions with Remote Displays
|
SpeckleSense: fast, precise, low-cost and compact motion sensing using laser speckle
|
PointerPhone: Using Mobile Phones for Direct Pointing Interactions with Remote Displays
|
Avoiding interference: how people use spatial separation and partitioning in SDG workspaces
|
Keep Calm and Study Memes
|
Memes in a Digital World: Reconciling with a Conceptual Troublemaker
|
Automatic Language Identification fromWritten Texts An Overview
|
N-Gram Based Text Categorization
|
Automatic Language Identification fromWritten Texts An Overview
|
Automatic Detection and Language Identification of Multilingual Documents
|
Frontal to profile face verification in the wild
|
From Few to many: Illumination cone models for face recognition under variable lighting and pose
|
Frontal to profile face verification in the wild
|
Deeply learned face representations are sparse, selective, and robust
|
Frontal to profile face verification in the wild
|
Face Description with Local Binary Patterns: Application to Face Recognition
|
algorithm and technique on various edge detection : a survey .
|
A Computational Approach toEdgeDetection
|
algorithm and technique on various edge detection : a survey .
|
Real-time Facial Expression Recognition Based on Adaptive Canny Operator Edge Detection
|
Performance Optimization of Communication Subsystem in Scale-Out Distributed Storage
|
Performance Optimization for All Flash Scale-Out Storage
|
Performance Optimization of Communication Subsystem in Scale-Out Distributed Storage
|
Ceph: a scalable, high-performance distributed file system
|
A System for Automated Detection of Ampoule Injection Impurities
|
What is principal component analysis?
|
A System for Automated Detection of Ampoule Injection Impurities
|
Particulate Matter in Injectable Drug Products
|
A System for Automated Detection of Ampoule Injection Impurities
|
Extreme learning machine: Theory and applications
|
Activity recognition and monitoring using multiple sensors on different body positions
|
Activity recognition from user-annotated acceleration data
|
measuring user engagement .
|
The development and evaluation of a survey to measure user engagement
|
measuring user engagement .
|
The Measurement of Web-Customer Satisfaction: An Expectation and Disconfirmation Approach
|
measuring user engagement .
|
Theory and models for creating engaging and immersive ecommerce Websites
|
measuring user engagement .
|
Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research
|
Towards Open Set Deep Networks
|
Distance-Based Image Classification: Generalizing to New Classes at Near-Zero Cost
|
Towards Open Set Deep Networks
|
Zero-Shot Learning Through Cross-Modal Transfer
|
Towards Open Set Deep Networks
|
Fast, Accurate Detection of 100,000 Object Classes on a Single Machine
|
Towards Open Set Deep Networks
|
Is object localization for free? - Weakly-supervised learning with convolutional neural networks
|
Beyond Traditional DTN Routing: Social Networks for Opportunistic Communication
|
Epidemic Routing for Partially-Connected Ad Hoc Networks
|
Beyond Traditional DTN Routing: Social Networks for Opportunistic Communication
|
Efficient routing in intermittently connected mobile networks: the multiple-copy case
|
Beyond Traditional DTN Routing: Social Networks for Opportunistic Communication
|
MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks
|
Intent Generation for Goal-Oriented Dialogue Systems based on Schema.org Annotations
|
Learning End-to-End Goal-Oriented Dialog
|
Intent Generation for Goal-Oriented Dialogue Systems based on Schema.org Annotations
|
Verb Semantics And Lexical Selection
|
Intent Generation for Goal-Oriented Dialogue Systems based on Schema.org Annotations
|
Efficient Estimation of Word Representations in Vector Space
|
Intent Generation for Goal-Oriented Dialogue Systems based on Schema.org Annotations
|
An End-to-End Goal-Oriented Dialog System with a Generative Natural Language Response Generation
|
two step credit risk assesment model for retail bank loan applications using decision tree data mining technique .
|
DATA MINING SYSTEM AND APPLICATIONS: A REVIEW
|
two step credit risk assesment model for retail bank loan applications using decision tree data mining technique .
|
data preprocessing for supervised leaning .
