username commited on
Commit Β·
9c7b045
1
Parent(s): edf6e6a
2file
Browse filesThis view is limited to 50 files because it contains too many changes. Β
See raw diff
- edge/.ipynb_checkpoints/graph_10003728-checkpoint.jsonl +56 -0
- graph_1000416.jsonl β edge/.ipynb_checkpoints/graph_1000416-checkpoint.jsonl +0 -0
- edge/.ipynb_checkpoints/graph_10004491-checkpoint.jsonl +2 -0
- edge/.ipynb_checkpoints/graph_10011823-checkpoint.jsonl +7 -0
- graph_1006459.jsonl β edge/.ipynb_checkpoints/graph_13427574-checkpoint.jsonl +0 -0
- edge/.ipynb_checkpoints/graph_13427694-checkpoint.jsonl +2 -0
- graph_1343571.jsonl β edge/.ipynb_checkpoints/graph_1343571-checkpoint.jsonl +0 -0
- edge/.ipynb_checkpoints/graph_134378860-checkpoint.jsonl +2 -0
- graph_1014845.jsonl β edge/.ipynb_checkpoints/graph_13441159-checkpoint.jsonl +0 -0
- graph_1344506.jsonl β edge/.ipynb_checkpoints/graph_1344506-checkpoint.jsonl +0 -0
- edge/.ipynb_checkpoints/graph_93001387-checkpoint.jsonl +25 -0
- edge/graph_10003728.jsonl +56 -0
- graph_1028144.jsonl β edge/graph_1000416.jsonl +0 -0
- edge/graph_10004491.jsonl +2 -0
- edge/graph_10011823.jsonl +7 -0
- graph_1030380.jsonl β edge/graph_10012473.jsonl +0 -0
- edge/graph_10015090.jsonl +1 -0
- edge/graph_10031526.jsonl +2 -0
- graph_1041439.jsonl β edge/graph_10041852.jsonl +0 -0
- graph_1041692.jsonl β edge/graph_10056835.jsonl +0 -0
- edge/graph_100595306.jsonl +7 -0
- edge/graph_10061981.jsonl +4 -0
- edge/graph_10064368.jsonl +10 -0
- graph_1048595.jsonl β edge/graph_1006459.jsonl +0 -0
- graph_1061957.jsonl β edge/graph_10065043.jsonl +0 -0
- edge/graph_10067743.jsonl +19 -0
- edge/graph_10086984.jsonl +2 -0
- edge/graph_10087812.jsonl +7 -0
- edge/graph_10088979.jsonl +5 -0
- edge/graph_10089999.jsonl +7 -0
- edge/graph_10091442.jsonl +15 -0
- edge/graph_10092092.jsonl +13 -0
- edge/graph_10093798.jsonl +1 -0
- edge/graph_10096622.jsonl +2 -0
- graph_1063643.jsonl β edge/graph_10096898.jsonl +0 -0
- edge/graph_10098507.jsonl +2 -0
- edge/graph_10098641.jsonl +2 -0
- graph_1074202.jsonl β edge/graph_10099297.jsonl +0 -0
- edge/graph_10100716.jsonl +1 -0
- edge/graph_10116146.jsonl +2 -0
- graph_1078188.jsonl β edge/graph_10119483.jsonl +0 -0
- graph_1110872.jsonl β edge/graph_10120175.jsonl +0 -0
- edge/graph_10120942.jsonl +1 -0
- edge/graph_10124745.jsonl +15 -0
- edge/graph_10137209.jsonl +5 -0
- edge/graph_10137283.jsonl +4 -0
- edge/graph_10137425.jsonl +28 -0
- edge/graph_10146579.jsonl +30 -0
- graph_1113420.jsonl β edge/graph_10147053.jsonl +0 -0
- edge/graph_10148401.jsonl +19 -0
edge/.ipynb_checkpoints/graph_10003728-checkpoint.jsonl
ADDED
|
@@ -0,0 +1,56 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"26706809|956843": []}
|
| 2 |
+
{"5207304|1230643": ["The aim of WSN is to perceive, collect and process the information of sensor nodes within the coverage of the network [1]."]}
|
| 3 |
+
{"9931547|17205659": ["The reliability, flexibility, cost-effectiveness and ease of deployment make wireless sensor networks (WSNs) promise to revolutionize our life in a wide range of application domains, including military, civil, and ecological areas [2,3]."]}
|
| 4 |
+
{"9931547|1236072": ["Owing to recent advances in wireless communications and electronic technologies, the manufacturing of lowcost, low-power, and multi-functional miniature sensors has become technically and economically feasible [1]."]}
|
| 5 |
+
{"6202265|1230643": []}
|
| 6 |
+
{"15664727|17325804": []}
|
| 7 |
+
{"1862414|1230643": ["Due to many attractive characteristics of sensor nodes such as small size and low cost, sensor networks [2], [12], [15], [19] become adopted to many military and civil applications, such as target tracking, surveillance, environmental control, and health care."]}
|
| 8 |
+
{"7334713|6396569": ["Localization over randomly deployed mobile sensor nodes also called MANET, is challenging when compared to localization over a static network [2]."]}
|
| 9 |
+
{"8267140|17516538": ["The utilization of traffic surveillance includes, but it is not restricted to, detection and avoidance of vehicle accidents, detection of vehicles with unusual behavior, and gathering of statistical information about roadway traffic, among several other applications [1], [2]."]}
|
| 10 |
+
{"13912957|164835": ["\u2026requirement was 125 m and was later tightened to 100 m.) This FCC mandate has motivated considerable research efforts towards developing accurate wireless location algorithms for cellular networks and has led to significant enhancements to the wireless location technology (see, e.g., [12]\u2013[25]).", "The solution that results in the shortest distance from the circle (4) is chosen to be an estimate of the MS location coordinates [12]."]}
|
| 11 |
+
{"1482668|1230643": ["\u2026homepage: www.elsevier .com/ locate/comnet\nSemi-supervised Laplacian regularized least squares algorithm for localization in wireless sensor networks\nJiming Chen a,c, Chengqun Wang a,b, Youxian Sun a, Xuemin (Sherman) Shen c,\u21d1 a State Key Lab of Industrial Control Technology, Zhejiang University,\u2026"]}
|
| 12 |
+
{"14573688|1230643": ["The increasing miniaturization of electronic components and advances in modern communication technologies lead to the development of extreme small, cheap, and smart sensor nodes [1]."]}
|
| 13 |
+
{"25188925|206583375": ["[7] proposes a system that uses RF signals along with ultrasonic signals for synchronization, which makes the approach computationally complex.", "However, there are also other performance metrics (see [7] and [8]) to be considered along with accuracy when comparing different positioning systems.", "Another issue is that some positioning systems can track user positions, which raises security and privacy concerns [7].", "Since this work derives a positioning system based on VLC and accelerometer measurements (for estimating receiver\u2019s acceleration and orientation), we modify the list of performance metrics in [7], [8] for comparing VLC-based positioning systems."]}
|
| 14 |
+
{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]}
|
| 15 |
+
{"60691644|2835258": ["Many multicast routing protocols [20][ 21 ][23] have been developed for MANETs.", "protocol [13], energy-efficient routing protocols [9][20][ 21 ][23][32], and new sensornet applica-"]}
|
| 16 |
+
{"1116542|206583375": ["IN LIGHT of numerous emerging location-aware wireless applications like cooperative communications [1] and mobile queries [2], various localization approaches based on WiFi [3]\u2013[5], UWB [6]\u2013[8], ultrasound [9], etc."]}
|
| 17 |
+
{"20785815|1230643": ["Sensor nodes have been deployed to play significant roles in traffic control, battlefield, habitat monitoring and intruder tracking in recent years [1]."]}
|
| 18 |
+
{"200115|14441987": ["Furthermore, some applications only require relative positions of nodes, such as in some direction-based routing algorithms [4], [5]."]}
|
| 19 |
+
{"29024863|5972227": ["More target tracking protocols can be found in [25, 26]."]}
|
| 20 |
+
{"5779256|17325804": []}
|
| 21 |
+
{"5779256|164835": ["It is also one of the common techniques for the estimation of an MT\u2019s location, which is given by [30]", "In [19], [30], with the assumption that the variances of the distance measurements are larger for NLOS FTs, the"]}
|
| 22 |
+
{"206257405|1230643": [", 2011) especially for target tracking scenario in order to efficiently obtain network scalability, reduce communication overhead, achieve data aggregation, and minimize energy consumption (Abbasi and Younis, 2007; Akyildiz et al., 2002; Kim et al., 2006).", "The sensor nodes are small in size and can perform many important functions out of which sensing, data processing, and wireless communication with other nodes (Akyildiz et al., 2002; Yong-Min et al., 2009)."]}
|
| 23 |
+
{"11319668|6275330": []}
|
| 24 |
+
{"36033198|15300368": ["For this reason, WSNs are widely used nowadays in many applications, such as fire detection [1] or intrusion detection [2], and other environmental and security applications [3]."]}
|
| 25 |
+
{"46159657|1230643": ["The rapid development of microelectronic technologies, embedded microprocessors, wireless communications, and networking technologies has made wireless sensor networks of large scale applicable to a wide range of applications, such as environmental monitoring, industrial sensing and diagnosis, situational awareness on the battlefield, space exploration, and healthcare [1]."]}
|
| 26 |
+
{"6391938|17325804": ["I. INTRODUCTION\nW IRELESS sensor networks (WSNs) comprise a largenumber of inexpensive devices that are deployed for observing and initial processing of physical or environmental changes taking place in their vicinity.", "D norm minimizer is the major source of increased complexity of the EM algorithm compared to the simpler LS algorithm at a particular iteration."]}
|
| 27 |
+
{"29902|7889189": ["As seen from Section II, if at least one node is compromised, false measurement could lead to wrong decision-making in the network [32],[33]."]}
|
| 28 |
+
{"29902|1940388": []}
|
| 29 |
+
{"5207304|1230643": ["The aim of WSN is to perceive, collect and process the information of sensor nodes within the coverage of the network [1]."]}
|
| 30 |
+
{"25188925|206583375": ["[7] proposes a system that uses RF signals along with ultrasonic signals for synchronization, which makes the approach computationally complex.", "However, there are also other performance metrics (see [7] and [8]) to be considered along with accuracy when comparing different positioning systems.", "Another issue is that some positioning systems can track user positions, which raises security and privacy concerns [7].", "Since this work derives a positioning system based on VLC and accelerometer measurements (for estimating receiver\u2019s acceleration and orientation), we modify the list of performance metrics in [7], [8] for comparing VLC-based positioning systems."]}
|
| 31 |
+
{"1482668|1230643": ["\u2026homepage: www.elsevier .com/ locate/comnet\nSemi-supervised Laplacian regularized least squares algorithm for localization in wireless sensor networks\nJiming Chen a,c, Chengqun Wang a,b, Youxian Sun a, Xuemin (Sherman) Shen c,\u21d1 a State Key Lab of Industrial Control Technology, Zhejiang University,\u2026"]}
|
| 32 |
+
{"6391938|17325804": ["I. INTRODUCTION\nW IRELESS sensor networks (WSNs) comprise a largenumber of inexpensive devices that are deployed for observing and initial processing of physical or environmental changes taking place in their vicinity.", "D norm minimizer is the major source of increased complexity of the EM algorithm compared to the simpler LS algorithm at a particular iteration."]}
|
| 33 |
+
{"8267140|17516538": ["The utilization of traffic surveillance includes, but it is not restricted to, detection and avoidance of vehicle accidents, detection of vehicles with unusual behavior, and gathering of statistical information about roadway traffic, among several other applications [1], [2]."]}
|
| 34 |
+
{"5779256|17325804": []}
|
| 35 |
+
{"5779256|164835": ["It is also one of the common techniques for the estimation of an MT\u2019s location, which is given by [30]", "In [19], [30], with the assumption that the variances of the distance measurements are larger for NLOS FTs, the"]}
|
| 36 |
+
{"9931547|17205659": ["The reliability, flexibility, cost-effectiveness and ease of deployment make wireless sensor networks (WSNs) promise to revolutionize our life in a wide range of application domains, including military, civil, and ecological areas [2,3]."]}
|
| 37 |
+
{"9931547|1236072": ["Owing to recent advances in wireless communications and electronic technologies, the manufacturing of lowcost, low-power, and multi-functional miniature sensors has become technically and economically feasible [1]."]}
|
| 38 |
+
{"14573688|1230643": ["The increasing miniaturization of electronic components and advances in modern communication technologies lead to the development of extreme small, cheap, and smart sensor nodes [1]."]}
|
| 39 |
+
{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]}
|
| 40 |
+