|
Lightweight Asynchronous Snapshots for Distributed Dataflows
|
TimeStream: reliable stream computation in the cloud
|
3-D Road Boundary Extraction From Mobile Laser Scanning Data via Supervoxels and Graph Cuts
|
Using Mobile LiDAR Data for Rapidly Updating Road Markings
|
3-D Road Boundary Extraction From Mobile Laser Scanning Data via Supervoxels and Graph Cuts
|
The 3D Hough Transform for plane detection in point clouds: A review and a new accumulator design
|
A survey of domain adaptation for statistical machine translation
|
HMM-Based Word Alignment in Statistical Translation
|
A survey of domain adaptation for statistical machine translation
|
A Statistical Approach to Machine Translation
|
Advanced Low-Voltage Power MOSFET Technology for Power Supply in Package Applications
|
NexFET generation 2, new way to power
|
Advanced Low-Voltage Power MOSFET Technology for Power Supply in Package Applications
|
Lateral power MOSFET for megahertz-frequency, high-density DC/DC converters
|
Advanced Low-Voltage Power MOSFET Technology for Power Supply in Package Applications
|
Design considerations on low voltage synchronous power MOSFETs with monolithically integrated gate voltage pull-down circuitry
|
Variational inference for Dirichlet process mixtures
|
a variational baysian framework for graphical models .
|
Variational inference for Dirichlet process mixtures
|
Latent Dirichlet Allocation
|
Variational inference for Dirichlet process mixtures
|
A Bayesian Analysis of Some Nonparametric Problems
|
Variational inference for Dirichlet process mixtures
|
Gibbs Sampling Methods for Stick-Breaking Priors
|
RNN Encoder Decoder 3 D Skeleton Converter 2 D Pose Sequence Generator Input Image 2 D Pose Heatmaps 3 D Skeleton Hourglass network
|
Articulated Human Detection with Flexible Mixtures of Parts
|
RNN Encoder Decoder 3 D Skeleton Converter 2 D Pose Sequence Generator Input Image 2 D Pose Heatmaps 3 D Skeleton Hourglass network
|
Weakly-supervised Disentangling with Recurrent Transformations for 3D View Synthesis
|
RNN Encoder Decoder 3 D Skeleton Converter 2 D Pose Sequence Generator Input Image 2 D Pose Heatmaps 3 D Skeleton Hourglass network
|
Marker-Less 3D Human Motion Capture with Monocular Image Sequence and Height-Maps
|
Multiview Image Completion with Space Structure Propagation
|
Image-based rendering in the gradient domain
|
Multiview Image Completion with Space Structure Propagation
|
Photo tourism: exploring photo collections in 3D
|
Multiview Image Completion with Space Structure Propagation
|
Image inpainting
|
Kalis β A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things
|
Securing communication in 6LoWPAN with compressed IPsec
|
Kalis β A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things
|
A cooperative intrusion detection system for ad hoc networks
|
Kalis β A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things
|
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
|
Beyond Behaviorism : On the Automaticity of Higher Mental Processes
|
The Neural Network House: An Environment that Adapts to its Inhabitants
|
Beyond Behaviorism : On the Automaticity of Higher Mental Processes
|
The Trouble of Thinking Activation and Application of Stereotypic Beliefs
|
Beyond Behaviorism : On the Automaticity of Higher Mental Processes
|
flocks , herds , and schools : a distributed behavioral model .
|
Beyond Behaviorism : On the Automaticity of Higher Mental Processes
|
COGNITIVE NEUROSCIENCE OF HUMAN MEMORY
|
raiden11@IECSIL-FIRE-2018 : Named Entity Recognition for Indian Languages
|
Learning Word Vectors for 157 Languages
|
raiden11@IECSIL-FIRE-2018 : Named Entity Recognition for Indian Languages
|
Named Entity Recognition and Classification in Kannada Language
|
raiden11@IECSIL-FIRE-2018 : Named Entity Recognition for Indian Languages
|
Named Entity Recognition in Bengali: A Conditional Random Field Approach
|
Phased Array for UAV Communications at 5.5 GHz
|
Substrate-Integrated Cavity-Backed Patch Arrays: A Low-Cost Approach for Bandwidth Enhancement
|
L2P2: Location-aware location privacy protection for location-based services
|
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
|
Subsets and Splits
SQL Console for sentence-transformers/specter
Counts the number of unique anchors in the triplet dataset, providing a basic overview of the diversity of anchors.