{"206257405|1230643": [", 2011) especially for target tracking scenario in order to efficiently obtain network scalability, reduce communication overhead, achieve data aggregation, and minimize energy consumption (Abbasi and Younis, 2007; Akyildiz et al., 2002; Kim et al., 2006).", "The sensor nodes are small in size and can perform many important functions out of which sensing, data processing, and wireless communication with other nodes (Akyildiz et al., 2002; Yong-Min et al., 2009)."]}
|
| 41 |
+
{"200115|14441987": ["Furthermore, some applications only require relative positions of nodes, such as in some direction-based routing algorithms [4], [5]."]}
|
| 42 |
+
{"26706809|956843": []}
|
| 43 |
+
{"15664727|17325804": []}
|
| 44 |
+
{"7334713|6396569": ["Localization over randomly deployed mobile sensor nodes also called MANET, is challenging when compared to localization over a static network [2]."]}
|
| 45 |
+
{"13912957|164835": ["\u2026requirement was 125 m and was later tightened to 100 m.) This FCC mandate has motivated considerable research efforts towards developing accurate wireless location algorithms for cellular networks and has led to significant enhancements to the wireless location technology (see, e.g., [12]\u2013[25]).", "The solution that results in the shortest distance from the circle (4) is chosen to be an estimate of the MS location coordinates [12]."]}
|
| 46 |
+
{"20785815|1230643": ["Sensor nodes have been deployed to play significant roles in traffic control, battlefield, habitat monitoring and intruder tracking in recent years [1]."]}
|
| 47 |
+
{"1116542|206583375": ["IN LIGHT of numerous emerging location-aware wireless applications like cooperative communications [1] and mobile queries [2], various localization approaches based on WiFi [3]\u2013[5], UWB [6]\u2013[8], ultrasound [9], etc."]}
|
| 48 |
+
{"6202265|1230643": []}
|
| 49 |
+
{"11319668|6275330": []}
|
| 50 |
+
{"36033198|15300368": ["For this reason, WSNs are widely used nowadays in many applications, such as fire detection [1] or intrusion detection [2], and other environmental and security applications [3]."]}
|
| 51 |
+
{"46159657|1230643": ["The rapid development of microelectronic technologies, embedded microprocessors, wireless communications, and networking technologies has made wireless sensor networks of large scale applicable to a wide range of applications, such as environmental monitoring, industrial sensing and diagnosis, situational awareness on the battlefield, space exploration, and healthcare [1]."]}
|
| 52 |
+
{"29902|7889189": ["As seen from Section II, if at least one node is compromised, false measurement could lead to wrong decision-making in the network [32],[33]."]}
|
| 53 |
+
{"29902|1940388": []}
|
| 54 |
+
{"60691644|2835258": ["Many multicast routing protocols [20][ 21 ][23] have been developed for MANETs.", "protocol [13], energy-efficient routing protocols [9][20][ 21 ][23][32], and new sensornet applica-"]}
|
| 55 |
+
{"1862414|1230643": ["Due to many attractive characteristics of sensor nodes such as small size and low cost, sensor networks [2], [12], [15], [19] become adopted to many military and civil applications, such as target tracking, surveillance, environmental control, and health care."]}
|
| 56 |
+
{"29024863|5972227": ["More target tracking protocols can be found in [25, 26]."]}
|
graph_1000416.jsonl β edge/.ipynb_checkpoints/graph_1000416-checkpoint.jsonl
RENAMED
|
File without changes
|
edge/.ipynb_checkpoints/graph_10004491-checkpoint.jsonl
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"118230787|206051485": []}
|
| 2 |
+
{"1628909|60779308": ["The shape descriptor used in this study is eccentricity, which is defined as the ratio of major to minor axes of a connected component and evaluate elongation of edges (Yang et al., 2008)."]}
|
edge/.ipynb_checkpoints/graph_10011823-checkpoint.jsonl
ADDED
|
@@ -0,0 +1,7 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"1428759|1230643": ["Wireless sensor networks (WSNs), comprising of tiny, radio-enabled sensing devices open up new opportunities to observe and interact with the physical world, and have been applied in domains ranging from patient health monitoring through the use of biomedical sensors to military applications such as battlefield surveillance [1].", "Wireless sensor networks have been a very active area of research in recent years (see [1] for a survey)."]}
|
| 2 |
+
{"16592951|1230643": ["Such networks have the potential to enable a wide range of applications in environmental monitoring, health, military and security (see [1] for a survey of applications)."]}
|
| 3 |
+
{"16102897|1230643": ["Sensor networks have been a very active area of research in recent years (see [1] for a survey), and there is a large body of work on data collection from sensor networks that applies higher-level techniques to sensor network data processing."]}
|
| 4 |
+
{"207172599|3330313": []}
|
| 5 |
+
{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]}
|
| 6 |
+
{"7774517|3330313": ["The term outlier, also known as anomaly, originally stems from the field of statistics [5].", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.e., statistics, neural networks and machine learning."]}
|
| 7 |
+
{"7774517|1230643": ["For a sensor node, the communication cost is often several orders of magnitude higher than the computation cost [20]."]}
|
graph_1006459.jsonl β edge/.ipynb_checkpoints/graph_13427574-checkpoint.jsonl
RENAMED
|
File without changes
|
edge/.ipynb_checkpoints/graph_13427694-checkpoint.jsonl
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"7607342|1400872": ["\u0091Hidden units makes it possible for the network to discover and exploit regularities of the task at hand such as symmetries or replicated structures\u0092 (Pearlmutter, 1995).", "Recurrent neural networks using the backpropagation algorithm, as developed first by (Pineda, 1987), and other extension (Pearlmutter, 1995; Chauvin & Rumelhart, 1995) had to be eliminated because of their long time computation (multiple training steps) and their complex computation (calculating derivatives).", "DRAMA differs from other RNN models by the fact that it uses an unsupervised training algorithm, based on Hebbian rules, while other RNNs use a supervised training algorithm, such as the backpropagation algorithm and other derivatives (Chauvin & Rumelhart, 1995; Pearlmutter, 1995)."]}
|
| 2 |
+
{"7124120|1708582": []}
|
graph_1343571.jsonl β edge/.ipynb_checkpoints/graph_1343571-checkpoint.jsonl
RENAMED
|
File without changes
|
edge/.ipynb_checkpoints/graph_134378860-checkpoint.jsonl
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"140693311|1877246": ["For a complete review about this topic, we address to Musialski et al. (2012)."]}
|
| 2 |
+
{"15335064|18587623": ["Night light data have been used in the past to study economic variables [1,2], socio-economic properties [3\u20135], population [6,7] and population density [8], built area [9,10], power consumption [11], greenhouse gas emissions [12], gas flaring [13], atmospheric chemistry [14], skyglow (light pollution) [15\u201317], the epidemiology of illness related to light exposure [18], among other analyses [19]."]}
|
graph_1014845.jsonl β edge/.ipynb_checkpoints/graph_13441159-checkpoint.jsonl
RENAMED
|
File without changes
|
graph_1344506.jsonl β edge/.ipynb_checkpoints/graph_1344506-checkpoint.jsonl
RENAMED
|
File without changes
|
edge/.ipynb_checkpoints/graph_93001387-checkpoint.jsonl
ADDED
|
@@ -0,0 +1,25 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"14666667|15170341": ["Objective tests can follow psychophysical approaches and engineering approaches, a detailed description of which is found in [5].", "Metrics can be classified according to the following scheme [5]: Full reference (FR) metrics: Both reference and outcome are available, and allow for detailed subjective and objective comparisons of images, videos, download times (on the application level), packet traces (on the network level), and\u2026", "For instance, QoE on the application level can be described by the hybrid image quality metric (HIQM) [5], and QoS on the network level can be represented by throughput variations and losses [4]."]}
|
| 2 |
+
{"32118915|3834736": []}
|
| 3 |
+
{"32118915|399542": []}
|
| 4 |
+
{"52304629|11381680": ["Moreover, web-based crowdsourcing frameworks, such as Quadrant of Euphoria [21], [22], crowdMOS [34] and QualityCrowd [35], represent a conceptual approach to develop subjective experiments that can be conducted in a web browser [36]."]}
|
| 5 |
+
{"52304629|399542": ["Crowdsourcing is an increasingly popular approach for generic subjective QoE assessment methodology [31]\u2013[33].", "The model correlates QoS parameters directly withQoE perceptions by adopting appropriate datamodels such as discriminant analysis approach based on statistics [19], [31], regression analysis [74]\u2013[76], support vector machine [77]\u2013[79], decision tree [20], [78], [80] and rough set [81]."]}
|
| 6 |
+
{"52304629|6581557": ["The most widely used FR approaches are Mean Squared Error (MSE), Peak Signal to Noise Ratio (PSNR) [41], [42], Structural Similarity Index (SSIM) [29], [46]\u2013[48] and Video Quality Metric (VQM) [37], [54].", "The predefined collection context affects the most suitable QoE assessment approach such as FR, RR, NR, and the selection influences the assessment accuracy [37].", "Because VQM has a good correlation with subjective feedback from observers [55], [56], the approach is adopted by the American National Standards Institute as a national standard.", "When gathering information to assess the QoE level, there are three different questions to be answered: (1) Which information should be collected? (2)Where should the information be collected? and (3) How should the collection be performed? [37].", "\u2022 Video Quality Metric (VQM) [37], [54] provides standardized and non-standardized approaches to measure\nVOLUME 6, 2018 48381\nthe perceived video quality by taking into account structural and temporal aspects.", "[55] M. Narwaria, M. P. D. Silva, and P. L. Callet, \u2018\u2018HDR-VQM: An objective quality measure for high dynamic range video,\u2019\u2019 Signal Process., Image Commun., vol. 35, pp. 46\u201360, Jul. 2015 [56] M. Wichtlhuber, G. Wicklein, S. Wilk, W. Effelsberg, and D. Hausheer, \u2018\u2018RT-VQM: Real-time video quality assessment for adaptive video streaming using GPUs,\u2019\u2019 in Proc.", "The implementation of VQM includes three steps: perception-based features extraction, video quality parameters computation (seven in total) and the combination of these parameters to finish the overall model.", "\u2022 Video Quality Metric (VQM) [37], [54] provides standardized and non-standardized approaches to measure"]}
|
| 7 |
+
{"70324764|7972041": []}
|
| 8 |
+
{"70324764|38911919": []}
|
| 9 |
+
{"25575499|5122855": ["[11] summarized the ongoing research topics on QoE-aware HTTP Adaptive Streaming (HAS) where they con-"]}
|
| 10 |
+
{"25575499|2261490": ["Barakovi\u0107 and Skorin-Kapov [18] reviewed the QoE assessment and management approaches over wireless networks using system, context and human factors.", "Barakovic\u0301 and Skorin-Kapov [18] reviewed the QoE assessment and management approaches over wireless networks using system, context and human factors."]}
|
| 11 |
+
{"25575499|64404": [", I, P and B frames [53]) on QoE were studied in [54] with different video contents."]}
|
| 12 |
+
{"16630618|763939": []}
|
| 13 |
+
{"1530631|763939": ["Lane changing No Support MOBIL [90] Supports"]}
|
| 14 |
+
{"62116074|763939": ["The main building blocks in designing a mobility model are: visualisation tool, output, platform and a class which GTNets (Georgia Tech Network Simulator) [35] and so on are some of the network simulators used for MANET simulation.", "The mobility model [35] is a model or a set of rules for designing random network topologies by using simulators.", "Tables 3 \u2013 5 are adapted from [35]."]}
|
| 15 |
+
{"31851714|6581557": ["E.g., Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39].", "The VQM was an improvement over the PSNR and SSIM as it also considered blurring, global noise, and color distortions.", "Traditionally, the quality of video playback for television and broadcasting media services and networked media was measured by using metrics such as Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39].", "The PSNR is computed by calculating the Mean Square Error (MSE) in each pixel, represented in dB by comparing both the original and received frames.", "SSIM extended PSNR to include the effects of luminance, contrast, and structural similarity of the frames.", ", Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39]."]}
|
| 16 |
+
{"31851714|15170341": []}
|
| 17 |
+
{"3782888|36280489": ["While this is first survey paper of its kind that primarily focuses on the cooperativeness in vehicular networks, there do exist a number of survey papers that cover cooperative networking [10], [26]\u2013[28] or vehicular communication [29]\u2013[40] in general."]}
|
| 18 |
+
{"3782888|3834736": []}
|
| 19 |
+
{"3782888|10329355": ["While this is first survey paper of its kind that primarily focuses on the cooperativeness in vehicular networks, there do exist a number of survey papers that cover cooperative networking [10], [26]\u2013[28] or vehicular communication [29]\u2013[40] in general."]}
|
| 20 |
+
{"3782888|7434318": []}
|
| 21 |
+
{"3782888|2335874": []}
|
| 22 |
+
{"3782888|763939": []}
|
| 23 |
+
{"399542|10559330": ["Different mechanisms and solutions can be used to form the QoS at the Network Layer, such as, Differentiated Services (DiffServ) [5], Integrated Services [6] and Multi-Protocol Label Switching (MPLS) [7]."]}
|
| 24 |
+
{"96447448|64404": []}
|
| 25 |
+
{"15343373|1299833": ["Due to frequent disruptions in the routes, traditional transport layer protocols from MANETs [134], [190], [191], [192] are not directly applicable to VANETs."]}
|
edge/graph_10003728.jsonl
ADDED
|
@@ -0,0 +1,56 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"26706809|956843": []}
|
| 2 |
+
{"5207304|1230643": ["The aim of WSN is to perceive, collect and process the information of sensor nodes within the coverage of the network [1]."]}
|
| 3 |
+
{"9931547|17205659": ["The reliability, flexibility, cost-effectiveness and ease of deployment make wireless sensor networks (WSNs) promise to revolutionize our life in a wide range of application domains, including military, civil, and ecological areas [2,3]."]}
|
| 4 |
+
{"9931547|1236072": ["Owing to recent advances in wireless communications and electronic technologies, the manufacturing of lowcost, low-power, and multi-functional miniature sensors has become technically and economically feasible [1]."]}
|
| 5 |
+
{"6202265|1230643": []}
|
| 6 |
+
{"15664727|17325804": []}
|
| 7 |
+
{"1862414|1230643": ["Due to many attractive characteristics of sensor nodes such as small size and low cost, sensor networks [2], [12], [15], [19] become adopted to many military and civil applications, such as target tracking, surveillance, environmental control, and health care."]}
|
| 8 |
+
{"7334713|6396569": ["Localization over randomly deployed mobile sensor nodes also called MANET, is challenging when compared to localization over a static network [2]."]}
|
| 9 |
+
{"8267140|17516538": ["The utilization of traffic surveillance includes, but it is not restricted to, detection and avoidance of vehicle accidents, detection of vehicles with unusual behavior, and gathering of statistical information about roadway traffic, among several other applications [1], [2]."]}
|
| 10 |
+
{"13912957|164835": ["\u2026requirement was 125 m and was later tightened to 100 m.) This FCC mandate has motivated considerable research efforts towards developing accurate wireless location algorithms for cellular networks and has led to significant enhancements to the wireless location technology (see, e.g., [12]\u2013[25]).", "The solution that results in the shortest distance from the circle (4) is chosen to be an estimate of the MS location coordinates [12]."]}
|
| 11 |
+
{"1482668|1230643": ["\u2026homepage: www.elsevier .com/ locate/comnet\nSemi-supervised Laplacian regularized least squares algorithm for localization in wireless sensor networks\nJiming Chen a,c, Chengqun Wang a,b, Youxian Sun a, Xuemin (Sherman) Shen c,\u21d1 a State Key Lab of Industrial Control Technology, Zhejiang University,\u2026"]}
|
| 12 |
+
{"14573688|1230643": ["The increasing miniaturization of electronic components and advances in modern communication technologies lead to the development of extreme small, cheap, and smart sensor nodes [1]."]}
|
| 13 |
+
{"25188925|206583375": ["[7] proposes a system that uses RF signals along with ultrasonic signals for synchronization, which makes the approach computationally complex.", "However, there are also other performance metrics (see [7] and [8]) to be considered along with accuracy when comparing different positioning systems.", "Another issue is that some positioning systems can track user positions, which raises security and privacy concerns [7].", "Since this work derives a positioning system based on VLC and accelerometer measurements (for estimating receiver\u2019s acceleration and orientation), we modify the list of performance metrics in [7], [8] for comparing VLC-based positioning systems."]}
|
| 14 |
+
{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]}
|
| 15 |
+
{"60691644|2835258": ["Many multicast routing protocols [20][ 21 ][23] have been developed for MANETs.", "protocol [13], energy-efficient routing protocols [9][20][ 21 ][23][32], and new sensornet applica-"]}
|
| 16 |
+
{"1116542|206583375": ["IN LIGHT of numerous emerging location-aware wireless applications like cooperative communications [1] and mobile queries [2], various localization approaches based on WiFi [3]\u2013[5], UWB [6]\u2013[8], ultrasound [9], etc."]}
|
| 17 |
+
{"20785815|1230643": ["Sensor nodes have been deployed to play significant roles in traffic control, battlefield, habitat monitoring and intruder tracking in recent years [1]."]}
|
| 18 |
+
{"200115|14441987": ["Furthermore, some applications only require relative positions of nodes, such as in some direction-based routing algorithms [4], [5]."]}
|
| 19 |
+
{"29024863|5972227": ["More target tracking protocols can be found in [25, 26]."]}
|
| 20 |
+
{"5779256|17325804": []}
|
| 21 |
+
{"5779256|164835": ["It is also one of the common techniques for the estimation of an MT\u2019s location, which is given by [30]", "In [19], [30], with the assumption that the variances of the distance measurements are larger for NLOS FTs, the"]}
|
| 22 |
+
{"206257405|1230643": [", 2011) especially for target tracking scenario in order to efficiently obtain network scalability, reduce communication overhead, achieve data aggregation, and minimize energy consumption (Abbasi and Younis, 2007; Akyildiz et al., 2002; Kim et al., 2006).", "The sensor nodes are small in size and can perform many important functions out of which sensing, data processing, and wireless communication with other nodes (Akyildiz et al., 2002; Yong-Min et al., 2009)."]}
|
| 23 |
+
{"11319668|6275330": []}
|
| 24 |
+
{"36033198|15300368": ["For this reason, WSNs are widely used nowadays in many applications, such as fire detection [1] or intrusion detection [2], and other environmental and security applications [3]."]}
|
| 25 |
+
{"46159657|1230643": ["The rapid development of microelectronic technologies, embedded microprocessors, wireless communications, and networking technologies has made wireless sensor networks of large scale applicable to a wide range of applications, such as environmental monitoring, industrial sensing and diagnosis, situational awareness on the battlefield, space exploration, and healthcare [1]."]}
|
| 26 |
+
{"6391938|17325804": ["I. INTRODUCTION\nW IRELESS sensor networks (WSNs) comprise a largenumber of inexpensive devices that are deployed for observing and initial processing of physical or environmental changes taking place in their vicinity.", "D norm minimizer is the major source of increased complexity of the EM algorithm compared to the simpler LS algorithm at a particular iteration."]}
|
| 27 |
+
{"29902|7889189": ["As seen from Section II, if at least one node is compromised, false measurement could lead to wrong decision-making in the network [32],[33]."]}
|
| 28 |
+
{"29902|1940388": []}
|
| 29 |
+
{"5207304|1230643": ["The aim of WSN is to perceive, collect and process the information of sensor nodes within the coverage of the network [1]."]}
|
| 30 |
+
{"25188925|206583375": ["[7] proposes a system that uses RF signals along with ultrasonic signals for synchronization, which makes the approach computationally complex.", "However, there are also other performance metrics (see [7] and [8]) to be considered along with accuracy when comparing different positioning systems.", "Another issue is that some positioning systems can track user positions, which raises security and privacy concerns [7].", "Since this work derives a positioning system based on VLC and accelerometer measurements (for estimating receiver\u2019s acceleration and orientation), we modify the list of performance metrics in [7], [8] for comparing VLC-based positioning systems."]}
|
| 31 |
+
{"1482668|1230643": ["\u2026homepage: www.elsevier .com/ locate/comnet\nSemi-supervised Laplacian regularized least squares algorithm for localization in wireless sensor networks\nJiming Chen a,c, Chengqun Wang a,b, Youxian Sun a, Xuemin (Sherman) Shen c,\u21d1 a State Key Lab of Industrial Control Technology, Zhejiang University,\u2026"]}
|
| 32 |
+
{"6391938|17325804": ["I. INTRODUCTION\nW IRELESS sensor networks (WSNs) comprise a largenumber of inexpensive devices that are deployed for observing and initial processing of physical or environmental changes taking place in their vicinity.", "D norm minimizer is the major source of increased complexity of the EM algorithm compared to the simpler LS algorithm at a particular iteration."]}
|
| 33 |
+
{"8267140|17516538": ["The utilization of traffic surveillance includes, but it is not restricted to, detection and avoidance of vehicle accidents, detection of vehicles with unusual behavior, and gathering of statistical information about roadway traffic, among several other applications [1], [2]."]}
|
| 34 |
+
{"5779256|17325804": []}
|
| 35 |
+
{"5779256|164835": ["It is also one of the common techniques for the estimation of an MT\u2019s location, which is given by [30]", "In [19], [30], with the assumption that the variances of the distance measurements are larger for NLOS FTs, the"]}
|
| 36 |
+
{"9931547|17205659": ["The reliability, flexibility, cost-effectiveness and ease of deployment make wireless sensor networks (WSNs) promise to revolutionize our life in a wide range of application domains, including military, civil, and ecological areas [2,3]."]}
|
| 37 |
+
{"9931547|1236072": ["Owing to recent advances in wireless communications and electronic technologies, the manufacturing of lowcost, low-power, and multi-functional miniature sensors has become technically and economically feasible [1]."]}
|
| 38 |
+
{"14573688|1230643": ["The increasing miniaturization of electronic components and advances in modern communication technologies lead to the development of extreme small, cheap, and smart sensor nodes [1]."]}
|
| 39 |
+
{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]}
|
| 40 |
+
{"206257405|1230643": [", 2011) especially for target tracking scenario in order to efficiently obtain network scalability, reduce communication overhead, achieve data aggregation, and minimize energy consumption (Abbasi and Younis, 2007; Akyildiz et al., 2002; Kim et al., 2006).", "The sensor nodes are small in size and can perform many important functions out of which sensing, data processing, and wireless communication with other nodes (Akyildiz et al., 2002; Yong-Min et al., 2009)."]}
|
| 41 |
+
{"200115|14441987": ["Furthermore, some applications only require relative positions of nodes, such as in some direction-based routing algorithms [4], [5]."]}
|
| 42 |
+
{"26706809|956843": []}
|
| 43 |
+
{"15664727|17325804": []}
|
| 44 |
+
{"7334713|6396569": ["Localization over randomly deployed mobile sensor nodes also called MANET, is challenging when compared to localization over a static network [2]."]}
|
| 45 |
+
{"13912957|164835": ["\u2026requirement was 125 m and was later tightened to 100 m.) This FCC mandate has motivated considerable research efforts towards developing accurate wireless location algorithms for cellular networks and has led to significant enhancements to the wireless location technology (see, e.g., [12]\u2013[25]).", "The solution that results in the shortest distance from the circle (4) is chosen to be an estimate of the MS location coordinates [12]."]}
|
| 46 |
+
{"20785815|1230643": ["Sensor nodes have been deployed to play significant roles in traffic control, battlefield, habitat monitoring and intruder tracking in recent years [1]."]}
|
| 47 |
+
{"1116542|206583375": ["IN LIGHT of numerous emerging location-aware wireless applications like cooperative communications [1] and mobile queries [2], various localization approaches based on WiFi [3]\u2013[5], UWB [6]\u2013[8], ultrasound [9], etc."]}
|
| 48 |
+
{"6202265|1230643": []}
|
| 49 |
+
{"11319668|6275330": []}
|
| 50 |
+
{"36033198|15300368": ["For this reason, WSNs are widely used nowadays in many applications, such as fire detection [1] or intrusion detection [2], and other environmental and security applications [3]."]}
|
| 51 |
+
{"46159657|1230643": ["The rapid development of microelectronic technologies, embedded microprocessors, wireless communications, and networking technologies has made wireless sensor networks of large scale applicable to a wide range of applications, such as environmental monitoring, industrial sensing and diagnosis, situational awareness on the battlefield, space exploration, and healthcare [1]."]}
|
| 52 |
+
{"29902|7889189": ["As seen from Section II, if at least one node is compromised, false measurement could lead to wrong decision-making in the network [32],[33]."]}
|
| 53 |
+
{"29902|1940388": []}
|
| 54 |
+
{"60691644|2835258": ["Many multicast routing protocols [20][ 21 ][23] have been developed for MANETs.", "protocol [13], energy-efficient routing protocols [9][20][ 21 ][23][32], and new sensornet applica-"]}
|
| 55 |
+
{"1862414|1230643": ["Due to many attractive characteristics of sensor nodes such as small size and low cost, sensor networks [2], [12], [15], [19] become adopted to many military and civil applications, such as target tracking, surveillance, environmental control, and health care."]}
|
| 56 |
+
{"29024863|5972227": ["More target tracking protocols can be found in [25, 26]."]}
|
graph_1028144.jsonl β edge/graph_1000416.jsonl
RENAMED
|
File without changes
|
edge/graph_10004491.jsonl
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"118230787|206051485": []}
|
| 2 |
+
{"1628909|60779308": ["The shape descriptor used in this study is eccentricity, which is defined as the ratio of major to minor axes of a connected component and evaluate elongation of edges (Yang et al., 2008)."]}
|
edge/graph_10011823.jsonl
ADDED
|
@@ -0,0 +1,7 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"1428759|1230643": ["Wireless sensor networks (WSNs), comprising of tiny, radio-enabled sensing devices open up new opportunities to observe and interact with the physical world, and have been applied in domains ranging from patient health monitoring through the use of biomedical sensors to military applications such as battlefield surveillance [1].", "Wireless sensor networks have been a very active area of research in recent years (see [1] for a survey)."]}
|
| 2 |
+
{"16592951|1230643": ["Such networks have the potential to enable a wide range of applications in environmental monitoring, health, military and security (see [1] for a survey of applications)."]}
|
| 3 |
+
{"16102897|1230643": ["Sensor networks have been a very active area of research in recent years (see [1] for a survey), and there is a large body of work on data collection from sensor networks that applies higher-level techniques to sensor network data processing."]}
|
| 4 |
+
{"207172599|3330313": []}
|
| 5 |
+
{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]}
|
| 6 |
+
{"7774517|3330313": ["The term outlier, also known as anomaly, originally stems from the field of statistics [5].", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.e., statistics, neural networks and machine learning."]}
|
| 7 |
+
{"7774517|1230643": ["For a sensor node, the communication cost is often several orders of magnitude higher than the computation cost [20]."]}
|
graph_1030380.jsonl β edge/graph_10012473.jsonl
RENAMED
|
File without changes
|
edge/graph_10015090.jsonl
ADDED
|
@@ -0,0 +1 @@
|
|
|
|
|
|
|
| 1 |
+
{"61166265|14441987": []}
|
edge/graph_10031526.jsonl
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"2745977|10500613": []}
|
| 2 |
+
{"2745977|913718": ["While both database schemas and ontologies provide a vocabulary of terms to describe a domain of interest, database schemas do not make explicit the semantics of their elements while ontologies, by definition (\u201ca formal, explicit, specification of a domain conceptualization\u201d [19]), do [44].", "In the terminology of [44], we describe an element level matcher which relies on the use of external knowledge sources to derive mappings.", "Internal approaches typically explore information provided by the matched ontologies such as their labels, structure or instances [44].", "The approaches developed both for database schemas and ontologies follow two major paradigms depending on the types of information they use to derive mappings [25, 38, 39, 44]."]}
|
graph_1041439.jsonl β edge/graph_10041852.jsonl
RENAMED
|
File without changes
|
graph_1041692.jsonl β edge/graph_10056835.jsonl
RENAMED
|
File without changes
|
edge/graph_100595306.jsonl
ADDED
|
@@ -0,0 +1,7 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"1517537|2398835": []}
|
| 2 |
+
{"1517537|18189153": ["Routing Attacks [65] Spoo\ufb01ng attacks (IP and URL spoo\ufb01ng), rushing, gray hole, black hole, Cybil, man-in-the-middle attacks, and sleep deprivation."]}
|
| 3 |
+
{"1517537|16654832": ["Meanwhile, different communication networks are available, such as Wi-Fi, LTE 3G/4G, and wireless networks, which connect end users to network resource [45]."]}
|
| 4 |
+
{"1517537|12815020": ["Port Scanning Scan the free and less secure port for attempting attacks.", "Port Scanning [63] TCP scanning, UDP Scanning, SYN scanning, FIN scanning, ACK scanning, and Window scanning."]}
|
| 5 |
+
{"11208721|14287498": ["Keromytis [107], [108] presented two comprehensive surveys of VoIP security, which summarized previous works related to VoIP security and organized them according to an"]}
|
| 6 |
+
{"11208721|7060462": ["Keromytis [107], [108] presented two comprehensive surveys of VoIP security, which summarized previous works related to VoIP security and organized them according to an"]}
|
| 7 |
+
{"49430339|37424351": ["protocol attacks, threats in network security, breaches in privacy, and configuration attacks [15].", "If an attacker is able to infect multiple smartphones, he may form a botnet that can launch simultaneous attacks on the smart network [15].", "\u201d Attackers may upload malicious smart applications onto an unsuspecting user\u2019s phone in order to infect the device that serves as a connection to the smart city [15].", "An example of an IoT infrastructure project can be seen in Santander, Spain called SmartSantander [15].", "Furthermore, social media websites that house a smartphone user\u2019s personal information may be subject to attack or manipulation when used as a personal identifier in a smart city [15].", "Thus, projects such as SmartSantander are a useful resource for testing solutions and corroborating theories surrounding smart city security and privacy challenges.", "Such attacks could occur through the internet, over unsecured Wi-Fi connections, or unconsented Bluetooth connections.", "SmartSantander is made up of over two thousand IoT devices mimicking an urban environment with the intention of developing a smart network with experimentation support and service provision [15].", "[15] state that \u201c[s]mart phones are one of the core component[s] of IoT infrastructure in a smart city as they give access to various services and smart applications [and] are also the main source of peoples\u2019 role in a smart city.", "IEEE 802.15.11 helps secure Wi-Fi through the Wi-Fi Protected Access (WPA) security protocol, and IEEE 802.15.1 is used in Bluetooth [15].", "Smartphone vulnerabilities that could compromise smart city security include malicious smart applications, botnets, location and gps, spyware, threats from social networks, Wi-Fi, and Bluetooth [15].", "A smartphone user\u2019s privacy and security could be compromised by compromising the GPS features available in smartphones, much like the previously mentioned 80-million-dollar yacht manipulated by researchers [15].", "Experimentation support allows researchers to put their theories to the test in a real life scenario and service provision allows SmartSantander to provide services to people described in the form of use cases [15]."]}
|
edge/graph_10061981.jsonl
ADDED
|
@@ -0,0 +1,4 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"30309437|14561706": ["By providing information about human behaviour, an automated system for its recognition can be a useful tool for both Human-Robot Interaction (and cooperation) in smart environments [2] and the purposes of Wearable and Assistive Robotics [3]."]}
|
| 2 |
+
{"9621856|16013270": ["The number of stages was determined by cross validation using n = [3, 5, 10, 15] fixed stages.", "Additionally, the number of Gaussians was evaluated with m = [1, 2, 3, 5, 10] Gaussians.", "One good measure of the productivity of the field is the sheer number and variety of datasets that have been produced by researchers in the last few years: A recent survey [3] lists no less than twenty\u2217Part of this work was done at the lab for Computer Vision for Human-Computer Interaction at the Karlsruhe Institute of Technology (http://cvhci."]}
|
| 3 |
+
{"14036544|16013270": ["Even when excluding single image action datasets such as the Stanford-40 Action Dataset (Yao et al. 2011b or the Pascal Action Classi\ufb01cation Challenge (Ever-ingham et al. 2011), the number of proposed activity datasets is quite large (Chaquet et al. (2013) survey 68 datasets)."]}
|
| 4 |
+
{"2904170|1634674": ["There is a rich history of activity recognition in the vision community; we refer the reader to the recent surveys of [11, 40] for a detailed summary."]}
|
edge/graph_10064368.jsonl
ADDED
|
@@ -0,0 +1,10 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"167536|1708582": []}
|
| 2 |
+
{"5854062|1634674": ["We discuss implementation, testing and evaluation in Section 6 and conclude the paper in Section 7."]}
|
| 3 |
+
{"3648998|16362395": ["The final class will be that of the majority [63].", "[63] proposed boosting, voting and stacking techniques as classifier combination strategies used in EEG signal analysis."]}
|
| 4 |
+
{"3648998|192934": ["The final decision is made based on the outputs of the stacked classifier in conjunction with the outputs of individual classifiers [65]."]}
|
| 5 |
+
{"11186847|16156203": ["[13] do model some temporal information by incorporating", "ery of frequent sequences\u201d [13], [14], \u201csequence mining\u201d [15],"]}
|
| 6 |
+
{"11186847|1176034": ["To find frequent and periodic patterns of activity, we will be exploiting a data mining subfield usually referred to as \" discovery of frequent sequences \" [13], [14], \" sequence mining \" [15], or \" activity monitoring \" [16]."]}
|
| 7 |
+
{"9226899|10817088": ["As such, it can also assist elderly people to age in place while still having sufficient security standards in case of emergency [7]\u2013[9]."]}
|
| 8 |
+
{"9226899|1634674": ["A variety of HMM-based variants is presented in a comprehensive survey by Turage et al. [84]."]}
|
| 9 |
+
{"11987951|1230643": ["1) Energy Consumption Constraints: From a system perspective, the energy consumption of IoT mainly comes from data communication because the energy expenditure in data sensing and processing is much less compared to data communication [29]."]}
|
| 10 |
+
{"5528008|1708582": []}
|
graph_1048595.jsonl β edge/graph_1006459.jsonl
RENAMED
|
File without changes
|
graph_1061957.jsonl β edge/graph_10065043.jsonl
RENAMED
|
File without changes
|
edge/graph_10067743.jsonl
ADDED
|
@@ -0,0 +1,19 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"18295491|7988320": []}
|
| 2 |
+
{"7854020|7988320": []}
|
| 3 |
+
{"999725|2635807": ["Additionally, we note that there are no arcs from biosensors to biosensors and from sinks to sinks.", "Keywords: Body Area Networks, Wireless Sensor Networks, Network Design, Robust Optimization, Traffic Uncertainty, Integer Linear Programming, Linear Relaxations, Metaheuristics.", "\u2026sent from b to each sink s \u2208 S, which is equal to the bitrate dbs, namely:\n\u2212 \u2211\n(b,j)\u2208 AB\u2192R\u222aAB\u2192S\ndbs x bs bj = \u2212 dbs \u2200 b \u2208 B, s \u2208 S (3)\nNote that since we must route the entire data flow of b for s on a single path, the unsplittable flow variables xbsij must be multiplied by the corresponding\u2026"]}
|
| 4 |
+
{"26822154|7988320": []}
|
| 5 |
+
{"26822154|16514036": []}
|
| 6 |
+
{"26822154|1230643": []}
|
| 7 |
+
{"26822154|20905429": ["In Pantelopoulos and Bourbakis (2010) the authors introduce a survey on wearable sensor-based systems for health monitoring and a comparison of system implementations was elaborated in order to choose the most important characteristics, which describe the functionality of systems."]}
|
| 8 |
+
{"26985018|16514036": ["Chen et al.(2) presented the difference between a wireless sensor network and BAN in terms of mobility, data rate, latency, node density, power supply, network topology, node replacement, security level, etc."]}
|
| 9 |
+
{"18049463|7854020": []}
|
| 10 |
+
{"16514036|1230643": ["Although many protocols and algorithms have been proposed for traditional wireless sensor networks (WSNs) [1], they are not well suited to the unique features and application requirements of BAN."]}
|
| 11 |
+
{"207223082|7834819": ["Examples of commercially available products are: Vivatec wrist care [27], Tynetec [25], Fallwatch (Vigi\u2019 fall) [4], activPAL [29], and Tunstall fall detector [10]."]}
|
| 12 |
+
{"52870530|16514036": []}
|
| 13 |
+
{"52870530|8836911": []}
|
| 14 |
+
{"10445703|20905429": ["Recently, many mobile-based medical monitoring devices have been developed with the capability of processing certain types of physiological signals [1][2]."]}
|
| 15 |
+
{"27415036|16514036": []}
|
| 16 |
+
{"11438682|11047930": ["\u2026protocols for WSNs and WBANs are proposed by considering different applications and topologies in Javaid, Khan, Shakir, et al. (2013), Tauqir et al. (2013), Javaid, Khan, Ilahi, et al. (2013), Javaid, Yaqoob, et al. (2013), Zhang and Sawchuk (2013), Tahir et al. (2013), and Javaid et al. (2013)."]}
|
| 17 |
+
{"25898379|42497499": ["The low band is divided into three channels and high band is divided into 8 channels [11]."]}
|
| 18 |
+
{"7988320|6539555": []}
|
| 19 |
+
{"15092326|12030667": ["A great number of studies have been conducted in the literature regarding the TDMA scheduling algorithms in WSNs [5] \u2013 [9].", "Thus, synchronization is a crucial issue in WSNs. Efficient synchronization means mainly lower (a) data loss, (b) interference and (c) power consumption.", "Instead, the communication protocol and the corresponding synchronization have been implemented from scratch not only for simplicity but also for investigating conceptual issues of WSNs.", "In paper [5] authors present sensor network properties that are crucial for the design of TDMA protocols."]}
|
edge/graph_10086984.jsonl
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"111220014|10086984": []}
|
| 2 |
+
{"109987278|10086984": []}
|
edge/graph_10087812.jsonl
ADDED
|
@@ -0,0 +1,7 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"17832672|1708582": ["The survey by Kaelbling et al. (1996) discusses several approaches to generalisation."]}
|
| 2 |
+
{"17216004|1708582": ["Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks (Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transfer between RL tasks (see Figure 1) to provide an overview of a new, growing area of research.", "Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks(Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transferbetween RL tasks( ee Figure 1) to provide an overview of a new,\u2026"]}
|
| 3 |
+
{"16198401|1708582": ["In this section we brie\ufb02y review the basic framework of RL on which we will build our arguments."]}
|
| 4 |
+
{"7770940|1452734": ["One of the crucial activities in the development process of puppies and babies is self-exploration [7].", "In recent years, studies on the inner mechanisms of human development, pursued in many different areas (such as neuroscience, psychology, developmental sciences, robotics, machine learning) converged to a new field, commonly referred to as developmental robotics [7, 20].", "Developmental robotics has its main source of inspiration in studies from neuroscience and psychology [7], that show how similar mechanisms could be traced in the developmental process of children.", "Because of the complexity of its goal, developmental robotics has many different facets [7]."]}
|
| 5 |
+
{"724794|1708582": ["\u2026at designing algorithms by which autonomous agents can learn to behave in some appropriate fashion in some environment, from their interaction with this environment or from observations gathered from the environment (see e.g. Kaelbling et al. (1996) or Sutton and Barto (1998) for a broad overview)."]}
|
| 6 |
+
{"204246491|10087812": ["Similarly to reinforcement learning, transfer learning (TL) [1, 9, 10] shows first that humans learn a task better and faster when they have first experienced a similar task [11].", "In this section we present three categories of knowledge transfer that are strongly related to those in [9, 15].", "In the context of RL, transfer training [9, 10] refers to the process of knowledge use, which are acquired in one or more prelearned tasks."]}
|
| 7 |
+
{"1223826|1708582": []}
|
edge/graph_10088979.jsonl
ADDED
|
@@ -0,0 +1,5 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"5753697|9104850": ["With the explosive growth of the World Wide Web, proxy caching has become an important technique to improve network performance [3, 11, 15, 23, 25, 27, 30]."]}
|
| 2 |
+
{"15154594|9104850": ["The performance objective is to minimize the total access cost by considering both transmission cost and transcoding cost."]}
|
| 3 |
+
{"7589446|816774": []}
|
| 4 |
+
{"61770681|8305806": ["Nevertheless, a survey of available multicast techniques in [210] indicated the potential for such a protocol, and efforts to develop a standard reliable multicast protocol that is scalable and efficient continue [219]."]}
|
| 5 |
+
{"61770681|7971188": ["Peer-topeer networks also influence grid systems, but because this is also a new technology, reliability has been less extensively researched [26]."]}
|
edge/graph_10089999.jsonl
ADDED
|
@@ -0,0 +1,7 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"11559229|6972141": ["The criteria were as follows: (1) the system is easy to use, (2) the system is easy to learn, (3) the", "The results show no significant difference in the ease of learning between the two conditions, (1) (2) (3) (4)"]}
|
| 2 |
+
{"12104564|7788290": ["Many examples of people tracking have used cameras as their primary sensor [19, 26], however laser rangefinders have also been used [52]."]}
|
| 3 |
+
{"9945281|1113420": ["Luckily, however, surveys of the most prominent challenges and issues in ubiquitous computing have shown that it is sufficient to localize a user within room-level accuracy for almost all applications [1, 3, 6, 12, 15, 30]."]}
|
| 4 |
+
{"16402554|206583375": ["A number of techniques [4]\u2013[7] have been proposed in the last decade for robust indoor positioning."]}
|
| 5 |
+
{"17591052|7834819": ["Aside from vision-based solutions, sensor-based approaches are also extensively adopted in biomedical systems [31\u201334]."]}
|
| 6 |
+
{"16371730|12715779": ["Some views of human computation are centered on the use of games [74].", "[8,74] \u201c\u2026a technique to let humans solve tasks, which cannot be solved by computers.\u201d"]}
|
| 7 |
+
{"16371730|30815820": ["\u2026that facilitate collective action and social interaction online with rich exchange of multimedia information and evolution of aggregate knowledge\u2026\u201d [48] \u201c\u2026 the interplay between persons' social behaviors and their interactions with computing technologies\u201d [15] The key distinction between human\u2026"]}
|
edge/graph_10091442.jsonl
ADDED
|
@@ -0,0 +1,15 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"18282837|18747476": []}
|
| 2 |
+
{"17889756|627405": ["identified several issues of electronic search derived from their experience in conducting SLRs (Brereton et al., 2007).", "Brereton et al. (2007) identified several issues of electronic search derived from their experience in conducting SLRs."]}
|
| 3 |
+
{"12955359|205435103": ["Two of the papers were published after 30th June 2008 (Beecham et al. 2008; G\u00f3mez et al. 2008) and were excluded from the SLR report but are included in this analysis."]}
|
| 4 |
+
{"12955359|7696556": []}
|
| 5 |
+
{"12955359|627405": ["These propositions were developed when we started scoping our overall research program (Brereton et al. 2007), but were revised when the specific case was identified.", "We have commented before on the problems of software engineering search engines (Brereton et al. 2007), but it is seems clear that we need better tools to support the overall systematic review process.", "We are currently undertaking a program of case study-based research that is aimed at better understanding the role of systematic literature reviews (SLRs) in software engineering (Brereton et al. 2007)."]}
|
| 6 |
+
{"12955359|27317885": ["J\u00f8rgensen and Shepperd (2007) report results from a broad manual search used for a mapping study of a specific software engineering topic (i."]}
|
| 7 |
+
{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]}
|
| 8 |
+
{"34200954|627405": ["Like other researchers, [25], we also found that tabulating the data is a useful mean of aggregation."]}
|
| 9 |
+
{"5223375|3939683": ["30.95% [S54], [S55], [S56], [S57], [S58], [S59], [S60], [S61], [S62], [S63] Semi-automatic 1.95% [S64], [S65], [S66], [S67], [S68], [S69], [S70], [S71], [S72], [S73], [S74], [S75] Manual 8.67% [S69], [S76], [S77], [S78], [S79], [S80], [S81], [S82], [S83], [S84] Artifact (RQ2) Code 72.89% [S1], [S2], [S3], [S11], [S65], [S85], [S86], [S87], [S88], [S89] Model 59.25% [S1], [S3], [S28], [S29], [S65], [S87"]}
|
| 10 |
+
{"5223375|206778272": ["Mens et al. [12] provided an overview of existing research in the \ufb01eld of software refactoring."]}
|
| 11 |
+
{"17279013|17446703": ["Guidelines for Performing Systematic Literature Review in Software Engineering.", "Systematic Reviews (SRs), also known as Systematic Literature Reviews, have been recently introduced in the area of Software Engineering (SE) [9] [20] as a structured and systematic methodology for performing literature reviews.", "[16] Salleh, N, Mendes, E. and Grundy, J. (2009) Empirical Studies of Pair Programming for CS/SE Teaching in Higher Education: A Systematic Literature Review.", "Empirical Studies of Pair Programming for CS/SE Teaching in Higher Education: A Systematic Literature Review [16]."]}
|
| 12 |
+
{"17279013|627405": ["For scoping RQs, perform a systematic preview mapping study [3] and define complementary RQs and unit of analysis [17].", "Difficulty in initial learning [4], lack of domain knowledge [1] [3] and guidance [1], education of the supervisors [1], not clear when to stop the piloting process [17], not finding many studies [5], distributed nature of team complicates the process of protocol development [3], limited quantity and quality of record keeping [3], and lack of consistency among researchers for defining conceptual structure during SR [4].", "We believe that data synthesis is always in accordance with the RQs and should attempt to answer the RQs.", "A review protocol template for optimizing the process of planning and execution [13] and for data extraction - one person extracting data and other acting as a checker [3] is more efficient than two people extracting data and comparing inconsistencies [3].", "In particular, similar problems were faced while formulating the research questions (RQs) and determining the inclusion/exclusion (I/E) and quality\ncriteria.", "Since the formulation of RQs was guided by the structure of PICOC, they found that identifying the PICOC really depended on the SR\u201fs context.", "In addition, some studies also suggest best practices [1] [3] for conducting SRs, challenges faced while conducting SRs [1], and point out a need for improvement in the SR guidelines related to the aspects of quality assessment, experience/examples, simplified version, quantitative analysis, qualitative analysis, and protocol templates [1].", "It is also our experience that creating the data extraction and data synthesis forms while creating the review protocol is an iterative activity, and is largely determined and should be aligned with the RQs.", "Overall Process: The overall process of conducting SRs is time and effort consuming [1], in particular processes of planning [13], execution [13] and data extraction [3].", "The formulation of RQs was also driven by the SR novices\u201f domains of interest, and the challenge was to ensure that the RQs were relevant and appropriate.", "Defining Research Questions (RQs): Problem scoping RQs [3], RQs structure not fitting comfortably with Population, Intervention, Comparison, Outcome, Context (PICOC) [17] and guidelines not considering impact of RQ type on review procedures [4].", "In our case i.e., for novices, we revised the research questions of all three SRs we carried out until we were satisfied that the RQs covered all the aspects of the topic area on which we wanted to collect the evidence.", "We have also observed that while some experiences are common to both novices and experts, certain problems are only faced by novices e.g., formulating RQs, selecting studies, creating data extraction and synthesis forms, etc.", "As the use of SRs in SE is new, various researchers have reported problems relating to different SR activities such as formulation of research questions [17], [3], conducting of literature searches [5] [17], interrater reliability checks [17], selection bias [6], quality assessment of primary studies [6] [5] [17]; and also with the overall SR process as being very time consuming [1] [13].", "The RQs were revised iteratively until consensus was achieved among the review team - a novice (PhD student) and the supervisor (Mendes).", "Gain a good knowledge of the SRs by reading and understanding the SR guidelines before attempting to conduct SRs.\n Expect the RQs as well as other parts of the protocol to evolve while conducting SRs."]}
|
| 13 |
+
{"15093265|7696556": []}
|
| 14 |
+
{"15093265|27317885": ["5 2005 No No Workshop 119 N Evidence produced by empirical software engineers [40] RT 2 2005 No Yes Conference 13 N Classifying context in SE experiments [41] SERT 2.", "5 [40] SLR P Y N P 2 [41] MS Y Y N P 2.", "System and application specialties 42 [41] 1 [15] 1 2 1 Total 233 12 8 6 4 11 8 29 17"]}
|
| 15 |
+
{"8422408|8250043": []}
|
edge/graph_10092092.jsonl
ADDED
|
@@ -0,0 +1,13 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"6021855|2670121": []}
|
| 2 |
+
{"11392154|393948": []}
|
| 3 |
+
{"201003|2670121": []}
|
| 4 |
+
{"3761015|2670121": ["As a reference, the survey paper by Cook [19] covers transfer learning for the application of activity recognition and the survey papers by Patel [89] and Shao [103] address transfer learning in the domain of image recognition.", "Cook [19] and Feuz [36] provide a different variation where the definition of supervised or unsupervised refers to the presence or absence of labeled data in the source domain and informed or uninformed refers to the presence or absence of labeled data in the target domain."]}
|
| 5 |
+
{"10213552|3750204": ["7.0 Batch Java Mahout \u00d7 \u00d7 \u2713 \u00d7 Spark 1.3.1 Batch, streaming Java, Python, R, Scala MLlib, Mahout, H 2 O \u2713 \u2713 \u2713 \u2713 Flink 0.8.1 Batch, streaming Java, Scala Flink-ML, SAMOA \u2713 \u2713 \u2713 \u00d7 Storm 0.9.4 Streaming Any SAMOA \u2713 \u2713 \u2713 \u00d7 H 2 O 3.0.0.12 Batch Java, Python, R, Scala H 2 O, Mahout, MLlib \u2713 \u2713 \u2713 \u2713 6.", "Mahout is one of the more well-known tools for ML.", "On the other hand, a number of companies have reported success using Mahout in production.", "Additionally, while a lot of documentation exists for Mahout, much of it is outdated and irrelevant to people using the current version .", "In April 2015, Mahout 0.9 was updated to 0.10.0, marking something of a shift in the project's goals [92].", "on Spark\u2019s iterative batch and streaming approaches, as well as its use of in-memory computation, enable jobs to run significantly faster than those using Mahout [88, 127].", "One of Mahout's most commonly cited assets is its extensibility and many have achieved good results by building off of the baseline algorithms [87, 99, 100].", "For machine learning tasks, Spark ships with the MLlib [60] and GraphX [61] libraries and the latest version of the Mahout [62] library offers a number of Spark implementations as well.", "Mahout includes several implementations that are not distributed and therefore not included, but they are discussed in the \" Evaluation of machine learning tools \" section.", "The algorithms included in Mahout focus primarily on classification, clustering and collaborative filtering, and have been shown to scale well as the size of the data increases [98].", "The goal of the Mahout-Samsara project is to help users build their own distributed Fig.", "Usability may be considered in terms of initial setup, ongoing maintenance, programming languages available, user interface available, amount Table 2 Overview of machine learning toolkits a Real-time streaming implementation b Single machine, trained using Stochastic gradient descent Mahout MLlib H", "MapReduce is compatible with the Mahout library for ML, and the programming interfaces discussed in the previous section can be used as well.", "One problem with using Mahout in production is that development has moved very slowly; version 0.10.0 was released nearly seven and a half years after the project was initially introduced.", "Among the more commonly cited complaints about Mahout is that it is difficult to set up on an existing Hadoop cluster [93\u201395]."]}
|
| 6 |
+
{"7322495|192934": ["We conducted experiments on two types of data, text data and image data, using Amazon product reviews [15] and UCI handwritten digits [11] respectively."]}
|
| 7 |
+
{"12935955|7704963": ["Similar techniques can also be found in the research of uncertain data mining [1]."]}
|
| 8 |
+
{"11067362|5940452": ["mation literature of using genetic algorithms to automatically learn weights for different parameters [43]."]}
|
| 9 |
+
{"15494001|11894197": ["A great deal of work has been conducted on various filter-based approaches to feature selection [7, 10, 27, 21]."]}
|
| 10 |
+
{"8500384|14356173": ["The existing literature incorporating statistical or machine learning techniques to detect outliers in healthcare is fairly extensive, using common methods such as decision trees or neural networks [26], [24], [29]."]}
|
| 11 |
+
{"8500384|27569632": ["While this paper does not provide a comprehensive discussion on outlier detection methods, we refer the reader to [10], [34]."]}
|
| 12 |
+
{"7857907|2670121": ["Figure 1 illustrates the layout and sensor locations for three smart homes from the CASAS datasets [Cook et al., 2013c] used in this paper.", "However, for applications such as sentiment analysis across different languages [Pan, 2010], and activity recognition across different domains [Cook et al., 2013b], the source", "Transfer learning approaches have found success in many applications including activity recognition [Hu et al., 2011; Cook et al., 2013c], sentiment classification [Zhou et al., 2014], document analysis and indoor localization [Pan and Yang, 2010].", "The CASAS dataset [Cook et al., 2013a] is a collection of smart home datasets that are widely used for investigating activity recognition algorithms.", "However, for applications such as sentiment analysis across different languages [Pan, 2010], and activity recognition across different domains [Cook et al., 2013b], the source \u21e4 The author contributed to this work during his internship at IIT Ropar. and target data are represented using\u2026"]}
|
| 13 |
+
{"14108784|15888893": ["For example, to predict user behaviors for a new product A where there is not enough training data, but there is useful data from a similar product B, can we use the knowledge learned from B to support predictions about A? Transfer learning has been proposed to address this problem [1,2] and has garnered tremendous attention from researchers [3\u20136]."]}
|
edge/graph_10093798.jsonl
ADDED
|
@@ -0,0 +1 @@
|
|
|
|
|
|
|
| 1 |
+
{"14369421|10093798": []}
|
edge/graph_10096622.jsonl
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"26135040|1230643": ["WSNs have been used in many applications, ranging from environmental and natural habitat monitoring, medical, industry and military applications [1-2]."]}
|
| 2 |
+
{"24682427|1230643": ["It has been used in applications such as environmental and natural habitat monitoring, medical instrumentation, industrial automation, and military surveillance [1], [2]."]}
|
graph_1063643.jsonl β edge/graph_10096898.jsonl
RENAMED
|
File without changes
|
edge/graph_10098507.jsonl
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"2201478|10098507": []}
|
| 2 |
+
{"16389868|18691290": ["A survey on this field and a comparison of the different projects is given in [4] and [5]."]}
|
edge/graph_10098641.jsonl
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"13053508|14736029": []}
|
| 2 |
+
{"23110468|14736029": []}
|
graph_1074202.jsonl β edge/graph_10099297.jsonl
RENAMED
|
File without changes
|
edge/graph_10100716.jsonl
ADDED
|
@@ -0,0 +1 @@
|
|
|
|
|
|
|
| 1 |
+
{"17151752|10100716": ["It has been successfully used in other studies (Montzka et al., 2012) with diferent applications including soil moisture (Montzka et al., 2011, 2013), snow water equivalent (Leisenring and Moradkhani, 2011), lood inundation mapping (Matgen et al., 2010), radiance data assimilation for operational\u2026", "On the other hand, data assimilation has been successfully used for parameter estimation in subsurface hydrology (Evensen, 2009, Han et al., 2012, 2013, Kurtz et al., 2012, Montzka et al., 2012, Moradkhani et al., 2005b)."]}
|
edge/graph_10116146.jsonl
ADDED
|
@@ -0,0 +1,2 @@
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"7284666|1099309": ["This adds to the findings of [10] where it was demonstrated that LBP features perform better for texture retrieval than the MPEG-7 texture features [15]."]}
|
| 2 |
+
{"11291804|192934": []}
|
graph_1078188.jsonl β edge/graph_10119483.jsonl
RENAMED
|
File without changes
|
graph_1110872.jsonl β edge/graph_10120175.jsonl
RENAMED
|
File without changes
|
edge/graph_10120942.jsonl
ADDED
|
@@ -0,0 +1 @@
|
|
|
|
|
|
|
| 1 |
+
{"114113653|10120942": []}
|
edge/graph_10124745.jsonl
ADDED
|
@@ -0,0 +1,15 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"9714082|9913343": ["Existing graphical password schemes can be categorized into recall-based, recognition-based and cued-recall [5]."]}
|
| 2 |
+
{"267586|9913343": ["Recent systems have been developed which use easy to remember passwords, including abstract art pictures like in the \u201cDeja vu\u201d system [2], graphical passwords (see survey in [6]), or memorized motor sequences."]}
|
| 3 |
+
{"7815763|9913343": ["More graphical password schemes have been summa-rized in a recent survey paper [10]."]}
|
| 4 |
+
{"15152094|9913343": ["emory task involved in remembering and entering the password, graphical passwords can be divided into three general categories: recall-based systems, cued-recall systems and recognition-based systems [13, 14]. DAS is the first recall-based graphical password scheme in which the password is a free-form picture drawn on a 2D grid [7]. This scheme releases users from remembering complex text string and has a"]}
|
| 5 |
+
{"9852158|9913343": ["An excellent survey of the numerous graphical password schemes that have been developed is [23]."]}
|
| 6 |
+
{"3849996|9913343": []}
|
| 7 |
+
{"7483764|9913343": ["As mentioned in [10], most recognitionbased graphical passwords tend to have a small password space.", "However, it is more difficult to carry out a brute force attack against graphical passwords than text-based passwords [10].", "the total number of pictures at each round) [10]."]}
|
| 8 |
+
{"18485594|9913343": ["More graphical password schemes have been summarized in a recent survey paper [15]."]}
|
| 9 |
+
{"208011223|9913343": []}
|
| 10 |
+
{"1441826|9913343": ["Many graphical password schemes have been proposed to date, and several surveys are available [29], [21], [26]."]}
|
| 11 |
+
{"651758|9913343": ["One might notice that our categorization of graphical passwords differs from most literature [7, 28, 35, 36], where a boundary line was drawn between recognition and recall."]}
|
| 12 |
+
{"10922169|9913343": ["One final point - graphical passwords is an active research topic; due to space limit, some interesting work is not covered here, but can be found in a recent survey of this topic in [11]."]}
|
| 13 |
+
{"16660466|9913343": ["Graphical password can be categorized into recall-based, recognition-based, and cued-recall [6,7]."]}
|
| 14 |
+
{"2084061|9913343": ["Early surveys of graphical passwords are available [Monrose and Reiter \n2005; Suo et al. 2005].", "Permission to make digital or hard copies of part or all of this work \nfor personal or classroom use is granted without fee provided that copies are not made or distributed \nfor pro.t or commercial advantage and that copies show this notice on the .rst page or initial screen \nof a display along\u2026"]}
|
| 15 |
+
{"56504976|9913343": []}
|
edge/graph_10137209.jsonl
ADDED
|
@@ -0,0 +1,5 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"9298269|1895753": ["asp?model=83319, and consists of the implementation of a number of benchmark neuronal network models in several different simulators, associated with a review article on spiking neuronal network simulators [2]."]}
|
| 2 |
+
{"1506679|513106": ["In addition to collecting basic demographics [8], [25], [26], the survey will ask participants to consider their own SPI preferences via a pairwise comparison mechanism based on the wiki survey mechanism designed by Salganik et al."]}
|
| 3 |
+
{"6168059|10500613": ["For example, one web aggregator requires the curation of 80,000 URLs and a second biotech company has the problem of curating 8000 spreadsheets."]}
|
| 4 |
+
{"6168059|386036": ["For example, one web aggregator requires the curation of 80,000 URLs and a second biotech company has the problem of curating 8000 spreadsheets."]}
|
| 5 |
+
{"5970075|6116234": []}
|
edge/graph_10137283.jsonl
ADDED
|
@@ -0,0 +1,4 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"15518330|9240891": []}
|
| 2 |
+
{"9230355|9240891": ["There are at the moment few trust systems and models that explicitly take the risk factor into account [8]."]}
|
| 3 |
+
{"3127783|9240891": ["The same trust is defined as \u201cthe firm belief in the competence of an entity to act dependably, securely and reliably within a specified context\u201d (assuming dependability covers reliability and timeliness)\u201d [ 8 ]."]}
|
| 4 |
+
{"2597225|9240891": ["The essential components of a trust relationship are: the trustor, the trustee, a specific context with associated level of trust, and the conditions under which this relationship becomes active [2] ."]}
|
edge/graph_10137425.jsonl
ADDED
|
@@ -0,0 +1,28 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"207239085|5671282": ["To date this problem has not been studied in cross-modal deep hashing methods [36].", "We refer the readers to [36] for a comprehensive survey.", "An advantageous solution to cross-modal retrieval is hashing methods, which compress high-dimensional data into compact binary codes with similar binary codes for similar objects [36]."]}
|
| 2 |
+
{"207239085|393948": ["Recently, it has been witnessed that deep learning methods [3], such as deep convolutional networks (CNNs) [21] and deep recurrent networks (RNNs) [35], have made performance breakthroughs on many real-world perception problems."]}
|
| 3 |
+
{"2276942|18050848": ["Because visual data provides a stream of information that is separate from the audio and invariant to acoustic noise, AVSR has shown noticable improvements over audio-only speech recognition in both clean and noisy conditions [2, 3, 4, 5, 6, 7, 9]."]}
|
| 4 |
+
{"1688357|7983519": ["The task of referring expression generation (REG) has been studied since the 1970s [40,22,30,7], with most work focused on studying particular aspects of the problem in some relatively constrained datasets.", "Referring expression generation has been studied for many years [40,22,30] in linguistics and natural language processing."]}
|
| 5 |
+
{"207107473|15369615": []}
|
| 6 |
+
{"15512141|18050848": ["Such improvements have been typically demonstrated on databases of small duration, and, in most cases, limited to a very small number of speakers (mostly less than ten, and often singlesubject) and to small vocabulary tasks [18], [ 21 ].", "A number of audio-visual corpora, commonly used in the literature, are listed in Table II. Notice that most are the product of efforts by few university groups or individual researchers with limited resources, and as a result, they suffer from one or more shortcomings [18], [ 21 ], [136]: They contain a single or small number of subjects, affecting the generalizability of developed methods to the wider population; they typically have small ..."]}
|
| 7 |
+
{"15512141|192934": ["The decision fusion framework, on the other hand, provides a mechanism for capturing these reliabilities, by borrowing from classifier combination theory, an active area of research with many applications [91] [92] [93]."]}
|
| 8 |
+
{"206742471|8777381": ["It is well accepted amongst the research community that certain acoustic and prosodic features play an important role in recognising the affective state [28]."]}
|
| 9 |
+
{"6733201|18050848": ["Audio-visual integration can be divided into three categories: feature fusion, decision fusion and model fusion [3-5].", "Many studies have shown that the integration of audio and visual features leads to more accurate speaker identification even in noisy environments [1-3]."]}
|
| 10 |
+
{"14415655|9835525": ["A popular technique is to compute a set of localized color histograms for each image and use a histogram distance function to detect boundaries [6, 7]."]}
|
| 11 |
+
{"162180|9045232": ["Over the years various methods for the detection of faces in images and image sequences are reported, see [95] for a comprehensive and critical survey of current face detection methods.", "Face detection techniques aim to identify all image regions which contain a face, regardless of its three-dimensional position, orientation, and lighting conditions used, and if present return their image location and extents [95]."]}
|
| 12 |
+
{"162180|192934": ["According to [37] the four best approaches for pattern recognition are:", "\u2022 Bayes classifier: assigns a pattern to the class which has the maximum estimated posterior probability [37]; \u2022 Decision tree: assigns a pattern to a class based on a hierarchical division of feature space [37]; \u2022 k-Nearest neighbor: assigns a pattern to the majority class among the k patterns with smallest distance in feature space [37]; \u2022 Hidden Markov model (HMM): assigns a pattern to a class based on a sequential model of state and transition probabilities [46, 69];"]}
|
| 13 |
+
{"6387482|4491892": ["These methods are also known as Sequential Monte Carlo (SMC) methods [33]."]}
|
| 14 |
+
{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]}
|
| 15 |
+
{"8745888|7983519": ["Referring expression generation is a classic NLP problem (see e.g., [54, 31]).", "Specifically, our model is based upon recently developed methods that combine convolutional neural networks (CNNs) with recurrent neural networks (RNNs)."]}
|
| 16 |
+
{"7332452|393948": ["Recent progress on deep learning is reviewed in [3]."]}
|
| 17 |
+
{"4209000|6387482": ["Note that simple fusion strategies, such as the early or late fusion, usually result in limited performance gain since the intrinsic relations among multiple feature representations are overlooked [4]."]}
|
| 18 |
+
{"7062194|6387482": []}
|
| 19 |
+
{"15315731|12607466": ["The fuzzy logic is applied both as a feature transform operator or a decision operator for image fusion [47, 51, 48, 52, 53, 49, 54, 55, 50, 56, 41, 57, 58, 60, 88, 59, 87, 89, 90, 91, 43, 82, 92].", "There are several applications of fuzzy logic base image fusion such as brain diagnosis [47, 48, 49, 50], cancer treatment [51], image segmentation and integration [51, 52], maximization mutual information [53], deep brain stimulation [54], brain tumor segmentation [55], image retrieval [56, 57], spatial weighted entropy [56], feature fusion [56], multimodal image fusion [41, 58, 59], ovarian cancer diagnosis [60], sensor fusion [88], natural computing methods [87] and gene expression [89, 90].", "The ability to train the neural network to adopt to these changes enable several applications for medical image fusion such as solving the problems of feature generation [36], classification [36], data fusion [36, 19, 27], image fusion [37, 38, 27, 39, 40, 41, 42, 43], micro-calcification diagnosis [19], breast cancer detection [38, 44, 45], medical diagnosis [27, 28, 42], cancer diagnosis [46], natural computing methods [87] and classifier fusion [45].", "The improvements of feature processing and analysis can be improved to fit the fuzzy space better when combined with probabilistic approaches such as fuzzy-neural network [41, 43], fuzzy-genetic-neural network-rough set [87], fuzzy-probability [89] and neuro-fuzzy-wavelet [82].", "Some of examples of these are wavelet-neural network [27, 28, 40], neural-fuzzy [41, 43], fuzzy-genetic-neural network-rough set [87] and SVM-ANN-GMM [45]."]}
|
| 20 |
+
{"15315731|10863733": []}
|
| 21 |
+
{"2257674|18050848": ["Yet, audio and lip information have been used for speaker identification and/or verification in relatively few works such as [3], [4], [5], [6], [7], [8]."]}
|
| 22 |
+
{"1033682|174797842": []}
|
| 23 |
+
{"11384576|6387482": []}
|
| 24 |
+
{"11384576|10397481": []}
|
| 25 |
+
{"11384576|2748484": ["Computational models of single- and multimodal saliency [10]\u2013[13] have been applied to emerging multimedia applications such as automatic video abstraction, summarization, indexing, and browsing [14], [15].", "An extensive survey on methods and taxonomies from the vast literature on video abstraction and summarization can be found in [18] and detailed field overviews in [15], [16]."]}
|
| 26 |
+
{"4537870|206602044": ["A number of diarization methods were recently proposed, e.g. [1]."]}
|
| 27 |
+
{"12818375|2748484": []}
|
| 28 |
+
{"13298437|7185733": ["For a comprehensive survey of hand and arm gesture recognition see Pavlovic et al. [ 17 ]."]}
|
edge/graph_10146579.jsonl
ADDED
|
@@ -0,0 +1,30 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"2119026|417250": ["In FOSD, a program is viewed as a composition of features [1]."]}
|
| 2 |
+
{"17031114|8296351": []}
|
| 3 |
+
{"9125809|8296351": ["There are different approaches and notations for describing feature models [12].", "Solver technology can be employed to answer a number of questions on feature models including whether a feature selection is valid or whether a feature is always, sometimes, or never present when another feature is present [12], which is interesting information for reference checking.", "Commonly, a feature model defines which feature selections are valid [13], and tools are available that check selections for validity [12,23]."]}
|
| 4 |
+
{"9125809|417250": ["A feature is a unit of functionality of a software system that satisfies a requirement, represents a design decision, or provides a configuration option [3].", "Feature-Oriented Software Development (FOSD) is a paradigm for the development of software product lines [3,11,13, 26]."]}
|
| 5 |
+
{"2679466|417250": ["feature management) is one of the reasons of the success of contemporary feature-oriented languages and tools [3].", "A feature is a unit of functionality of a program that satisfies a requirement, represents a design decision, or provides a potential configuration option [3]."]}
|
| 6 |
+
{"8649253|11607029": ["Often simple rules such as replacement, concatenation, specialization, or overriding suffice, but the approach is open to more sophisticated rules known from multidimensional separation of concerns [16] or software merging [32]."]}
|
| 7 |
+
{"13986823|9766972": ["For an overview of the field see a recent survey [52]."]}
|
| 8 |
+
{"13986823|14022070": ["Moreover, combinatorial testing allows to compute a set of con-\ufb01gurations that cover all combinations among all n -sized sets of con\ufb01guration options [43, 24].", "Beyond opportunistic and ad-hoc testing of individual con\ufb01gura-tions [32, 43], developers could write simple test cases validating .", "Sampling strategies, e.g. pairwise sampling [43, 24], can help to reduce the test effort, but are intrinsically incomplete."]}
|
| 9 |
+
{"8497188|8296351": ["Benavides et al. [37] provide state-of-the-art information on the analysis of feature models, leveraging the operations employed in model veri\ufb01cation."]}
|
| 10 |
+
{"8497188|627405": ["The importance of SLR for software engineering has been addressed by a reasonable amount of studies, as deeply discussed in [12\u201315]."]}
|
| 11 |
+
{"7092094|8296351": ["There are many different notations and extensions of variability models [9], [19].", "For many of these questions, we may be tempted to use automated analyses of feature models, that has been broadly investigated in literature [9].", "\u2026statistics about feature models and to detect inconsistencies in feature models, e.g., dead features which are not contained in any valid configuration or false optional features which are declared as optional but actually required in all valid configurations due to cross-tree constraints [9].", "There are numerous approaches to reason about valid feature combinations in feature models [9].", "A common form of variability models are feature models [2], [8], [9]."]}
|
| 12 |
+
{"7092094|417250": ["Proponents of feature-oriented software development argue that this simple 1:1 mapping is a strength in understanding and structuring the product-line implementation [23]."]}
|
| 13 |
+
{"61456903|8296351": []}
|
| 14 |
+
{"61456903|16125167": ["For yet other concerns of the system that are currently not configurable, no tracing information may be present in the source code; in such cases, tracing links can be extracted manually or with semi-automatic feature-location tools (Biggerstaff et al. 1993; Robillard and Murphy 2002; Poshyvanyk et al. 2007; Cornelissen et al. 2009)."]}
|
| 15 |
+
{"61456903|206778272": []}
|
| 16 |
+
{"61456903|11607029": ["In practice, merges are mostly performed in a line-based fashion using textual patches, and only when there is a conflict (that is when different changes are applied to the same line) manual intervention is necessary (Mens 2002).", "Although language-specific merge mechanisms exist (Mens 2002; Apel et al. 2012b), merging is usually performed in a text-based fashion, oblivious to the meaning of the merged artifacts."]}
|
| 17 |
+
{"61456903|417250": []}
|
| 18 |
+
{"6100651|10146579": ["Recent surveys on product-line analyses give a detailed overview on related work [55] and related tools [37]."]}
|
| 19 |
+
{"6100651|9766972": ["Consequently, it seems useful to combine several techniques for product-line verification [55].", "In the last decade, several verification approaches have been proposed that take commonality and variability in a product line into account [55].", "So far, researchers evaluated product-line analyses only for product lines with defects or without [55].", "Recent surveys on product-line analyses give a detailed overview on related work [55] and related tools [37].", "Others specify the expected behavior with an extension of \u03bc-calculus [25], computation tree logic [18], and aspect-oriented programming [4, 6] (for further techniques see [55]), whereas we are the first to check feature-oriented contracts with model checking.", "A well-known strategy is family-based verification, in which all products are verified simultaneously \u2013 either by making tools variability-aware or by transforming compile-time into runtime variability [55].", "A simple strategy for product-line verification is to generate and verify all products individually, known as product-based verification [55]."]}
|
| 20 |
+
{"7015696|417250": ["Feature-oriented software development (FOSD) is a paradigm for the construction, customization, and synthesis of software systems (Apel and Ka\u0308stner, 2009).", "Feature-oriented software development (FOSD) is a paradigm for the construction, customization, and synthesis of software systems (Apel and K\u00e4stner, 2009)."]}
|
| 21 |
+
{"9766972|8296351": ["\u2026focus only on testing are outside the scope of this article; we refer the reader to dedicated surveys on feature-model analysis [Janota et al. 2008; Benavides et al. 2010] and on product-line testing [Tevanlinna et al. 2004; Engstro\u0308m and Runeson 2011; Da Mota Silveira Neto et al. 2011; Oster et\u2026", ", feature-model analysis) or that focus only on testing are outside the scope of this article; we refer the reader to dedicated surveys on feature-model analysis [Janota et al. 2008; Benavides et al. 2010] and on product-line testing [Tevanlinna et al."]}
|
| 22 |
+
{"9766972|14022070": ["A typical strategy is to sample a smaller number of products, usually based on some coverage criteria, such that still reasonable statements on the correctness or other properties of the entire product line are possible [Oster et al. 2010; Perrouin et al. 2010; Nie and Leung 2011].", "While most coverage criteria such as pair-wise or t-wise coverage are often proposed for testing of single systems [Nie and Leung 2011] and product lines [Oster et al. 2010; Perrouin et al. 2010], they have also been applied to scale-type checking [Jayaraman et al. 2007; Liebig et al. 2013], static\u2026", "While most coverage criteria such as pair-wise or t-wise coverage are often proposed for testing of single systems [Nie and Leung 2011] and product lines [Oster et al.", "A frequently stated assumption is that most faults are caused by an interaction of only few features [Nie and Leung 2011; Kuhn et al. 2013].", "reasonable statements on the correctness or other properties of the entire product line are possible [Oster et al. 2010; Perrouin et al. 2010; Nie and Leung 2011]."]}
|
| 23 |
+
{"571642|417250": ["Vol. 8, No. 6, September\u2013October 2009"]}
|
| 24 |
+
{"16206467|8296351": ["However, a more detailed discussion is outside the scope of this paper; see [7, 14, 32, 62] for more information about using variability models in variability analysis.", "For related work on implementing variability, on the variability-aware lexer, and on variability-aware type systems, see our discussions in prior work [30, 32, 33]; for a comprehensive discussion on variability-model analysis and reasoning about variability, we recommend Benavides\u2019 survey [7]."]}
|
| 25 |
+
{"16206467|417250": []}
|
| 26 |
+
{"16852033|627405": ["003 since they are considered the world leading publishers for high quality publications [11]."]}
|
| 27 |
+
{"17836427|8296351": ["Figure 1: A simple feature model of a mobile phone product line [1], representing the features and their dependencies."]}
|
| 28 |
+
{"8018012|417250": []}
|
| 29 |
+
{"16076198|8296351": ["Feature model analysis [18] aims at finding inconsistencies in feature models, e."]}
|
| 30 |
+
{"16076198|417250": ["Our solution is to create derivatives [13], i."]}
|
graph_1113420.jsonl β edge/graph_10147053.jsonl
RENAMED
|
File without changes
|
edge/graph_10148401.jsonl
ADDED
|
@@ -0,0 +1,19 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"16185925|1236072": []}
|
| 2 |
+
{"16948685|1230643": ["therefore, energy conservation is the most important performance objective[ 1 ,2] to extend network lifetime while designing WSN protocols, such as media access control[3], routing [4-5],data aggregation[6]for WSN[7].", "wireless sensor networsk(WSNs)is a new network paradigm that involve the deployment of hundreds-even thousand-of low-cost, energy-limited, small, and applicationspecific sensor nodes to create applications for factory monitoring and control, disaster response, military sensing intelligent house control, and, etc [ 1 ].Since WSN is typically deployed in an uncontrolled or unreachable environment, each sensor node carries a limited, generally ..."]}
|
| 3 |
+
{"19799172|1236072": ["Many routing protocols have been specifically designed for the wireless sensor networks where several factors such as energy efficiency, low latency, and success rate are necessary to take into account [2], [4], [5]."]}
|
| 4 |
+
{"19799172|1230643": ["Recently, advances in minimization, low-power, low-cost, efficient and multi-functional wireless communication equipment, and improved small-scale energy supplies make a new hi-tech dream achievable: wireless sensor networks [1], [2]."]}
|
| 5 |
+
{"19799172|14441987": ["Since the 1970s, wireless networks have been showing huge interest to the computing industry and the research community [3]."]}
|
| 6 |
+
{"19799172|1708582": ["However, the Bant uses a reinforcement learning algorithm [18], [19] in order to get a better and more efficient route than the one chosen by the Fant and at the end it updates the routing tables of the reverse-visited sensor nodes."]}
|
| 7 |
+
{"13956612|1236072": []}
|
| 8 |
+
{"13956612|1230643": []}
|
| 9 |
+
{"13416245|15300368": []}
|
| 10 |
+
{"13515148|1236072": []}
|
| 11 |
+
{"493649|1236072": []}
|
| 12 |
+
{"493649|1230643": ["Typical applications include, but are not limited to, data collection, monitoring, surveillance, and medical telemetry [1, 2].", "However, this cause delays in propagation of data through the nodes."]}
|
| 13 |
+
{"16154982|1230643": ["Although some applications involve a small number of sensors (10-20), other applications may involve a large number of sensor nodes (100-1000) [5]."]}
|
| 14 |
+
{"11564347|1708582": ["This gives rise to a credit assignment problem typical of the reinforcement learning (cid:12)eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996).", "This gives rise to a credit assignment problem typical of the reinforcement learning eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996)."]}
|
| 15 |
+
{"15225372|1230643": ["With the rapid development of wireless communication technology, micro electromechanical technology and sensor technology, Wireless Sensor Networks [ 1 , 2] has become a research hotspot that receives much attention."]}
|
| 16 |
+
{"15187780|14441987": ["The traditional routing protocols defined for wireless ad hoc networks [1] [9] are not well suited due to the following reasons: 1."]}
|
| 17 |
+
{"9809074|1236072": ["Recent advance in micro-electromechanical system technology has made it possible to develop low-power and low-cost sensors with at a much reduced cost, so that large wireless sensor networks with thousands of tiny sensors are well within the realm of reality."]}
|
| 18 |
+
{"20991280|1236072": ["Several power-efficient routing protocols have been proposed to address this topic [2]."]}
|
| 19 |
+
{"36606936|14441987": ["The traditional routing protocols for wireless ad hoc networks [2] are not well suited for sensors networks."]}
|